scholarly journals TEACHING AND LEARNING OF INDUSTRIAL CYBER SECURITY TECHNOLOGIES BASED ON PHOENIX CONTACT COMPANY WIRELESS EQUIPMENT

2020 ◽  
Vol 4 (2) ◽  
pp. 99-110
Author(s):  
Vladlen SHAPO ◽  
Maksym LEVINSKYI ◽  
Valeriy VOLOVSHCHYKOV
2020 ◽  
Author(s):  
Nasser AlAzwani ◽  
Tom Chen

Cyber deterrence by denial strategy can be practised by the state by making it hard for adversaries to succeed any attempt of attacking. It was practised during nuclear deterrence strategies as well as in many other conventional deterrence. This paper argues the functionality of cyber deterrence by denial in deterring cyber threats. In this paper, our attempt is to define cyber deterrence by denial, model it, explore operational roles of cyber security technologies in approaching deterrence by denial within cyber space. Model analysis shed lights over practicing deterrence by denial and its vital role in understanding how efficiently denial can work in maximize failure of any attack which will impact in maximizing cost of cyber attacks to the attacker. Due to limitations in cyber security technologies, unknown cyber threat might not be deterred with assumed approach. Proposed model confirmed that deterrence by denial strategy might works in deterring known cyber threats within instrumental model. As for the benefit of enhancing deterrence in cyber space there is a serious need to reduce the tendency to ignore exploring this strategy.


2021 ◽  
Vol 12 (1) ◽  
pp. 82-97
Author(s):  
Shahzeb Akhtar ◽  
Pratima Amol Sheorey ◽  
Sonali Bhattacharya ◽  
Ajith Kumar V. V.

This paper examines the challenges that small, medium, and large businesses in the financial services industry are facing concerning data security and providing relevant tools and strategies to protect the same. A qualitative research-based approach has been used where one-on-one interviews were conducted with 10 CIOs (chief information officers) and CISOs (chief information security officers). This data was compared with secondary data sources to validate the findings. This paper presents an in-depth analysis regarding security technologies and their efficacy to protect data assets and sensitive information. It will also opine about the technologies that each business type can use economically to cover the gamut of cyber-attacks. Existing research is restricted to either addressing small and medium businesses (SMBs) or large businesses. This paper attempts a comprehensive review for all sizes of businesses.


2016 ◽  
Vol 35 ◽  
pp. 51-80 ◽  
Author(s):  
Luke Topham ◽  
Kashif Kifayat ◽  
Younis Younis ◽  
Qi Shi ◽  
Bob Askwith

2020 ◽  
Author(s):  
Nasser AlAzwani ◽  
Tom Chen

Cyber deterrence by denial strategy can be practised by the state by making it hard for adversaries to succeed any attempt of attacking. It was practised during nuclear deterrence strategies as well as in many other conventional deterrence. This paper argues the functionality of cyber deterrence by denial in deterring cyber threats. In this paper, our attempt is to define cyber deterrence by denial, model it, explore operational roles of cyber security technologies in approaching deterrence by denial within cyber space. Model analysis shed lights over practicing deterrence by denial and its vital role in understanding how efficiently denial can work in maximize failure of any attack which will impact in maximizing cost of cyber attacks to the attacker. Due to limitations in cyber security technologies, unknown cyber threat might not be deterred with assumed approach. Proposed model confirmed that deterrence by denial strategy might works in deterring known cyber threats within instrumental model. As for the benefit of enhancing deterrence in cyber space there is a serious need to reduce the tendency to ignore exploring this strategy.


Author(s):  
Rania Mokhtar ◽  
Rashid Saeed

An important part of ISO/IEC 27002 cyber security standard is the conservation of confidentiality that falls under its computer facility protection part which insures that the computer and its stored information can only be accessed by the authorized users. Securing mobile devices and mobile data to ensure the confidentiality, integrity, and availability of both data and security applications requires special consideration to be paid to the typical mobile environment in which a mobile computing device would be utilized. Protecting mobile devices includes multiple security technologies such as the right identification of its particular user, data encryption, physical locking devices, monitoring and tracking software, and alarms. This chapter reviews security-specific hardware and software applied to mobile computing and presents its advantages and drawbacks. Then it considers the concept of usability constraints in context of mobile computing security and introduces the seamless security method for identity proof of a particular user or device.


2021 ◽  
Vol 83 (3) ◽  
pp. 152-163
Author(s):  
Інна Сергіївна Заярна

Due to the COVID-19 pandemic a strict quarantine was imposed from March to May of 2020. Ukrainian higher education faced new challenges caused by unexpected distance teaching and learning implemented in all higher educational establishments during the period in question. Despite the sound theoretical achievements of Ukrainian scientists in the field of distance education, as well as the existing legal framework for the implementation of distance learning in higher education, not all educational institutions had well-established learning management systems. All the above induced foreign languages teachers to search for available technologies which allow delivering their lectures effectively. One of the most popular services was video conferencing, in particular Zoom. The research deals with the specifics of teaching foreign languages in higher educational establishments on Zoom Platform via video conferencing. The research presents the results of the survey conducted among the teachers who used Zoom for teaching foreign languages during the quarantine from March to June in 2020. Based on the survey respondents’ answers, the author determines benefits and drawbacks of Zoom for teaching foreign languages in higher educational establishments, specifies the factors for psychological comfort, as well as the conditions and tools for the development of language skills and speech abilities. Special attention is paid to methodological recommendations aimed at practical implementation of foreign languages online teaching via Zoom video conferencing. The author considers such aspects of foreign languages teaching via Zoom video conferencing as cyber security, discipline issues, creation of psychologically comfortable atmosphere, and Zoom technical tools for teaching foreign language communication.


Subject The impact of the new additions to the Wassenaar Arrangement. Significance The US Bureau of Industry and Security (BIS) is taking public comments on its proposed implementation of the cyber security provisions of the the most recent additions to the Wassenaar Arrangement on arms-export controls. The Wassenaar Arrangement is a multilateral agreement to manage the international trade in conventional arms and certain dual-use goods and technologies to contribute to international stability and prevent human rights abuses. In December 2013, it added two types of cyber security technologies to its control lists -- the first such restriction on the export of commercially-available and widely-used software since the creation of the Arrangement in 1996. Impacts Governments not participating in the Wassenaar Arrangement may turn to alternative suppliers. Using export controls as a proxy for regulating the technology's use may limit research into cyber vulnerabilities. The easily transferable nature of software could undermine the effectiveness of export control regimes.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Michael M. Prentice

PurposeThe purpose of this paper is to demonstrate how document protection has become a key object of concern for organizations, how the threat of leaks has led to an increase in security technologies and policies and how these developments present new and emergent ethnographic challenges for researchers. Through a study of a South Korean organization, the paper aims to demonstrate the ways workplace documents are figured into wider legal, regulatory and cyber security concerns.Design/methodology/approachThe research is based on 12 months of intensive embedded fieldwork in a South Korean firm from 2014 to 2015 and follow-up interviews in 2018. The author followed an immersive and inductive approach to collecting ethnographic data in situ. The author was hired as an intern in a Korean conglomerate known as the Sangdo Group where he worked alongside Human Resources managers to understand their work practices. The present article reflects difficulties in his original research design and an attempt to analyze the barriers themselves. His analysis combines ideas from theories of securitization and document studies to understand how the idea of protection is reshaping workplaces in South Korea and elsewhere.FindingsThe paper highlights three findings first that South Korean workplaces have robust socio-material infrastructures around document protection and security, reflecting that security around document leaks is becoming integrated into normal organizational life. Second, the securitization of document leaks is shifting from treating document leaks as a threat to organizational existence, to a crime by individual actors that organizations track. Third, that even potential document leaks can have transitive effects on teams and managers.Originality/valueOrganizational security practices and their integration into workplace life have rarely been examined together. This paper connects Weber's insights on bureaucratization with the concept of securitization to examine the rise of document security practices and policies in a South Korean organization. The evidence from South Korea is valuable because technological developments around security coupled with organizational complexities portend issues for other organizational environments around the world.


Energies ◽  
2020 ◽  
Vol 13 (8) ◽  
pp. 1883
Author(s):  
Jun-Gyu Park ◽  
Yangjae Lee ◽  
Ki-Wan Kang ◽  
Sang-Hoon Lee ◽  
Ki-Woong Park

Research on various security technologies has been actively underway to protect systems from attackers. However, attackers can secure enough time to reconnoiter and attack the target system owing to its static nature. This develops asymmetric warfare in which attackers outwit defenders. Moving target defense (MTD) technologies, which obfuscate the attack surface by modifying the main properties of the potential target system, have been gaining attention as an active cyber security technology. Particularly, network-based MTD (NMTD) technologies, which dynamically mutate the network configuration information, such as IP and ports of the potential target system, can dramatically increase the time required for an attacker to analyze the system. Therefore, this system defense technology has been actively researched. However, increasing the analysis complexity of the target system is limited in conventional NMTD because the variation of system properties (e.g., IP, port) that can be mutated is restricted by the system configuration environment. Therefore, there is a need for an MTD technique that effectively delays an attacker during the system analysis by increasing the variation of system properties. Additionally, in terms of practicality, minimizing the computational overhead arising by the MTD technology and solving the compatibility problem with existing communication protocols are critical issues that cannot be overlooked. In this study, we propose a technology called Ghost-MTD (gMTD). gMTD allows only the user who is aware of protocol mutation patterns to correctly communicate with the service modules of the server system through protocol mutation using the pre-shared one-time bit sequence. Otherwise, gMTD deceives the attackers who attempt to infiltrate the system by redirecting their messages to a decoy-hole module. The experimental results show that the proposed technology enables protocol mutation and validation with a very low performance overhead of only 3.28% to 4.97% using an m-bit (m ≥ 4) length one-time bit sequence and can be applied to real systems regardless of the specific communication protocols.


Sign in / Sign up

Export Citation Format

Share Document