scholarly journals Introduction to Cyber Security - A Review

Author(s):  
Pratik Narendra Gulhane ◽  
Yash Vishwas Manwar

Cyber Security is a process that’s designed to protect networks and devices from external threats. It is important because it protects all categories of data from theft and damage. This paper addresses Cyber Security, Need of Cyber security and its Measures. In today’s world we found that the amount of threats like data theft, scams, and phishing are increasing day-by-day. So this explains how the cyber security is important while dealing with internet. It can be prevented by following the security measures. To overcome the barriers related to security issues we have to spread awareness about cyber security and its measures. Cyber security is one of the most important aspects of the fast-paced growing digital world. The threats of it are hard to deny, there is no perfect solution for cybercrimes but we should try our best to minimize them.

Author(s):  
Vahid Hassani ◽  
Naveena Crasta ◽  
António M. Pascoal

Autonomous marine vessels are the way forward to revolutionize maritime operations. However, the safety and success of autonomous missions depend critically on the availability of a reliable positioning system and time information generated using global positioning system (GPS) data. GPS data are further used for guidance, navigation, and control (GNC) of vehicles. At a mission planning level GPS data are commonly assumed to be reliable. From this perspective, this article aims to highlight the perils of maritime navigation attacks, showing the need for the enhancement of standards and security measures to intercept any serious threats to marine vessels emanating from cyber attacks and GPS spoofing. To this end, we consider a case where a cyber attacker blocks the real GPS signals and dupes the GPS antennas on board the marine vehicle with fake signals. Using the Nomoto model for the steering dynamics of a marine vessel and exploiting tools from linear control theory we show analytically, and verify using numerical simulations, that it is possible to influence the state variables of the marine vessel by manipulating the compromised GPS data.


IoT (Internet of Thing) is becoming ubiquitous day by day and making dumb devices smarter by enabling them to transfer the information over the network. IoT not confined to homes or in utilities but can be found in array of fields. IoT is rapidly making the world smarter by connecting physical to digital world and it is estimated that by 2024 more than 20 billion devices are likely to be connected. It brings opportunity but also brings numerous kind of risks. The worry is how we to keep billions of devices secure and what to ensure the security of networks these run on. The present paper focused on all the issues concerning about securing IoT environment and how machine learning techniques may help to address these security issues. The paper also discusses the proposed approaches, parameters, characteristic of techniques and explores which technique could be more effective.


2020 ◽  
Author(s):  
Pranav C

Abstract: With rapid computerisation of all walks of life, cyber security has become a major challenge to the mankind. Cyber security is all about security of anything in cyber realm, while information security is all about security of information regardless of the realm. Cybercrimes are perpetrated by using computers and related devices / networks by individuals with sophisticated knowledge in the field of computers. Cybercrime is an evil having its origin in the growing dependence on computers in modern life. In a day and age when everything from microwave ovens and refrigerators to nuclear power plants is being run on computers, cybercrime has assumed rather sinister implications. Cybercrime perpetrators are keeping pace with innovations in technology and are way ahead of security measures taken to curb them. With huge money involved in cybercrimes, it has become a major concern. This research paper briefly defines cyber security and deals in detail with cybercrime and five major cyber security threats currently plaguing the world.


Author(s):  
Curtis G. Northcutt

The recent proliferation of embedded cyber components in modern physical systems [1] has generated a variety of new security risks which threaten not only cyberspace, but our physical environment as well. Whereas earlier security threats resided primarily in cyberspace, the increasing marriage of digital technology with mechanical systems in cyber-physical systems (CPS), suggests the need for more advanced generalized CPS security measures. To address this problem, in this paper we consider the first step toward an improved security model: detecting the security attack. Using logical truth tables, we have developed a generalized algorithm for intrusion detection in CPS for systems which can be defined over discrete set of valued states. Additionally, a robustness algorithm is given which determines the level of security of a discrete-valued CPS against varying combinations of multiple signal alterations. These algorithms, when coupled with encryption keys which disallow multiple signal alteration, provide for a generalized security methodology for both cyber-security and cyber-physical systems.


2020 ◽  
Author(s):  
Cátia Santos-Pereira

BACKGROUND GDPR was scheduled to be formally adopted in 2016 with EU member states being given two years to implement it (May 2018). Given the sensitive nature of the personal data that healthcare organization process on a 24/7 basis, it is critical that the protection of that data in a hospital environment is given the high priority that data protection legislation (GDPR) requires. OBJECTIVE This study addresses the state of Public Portuguese hospitals regarding GDPR compliance in the moment of GDPR preparation period (2016-2018) before the enforcement in 25 May 2018, and what activities have started since then. The study focuses in three GDPR articles namely 5, 25 and 32, concerning authentication security, identity management processes and audit trail themes. METHODS The study was conducted between 2017 and 2019 in five Portuguese Public Hospitals (each different in complexity). In each hospital, six categories of information systems critical to health institutions were included in the study, trying to cover the main health information systems available and common to hospitals (ADT, EPR, PMS, RIS, LIS and DSS). It was conducted interviews in two phases (before and after GDPR enforcement) with the objective to identify the maturity of information systems of each hospital regarding authentication security, identity management processes and traceability and efforts in progress to avoid security issues. RESULTS A total of 5 hospitals were included in this study and the results of this study highlight the hospitals privacy maturity, in general, the hospitals studied where very far from complying with the security measures selected (before May 2018). Session account lock and password history policy were the poorest issues, and, on the other hand, store encrypted passwords was the best issue. With the enforcement of GDPR these hospitals started a set of initiatives to fill this gap, this is made specifically for means of making the whole process as transparent and trustworthy as possible and trying to avoid the huge fines. CONCLUSIONS We are still very far from having GDPR compliant systems and Institutions efforts are being done. The first step to align an organization with GDPR should be an initial audit of all system. This work collaborates with the initial security audit of the hospitals that belong to this study.


2022 ◽  
Author(s):  
Nitul Dutta ◽  
Nilesh Jadav ◽  
Sudeep Tanwar ◽  
Hiren Kumar Deva Sarma ◽  
Emil Pricop

2019 ◽  
Vol 9 (S1) ◽  
pp. 58-63
Author(s):  
S. Lakshmi ◽  
L. Santhi

Academic Libraries nowadays have to relate all its activities to public and its users very often and keep them updated with the changes and Updation in the Library. In order to attract the users and sustain in this modern ICT world, the user’s complete satisfaction is the ultimatum. We are in a digital world where one need not physically go to the Library or a computer to get information they want. Just a swipe on their smart phone and they have their required information in their finger tips. They just require a device to login and an internet or Wi-Fi connection. That’s it. This study is about the marketing of information products and services among users of M. Kumarasamy College of Engineering, Karur. From this research it is found that the marketing of services has been a great challenge with limited budget as well as the emerging ICT tools and technology day by day. The study shows the user behavior, their awareness level, usage, usefulness & the marketing strategies used in the College Library for promoting their services. This paper also suggests that Librarians have to be proactive in marketing their information sources & services with the help of current marketing strategies using ICT which is the need of the hour.


Sign in / Sign up

Export Citation Format

Share Document