scholarly journals Contemporary Trends in Economic Cybersecurity

2019 ◽  
Vol 13 (4) ◽  
pp. 22-30
Author(s):  
Yu. Yu. Shitova ◽  
Yu. A. Shitov

This paper is devoted to the analysis of modern trends in economic cybersecurity. We analysed the dynamics of cyber-attacks over the past five years and, particularly, pointed on the main trends of 2018 year. Our analysis showed great diversity and variety of cyber-criminal actions: global espionage, financial attacks, card fraud, information theft and phishing, network attacks and traffic interception, cryptographers and extortionists, crypto-jacking. Further, we attempted to predict cyber threats that await us soon. We expected the main problems come from smart cyber-attacks, based on the latest technologies of artificial intelligence (AI) and machine learning (ML), as well as exploiting the vulnerabilities of the Internet of Things. Therefore, we ought to apply integrated approaches using the same innovative technologies. The cyber-crime industry will increasingly consolidate — the efforts will be focused on automating and streaming criminal cyber activities, and new technologies will further reduce the cost of searching for vulnerabilities. It means development of hacking tools while accelerating the speed and scale of attacks. We must implement an integrated, echeloned approach with the same innovative technologies of AI and MO used by hackers, to fight effectively with future cyber threats. Small and medium businesses will have the opportunity to purchase a cyber-defence service. An improvement of the internal IT culture in the company remains the critical issue, which is still a weak link in the chain and the target of cyber-attacks. We discuss the measures of legislative state support in Europe and Russia against cybercrime in the final section of the paper, followed by conclusion.

2021 ◽  
pp. 84-94
Author(s):  
Mohammed. I. Alghamdi ◽  

The cyber security risks on Intellectual Property (IP) have unfortunately become the center of media attention quite recently. The cyber domain has risen to the front position of national security policy in the United States. This growth has created room for developing a lot of innovative technologies to prevent IP cyber-attacks. Usually, cyber-attacks target private data. But cyber-attacks have recently expanded their threat level to intellectual property. These threats affect companies, people, and even national security. Cyber threats to IP will be victimized by globalization. Hence, this article is aimed to explore existing innovative technologies used to prevent IP cyber-attacks and their future scope. To find out the existing technologies used in the prevention of cyber-attacks, secondary data will be used from recent reports by various public and government organizations, research papers, and news portals, and other relevant sources. Since cyber threats are increasing, a comprehensive, multinational strategy is needed for making better cyber security infrastructure. This strategy would improve international relations, protect international supply chains, innovation, and reduce financial losses.


2019 ◽  
Vol 70 (2) ◽  
pp. 313
Author(s):  
Valeriy Yu. Bykov ◽  
Oleksandr Yu. Burov ◽  
Nina P. Dementievska

The article discusses the problems of cyber-security of participants of the educational process, emphasizes the fact that these problems are not limited to the technical aspects of the protection of information resources, they must include in their entirety the following types of protection: legal, technical, informational, organizational and psychological. Among the psychological tools for securing cyber-security, it is proposed to distinguish cognitive ones, as the general population, and especially children and youth, increasingly become targets of cyber-attacks, first of all, their cognitive sphere, becoming the most vulnerable (weak) link in the network. In anthropocentric networks, which make up an ever-increasing share among common networks, the network itself acquires new properties, acting as an independent component (in addition to factors such as the network node, interface and links). Threats to participants in the educational process from the cyberspace should be regarded as passive and active, developing adequate means of protection and viability of the system "subject of educational process-learning-environment". The most significant among cyber-threats for the participants of the educational process are the social engineering methods, which knowledge and resistance can be the most effective for providing cyber-security. As part of the training of participants in the educational process on cyber-security, it is proposed to use "cyber vaccination", that is the formation of a conscious cognitive experience of staying under the influence of a cyber threat and counteracting it as a system of training activities that include, in addition to traditional methods, training of "cyber attacks", as well as the formation of knowledge and skills of resilience (recovery) in relation to cyber-threats. Further research is suggested to focus on the detailed development of types of threats to participants in the education process, as well as methods of counteraction. A special place should be a problem of resistance to cyber-threats, which can use the experience of training operators in emergent industries, including assessing the current state of the person and necessary adjustments in order to optimize its performance.


2019 ◽  
Vol 27 (2) ◽  
pp. 292-323 ◽  
Author(s):  
Omerah Yousuf ◽  
Roohie Naaz Mir

Purpose Internet of Things (IoT) is a challenging and promising system concept and requires new types of architectures and protocols compared to traditional networks. Security is an extremely critical issue for IoT that needs to be addressed efficiently. Heterogeneity being an inherent characteristic of IoT gives rise to many security issues that need to be addressed from the perspective of new architectures such as software defined networking, cryptographic algorithms, federated cloud and edge computing. Design/methodology/approach The paper analyzes the IoT security from three perspectives: three-layer security architecture, security issues at each layer and security countermeasures. The paper reviews the current state of the art, protocols and technologies used at each layer of security architecture. The paper focuses on various types of attacks that occur at each layer and provides the various approaches used to countermeasure such type of attacks. Findings The data exchanged between the different devices or applications in the IoT environment are quite sensitive; thus, the security aspect plays a key role and needs to be addressed efficiently. This indicates the urgent needs of developing general security policy and standards for IoT products. The efficient security architecture needs to be imposed but not at the cost of efficiency and scalability. The paper provides empirical insights about how the different security threats at each layer can be mitigated. Originality/value The paper fulfills the need of having an extensive and elaborated survey in the field of IoT security, along with suggesting the countermeasures to mitigate the threats occurring at each level of IoT protocol stack.


2019 ◽  
Vol 7 (1) ◽  
pp. 14-26
Author(s):  
Ruti Gafni ◽  
Tal Pavel

Small and Medium Businesses (SMB) use Internet and computer-based tools in their daily processes, sometimes without being aware to the cyber threats, or without knowing how to be prepared in case of a cyber-attack, although they are a major target for cyber-attacks. Specific information about cybersecurity needed by SMBs, in order to cope with cyber threats, is not always available or easily accessible. In this study, a vast search of different types of information about SMBs’ cybersecurity was performed, in order to find whether a hole of accessible information exists in this area. This exploratory research covered general mass communication media channels, technological and professional cybersecurity websites, and academic journals, and found that indeed very few studies, articles and news items were published in this matter. Leveraging knowledge and awareness, diminishing the shame for reporting cyber-attacks, and increasing mass communication media interest and public attention, may be activities to cover this “invisible hole”.


2018 ◽  
Vol 35 (2) ◽  
pp. 40-47
Author(s):  
S. M. Doguchaeva

The era of digital transformation provides the opportunity for leading companies to change priorities - to begin to take care of the support environment using innovative technologies and become a leading creative platform open for innovation. The successful development of the digital world, the blockchain technology, the Internet of things – the mechanism which will change the financial world. 


2019 ◽  
pp. 30-41 ◽  
Author(s):  
E.P. Sannikova ◽  
A.V. Malysheva ◽  
F.A. Klebanov ◽  
D.G. Kozlov

The capacity of yeast to produce the highly active variants of PLA2 has been confirmed. The high-active variants were based on the original enzyme from the strain А-2688 of Streptomyces violaceoruber. To reduce the enzyme toxicity and to increase its expression, various approaches were tested including point mutations, construction of artificial N- and/or C-end pro-regions, hybridization with other proteins and engineering or inactivation of glycosylation sites. As a main result, the modified PLA2 enzymes were obtained which have the same secretion level as their low-active predecessors, but specific activity of which was at least tenfold higher. As the main feature, the selected mutants were characterized by a lower affinity for Ca2+ that probably accounts for their low toxicity (and high expression capacity) at the stage of biosynthesis and their ability to activate under special conditions, e.g. during the egg yolk fermentation. The data obtained can provide a basis for the cost reduction of highly active PLA2 enzyme preparations in industries where the application of high calcium concentrations is allowed. recombinant phospholipase А2, Streptomyces violaceoruber, yeasts, secretion, producer strain The work was initiated by the Innovation Center Biriuch - New Technologies, Ltd., and was supported within the framework of the State Assignment no. 595-00004-18 PR.


Author(s):  
Mahesh K. Joshi ◽  
J.R. Klein

New technologies like artificial intelligence, robotics, machine intelligence, and the Internet of Things are seeing repetitive tasks move away from humans to machines. Humans cannot become machines, but machines can become more human-like. The traditional model of educating workers for the workforce is fast becoming irrelevant. There is a massive need for the retooling of human workers. Humans need to be trained to remain focused in a society which is constantly getting bombarded with information. The two basic elements of physical and mental capacity are slowly being taken over by machines and artificial intelligence. This changes the fundamental role of the global workforce.


2021 ◽  
Vol 13 (11) ◽  
pp. 6372
Author(s):  
Vincenzo Varriale ◽  
Antonello Cammarano ◽  
Francesca Michelino ◽  
Mauro Caputo

The digital transformation of supply chains should revolutionize entire management processes and improve various aspects of sustainability. In particular, the plans of Industry 4.0 aim towards a digitization of several procedures by exploiting emerging technologies such as the Internet of Things, RFID and blockchain. The purpose of this study is to highlight how order and disruption events processes can be improved with the adoption of emerging technologies and how this reflects on the improvement of sustainability aspects. The study is based on the comparison of two simulation scenarios between three actors in the cheese supply chain. In particular, a first traditional scenario “as is” is simulated without the use of new technologies and is compared to a second scenario “to be” that adopts IoT, RFID and blockchain. The results show an improvement in time performance for managing both perfect and non-compliant orders. The developed framework highlights the impact of new technologies on sustainability aspects, showing further managerial implications.


Micromachines ◽  
2021 ◽  
Vol 12 (8) ◽  
pp. 882
Author(s):  
M. Munzer Alseed ◽  
Hamzah Syed ◽  
Mehmet Cengiz Onbasli ◽  
Ali K. Yetisen ◽  
Savas Tasoglu

Civil wars produce immense humanitarian crises, causing millions of individuals to seek refuge in other countries. The rate of disease prevalence has inclined among the refugees, increasing the cost of healthcare. Complex medical conditions and high numbers of patients at healthcare centers overwhelm the healthcare system and delay diagnosis and treatment. Point-of-care (PoC) testing can provide efficient solutions to high equipment cost, late diagnosis, and low accessibility of healthcare services. However, the development of PoC devices in developing countries is challenged by several barriers. Such PoC devices may not be adopted due to prejudices about new technologies and the need for special training to use some of these devices. Here, we investigated the concerns of end users regarding PoC devices by surveying healthcare workers and doctors. The tendency to adopt PoC device changes is based on demographic factors such as work sector, education, and technology experience. The most apparent concern about PoC devices was issues regarding low accuracy, according to the surveyed clinicians.


Informatics ◽  
2021 ◽  
Vol 8 (2) ◽  
pp. 30
Author(s):  
Mansoor Ahmed Soomro ◽  
Mohd Hizam-Hanafiah ◽  
Nor Liza Abdullah ◽  
Mohd Helmi Ali ◽  
Muhammad Shahar Jusoh

Industry 4.0 revolution, with its cutting-edge technologies, is an enabler for businesses, particularly in reducing the cost and improving the productivity. However, a large number of organizations are still too in their infancy to leverage the true potential of Industry 4.0 and its technologies. This paper takes a quantitative approach to reveal key insights from the companies that have implemented Industry 4.0 technologies. For this purpose, 238 technology companies in Malaysia were studied through a survey questionnaire. As technology companies are usually the first in line to adopt new technologies, they can be studied better as leaders in adopting the latest technologies. The findings of this descriptive study surfaced an array of insights in terms of Industry 4.0 readiness, Industry 4.0 technologies, leadership, strategy, and innovation. This research paper contributes by providing 10 key empirical insights on Industry 4.0 that can be utilized by managers to pace up their efforts towards digital transformation, and can help the policymakers in drafting the right policy to drive the digital revolution.


Sign in / Sign up

Export Citation Format

Share Document