Deciphering the Myth About Non-Compliance and Its Impact on Cyber Security and Safety

Author(s):  
Kwasi Danso Dankwa

The use of computers and sophisticated technologies are on the rise, and organizations are constantly looking for ways to invest in technologies to stay ahead of the competitive market. As such, cyber security and safety measures have been put in place by the organizations to protect them from attacks and to ensure that products and services are safe. However, managing cyber security and safety is becoming more challenging in today's business because people are both a cause of cyber security incidents as well as a key part of the protection from them. It is however that non-compliance with policies and directives are major security breaches. What is not well known, however, are the reasons behind the non-compliance behaviours. This chapter seeks to explore the reasons behind the non-compliance behaviours by use of compliance assessment model (CAM). The chapter reviews a case study in a health centre and systematically assesses the reasons behind the non-compliance behaviour by using the CAM model.

2015 ◽  
Vol 4 (1) ◽  
pp. 135-142 ◽  
Author(s):  
Nimisha Singh ◽  
Abha Rishi

As the world becomes increasingly interlinked through the Internet, cyberspace frauds are also on the rise. This is a case study on a company, Pyramid Cyber Security (P) Ltd., which specializes in digital crime, fraud and forensic solutions and services in India. Over the years, the company has established several digital forensics laboratories and security projects for agencies in law enforcement, the public sector and corporate organizations. With the scalability, flexibility and economic advantage offered by cloud computing, more and more organizations are moving towards cloud for their applications. With all the benefits of cloud computing, it also opens up a company to the danger of digital crime and security breaches on the cloud platform. This has thrown open new vistas for Pyramid, putting it in a dilemma of whether to focus on the existing business or explore new opportunities in cloud forensics investigation thrown by the wide acceptance of cloud computing. It also poses the question whether a company should go in for pre-incident or post-incident digital network security architecture. It is a teaching case.


2020 ◽  
Vol 62 (7) ◽  
pp. 2917-2935
Author(s):  
Alaa Mohasseb ◽  
Benjamin Aziz ◽  
Jeyong Jung ◽  
Julak Lee

Author(s):  
Petar Radanliev ◽  
Rafael Mantilla Montalvo ◽  
Stacy Cannady ◽  
Razvan Nicolescu ◽  
Dave De Roure ◽  
...  

This research article reports the results of a qualitative case study that correlates academic literature with five Industry 4.0 cyber trends, seven cyber risk frameworks and two cyber risk models. While there is a strong interest in industry and academia to standardise existing cyber risk frameworks, models and methodologies, an attempt to combine these approaches has not been done until present. We apply the grounded theory approach to derive with integration criteria for the reviewed frameworks, models and methodologies. Then, we propose a new architecture for the integration of the reviewed frameworks, models and methodologies. We therefore advance the efforts of integrating standards and governance into Industry 4.0 and offer a better understanding of a holistic economic impact assessment model for IoT cyber risk.


2020 ◽  
Vol 12 (6) ◽  
pp. 2208 ◽  
Author(s):  
Jamie E. Filer ◽  
Justin D. Delorit ◽  
Andrew J. Hoisington ◽  
Steven J. Schuldt

Remote communities such as rural villages, post-disaster housing camps, and military forward operating bases are often located in remote and hostile areas with limited or no access to established infrastructure grids. Operating these communities with conventional assets requires constant resupply, which yields a significant logistical burden, creates negative environmental impacts, and increases costs. For example, a 2000-member isolated village in northern Canada relying on diesel generators required 8.6 million USD of fuel per year and emitted 8500 tons of carbon dioxide. Remote community planners can mitigate these negative impacts by selecting sustainable technologies that minimize resource consumption and emissions. However, the alternatives often come at a higher procurement cost and mobilization requirement. To assist planners with this challenging task, this paper presents the development of a novel infrastructure sustainability assessment model capable of generating optimal tradeoffs between minimizing environmental impacts and minimizing life-cycle costs over the community’s anticipated lifespan. Model performance was evaluated using a case study of a hypothetical 500-person remote military base with 864 feasible infrastructure portfolios and 48 procedural portfolios. The case study results demonstrated the model’s novel capability to assist planners in identifying optimal combinations of infrastructure alternatives that minimize negative sustainability impacts, leading to remote communities that are more self-sufficient with reduced emissions and costs.


Sensors ◽  
2021 ◽  
Vol 21 (16) ◽  
pp. 5300
Author(s):  
Antonia Nisioti ◽  
George Loukas ◽  
Stefan Rass ◽  
Emmanouil Panaousis

The use of anti-forensic techniques is a very common practice that stealthy adversaries may deploy to minimise their traces and make the investigation of an incident harder by evading detection and attribution. In this paper, we study the interaction between a cyber forensic Investigator and a strategic Attacker using a game-theoretic framework. This is based on a Bayesian game of incomplete information played on a multi-host cyber forensics investigation graph of actions traversed by both players. The edges of the graph represent players’ actions across different hosts in a network. In alignment with the concept of Bayesian games, we define two Attacker types to represent their ability of deploying anti-forensic techniques to conceal their activities. In this way, our model allows the Investigator to identify the optimal investigating policy taking into consideration the cost and impact of the available actions, while coping with the uncertainty of the Attacker’s type and strategic decisions. To evaluate our model, we construct a realistic case study based on threat reports and data extracted from the MITRE ATT&CK STIX repository, Common Vulnerability Scoring System (CVSS), and interviews with cyber-security practitioners. We use the case study to compare the performance of the proposed method against two other investigative methods and three different types of Attackers.


2021 ◽  
Vol 13 (9) ◽  
pp. 5103
Author(s):  
Vincenzo Gallelli ◽  
Giusi Perri ◽  
Rosolino Vaiana

The European Union policy strategies on the sustainability of the transport system pursue the goals of maximizing safety and environmental benefits and reducing the severity and frequency of crashes, congestion, and pollutant emission rates. A common issue is the planning of the most effective solution for operational and safety management at intersections. In this study, an egg turbo roundabout is proposed as the alternative solution to a conventional roundabout in Southern Italy which suffers from traffic congestion. A comparative analysis is carried out using microsimulation techniques to investigate the safety effects and operational improvements of converting a traditional priority intersection into standard roundabout or turbo roundabout layout. In particular, the VISSIM software is used to explore the most relevant operational performance measures: queue length, travel times and delays. The lowest values of these measurements are recorded for the simulated turbo roundabout, thus making this scheme more appropriate in terms of operational performances. With regard to safety analysis, the Surrogate Safety Assessment Model (SSAM) is used to collect information on the predicted number of conflicts, the probability, and severity of the potential collisions. The results suggest that, for the specific case study, the safety levels of the standard roundabout and the turbo roundabout are approximately comparable.


Minerals ◽  
2021 ◽  
Vol 11 (6) ◽  
pp. 582
Author(s):  
Magner Turner-Carrión ◽  
Paúl Carrión-Mero ◽  
Israel Turner-Salamea ◽  
Fernando Morante-Carballo ◽  
Maribel Aguilar-Aguilar ◽  
...  

The Zaruma-Portovelo mining district in Ecuador, and in particular, Portovelo City, is home to the oldest mining museum in the country. This museum, named Museo Mineralógico Magner Turner (MMMT in Spanish), is a centre that reflects, through its collections, the history and culture of this territory. This work aimed to evaluate the MMMT as a possible geosite by analysing its contributions to the geomining heritage of the Zaruma-Portovelo district, and thus, to enhance it and promote its collections as a geotouristic attraction. The work involved three phases: (i) describing the museum and its surroundings; (ii) a semiquantitative evaluation of the museum using the Brilha method and a geosites assessment model (GAM); and (iii) a qualitative evaluation using the Delphi and SWOT methodologies to define strategies and proposals for museum development. The results obtained by the semiquantitative evaluation of the geosite with the Brilha method reflect high scientific (330/400), educational (380/400) and touristic (365/400) appeal. The applied GAM shows the museum as a geosite with high principal and additional value, placing it in the Z33 field of the global valuation matrix. In addition, the semiquantitative and qualitative evaluation made it possible to describe the importance of the museum and its collections in the development of the area. The study carried out qualified the museum as a mining site with an appropriate valuation, an example of ex-situ geological heritage conservation and a basis for geotourism development.


Sign in / Sign up

Export Citation Format

Share Document