scholarly journals Insights into Organizational Security Readiness: Lessons Learned from Cyber-Attack Case Studies

2021 ◽  
Vol 1 (4) ◽  
pp. 638-659
Author(s):  
Faisal Quader ◽  
Vandana P. Janeja

This paper focuses on understanding the characteristics of multiple types of cyber-attacks through a comprehensive evaluation of case studies of real-world cyber-attacks. For each type of attack, we identify and link the attack type to the characteristics of that attack and the factors leading up to the attack, as observed from the review of case studies for that type of attack. We explored both the quantitative and qualitative characteristics for the types of attacks, including the type of industry, the financial intensity of the attack, non-financial intensity impacts, the number of impacted customers, and the impact on users’ trust and loyalty. In addition, we investigated the key factors leading up to an attack, including the human behavioral aspects; the organizational–cultural factors at play; the security policies adapted; the technology adoption and investment by the business; the training and awareness of all stakeholders, including users, customers and employees; and the investments in cybersecurity. In our study, we also analyzed how these factors are related to each other by evaluating the co-occurrence and linkage of factors to form graphs of connected frequent rules seen across the case studies. This study aims to help organizations take a proactive approach to the study of relevant cyber threats and aims to educate organizations to become more knowledgeable through lessons learned from other organizations experiencing cyber-attacks. Our findings indicate that the human behavioral aspects leading up to attacks are the weakest link in the successful prevention of cyber threats. We focus on human factors and discuss mitigation strategies.

2019 ◽  
Vol 7 (1) ◽  
pp. 14-26
Author(s):  
Ruti Gafni ◽  
Tal Pavel

Small and Medium Businesses (SMB) use Internet and computer-based tools in their daily processes, sometimes without being aware to the cyber threats, or without knowing how to be prepared in case of a cyber-attack, although they are a major target for cyber-attacks. Specific information about cybersecurity needed by SMBs, in order to cope with cyber threats, is not always available or easily accessible. In this study, a vast search of different types of information about SMBs’ cybersecurity was performed, in order to find whether a hole of accessible information exists in this area. This exploratory research covered general mass communication media channels, technological and professional cybersecurity websites, and academic journals, and found that indeed very few studies, articles and news items were published in this matter. Leveraging knowledge and awareness, diminishing the shame for reporting cyber-attacks, and increasing mass communication media interest and public attention, may be activities to cover this “invisible hole”.


Author(s):  
Ana Kovacevic ◽  
Dragana Nikolic

We are facing the expansion of cyber incidents, and they are becoming more severe. This results in the necessity to improve security, especially in the vulnerable field of critical infrastructure. One of the problems in the security of critical infrastructures is the level of awareness related to the effect of cyberattacks. The threat to critical infrastructure is real, so it is necessary to be aware of it and anticipate, predict, and prepare against a cyber attack. The main reason for the escalation of cyberattacks in the field of Critical Infrastructure (CI) may be that most control systems used for CI do not utilise propriety protocols and software anymore; they instead utilise standard solutions. As a result, critical infrastructure systems are more than ever before becoming vulnerable and exposed to cyber threats. It is important to get an insight into what attack types occur, as this may help direct cyber security efforts. In this chapter, the authors present vulnerabilities of SCADA systems against cyber attack, analyse and classify existing cyber attacks, and give future directions to achieve better security of SCADA systems.


2021 ◽  
Author(s):  
Stuart Fowler ◽  
Keith Joiner ◽  
Elena Sitnikova

<div>Cyber-worthiness as it is termed in Australian Defence, or cyber-maturity more broadly, is a necessary feature of modern complex systems which are required to operate in a hostile cyber environment. To evaluate the cyber-worthiness of complex systems, an assessment methodology is required to examine a complex system’s or system-of-system’s vulnerability to and risk of cyber-attacks that can compromise such systems. This assessment methodology should address the cyber-attack surface and threat kill chains, including supply chains and supporting infrastructure. A cyber-worthiness capability assessment methodology has been developed based on model-based systems engineering concepts to analyse the cyber-worthiness of complex systems and present a risk assessment of various cyber threats to the complex system. This methodology incorporates modelling and simulation methods that provide organisations greater visibility and consistency across diverse systems, especially to drive cybersecurity controls, investment and operational decisions involving aggregated systems. In this paper, the developed methodology will be presented in detail and hypothesised outcomes will be discussed.</div>


Author(s):  
Ana Kovacevic ◽  
Dragana Nikolic

We are facing the expansion of cyber incidents, and they are becoming more severe. This results in the necessity to improve security, especially in the vulnerable field of critical infrastructure. One of the problems in the security of critical infrastructures is the level of awareness related to the effect of cyberattacks. The threat to critical infrastructure is real, so it is necessary to be aware of it and anticipate, predict, and prepare against a cyber attack. The main reason for the escalation of cyberattacks in the field of Critical Infrastructure (CI) may be that most control systems used for CI do not utilise propriety protocols and software anymore; they instead utilise standard solutions. As a result, critical infrastructure systems are more than ever before becoming vulnerable and exposed to cyber threats. It is important to get an insight into what attack types occur, as this may help direct cyber security efforts. In this chapter, the authors present vulnerabilities of SCADA systems against cyber attack, analyse and classify existing cyber attacks, and give future directions to achieve better security of SCADA systems.


Risks ◽  
2020 ◽  
Vol 8 (2) ◽  
pp. 61 ◽  
Author(s):  
Mark Bentley ◽  
Alec Stephenson ◽  
Peter Toscas ◽  
Zili Zhu

The cost of cybersecurity incidents is large and growing. However, conventional methods for measuring loss and choosing mitigation strategies use simplifying assumptions and are often not supported by cyber attack data. In this paper, we present a multivariate model for different, dependent types of attack and the effect of mitigation strategies on those attacks. Utilising collected cyber attack data and assumptions on mitigation approaches, we look at an example of using the model to optimise the choice of mitigations. We find that the optimal choice of mitigations will depend on the goal—to prevent extreme damages or damage on average. Numerical experiments suggest the dependence aspect is important and can alter final risk estimates by as much as 30%. The methodology can be used to quantify the cost of cyber attacks and support decision making on the choice of optimal mitigation strategies.


2016 ◽  
Vol 118 (5) ◽  
Author(s):  
Blake E. Angelo ◽  
Becca B.R. Jablonski ◽  
Dawn Thilmany

Purpose A body of literature and case studies has developed as part of the reporting, outreach and evaluation of the local and regional food system projects supported by grants and other funders. Yet, there is concern that food value chains are promoted without adequately evaluating the viability of these businesses, or how these markets affect the performance and welfare of key stakeholders: farm vendors and local communities/economies. Design/methodology/approach This paper reviews and summarizes a comprehensive set of U.S.-based case studies focused on food value chains. We conduct a meta-analysis to systematically capture what available case study evidence tells us about: 1) trends in the viability of food value chain businesses; 2) the impact of these businesses on participating farm vendors; and, 3) the associated community economic development outcomes (framed in terms of ‘wealth creation’). Findings In addition to sharing findings from the meta-analysis, we demonstrate how the lack of standardized protocols for case study development is a barrier to learning about metric comparisons, best practices, and what impacts these food value chain businesses may have. We conclude with some recommendations of how the field can move forward to evaluate and share lessons learned using more uniform, project-driven case study development. Originality/value This is the first study to conduct a systematic meta-analysis of U.S. food value chain businesses.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Nikdokht Ghadiminia ◽  
Mohammad Mayouf ◽  
Sharon Cox ◽  
Jan Krasniewicz

Purpose Building information modelling (BIM) creates a golden thread of information of the facility, which proves useful to those with the malicious intent of breaching the security of the facility. A cyber-attack incurs adverse implications for the facility and its managing organisation. Hence, this paper aims to unravel the impact of a cybersecurity breach, by developing a BIM-facilities management (FM) cybersecurity-risk-matrix to portray what a cybersecurity attack means for various working areas of FM. Design/methodology/approach This study commenced with exploring cybersecurity within various stages of a BIM project. This showcased a heightened risk of cybersecurity at the post-occupancy phase. Hence, thematic analysis of two main domains of BIM-FM and cybersecurity in the built environment led to the development of a matrix that illustrated the impact of a cybersecurity attack on a BIM-FM organisation. Findings Findings show that the existing approaches to the management of cybersecurity in BIM-FM are technology-dependent, resulting in an over-reliance on technology and a lack of cybersecurity awareness of aspects related to people and processes. This study sheds light on the criticality of cyber-risk at the post-occupancy phase, highlighting the FM areas which will be compromised as a result of a cyber-attack. Originality/value This study seeks to shift focus to the people and process aspects of cybersecurity in BIM-FM. Through discussing the interconnections between the physical and digital assets of a built facility, this study develops a cyber-risk matrix, which acts as a foundation for empirical investigations of the matter in future research.


2021 ◽  
Vol 5 (4) ◽  
pp. 342-375
Author(s):  
Olayanju Sunday Akinwale ◽  
◽  
Dahunsi Folasade Mojisola ◽  
Ponnle A. Akinlolu ◽  
◽  
...  

<abstract> <p>The advancement in communication technology and the availability of intelligent electronic devices (IEDs) have impacted positively on the penetration of renewable energy sources (RES) into the main electricity grid. High penetration of RES also come along with greater demand for more effective control approaches, congestion management techniques, and microgrids optimal dispatch. Most of the secondary control methods of microgrid systems in the autonomous mode require communication links between the distributed generators (DGs) for sharing power information and data for control purposes. This article gives ample review on the communication induced impairments in islanded microgrids. In the review, attention is given to communication induced delay, data packet loss, and cyber-attack that degrades optimal operations of islanded microgrids. The review also considered impairments modelling, the impact of impairments on microgrids operation and management, and the control methods employed in mitigating some of their negative impacts. The paper revealed that innovative control solutions for impairment mitigation rather than the development of new high-speed communication infrastructure should be implemented for microgrid control. It was also pointed out that a sparse communication graph is the basis for communication topology design for distributed secondary control in the microgrid.</p> </abstract>


2020 ◽  
Vol 14 (1) ◽  
Author(s):  
Getnet Yimer ◽  
Wondwossen Gebreyes ◽  
Arie Havelaar ◽  
Jemal Yousuf ◽  
Sarah McKune ◽  
...  

Abstract Background According to the Internal Displacement Monitoring Centre report on global human displacement, Ethiopia has the highest number of newly displaced people forced to flee their homes. Displaced people have arrived in other regions, sometimes leading to conflict. Several regions in Ethiopia experience on-going ethnic tensions and violence between tribes, which leaves smallholder farmers suspicious of any outside activities in their locale, assuming other ethnic groups may harm them. Changes in the central Ethiopian government have also led to suspicion of non-local agencies. The Campylobacter Genomics and Enteric Dysfunction (CAGED) research project’s objective is to improve the incomes, livelihoods and nutrition of smallholder farmers and was conducted during this period of increasing violence. The project aims to assess the impact of reducing exposure to chicken excreta on young children’s gut health and growth. This paper does not report empirical findings from CAGED, but is part of a series that aims to identify challenges in humanitarian research and reports on mitigation strategies during this research. Discussion This research is important to determine whether Campylobacter infection in chicken’s contributes to illness and stunting in children. However, violence against other researchers in different parts of Ethiopia led to mistrust and lack of engagement by the community with the researchers. Some reactions were so hostile that the team was fearful about returning to some households. As a result, the team designed strategies to respond, including establishing two types of community advisory boards. One used pre-existing village elder structures and another was composed of village youth. Data collection team members received training in principles of ethics, consent, and crisis management, and were provided on-going support from local and international principal investigators and the study’s ethics advisor. Conclusion The hostility and mistrust led to fear among the data collectors. These and the resulting strategies to address them resulted in delays for the research. However, the interventions taken resulted in successful completion of the field activities. Moreover, the lessons learned from this project are already being implemented with other projects being conducted in various parts of Ethiopia.


2013 ◽  
Vol 12 (4) ◽  
pp. 701-710 ◽  
Author(s):  
John D. Loike ◽  
Brittany S. Rush ◽  
Adam Schweber ◽  
Ruth L. Fischbach

Columbia University offers two innovative undergraduate science-based bioethics courses for student majoring in biosciences and pre–health studies. The goals of these courses are to introduce future scientists and healthcare professionals to the ethical questions they will confront in their professional lives, thus enabling them to strategically address these bioethical dilemmas. These courses incorporate innovative pedagogical methods, case studies, and class discussions to stimulate the students to think creatively about bioethical issues emerging from new biotechnologies. At the end of each course, each student is required to submit a one-page strategy detailing how he or she would resolve a bioethical dilemma. Based on our experience in teaching these courses and on a qualitative analysis of the students’ reflections, we offer recommendations for creating an undergraduate science-based course in bioethics. General recommendations include: 1) integrating the science of emerging biotechnologies, their ethical ramifications, and contemporary bioethical theories into interactive class sessions; 2) structuring discussion-based classes to stimulate students to consider the impact of their moral intuitions when grappling with bioethical issues; and 3) using specific actual and futuristic case studies to highlight bioethical issues and to help develop creative problem-solving skills. Such a course sparks students’ interests in both science and ethics and helps them analyze bioethical challenges arising from emerging biotechnologies.


Sign in / Sign up

Export Citation Format

Share Document