scholarly journals Digital Risk Management for Data Attacks against State Evaluation

Understanding reasonable framework cyber attacks is essential for creating material assurance and recuperation measures. Propelled attacks follow exploited contact at diminished expenses and recognize capacity. This paper behaviors chance investigation of joined data trustworthiness and handiness attacks against the office framework state evaluation. We will in general contrast the consolidated attacks and unadulterated honesty attacks - false data infusion attacks. A safety record for defenselessness appraisal to those two sorts of attacks is arranged and created because a blended number connected science drawback. We will in general demonstrate that such joined attacks will prevail with less assets than false data infusion attacks. The consolidated attacks with confined data of the framework design also open gifts to keep camouflage against the undesirable data location. At last, the risk of joined attacks to dependable framework activity is assessed abuse the outcomes from defenselessness evaluation and attacks sway examination. The discoveries during this paper are substantial and upheld by a top to bottom contextual investigation

Sensors ◽  
2020 ◽  
Vol 20 (12) ◽  
pp. 3537 ◽  
Author(s):  
Georgia Lykou ◽  
Dimitrios Moustakas ◽  
Dimitris Gritzalis

As the fastest growing segment of aviation, unmanned aerial systems (UAS) continue to increase in number, technical complexity and capabilities. Numerous civilian and commercial uses are drastically transforming civil protection, asset delivery, commercial and entertaining activities. However, UAS pose significant challenges in terms of safety, security and privacy within society. An increasing phenomenon, nowadays, is drone-related incidents near airport facilities, which are expected to proliferate in frequency, complexity and severity, as drones become larger and more powerful. Critical infrastructures need to be protected from such aerial attacks, through effective counteracting technologies, risk management and resilience plans. In this paper, we present a survey of drone incidents near airports and a literature review of sensor technologies, able to prevent, detect, identify and mitigate rogue drones. We exhibit the benefits and limitations of available counter-drone technologies (C-UAS); however, defending airports against misused drone activity is a hard problem. Therefore, we analyze three realistic attack scenarios from malicious drones and propose an effective C-UAS protection plan for each case. We discuss applicability limitations of C-UAS in the aviation context and propose a resilience action plan for airport stakeholders for defending against airborne threats from misused drones.


2021 ◽  
pp. 19-27
Author(s):  
Nazar Demchyshak ◽  
Anastasiia Shkyria

Purpose. The aim of the article is substantiation of approaches of domestic and foreign scientists to risk management in the financial sector of Ukraine in the context of cyber threats and the need to ensure national security and post-pandemic economic recovery. Methodology of research. General scientific and special methods of scientific research are used in the article, in particular: induction, deduction, scientific abstraction - to reveal the essence of the concepts of "cyber threat", “cyber security" and "digitalization"; statistical and graphical methods - to assess the current situation in the field of cyber defence in the world and the national cyber security index; methods of analysis and synthesis - in substantiating the conclusions of the research. Finding. Definitions of cyber risk, approaches to its interpretation and classification were considered. The importance of cyber security in the digitalization of the national economy was argued. The Strategy of Ukrainian Financial Sector Development until 2025 is analysed. The world statistics of frequency and losses due to cyber-attacks are studied and the cyber threats that caused the greatest losses in Ukraine are identified. The analysis of Ukraine’s positions in the National Cyber Security Index 2020 is carried out. The directions of cyber threat prevention that can be useful for Ukrainian companies are substantiated. Originality. The author’s definition of the term "cyber risk" is proposed, in which special attention in focused on the effects of cyber threats. The importance of cyber risk management in the conditions of inevitability of digitalization in the financial sector of Ukraine is substantiated. Approaches to the prevention of cyber-attacks, the implementation of which is necessary for the successful digital transformation of Ukraine, are proposed. Practical value. The results of the research will contribute to the formation of an effective risk management system in the financial sector of Ukraine in terms of digitalization of the financial space and post-pandemic recovery of the national economy. Key words: national security, cyber risk, cyber threat, cyber defence, digitalization, post-pandemic recovery, fintech.


2021 ◽  
Vol 4 (2) ◽  
pp. 30-43
Author(s):  
Florian-Klaus Kaiser ◽  
Marcus Wiens ◽  
Frank Schultmann

Cyber-attacks have a tremendous impact on worldwide economic performance. Hence, it is vitally important to implement effective risk management for different cyber-attacks, which calls for profound attacker models. However, cyber risk modelling based on attacker models seems to be restricted to overly simplified models. This hinders the understanding of cyber risks and represents a heavy burden for efficient cyber risk management. This work aims to forward scientific research in this field by employing a multi-method approach based on a quantitative content analysis of scientific literature and a natural experiment. Our work gives evidence for the oversimplified modelling of attacker motivational patterns. The quantitative content analysis gives evidence for a broad and established misunderstanding of attackers as being illicitly malicious. The results of the natural experiment substantiate the findings of the content analysis. We thereby contribute to the improvement of attacker modelling, which can be considered a necessary prerequisite for effective cyber risk management.


2018 ◽  
Author(s):  
Eric Perakslis

BACKGROUND There is an old expression in agriculture that the best time to plant a tree was 20 years ago. The second best time, is today. This is exactly where we find ourselves today with healthcare cyber security. The systems we use simply were not designed or built, nor are they currently managed, for the types of advanced persistent threats that face us. There are many ways that cyber security and cyber resilience can be approached and optimized but the most significant factor is time. The majority of systems supporting critical healthcare missions were developed over the course of years, or even decades. Major revisions and new features are developed over the course of months and years. Fixes and updates are typically delivered monthly or as daily emergency releases. System operators extend the time to achieve these system improvements with testing and validation of systems, updates, and patches to ensure functionality and that no unintended consequences are being introduced. This extended lifecycle leaves critical missions lacking functionality and exposed to cyber risks on a continual basis. It is impossible for most organizations to stay up to speed with cyber defense. OBJECTIVE To relay the importance of building cyber strategies that understand and optimize the essential nature of cyber time. METHODS NA. Viewpoint piece RESULTS NA - viewpoint Piece CONCLUSIONS Cybersecurity varies greatly from most domains of risk management in that there is always a determined adversary actively executing an agenda that inevitably brings harm to targeted organizations. This adversary is moving at unprecedented speed and organizations must build and execute strategies that enable response and resiliency in real-time to meet this unprecedented level of persistent threat.


2019 ◽  
Vol 5 (1) ◽  
pp. 46-48
Author(s):  
Akash RANA

The starting point of the paper is the recognition of the growing threat of cyber-attacks to commercial maritime. Constantly growing dependency on technology has obvious advantages, on the other hand, however, it makes commercial maritime vessels progressively more vulnerable to cyber-crime, including GPS signal interference, malware attacks or even gaining control over ships’ systems and networks. The main objective of the paper is to present and discuss the Guidelines on Cyber Security Onboard Ships developed by the International Maritime Organization, including best practices for implementation of cyber risk management. The article’s goal is to summarize the guidelines and to familiarize the reader with the reasons why and the methods how they should be implemented. The paper is concluded with an example how the Guidelines can be adopted by national authorities, i.e., a brief presentation of “Code of Practice: Cyber Security for Ships” – a document developed by the British government that transposes the IMO guidelines.


2021 ◽  
Vol 44 (3) ◽  
pp. 345-371
Author(s):  
Young-Gon Kim ◽  
Nak-Hyun Han ◽  
Ho-Seok Ko ◽  
Seong-Hoo Kim

Sign in / Sign up

Export Citation Format

Share Document