Flow-Graph and Markovian Methods for Cyber Security Analysis

2018 ◽  
pp. 674-702 ◽  
Author(s):  
Kouroush Jenab ◽  
Sam Khoury ◽  
Kim LaFevor

A flow-graph depicts the interrelationships among cyber security and security threats/incidents (i.e., internal, external, and accidental). Using a flow-graph, the manner in which security threats may affect systems can be investigated. This paper reports analytical approaches to analyze time to security threats and probability of security threat occurrence. Considering embedded threat detection functions in a safe-guard unit, the proposed approaches use the flow-graph concept, and Markovian method to calculate time to security threat occurrence and its probability. The threat detection functions are featured by incident detection and recovery mechanisms. The results of this study can be used by all parties (public and private sector organizations, service providers, IT, and insurance companies) to better deal with cyber security issues with respect to utilizing technology, investment, and insurance. An illustrative example is demonstrated to present the application of the approach.

2016 ◽  
Vol 12 (1) ◽  
pp. 59-84 ◽  
Author(s):  
Kouroush Jenab ◽  
Sam Khoury ◽  
Kim LaFevor

A flow-graph depicts the interrelationships among cyber security and security threats/incidents (i.e., internal, external, and accidental). Using a flow-graph, the manner in which security threats may affect systems can be investigated. This paper reports analytical approaches to analyze time to security threats and probability of security threat occurrence. Considering embedded threat detection functions in a safe-guard unit, the proposed approaches use the flow-graph concept, and Markovian method to calculate time to security threat occurrence and its probability. The threat detection functions are featured by incident detection and recovery mechanisms. The results of this study can be used by all parties (public and private sector organizations, service providers, IT, and insurance companies) to better deal with cyber security issues with respect to utilizing technology, investment, and insurance. An illustrative example is demonstrated to present the application of the approach.


2021 ◽  
Vol 17 (1) ◽  
pp. 150-166
Author(s):  
Andrei L. LOMAKIN ◽  
Evgenii Yu. KHRUSTALEV ◽  
Gleb A. KOSTYURIN

Subject. As the socio-economic relationships are getting digitalized so quickly, the society faces more and more instances of cybercrime. To effectively prevent arising threats to personal information security, it is necessary to know key social engineering methods and security activities to mitigate consequences of emerging threats. Objectives. We herein analyze and detect arising information security threats associated with social engineering. We set forth basic guidelines for preventing threats and improving the personal security from social engineering approaches. Methods. The study relies upon methods of systems analysis, synthesis, analogy and generalization. Results. We determined the most frequent instances associated with social engineering, which cause personal information security threats and possible implications. The article outlines guidelines for improving the persona; security from social engineering approaches as an information security threat. Conclusions and Relevance. To make information security threats associated with social engineering less probable, there should be a comprehensive approach implying two strategies. First, the information security protection should be technologically improved, fitted with various data protection, antivirus, anti-fishing software. Second, people should be more aware of information security issues. Raising the public awareness, the government, heads of various departments, top executives of public and private organizations should set an integrated training system for people, civil servants, employees to proliferate the knowledge of information security basics.


2017 ◽  
Vol 7 (1.5) ◽  
pp. 253
Author(s):  
N. Srinivasu ◽  
O. Sree Priyanka ◽  
M. Prudhvi ◽  
G. Meghana

Cloud Security was provided for the services such as storage, network, applications and software through internet. The Security was given at each layer (Saas, Paas, and Iaas), in each layer, there are some security threats which became the major problem in cloud computing. In Saas, the security issues are mainly present in Web Application services and this issue can be overcome by web application scanners and service level agreement(SLA). In Paas, the major problem is Data Transmission. During transmission of data, some data may be lost or modified. The PaaS environment accomplishes proficiency to some extent through duplication of information. The duplication of information makes high accessibility of information for engineers and clients. However, data is never fully deleted instead the pointers to the data are deleted. In order to overcome this problem the techniques that used are encryption[12], data backup. In Iaas the security threat that occurs in is virtualization and the techniques that are used to overcome the threats are Dynamic Security Provisioning(DSC), operational security procedure, for which Cloud Software is available in the market, for e.g. Eucalyptus, Nimbus 6.


2018 ◽  
pp. 132-150
Author(s):  
Taiseera Al Balushi ◽  
Saqib Ali ◽  
Osama Rehman

Initiatives carried by companies, institutes and governments to flourish and embellish the Information and Communication Technology (ICT) among the public have led to its penetration into every walk of life. ICT enhances the efficiency of various systems, such as the organisation and transfer of data. However, with the digital and remote access features of ICT comes the motivation towards financial, political and military gains by rivals. Security threats and vulnerabilities in existing ICT systems have resulted in cyber-attacks that are usually followed by substantial financial losses. This study discusses the security in ICT from a business, economic and government perspective. The study makes an attempt to understand the seriousness of the security issues and highlights the consequences of security breech from an economic perspective. Based on the performed analysis, the factors behind these attacks are provided along with recommendations for better preparations against them.


2017 ◽  
Vol 36 (1) ◽  
pp. 9-33
Author(s):  
Ieva Karpavičiūtė

Abstract The paper addresses the security threat perception and securitization of existential threats in Lithuania. It focuses upon the securitization theory and its ability to explain the change of national security agendas as affected by the changes in national identity and existential security threats. It takes into account the internal and external factors that are shaping the objective and subjective national threat perception. The paper applies O. Waever’s securitization theory with an aim to explain how the national security threats are being addressed and perceived in Lithuania. Moreover, the paper is developed against the backdrop of the most recent developments in securitization theory and evolution of its theoretical perceptions of identity, existential threats, and legitimacy. It also discusses the possibility of inclusion of hybrid security threats into an analysis of securitization. The empirical part of the article assesses the most recent security challenges, provides evaluation of changes in national security perception, and portrays the dynamics of national security threats as defined in the National Security Strategies and the Military Doctrine. The paper focuses upon the most recent dynamics in security policy of Lithuania. It also takes into account the hybrid nature of security threats and the reaction to hybrid security elements such as: cyber security, information security, and international terrorism.


2022 ◽  
pp. 488-505
Author(s):  
Valentina V. Timčenko

Introduction of the Dynamic Line Rating (DLR) concept has an important role in implementing smart grids in the power utility's transmission network. DLR assumes real-time control of the overhead transmission line, based on the continuous evaluation of the actual thermal and other operating conditions, and further estimation of the maximum transmission line's load and other relevant parameters that determine operational limitations. This chapter presents cloud-based DLR systems in terms of architecture, cloud services, and cyber security issues. DLR systems are explored with regards to cloud computing in industry, applicable cloud services and infrastructures, and communication system's performance. Security and privacy of cloud-based DLR systems have been addressed in terms of public and private services. A secure hybrid cloud-based architecture to support DLR is proposed.


In the era of social media and the Internet, there has been an exponential increase in threats related to the privacy of user accounts and data. The confidentiality of personal data is compromised for various motives. This sudden increase in security threats has led to widespread problems. Our research is focused on analyzing the extent of cyber-attacks in various countries across the globe. We have proposed a novel approach for analyzing the tweets related to cyber-attacks and its surrounding fields. The analysis proves that Asian countries face more cyber security issues as compared to European countries. Further, it is also analyzed that developing countries like India are more prone to these issues as compare to developed countries like the United States or the United Kingdom.


Author(s):  
Alika Guchua ◽  
Thornike Zedelashvili

The work deals with the topic of cyberwar as a phenomenon of asymmetric threat and cyber-nuclear security threats in modern world politics, potential threats to international politics and global security issues, counter-terrorism policies are discussed. The paper discusses the challenges facing cyber security worldwide and the phenomenon of cyber security against the backdrop of asymmetric threats. Cyberspace has already become a weapon of infinite capacity for the whole world. It has generated positive effect as well as has become the area of evil for terrorists, which are actively using modern technologies, computer systems. The facts are many and we are often in the center of events. With the development of technology in the 21st century, global changes are taking place in international security, the geopolitical transition and new threats and challenges, and international security issues are becoming increasingly important. The international security system is vulnerable to challenges such as the use of weapons of mass destruction and cyber terrorism. The article discusses the dangers and problems of hybrid warfare in international security, as well as the Russian-Georgian hybrid warfare. Keywords: Cyberwar, asymmetric threat, hackers, attack, hybrid war, Russia-Georgia, NATO, EU, nuclear terrorism, nuclear security


Sign in / Sign up

Export Citation Format

Share Document