scholarly journals Contemporary Issues in Cybersecurity

2016 ◽  
Vol 1 (1) ◽  
pp. 1-6
Author(s):  
Harry Katzan

The effectiveness of modern computer applications is normally regarded as a function of five basic attributes of secure computer and information systems: availability, accuracy, authenticity, confidentiality, and integrity.  The concepts generally apply to government, business, education, and the ordinary lives of private individuals.  The considerations normally involve extended Internet applications – hence the name Cybersecurity.  Achieving and maintaining a secure cyberspace is a complicated process, and some of the concerns involve personal identity, privacy, intellectual property, the critical infrastructure, and the sustainability of organizations.  The threats to a secure operating infrastructure are serious and profound: cyber terrorism, cyber war, cyber espionage, and cyber crime, to which the technical community has responded with safeguards and procedures, usually supplied by the private sector.  This paper provides a comprehensive view of security in the cyber domain with the ultimate objective of developing a science of cybersecurity.

2012 ◽  
Vol 5 (2) ◽  
pp. 71-78
Author(s):  
Harry Katzan, Jr.

The efficacy of modern computer systems is normally regarded as a function of five basic attributes of computer and information security: availability, accuracy, authenticity, confidentiality, and integrity. The concepts generally apply to government, business, education, and the ordinary lives of private individuals. The considerations normally involve extended applications of the Internet hence the name Cybersecurity. Achieving and maintaining a secure cyberspace is a complicated process, and some of the concerns involve personal identity, privacy and intellectual property, secure maintenance of the critical infrastructure, and the sustainability of organizations. The threats to a secure operating infrastructure are serious and profound: cyber terrorism, cyber war, cyber espionage, and cyber crime, to which the technical community has responded with a plethora of ad hoc safeguards and procedures, usually supplied by the competitive private sector. This paper proposes a fresh view of the cyber domain based on service science with the ultimate objective of developing a cybersecurity service model.


2013 ◽  
Vol 3 (3) ◽  
pp. 1-18 ◽  
Author(s):  
Martti Lehto

Threats in cyberspace can be classified in many ways. This is evident when you look at cyber security on a multinational level. One of the most common models is a threefold classification based on motivational factors. Most nations use this model as a foundation when creating a strategy to handle cyber security threats as it pertains to them. This paper will use the five level model: cyber activism, cybercrime, cyber espionage, cyber terrorism and cyber warfare. The National Cyber Security Strategy defines articulates the overall aim and objectives of the nation's cyber security policy and sets out the strategic priorities that the national government will pursue to achieve these objectives. The Cyber Security Strategy also describes the key objectives that will be undertaken through a comprehensive body of work across the nation to achieve these strategic priorities. Cyberspace underpins almost every facet of the national functions vital to society and provides critical support for areas like critical infrastructure, economy, public safety, and national security. National governments aim at making a substantial contribution to secure cyberspace and they have different focus areas in the cyber ecosystem. In this context the level of cyber security reached is the sum of all national and international measures taken to protect all activities in the cyber ecosystem. This paper will analyze the cyber security threats, vulnerabilities and cyber weaponry and the cyber security objectives of the Cyber Security Strategies made by Australia, Canada, Czech Republic, Estonia, Finland, Germany, the Netherlands, the United Kingdom and the United States.


Author(s):  
Mikhail Selianinau

AbstractIn this paper, we deal with the critical problem of performing non-modular operations in the Residue Number System (RNS). The Chinese Remainder Theorem (CRT) is widely used in many modern computer applications. Throughout the article, an efficient approach for implementing the CRT algorithm is described. The structure of the rank of an RNS number, a principal positional characteristic of the residue code, is investigated. It is shown that the rank of a number can be represented by a sum of an inexact rank and a two-valued correction to it. We propose a new variant of minimally redundant RNS, which provides low computational complexity for the rank calculation, and its effectiveness analyzed concerning conventional non-redundant RNS. Owing to the extension of the residue code, by adding the excess residue modulo 2, the complexity of the rank calculation goes down from $O\left (k^{2}\right )$ O k 2 to $O\left (k\right )$ O k with respect to required modular addition operations and lookup tables, where k equals the number of non-redundant RNS moduli.


2020 ◽  
Vol 13 (1) ◽  
pp. 291
Author(s):  
Masike Malatji ◽  
Annlizé L. Marnewick ◽  
Suné von Solms

The water and wastewater sector is an important lifeline upon which other economic sectors depend. Securing the sector’s critical infrastructure is therefore important for any country’s economy. Like many other nations, South Africa has an overarching national cybersecurity strategy aimed at addressing cyber terrorism, cybercriminal activities, cyber vandalism, and cyber sabotage. The aim of this study is to contextualise the water and wastewater sector’s cybersecurity responsibilities within the national cybersecurity legislative and policy environment. This is achieved by conducting a detailed analysis of the international, national and sector cybersecurity stakeholders; legislation and policies; and challenges pertaining to the protection of the water and wastewater sector. The study found some concerning challenges and improvement gaps regarding the complex manner in which the national government is implementing the cybersecurity strategy. The study also found that, along with the National Cybersecurity Policy Framework (the national cybersecurity strategy of South Africa), the Electronic Communications and Transactions Act, Critical Infrastructure Protection Act, and other supporting legislation and policies make provision for the water and wastewater sector’s computer security incidents response team to be established without the need to propose any new laws or amend existing ones. This is conducive for the immediate development of the sector-specific cybersecurity governance framework and resilience strategy to protect the water and wastewater assets.


Author(s):  
Acheme Odeh

The internet technologies have made it even easier for terrorist activities to migrate smoothly to the internet. Nations are now benefiting from the act of cyberterrorism, making it more difficult to successfully fight this monster. This chapter aims to draw up a review on various published work addressing the financial benefits of cyberterrorism. The question is to know if economic benefits alone is significantly strong enough to encourage more cyberterrorism activities. Should this be the case, what can be done to curb this deadly cancer from spreading further? Scientific methods could prove to be a much efficient solution to the issue of cyber terrorism. But how is that going to happen and for how long should we wait to see this happen? Would it ever happen? Considering that the internet is an ever-growing technology with endless possibilities for both attackers and crime investigative specialist, do we forsee a cyber war between nations who can boost of better fighting and defending technologies? These questions and many more are discussed based on recent literature.


Author(s):  
Murray E. Jennex

Cyber war and cyber terrorism is real and is being waged. Cyber terrorists and cyber warriors are attacking systems and succeeding in their attacks. This requires management to prepare for the worst case, the loss and destruction of critical data and systems. This chapter helps management prepare for this worst case by discussing how to design and build emergency response systems. These systems are used to respond to worst case attacks. Additionally, these systems are useful for responding to other disasters that can cause the loss of systems and data. This chapter presents research into emergency response systems and concludes with a model of what an emergency response system should consist of.


Author(s):  
Usman Javed Butt ◽  
Maysam F. Abbod ◽  
Arvind Kumar

Marketing is a process of creating, capturing, and exchanging ‘value' for the mutual benefits of marketers, customers, intermediaries, and other stakeholders. Such a transaction requires trust as it might be facing a range of online cyber risks. Modern cybercrimes have exponentially grown over the last decade. Ransomware is one of the types of malware which is the result of a sophisticated attempt to compromise the modern computer systems. The businesses, governments, and large corporations are investing heavily to combat this cyber threat against their critical infrastructure. New technological shifts help to improve marketing and business productivity and keep the company's global competitiveness in an overflowing competitive market. However, the businesses and the systems involved need security measures to protect integrity and availability which will help avoid any malfunctioning to their operations due to the cyber-attacks. There have been several cyber-attack incidents on several businesses such as healthcare, pharmaceutical, water cleaning, and energy sector.


2017 ◽  
Vol 1 (1) ◽  
pp. 10
Author(s):  
Hala Abdelmoez Mohamed

Due to living in a society plagued by acceleration and significant development in building technology, information, and computer applications, a transformation in Arts and Architecture has resulted in a neglect, whether deliberate or non-deliberate, in the dimensions of moral and non–physical values such as heritage and civilization. It is safe to say that such neglect has led to the creation of Architectural products with no identities. As a result, an appearance of new architectural trends that includes Green and Smart Architecture, for instance, was identified. This new type of Architecture generally relies on merge between the use of the natural and surrounding environment in serving the design process as well as the use of modern computer applications, fixtures, technology, and new building materials combined to provide a comfortable and safe environment for users.When traditional Arab Architecture is the product of a rich experience of its manufacturers’, it presents an integrated mixture between each of the non–physical features represented in religious beliefs, traditions and customs prevailing in the community, and the physical elements that include the effects of the natural environment, climate changes, building materials, and natural resources available.Screening and Mashrabiah represent a very important element in traditional and Arab Architecture. It is also still being used nowadays in Modern Architecture after enduring a study of its functions, benefits, new materials and applications such as smart Mashrabiah. The conclusion of this research provides recommendations of new applications and Architectural treatments for Screening and Mashrabiah and their possible use as unique identity factors that represent our modern Architecture both in the Arab world and worldwide.


Sign in / Sign up

Export Citation Format

Share Document