scholarly journals The Cybersecurity and the Care Robots: A Viewpoint on the Open Problems and the Perspectives

Healthcare ◽  
2021 ◽  
Vol 9 (12) ◽  
pp. 1653
Author(s):  
Daniele Giansanti ◽  
Rosario Alfio Gulino

Care robots represent an opportunity for the health domain. The use of these robots has important implications. They can be used in surgery, rehabilitation, assistance, therapy, and other medical fields. Therefore, care robots (CR)s, have both important physical and psychological implications during their use. Furthermore, these devices, meet important data in clinical applications. These data must be protected. Therefore, cybersecurity (CS) has become a crucial characteristic that concerns all the involved actors. The study investigated the collocation of CRs in the context of CS studies in the health domain. Problems and peculiarities of these devices, with reference to the CS, were faced, investigating in different scientific databases. Highlights, ranging also from ethics implications up to the regulatory legal framework (ensuring safety and cybersecurity) have been reported. Models and cyber-attacks applicable on the CRs have been identified.

2020 ◽  
Vol 50 (4) ◽  
pp. 321-329
Author(s):  
Sławomir Dygnatowski ◽  
Włodzimierz Dygnatowski

SummaryThe last decades have brought about the rapid development of information technology, which was reflected in all areas of social life and economic. Unfortunately, the ongoing digitization and the presence of individuals, private entities as well as countries in the network makes them exposed to new types of threats that have never been seen before. The perpetrators of these threats may be individuals, organized criminal groups or foreign country interviews. Threats and vectors of attacks has many forms, and their evolution continues all along with the progressive development of broadly understood cyberspace. In order to be able to effectively fight with the increasing threats in cyberspace, not only technical and organizational measures are needed, but also the formal and legal framework to combat cyber-attacks. In this article, the authors discuss the legal comparison of the basics of cyber security against the Polish background and EU legislation.


Author(s):  
Satheesh .M ◽  
Deepika .M

In this work, two participants fairly send or receive things through the aid of intermediate who is only engaged if required. An up-to-date accepted necessity is with the aim of involving third party in the trade should be transparent, to save from privacy and evade terrible publicity. Together, a dishonest intermediate will negotiate the fairness of the trade and so the intermediate should be liable in case of any behavioural changes. Optimistic fair exchange (OFE) is one of the classical protocols to assure fairness of indulgence for a party. This exchange can be done by means of an arbitrator. The most important aspect of OFE is to describe security models so as to capture real-time attacks and design schemes secure in practical models. Signaller is confirmed with the data to send the correct person to address that to make sure it is. Since then the SMS has gone through to achieve that can hold the path to the right to see which if any is the fact that to ensure there is. After the signature is created by creating it to be able to well take care of it and then to the right of the person to pay off that is sure to make it. In this project, to avoid the third party attack (hacking) and unauthorized person access the particular important data. The data should be transmitted in sender to receiver that receiver only have a correct data without any data losses, protect a data security in cyber-attacks. A signature may be digitally and OFE design for the exchanged item have trade-off between transparency and accountability.


LAW REVIEW ◽  
2018 ◽  
Vol 38 (1) ◽  
Author(s):  
Dr. Syed Sadiq Husain Abidi

The incredible evolution of information society and its dependence on Internet usage in world and particularly in India is laterally accompanied by vulnerability of societies to cybercrime. Cybercriminals are not constrained by geographical limitations as cyberspace is a free-flowing, borderless and a global problem. India has a dream to convert its society into information society by applying "Digital India" Paradigm, where government sector, the private sector and individuals completely depend on the Internet to conduct sensitive transactions and store important data on the cloud. This makes India Vulnerable to cybercrimes. Internet, worldwide connection of loosely held networks, has made the flow of data and information between different networks simple. With data and information being transferred between networks at distant locations, security related issues have become a major concern for the administrators. The advancement in the field of cyber crime has made administrators take serious steps to protect the system from unauthorized access or virus attacks. The growth of cyber crime in India since 1998 has shown an exponential curve. Though India has managed to control the cyber attacks and registered itself in the Fully Updated Countries still there is lot more work to be done to reduce the increasing cyber crime and protect the machine under threat. Data mining techniques are being used to save the machine and the network under threat. There has been some litigation or judicial decisions on cyber crimes across the world. Cyber litigation, in India, is still in its beginning and it is expected to raise high as the commission of cyber crimes and its reporting is increasing alarmingly. There has not been much litigation on cyber crimes so far, in India and this will be a challenge for judicial decisions on cybercrime in near future. Present Article point out the judicial view about Cyber Crime in India.


2018 ◽  
Vol 9 (1) ◽  
pp. 78 ◽  
Author(s):  
Mihail Nikolaevich DUDIN ◽  
Vadim Nikolaevich ZASKO ◽  
Evgeniya Evgenevna FROLOVA ◽  
Natalya Georgievna PAVLOVA ◽  
Ekaterina Petrovna RUSAKOVA

The issues of ensuring the electronic payments’ security are currently in the limelight of participants in the monetary system and the scientific expert community. The goal of this paper is to develop organizational and legal measures aimed at improving the security of electronic payments in the Russian Federation. Research methods include the analysis of retrospective data describing the development of the payment system and electronic payments using bank cards, as well as the method of statistical observations and analysis of secondary data from surveys of Russian and foreign companies covering the information security. Through solving the research problems, the author managed to draw a number of conclusions: Dynamic development of the electronic payment system causes the growth of cybercrime and cyber risks in payment systems; Despite quite active actions of state bodies and the Bank of Russia, the legal framework and infrastructure for electronic payments are still in the development stage; Cyber attacks cause significant damage not only to financial institutions, but also to companies from a non-financial sector, as well as to ordinary citizens using electronic payment systems. In the opinion of the author, the key organizational and legal measures aimed at mitigating cyber risks in electronic payments may be measures to form the centralized payment infrastructure of the Bank of Russia, introduce the corporate cyber threat management systems, improve policies and procedures for the protection of personal data at the corporate level, as well as train the employees in the field of information security of electronic settlements.


2016 ◽  
Vol 24 (1) ◽  
pp. 38-52 ◽  
Author(s):  
Kosmas Pipyros ◽  
Lilian Mitrou ◽  
Dimitris Gritzalis ◽  
Theodoros Apostolopoulos

Purpose – The increasing number of cyber attacks has transformed the “cyberspace” into a “battlefield”, bringing out “cyber warfare” as the “fifth dimension of war” and emphasizing the States’ need to effectively protect themselves against these attacks. The existing legal framework seem inadequate to deal effectively with cyber operations and, from a strictly legal standpoint, it indicates that addressing cyber attacks does not fall within the jurisdiction of just one legal branch. This is mainly because of the fact that the concept of cyber warfare itself is open to many different interpretations, ranging from cyber operations performed by the States within the context of armed conflict, under International Humanitarian Law, to illicit activities of all kinds performed by non-State actors including cybercriminals and terrorist groups. The paper initially presents major cyber-attack incidents and their impact on the States. On this basis, it examines the existing legal framework at the European and international levels. Furthermore, it approaches “cyber warfare” from the perspective of international law and focuses on two major issues relating to cyber operations, i.e. “jurisdiction” and “attribution”. The multi-layered process of attribution in combination with a variety of jurisdictional bases in international law makes the successful tackling of cyber attacks difficult. The paper aims to identify technical, legal and, last but not least, political difficulties and emphasize the complexity in applying international law rules in cyber operations. Design/methodology/approach – The paper focuses on the globalization of the “cyber warfare phenomenon” by observing its evolutionary process from the early stages of its appearance until today. It examines the scope, duration and intensity of major cyber-attacks throughout the years in relation to the reactions of the States that were the victims. Having this as the base of discussion, it expands further by exemplifying “cyber warfare” from the perspective of the existing European and International legal framework. The main aim of this part is to identify and analyze major obstacles that arise, for instance in terms of “jurisdiction” and “attribution” in applying international law rules to “cyber warfare”. Findings – The absence of a widely accepted legal framework to regulate jurisdictional issues of cyber warfare and the technical difficulties in identifying, with absolute certainty, the perpetrators of an attack, make the successful tackling of cyber attacks difficult. Originality/value – The paper fulfills the need to identify difficulties in applying international law rules in cyber warfare and constitutes the basis for the creation of a method that will attempt to categorize and rank cyber operations in terms of their intensity and seriousness.


Author(s):  
Haoyu Wu ◽  
Sidney Omelon ◽  
Maja Mujcin

Cyberattacks on process control systems are a new phenomenon. A new, simplified, and constrained design project was tested in a third year chemical engineering process control class. This design project was assigned to self-selected, small (3-4) student groups, who were tasked to produce five reports in series. The first report provided a preliminary identification and description of a cyberattack on a chemical process control system. The second report described a more detailed and technical analysis of the cyberattack, using a block diagram. The third report was a proposal of how an engineer on duty during the attack could have mitigated the effects of the cyberattack. The design component was the goal of the fourth report: create a strategy for preventing future, similar cyberattacks. The fifth report was a summary report of the first four reports, with edits made to improve the content and quality of technical writing. After the course was completed, an on-line survey was offered to the students. The results revealed the students’ inexperience with generating a solution to open problems, solving problems with few available resources, and the need for technical writing improvement.46 % of the student survey respondents reported that the project increased their understanding of the relevance of process control to their education; 32 % reported a neutral effect, and 21 % a negative effect. An overall positive recommendation favoured repeating improved iterations of this project


Legal Ukraine ◽  
2020 ◽  
pp. 14-29
Author(s):  
Mariana Zhuravel

Dependency on global cyberspace is rapidly increasing nowadays. Virtual reality generates opportunities for enterprises, governments and individuals; however it also poses significant threats to security on different levels including the national level, whereby key state infrastructures can become a target of cyber attacks. This was seen during the Covid-19 pandemic when the healthcare system in a number of countries experienced cyber threats, which in the example of the Czech Republic, led to severe disruption of the medical processes in a hospital. Thus, cybercrime can cause detrimental effects not only to individuals or business entities, but also to a large group of stakeholders. Infinite cyberspace, the anonymous character of cyber attackers, advances in technology and a lack of cyber security measures in place – these all give cybercrime a sophisticated and aggressive nature and as a result, make us more vulnerable to it. This article will consider different categories of cybercrime, namely, crimes against the person; crimes against property, and crimes against the government, drawing examples from real life cases. This will be followed by an exploration of the methods which should be employed in the fight against cybercrime. In addition, the EU legislative framework will be considered as an example of legal measures against cybercrime. Key words: Internet, cyberspace, cybercrime, cyber attack, cyber threat, cybersecurity, ransomware, cyber terrorism, European Union legal framework, NIS Directive, ENISA, ways.


2021 ◽  
Vol 2021 ◽  
pp. 1-10
Author(s):  
Pooneh Malekifar ◽  
Reza Pakzad ◽  
Ramin Shahbahrami ◽  
Milad Zandi ◽  
Ali Jafarpour ◽  
...  

Background. Coinfections have a potential role in increased morbidity and mortality rates during pandemics. Our investigation is aimed at evaluating the viral coinfection prevalence in COVID-19 patients. Methods. We systematically searched scientific databases, including Medline, Scopus, WOS, and Embase, from December 1, 2019, to December 30, 2020. Preprint servers such as medRxiv were also scanned to find other related preprint papers. All types of studies evaluating the viral coinfection prevalence in COVID-19 patients were considered. We applied the random effects model to pool all of the related studies. Results. Thirty-three studies including 10484 patients were identified. The viral coinfection estimated pooled prevalence was 12.58%; 95% CI: 7.31 to 18.96). Blood viruses (pooled prevalence: 12.48%; 95% CI: 8.57 to 16.93) had the most frequent viral coinfection, and respiratory viruses (pooled prevalence: 4.32%; 95% CI: 2.78 to 6.15) had less frequent viral coinfection. The herpesvirus pooled prevalence was 11.71% (95% CI: 3.02 to 24.80). Also, the maximum and minimum of viral coinfection pooled prevalence were in AMRO and EMRO with 15.63% (95% CI: 3.78 to 33.31) and 7.05% (95% CI: 3.84 to 11.07), respectively. Conclusion. The lowest rate of coinfection belonged to respiratory viruses. Blood-borne viruses had the highest coinfection rate. Our results provide important data about the prevalence of blood-borne viruses among COVID-19 patients which can be critical when it comes to their treatment procedure.


2021 ◽  
Vol 1 (1) ◽  
pp. 1-8
Author(s):  
Sachin Kr. Tomar ◽  

Cyber Security refers to the processes of protecting data and systems from cyber-attacks. Any firm without security policies and systematic security systems is at large risk and the important data related to that firm are not safe without security policies like. Payment Card Industry and Data Security Standard framework used to protect payment security credit card, debit card, etc. In maintaining access, the hacker inside the target system is used to exploit vulnerabilities and password cracking. In today’s era, day by day cybercrimes rise so it raised the requirement of system Security or even the entire network. As more business exercises are being mechanized and an expanding number of PCs are being utilized to store important data, the requirement for secure PC frameworks turns out to be more evident. As a result, network safety issues have become public safety issues.


Sign in / Sign up

Export Citation Format

Share Document