scholarly journals A Comprehensive Analysis of Cyber Security Attacks in Virtual Organizations with their Mitigation Plans

Author(s):  
K S
2021 ◽  
Author(s):  
Abhi Patel ◽  
Tim Schenk ◽  
Steffi Knorn ◽  
Heiko Patzlaff ◽  
Dragan Obradovic ◽  
...  

2019 ◽  
pp. 1697-1710
Author(s):  
Paul Kariuki

It is critical that cyber education curriculum considers the growing cyber technologies and which aspects of these technologies need to be aligned with the fourth industrial revolution. This chapter seeks to present a comprehensive analysis of the current level of cyber security education in South Africa. It will also track the current trends of cyber security education in the country as well as examining any challenges being experienced including any knowledge gaps. In the end, the chapter proposes recommendations for consideration in strengthening cybersecurity education in the country in to achieve advanced cyber security responses, capable of mitigating any cyber security threats. Offering quality cyber security education is important in preparing the next generation cyber security practitioners, who are highly competent and capable of developing innovative solutions in response to the growing global demand of cyber technologies. The chapter ends by proposing specific strategies that can guide towards this ideal in the context of the fourth industrial revolution.


2020 ◽  
Vol 2020 ◽  
pp. 1-15
Author(s):  
Qiyi He ◽  
Xiaolin Meng ◽  
Rong Qu

CAV (connected and autonomous vehicle) is a crucial part of intelligent transportation systems. CAVs utilize both sensors and communication components to make driving decisions. A large number of companies, research organizations, and governments have researched extensively on the development of CAVs. The increasing number of autonomous and connected functions however means that CAVs are exposed to more cyber security vulnerabilities. Unlike computer cyber security attacks, cyber attacks to CAVs could lead to not only information leakage but also physical damage. According to the UK CAV Cyber Security Principles, preventing CAVs from cyber security attacks need to be considered at the beginning of CAV development. In this paper, a large set of potential cyber attacks are collected and investigated from the aspects of target assets, risks, and consequences. Severity of each type of attacks is then analysed based on clearly defined new set of criteria. The levels of severity for the attacks can be categorized as critical, important, moderate, and minor. Mitigation methods including prevention, reduction, transference, acceptance, and contingency are then suggested. It is found that remote control, fake vision on cameras, hidden objects to LiDAR and Radar, spoofing attack to GNSS, and fake identity in cloud authority are the most dangerous and of the highest vulnerabilities in CAV cyber security.


Author(s):  
Wolfgang Ziegler

While projects, developments and applications addressing and using artificial intelligence (AI) are rather multifaceted and their number is constantly increasing, the standardisation activities in the field of artificial intelligence are limited, their number is significantly lower and does not increase at the same pace. The European funded project StandICT.eu aims at supporting European experts’ presence in and contributions to international standardisation activities in ICT. The focus of the project is on the 5 priority domains identified by the European Commission (Cloud Computing, IoT, Big Data, Cyber Security, 5G) and on Artificial Intelligence while being open for other relevant topics defined in the annual European Rolling Plan for ICT Standardisation. The project has two main outcomes: (i) increased contribution of European experts in international standardisation through support by providing grants for planned contributions of successful applications of experts, and (ii) an online observatory of published standards and ongoing standardisation activities in the areas mentioned before. This observatory (called Standards Watch) is accessible through the project’s web site and open for contributions and comments from registered users. As part of the effort for the Standards Watch the projects has prepared a comprehensive analysis of the international standardisation landscape in the AI field, that comprises a description of the ICT standards and ongoing work at international level in the field of AI across the standardisation organisations already active in the field. In this article we will present results of our work where we have analysed the work of the 5 international and European Standards Development Organisations (SDOs) IEEE,1 ISO/IEC,2 ITU-T,3 ETSI4 and CEN-CENELEC5 developing standards in the field of AI. The first 4 bodies have already been active several years in AI standardisation at the time of writing this article. CEN-CENELEC has launched a focus group in 2019 which aims at producing a roadmap for AI standardisation. For these 4 SDOs information on their active groups, details of their work and the respective state/outcome is provided in the main part of this article. Followed by the same exercise for the two identified Standards Settings Organisations (SSOs): W3C6 and IRTF,7 their active groups and the respective state/outcome. With this information an initial analysis of the AI standardisation landscape as Q3 2019 is performed with the main outcomes that (i) the number of working groups chaired by Europeans is significant and (ii) that there is room for European experts contributing to ongoing and future standardisation work. The article is concluded by considerations on future priorities.


Author(s):  
Paul Kariuki

It is critical that cyber education curriculum considers the growing cyber technologies and which aspects of these technologies need to be aligned with the fourth industrial revolution. This chapter seeks to present a comprehensive analysis of the current level of cyber security education in South Africa. It will also track the current trends of cyber security education in the country as well as examining any challenges being experienced including any knowledge gaps. In the end, the chapter proposes recommendations for consideration in strengthening cybersecurity education in the country in to achieve advanced cyber security responses, capable of mitigating any cyber security threats. Offering quality cyber security education is important in preparing the next generation cyber security practitioners, who are highly competent and capable of developing innovative solutions in response to the growing global demand of cyber technologies. The chapter ends by proposing specific strategies that can guide towards this ideal in the context of the fourth industrial revolution.


2021 ◽  
pp. 8-17
Author(s):  
Mohammed I. Alghamdi ◽  

In the modern internet-connected society, technologies underpin almost every action in society. Although there have been positive effects of technologies in the organization, there have been forensic specialists indicating the issues and challenges with cyber security threats. The real-time conditions provide the capability of the organization in detecting, analyzing, and defending individuals against such threats. In this research project, the focus is on understanding the cyber security threats and the protection approaches to be utilized in safeguarding threats from financial institutions. With the Covid-19 pandemic, most of the financial firms, including Al Rajhi Bank, are utilizing technologies in their operations, and this has exposed them to cyber security threats. From the literature review conducted, the financial firms need to consider cyber security approaches including implementing triple DES, RSA, and blowfish algorithms in improving the security measures of the organizations.


2017 ◽  
Vol 36 ◽  
pp. 90-100 ◽  
Author(s):  
L. Pan ◽  
X. Zheng ◽  
H.X. Chen ◽  
T. Luan ◽  
H. Bootwala ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document