scholarly journals Cyber-security for Mobile Service Robots – Challenges for Cyber-physical System Safety

Author(s):  
Wojciech Dudek ◽  
Wojciech Szynkiewicz

A review of the known and an indication of the new threats for cyber-physical robotic systems, caused by cybernetic attacks, serves, in this paper, as a basis for the analysis of the known methods relied upon to detect and mitigate consequences of such attacks. A particular emphasis is placed on threats specific for cyber-physical systems, as they are a feature distinguishing these systems from their traditional Information and Communication Technologies (ICT) counterparts. Based on the review of literature and own analyses, unresolved issues regarding the cyber-security of robot systems are presented and discussed.

2021 ◽  
Vol 16 (1) ◽  
pp. 47-60
Author(s):  
Michaela Šimonová ◽  

The arrival of information and communication technologies is nothing new. The number of people using these technologies and moving in cyberspace is growing, and therefore it is an important role of the state to respond sufficiently to such developments. A fundamental role of the state is to create a stable security system consisting of complex legislation as well as creation of a legislative environment capable of responding flexibly to the growing number of diverse incidents in cyberspace. Sufficient legal regulation consisting of unambiguous determination of competencies and tasks of individual subjects represents the basic pillar for the creation of a stable security system. The role of the state is also to maintain existing and create new partnerships with organizations that are able to provide relevant information and knowledge in the field of cyber security.


Author(s):  
Eric Luiijf

Advancements of information and communication technologies (ICT) cause infrastructure owners to augment current infrastructures with such ICT. The creation of more efficient and effective end-user services provides economical benefits and increases customer satisfaction. Concurrently, ICT advancements allow governmental and industrial sectors to develop complete new infrastructures and infrastructure services, the so called Next Generation Infrastructures (NGI). NGI will offer new services to society, end-users and the supply-chain of organisations and linked, dependent infrastructural services. For over fifty years, the introduction of new ICT-based services and infrastructures has been tightly coupled with failures in ICT-security. This chapter on NGI discusses the root causes of these security failures. Based on historical experiences, this chapter predicts threats and cyber security failures alike for the envisioned NGI such as smart (energy) grids, smart road transport infrastructure, smart cities, and e-health. This prediction will become reality unless fundamental changes in the approach to security of ICT-based and ICT-controlled infrastructures are taken.


Author(s):  
Babar Bhatti

Social media is transforming the way we find, create, and share information during the course of our personal life and work. The rapid growth of social media and the ubiquitous sharing and access of information through various digital channels has created new vulnerabilities and cyber threats. This chapter will provide an overview of the security and privacy implications of social networks and communities. The goal of this chapter is to examine and raise awareness about cyber security threats from social media, to describe the state of technology to mitigate security risks introduced by social networks, to shed light on standards for identity and information sharing or lack thereof, and to present new research and development. The chapter will serve as a reference to students, researchers, practitioners, and consultants in the area of social media, cyber security, and Information and Communication technologies (ICT).


Cyber Crime ◽  
2013 ◽  
pp. 1711-1727
Author(s):  
Babar Bhatti

Social media is transforming the way we find, create, and share information during the course of our personal life and work. The rapid growth of social media and the ubiquitous sharing and access of information through various digital channels has created new vulnerabilities and cyber threats. This chapter will provide an overview of the security and privacy implications of social networks and communities. The goal of this chapter is to examine and raise awareness about cyber security threats from social media, to describe the state of technology to mitigate security risks introduced by social networks, to shed light on standards for identity and information sharing or lack thereof, and to present new research and development. The chapter will serve as a reference to students, researchers, practitioners, and consultants in the area of social media, cyber security, and Information and Communication technologies (ICT).


2016 ◽  
Vol 66 (6) ◽  
pp. 557
Author(s):  
Indivar Gupta ◽  
P.R. Mishra

<p>In the present cyber age, public services are getting more and more dependent on use of Information and communication technologies (ICT) day by day. A number of applications viz., Internet of Things, PDF, cloud computing and virtualization and machine to machine (M2M) system usage are sneaking deeply into our everyday life. The more we depend on ICT, the more deepens our concern about IT security or cyber security. Cyber security protects the data and integrity of assets that belong to or connect to a network. It is meant to defend those assets against all sorts of threat actors throughout the life cycle of a cyber attack. It is quite unsurprising that cyber security industry is growing at the same pace as ICT is doing.</p>


Author(s):  
Jeffrey Kurebwa

This study provides an understanding of cyber security and further analyses the Cyber Security and Data Protection Bill of Zimbabwe. The internet and other technological developments have provided a variety of platforms for increased and sometimes unrestricted exercise of freedom of expression, association, online transactions, and access to information rights. Zimbabwe has faced increased threats from cyber activities. This has necessitated the country to enact the Cyber Security and Data Protection Bill. The purpose of the Cyber Security and Data Protection Bill is to increase cyber security in order to build confidence and trust in the secure use of information and communication technologies by data controllers, their representatives, and data subjects. This study relied on data gathered through key informant interviews and documentary search. The key informants were drawn from various institutions that deal with cybercrime. Zimbabwe does not have adequate and effective legislative instruments to combat cybercrime.


2021 ◽  
Author(s):  
Temitope O Awodiji

Based on Information and Communication Technologies (ICT) fast advancement and the integration of advanced analytics into manufacturing, products, and services, several industries face new opportunities and at the identical time challenges of maintaining their ability and market desires. Such integration, that is termed Cyber-physical Systems (CPS), is remodeling the industry into a future level. CPS facilitates the systematic conversion of big data into information that reveals invisible patterns of deterioration and inefficiency and leads to better decision-making. This project focuses on existing trends within the development of industrial huge information analytics and CPS. Then it, in brief, discusses a system architecture for applying CPS in manufacturing referred to as 5C. The 5C architecture, comprises necessary steps to totally integrate cyber-physical systems within the manufacturing industry.


2019 ◽  
Vol 52 (3) ◽  
pp. 56-64
Author(s):  
Lesław Pietrewicz

The topic of coordination arises whenever various tasks or resources must be employed together to produce desirable outcomes. Whereas the complexity of tasks and interactions needed to produce results increase coordination needs, advances in information and communication technologies (ICT) dramatically improve its possibilities. Vertically and horizontally integrated Industry 4.0 manufacturing systems, using ICT to interact with and expand the capabilities of the physical systems, both demand enhanced coordination within and between organizations, and are themselves designed to foster coordination, making coordination in the age of Industry 4.0 a particularly timely and challenging research topic. The paper contributes to the emerging stream of literature on coordination in the age of Industry 4.0 by analyzing the characteristics of blockchain as a coordination mechanism and its application to the hybrid cyber-physical production systems.


Author(s):  
K. Blishchuk ◽  
O. Domsha

Problem setting. Digital economy should be considered as the new phenomenon, which was formed under the influence of progressive changes in technology and is a system of economic relations based on the usage of digital media means of information transmission. The development of the digital economy requires new approaches, methods and tools of building the system of public administration, which has significantly evolved under the influence of democratic transformations and the development of civil society. Therefore, nowadays there is a demand for understanding the essence of the digital economy in society as an objective reality that is confidently evolving, as well as for finding further ways to its development as a part of the system of public administration. Recent research and publications analysis. Issues of digitalization and digital economy are raised in the publications of such researchers as V. Apalkova, N. Dieieva, A. Dobrynin, S. Vereteniuk, H. Karcheva, V. Kuibida, S. Koliadenko, N. Kraus, D. Laion, V. Liashenko, A. Maslov, K. Semiachkov and others. The use of information and communication technologies in the field of public administration is revealed in the works of such scientists as O. Bernaziuk, N. Hrytsiak, N. Drahomyretska, O. Yemelianenko, T. Kaminska, A. Kaminskyi, O. Kachnyi, S. Kutsenko, I. Lopushynskyi, V. Nikolaiev, V. Pysarenko, A. Semenchenko, S. Chukut and others. However, there is the necessity for comprehensive research on the transformational changes connected to the digitalization of economic processes in the society. Highlighting previously unsettled parts of the general problem. The aim of the article is to substantiate the directions of the digital economy development as a component of the public administration system based on the study of the features of the category “digital economy”, analysis of the problems related to the functioning of the digital economy in modern society. Paper main body. The digital economy is the important basis for the functioning of the information society on the basis of information and communication technologies, according to that it can be attributed to the priorities of the public administration system development. The author’s definition of the digital economy from the position of a component of the public administration system as a complex model of interaction of economic and managerial entities operating on the basis of widespread use of information and communication technologies to meet the needs of the population and increase the efficiency of the public sector. The development of the digital economy and digital technologies is important for the public sector, taking into account the services received by both businesses and citizens of the country. The most common digital services available in the world today are registration of the new business, applying for a business license, applying for a birth certificate, and paying for utilities. The main factors that hinder the spread of digital services are the low level of financing for technological development and cyber security, the presence of software piracy, insufficient protection of intellectual property rights, insufficient number of mobile broadband subscribers, significant investment risks, undeveloped financial and banking services. Ukraine’s strengths contributing to the development of the digital economy are high-quality training of IT professionals, their ability to work with large data sets, e-democracy, sufficient speed of Internet connections and the implementation of investment projects in the field of telecommunications. This gives grounds to assert the significant opportunities of the Ukrainian state to develop the digital economy in the future. The government together with business have to take the following steps to overcome the problem of developing the digital economy: to develop the infrastructure for mobile Internet, Internet of things, cloud technologies and cyber security, i.e. “solid” infrastructure; to create full-fledged conditions for e-commerce and e-business; to form “soft” infrastructure aimed at data openness, identification and trust of citizens, the improvement of public services, etc .; to provide digital transformation projects through their implementation at the regional and national levels; to provide the population with information about possible risks from the total digitalization of the economy; to ensure technological and consulting support in the field of using secure information and communication systems. The development of the digital economy is an objective reality nowadays, taking into account the rapid progress in the field of technological and innovative support of all spheres of society. Digitalization will reduce the cost of paper money transactions, reduce corruption by providing most transactions electronically, facilitate access to most public administration services, and increase the efficiency of the economy on the whole. Conclusions of the research and prospects for further studies. The digital economy as a component of public administration system is the complex concept that involves the digitalization of public services and the development of the public sector through the active introduction of digital products in all spheres of the society. Considering the potential of Ukraine, its strengths and global trends that objectively affect the Ukrainian state, we can predict that the development of the digital economy will transform domestic industries and reformat them according to the needs and demands of the population.


ANCIENT LAND ◽  
2021 ◽  
Vol 03 (03) ◽  
pp. 32-35
Author(s):  
İxtiyar Bəxtiyar oğlu Xanızadə ◽  

The present stage of development is characterized by strong scientific and technical development, which includes high-tech industries. Thus, information and communication technologies (ICT) are one of the main factors influencing the formation of 21st century society. Their revolutionary influence is constantly growing on the security of people's livelihoods, their work and education, and the interaction between the state and civil society. ICT is becoming more and more important stimulus for world community development. However, more precisely, ET development is always accompanied by negative social impacts, including various types of crimes. The rapid development of computer technology, in particular, has led to the expansion of crimes related to electronic processing of information, including crime-related types of terrorism. The article explores the problems of Information Security at the Airports, and cyber security caused by information security. Particular attention is paid to the illegal acquisition of information, the methods used to protect information, the use of illegally obtained information for personal gain, and the interference in the operation of life support facilities. Key words: information, information security, cyberterrorizm


Sign in / Sign up

Export Citation Format

Share Document