Enterprise Security

2022 ◽  
pp. 441-470
Author(s):  
Manish Shukla ◽  
Harshal Tupsamudre ◽  
Sachin Lodha

As we increasingly depend on technology, cyber threats and vulnerabilities are creating trust issues for businesses and enterprises, and cybersecurity is being considered as the number one threat to the global economy over the next 5-10 years. In this chapter, the authors explain this phenomenon by first describing the changing cyber ecosystem due to extreme digitalization and then its ramifications that are plainly visible in the latest trends in cyber-attacks. In the process, they arrive at five key implications that any modern enterprise needs to be cognizant of and discuss eight emerging measures that may help address consequences of those implications substantially. It is hoped that these measures will play a critical role in making enterprise security more proactive, cognitive, automated, connected, invisible, and risk aware.

Author(s):  
Manish Shukla ◽  
Harshal Tupsamudre ◽  
Sachin Lodha

As we increasingly depend on technology, cyber threats and vulnerabilities are creating trust issues for businesses and enterprises, and cybersecurity is being considered as the number one threat to the global economy over the next 5-10 years. In this chapter, the authors explain this phenomenon by first describing the changing cyber ecosystem due to extreme digitalization and then its ramifications that are plainly visible in the latest trends in cyber-attacks. In the process, they arrive at five key implications that any modern enterprise needs to be cognizant of and discuss eight emerging measures that may help address consequences of those implications substantially. It is hoped that these measures will play a critical role in making enterprise security more proactive, cognitive, automated, connected, invisible, and risk aware.


2018 ◽  
Vol 23 (1) ◽  
pp. 75-87 ◽  
Author(s):  
Florin Ogîgău-Neamțiu ◽  
Horațiu Moga

Abstract Information assurance plays a critical role in modern countries around the globe and IT systems are key elements in this environment. Enabling or disabling such capabilities are strategic goals which dramatically influence a nation capacity to perform thus drawing considerate attention of stakeholders. This research defines a method to deal with cyber threats focused on attacker by using the game theory approach and canonic strategies specific to informational war. The cyber threats corresponding risks are treated through the bimatrix game theory and the strategies for Defender and Challenger game players are adapted from the informational war theory. The authors consider cyber-attacks to be a subcomponent of the informational war and thus they can be handled, with minimal alterations, with instruments from the same wide informational war framework.


2019 ◽  
Vol 7 (1) ◽  
pp. 14-26
Author(s):  
Ruti Gafni ◽  
Tal Pavel

Small and Medium Businesses (SMB) use Internet and computer-based tools in their daily processes, sometimes without being aware to the cyber threats, or without knowing how to be prepared in case of a cyber-attack, although they are a major target for cyber-attacks. Specific information about cybersecurity needed by SMBs, in order to cope with cyber threats, is not always available or easily accessible. In this study, a vast search of different types of information about SMBs’ cybersecurity was performed, in order to find whether a hole of accessible information exists in this area. This exploratory research covered general mass communication media channels, technological and professional cybersecurity websites, and academic journals, and found that indeed very few studies, articles and news items were published in this matter. Leveraging knowledge and awareness, diminishing the shame for reporting cyber-attacks, and increasing mass communication media interest and public attention, may be activities to cover this “invisible hole”.


Author(s):  
Ana Kovacevic ◽  
Dragana Nikolic

We are facing the expansion of cyber incidents, and they are becoming more severe. This results in the necessity to improve security, especially in the vulnerable field of critical infrastructure. One of the problems in the security of critical infrastructures is the level of awareness related to the effect of cyberattacks. The threat to critical infrastructure is real, so it is necessary to be aware of it and anticipate, predict, and prepare against a cyber attack. The main reason for the escalation of cyberattacks in the field of Critical Infrastructure (CI) may be that most control systems used for CI do not utilise propriety protocols and software anymore; they instead utilise standard solutions. As a result, critical infrastructure systems are more than ever before becoming vulnerable and exposed to cyber threats. It is important to get an insight into what attack types occur, as this may help direct cyber security efforts. In this chapter, the authors present vulnerabilities of SCADA systems against cyber attack, analyse and classify existing cyber attacks, and give future directions to achieve better security of SCADA systems.


2021 ◽  
Author(s):  
Stuart Fowler ◽  
Keith Joiner ◽  
Elena Sitnikova

<div>Cyber-worthiness as it is termed in Australian Defence, or cyber-maturity more broadly, is a necessary feature of modern complex systems which are required to operate in a hostile cyber environment. To evaluate the cyber-worthiness of complex systems, an assessment methodology is required to examine a complex system’s or system-of-system’s vulnerability to and risk of cyber-attacks that can compromise such systems. This assessment methodology should address the cyber-attack surface and threat kill chains, including supply chains and supporting infrastructure. A cyber-worthiness capability assessment methodology has been developed based on model-based systems engineering concepts to analyse the cyber-worthiness of complex systems and present a risk assessment of various cyber threats to the complex system. This methodology incorporates modelling and simulation methods that provide organisations greater visibility and consistency across diverse systems, especially to drive cybersecurity controls, investment and operational decisions involving aggregated systems. In this paper, the developed methodology will be presented in detail and hypothesised outcomes will be discussed.</div>


2016 ◽  
Vol 4 (1) ◽  
pp. 61 ◽  
Author(s):  
Muhamad Rizal ◽  
Yanyan Yani

The purpose of state defense is to protect and to save the integrity of the Unitary State of the Republic of Indonesia, the sovereignty of the state, as well as its security from all kinds of threats, whether they are military or non-military ones. One of the non-military threats that potentially threatens the sovereignty and security of the nation-state is the misuse of technology and information in cyberspace. The threat of irresponsible cyber attacks can be initiated by both state and non-state actors. The actors may be an individual, a group of people, a faction, an organization, or even a country. Therefore, the government needs to anticipate cyber threats by formulating cyber security strategies and determining comprehensive steps to defend against cyber attacks; its types and the scale of counter-measures, as well as devising the rules of law. 


2021 ◽  
Author(s):  
◽  
Phoxai Inthaboualy

<p>The current literature focuses primarily on the national competitiveness of developed or developing economies. However, minimal research exists on understanding the national competitiveness of less developed countries (LDCs) whose strengths in factor endowments, government institutions and the extent of global integration are not the same as those of developed or developing countries. This study aims to fill this research gap by exploring factors contributing to the competitiveness of Laos. Laos is a small, poor and land-locked country in Southeast Asia with rich natural resources. To achieve the study objectives, 20 semi-structured interviews were conducted with senior government officials, industrial representatives, professors and NGOs in Laos. The findings suggest three key factors are critical for enhancing Lao competitiveness: factor endowments, the role of government, and global integration. Laos‘ factor endowments include hydropower, mining, agriculture, garment and textile industries, and services. Laos is interacting more with the global economy as it gets set to embrace membership of the World Trade Organisation after approximately 15 years of membership of ASEAN. The government is playing a critical role by developing Lao factor endowments and developing policies required for global integration. However, the country faces challenges of value addition to the existing natural resources, developing and leveraging human capital, and further improvement in rules and regulations.</p>


2021 ◽  
Author(s):  
◽  
Phoxai Inthaboualy

<p>The current literature focuses primarily on the national competitiveness of developed or developing economies. However, minimal research exists on understanding the national competitiveness of less developed countries (LDCs) whose strengths in factor endowments, government institutions and the extent of global integration are not the same as those of developed or developing countries. This study aims to fill this research gap by exploring factors contributing to the competitiveness of Laos. Laos is a small, poor and land-locked country in Southeast Asia with rich natural resources. To achieve the study objectives, 20 semi-structured interviews were conducted with senior government officials, industrial representatives, professors and NGOs in Laos. The findings suggest three key factors are critical for enhancing Lao competitiveness: factor endowments, the role of government, and global integration. Laos‘ factor endowments include hydropower, mining, agriculture, garment and textile industries, and services. Laos is interacting more with the global economy as it gets set to embrace membership of the World Trade Organisation after approximately 15 years of membership of ASEAN. The government is playing a critical role by developing Lao factor endowments and developing policies required for global integration. However, the country faces challenges of value addition to the existing natural resources, developing and leveraging human capital, and further improvement in rules and regulations.</p>


Author(s):  
Ana Kovacevic ◽  
Dragana Nikolic

We are facing the expansion of cyber incidents, and they are becoming more severe. This results in the necessity to improve security, especially in the vulnerable field of critical infrastructure. One of the problems in the security of critical infrastructures is the level of awareness related to the effect of cyberattacks. The threat to critical infrastructure is real, so it is necessary to be aware of it and anticipate, predict, and prepare against a cyber attack. The main reason for the escalation of cyberattacks in the field of Critical Infrastructure (CI) may be that most control systems used for CI do not utilise propriety protocols and software anymore; they instead utilise standard solutions. As a result, critical infrastructure systems are more than ever before becoming vulnerable and exposed to cyber threats. It is important to get an insight into what attack types occur, as this may help direct cyber security efforts. In this chapter, the authors present vulnerabilities of SCADA systems against cyber attack, analyse and classify existing cyber attacks, and give future directions to achieve better security of SCADA systems.


Author(s):  
Oleksandr Klevtsov ◽  
Artem Symonov ◽  
Serhii Trubchaninov

The chapter is devoted to the issues of cyber security assessment of instrumentation and control systems (I&C systems) of nuclear power plants (NPP). The authors examined the main types of potential cyber threats at the stages of development and operation of NPP I&C systems. Examples of real incidents at various nuclear facilities caused by intentional cyber-attacks or unintentional computer errors during the maintenance of the software of NPP I&C systems are given. The approaches to vulnerabilities assessment of NPP I&C systems are described. The scope and content of the assessment and periodic reassessment of cyber security of NPP I&C systems are considered. An approach of assessment to cyber security risks is described.


Sign in / Sign up

Export Citation Format

Share Document