Cyber Attacks and Preliminary Steps in Cyber Security in National Protection

Author(s):  
Faruk Aydin ◽  
O. Tolga Pusatli

Cyber attacks launched by individuals and/or supported by nation states have increased due to the prevalence of information technologies at critical infrastructure of the states. In this chapter, such attacks and consecutive impacts are visited. In connection with this issue, evolution of cyber threats from annoying malware to serious weapons is studied by examples; hence, precautions against such threats are visited and usage of anti-malware applications as prevalent precautions is assessed within the scope. Selected information security standards and strategies of selected states and precautions for cyber security of Turkey are studied. Our findings underline that educated citizens and companies along with public institutions should cooperate to provide a nationwide cyber security. Consequently, it is defended that governments should play an affective role to protect, educate, and guide governmental and private companies and citizens on the cyber security by promoting the cyber security topic in the successive national development plans.

2018 ◽  
pp. 213-229
Author(s):  
Faruk Aydin ◽  
O. Tolga Pusatli

Cyber attacks launched by individuals and/or supported by nation states have increased due to the prevalence of information technologies at critical infrastructure of the states. In this chapter, such attacks and consecutive impacts are visited. In connection with this issue, evolution of cyber threats from annoying malware to serious weapons is studied by examples; hence, precautions against such threats are visited and usage of anti-malware applications as prevalent precautions is assessed within the scope. Selected information security standards and strategies of selected states and precautions for cyber security of Turkey are studied. Our findings underline that educated citizens and companies along with public institutions should cooperate to provide a nationwide cyber security. Consequently, it is defended that governments should play an affective role to protect, educate, and guide governmental and private companies and citizens on the cyber security by promoting the cyber security topic in the successive national development plans.


2020 ◽  
pp. 53-60
Author(s):  
Mohammed I. Alghamdi ◽  

Our economy, infrastructure and societies rely to a large extent on information technology and computer networks solutions. Increasing dependency on information technologies has also multiplied the potential hazards of cyber-attacks. The prime goal of this study is to critically examine how the sufficient knowledge of cyber security threats plays a vital role in detection of any intrusion in simple networks and preventing the attacks. The study has evaluated various literatures and peer reviewed articles to examine the findings obtained by consolidating the outcomes of different studies and present the final findings into a simplified solution.


Author(s):  
Ana Kovacevic ◽  
Dragana Nikolic

We are facing the expansion of cyber incidents, and they are becoming more severe. This results in the necessity to improve security, especially in the vulnerable field of critical infrastructure. One of the problems in the security of critical infrastructures is the level of awareness related to the effect of cyberattacks. The threat to critical infrastructure is real, so it is necessary to be aware of it and anticipate, predict, and prepare against a cyber attack. The main reason for the escalation of cyberattacks in the field of Critical Infrastructure (CI) may be that most control systems used for CI do not utilise propriety protocols and software anymore; they instead utilise standard solutions. As a result, critical infrastructure systems are more than ever before becoming vulnerable and exposed to cyber threats. It is important to get an insight into what attack types occur, as this may help direct cyber security efforts. In this chapter, the authors present vulnerabilities of SCADA systems against cyber attack, analyse and classify existing cyber attacks, and give future directions to achieve better security of SCADA systems.


Author(s):  
Ana Kovacevic ◽  
Dragana Nikolic

We are facing the expansion of cyber incidents, and they are becoming more severe. This results in the necessity to improve security, especially in the vulnerable field of critical infrastructure. One of the problems in the security of critical infrastructures is the level of awareness related to the effect of cyberattacks. The threat to critical infrastructure is real, so it is necessary to be aware of it and anticipate, predict, and prepare against a cyber attack. The main reason for the escalation of cyberattacks in the field of Critical Infrastructure (CI) may be that most control systems used for CI do not utilise propriety protocols and software anymore; they instead utilise standard solutions. As a result, critical infrastructure systems are more than ever before becoming vulnerable and exposed to cyber threats. It is important to get an insight into what attack types occur, as this may help direct cyber security efforts. In this chapter, the authors present vulnerabilities of SCADA systems against cyber attack, analyse and classify existing cyber attacks, and give future directions to achieve better security of SCADA systems.


2020 ◽  
Vol 5 ◽  
pp. 141-149
Author(s):  
Andrei Șestacov

Information technologies have already radically transformed the communications and information technology sectors, trade, media, and the education sector, especially education, which is on the top priority. Digital technologies will radically change the way data is sent and retrieved, will allow immediate and real-time feedback from students, will facilitate access to education through distance learning, will allow new service providers to enter traditional markets education. Thus, a diligent and well planned implementation of cyber security, as well as information security of information networks of educational institutions will provide a definite competitive advantage in the information environment. In the context of a dynamic information environment prone to large-scale cyber-attacks, in which cybercriminals are using increasingly advanced methods to implement attack vectors that are undetectable and difficult to neutralize, this scientific study is designed to protect data and security of your institutions as well as to ensure the confidentiality of your students and teachers. Whether we are talking about large or small educational institutions, this study provides a series of recommendations on the secure use of social networks with a minimum set of measures needed to prevent cyber-attacks as well as reduce the damage caused in case of attacks. At the same time, it will examine the best practices in the online environment, effectively analyze the privacy settings of mobile devices and present some top tips for the secure use of social networks. The study aims to comply with the following minimum set of measures in order to prevent cyber-attacks in educational institutions, and reduce the damage caused in the event of attacks. Cyber-bezpieczeństwo w obszarze edukacji Technologie informacyjne radykalnie przekształciły sektory komunikacji, handlu, mediów i edukacji. Technologie cyfrowe zmienią sposób przesyłania i wyszukiwania danych, umożliwią natychmiastową informację zwrotną od uczniów w czasie rzeczywistym oraz ułatwiają dostęp do edukacji poprzez kształcenie na odległość. Zatem rzetelne i dobrze zaplanowane wdrożenie cyberbezpieczeństwa, a także bezpieczeństwa informacyjnego sieci informacyjnych placówek oświatowych zapewni zdecydowaną przewagę konkurencyjną w środowisku informacyjnym. Artykuł ma na celu przedstawienie środków zapobiegawczych przeciw cyberatakom w placówkach edukacyjnych i ograniczania szkód wyrządzanych w przypadku takich ataków.


Author(s):  
O. V. Samchyshyn ◽  
D. V. Perevizna

Emergence of new technologies and modernization of existing information technologies, development of information and telecommunication processing and storage systems have increase the level of information security, necessitating an increase of information security’s effectiveness with the complexity of data storage architecture. Security of information from unauthorized access is an essential measure to prevent material and non-material damage to its owner. So it is very important to take into account the efficiency of the subsystem of access control and data security in order to ensure security of some information system. Accordingly the threat of information leakage has made the means of information security and cyber security one of the mandatory characteristics of information and telecommunication systems and information security has become an integral part of professional function. Under conditions of the hybrid war of the Russian Federation against Ukraine? the number of cyber attacks on military information and telecommunication systems has increased. At the same time their technological complexity has increased too. This process necessitates the improvement of information security systems and the process of providing access to them by using modern types of users identification. Access control is an effective method of information security. It regulates the use of information system resources. User’s identification is an important and integral element of access control system. An analysis of modern types of users identification is presented in the paper. The technology of QR-code is considered: the principle of formation, the types of coding, the structure of elements, the advantages of its usage. The interconnection between its components was established. Prospects for further research are the development of an algorithm and software application for user identification to provide access by QR-code to information and telecommunication systems for military purposes.


Energetika ◽  
2018 ◽  
Vol 63 (4) ◽  
Author(s):  
Heinz-Peter Berg

In the last years, cybersecurity has become a crucial essential element within the security framework of critical infrastructures such as process industry, railways, hospitals and also nuclear facilities. The types of threats change, and not only organizations requiring money from the affected organization but also nation states seem to be involved. The number of cyber-attacks to all types of critical infrastructure increased and these attacks are seen as a threatening problem. For the specific aspects of nuclear facilities in Germany, current experiences and future activities regarding these facilities under the German IT Act are discussed. Moreover, respective regulatory requirements recently set in force in Germany are presented. In addition, ongoing international activities in this area are discussed.


2020 ◽  
Vol 25 (6) ◽  
Author(s):  
Iliya Fayans ◽  
Yair Motro ◽  
Lior Rokach ◽  
Yossi Oren ◽  
Jacob Moran-Gilad

Next generation sequencing (NGS) is becoming the new gold standard in public health microbiology. Like any disruptive technology, its growing popularity inevitably attracts cyber security actors, for whom the health sector is attractive because it combines mission-critical infrastructure and high-value data with cybersecurity vulnerabilities. In this Perspective, we explore cyber security aspects of microbial NGS. We discuss the motivations and objectives for such attack, its feasibility and implications, and highlight policy considerations aimed at threat mitigation. Particular focus is placed on the attack vectors, where the entire process of NGS, from sample to result, could be vulnerable, and a risk assessment based on probability and impact for representative attack vectors is presented. Cyber attacks on microbial NGS could result in loss of confidentiality (leakage of personal or institutional data), integrity (misdetection of pathogens) and availability (denial of sequencing services). NGS platforms are also at risk of being used as propagation vectors, compromising an entire system or network. Owing to the rapid evolution of microbial NGS and its applications, and in light of the dynamics of the cyber security domain, frequent risk assessments should be carried out in order to identify new threats and underpin constantly updated public health policies.


2019 ◽  
pp. 331-367
Author(s):  
Cameron S. D. Brown

This chapter examines legal and technical issues that arise when considering strategic retaliatory countermeasures to cyber-attacks. Implications connected with endorsing techniques of active defense for nation-states are viewed alongside challenges faced by private entities. Proactive avenues for tackling cyber-security threats are evaluated and shortcomings within the international system of governance are analyzed. Retributive justice as a legal and philosophical concept is viewed through the lens of customary international law pertaining to use of force and self-defense. Difficulties in adapting rules governing kinetic warfare to instances of cyber-conflict are elucidated. The danger of executing counterstrikes for private entities is explained with reference to cross-border dilemmas, conflict of laws, and risks stemming from civil, criminal, and also administrative liability. Protocols for safeguarding anonymity are observed and the problem of attribution is illustrated. Costs and benefits associated with adopting methods of active defense are presented and solutions to avoid accountability failure are recommended.


Author(s):  
Manju Khari ◽  
Gulshan Shrivastava ◽  
Sana Gupta ◽  
Rashmi Gupta

Cyber Security is generally used as substitute with the terms Information Security and Computer Security. This work involves an introduction to the Cyber Security and history of Cyber Security is also discussed. This also includes Cyber Security that goes beyond the limits of the traditional information security to involve not only the security of information tools but also the other assets, involving the person's own confidential information. In computer security or information security, relation to the human is basically to relate their duty(s) in the security process. In Cyber security, the factor has an added dimension, referring humans as the targets for the cyber-attacks or even becoming the part of the cyber-attack unknowingly. This also involves the details about the cybercriminals and cyber risks going ahead with the classification of the Cybercrimes which is against individual, property, organisation and society. Impacts of security breaches are also discussed. Countermeasures for computer security are discussed along with the Cyber security standards, services, products, consultancy services, governance and strategies. Risk management with the security architecture has also been discussed. Other section involves the regulation and certification controls; recovery and continuity plans and Cyber security skills.


Sign in / Sign up

Export Citation Format

Share Document