Crafting Strategies of Security Breaches

2022 ◽  
pp. 214-234
Author(s):  
Heru Susanto ◽  
Nurul Mardhiah ◽  
Alifya Kayla Shafa Susanto

In recent years, the number of financial technology players and users have increased at a significant rate due to the rapid technological advancement in financial technology. While smart devices are providing more useful features to users, they have also made it possible for cyber threats to migrate from desktops to smart devices. Thus, it is important for smart device users to be aware that their device could be exposed to cyber threats and that users could protect their devices by employing data-centric cyber security measures. This study reveals how financial technology business model responded to the breach phenomenon by employing data-centric protection approaches. The result is very interesting. Data-centric security is very needed as it is capable of protecting data as a whole. It provides a gapless protection, meaning to say, the data are encrypted and classified wherever it moves. With persistent protection and cross-platform operability, data-centric security will eliminate gaps and keep data protected.

2020 ◽  
pp. 31-35
Author(s):  
Oksana MAKOVETS ◽  
Iryna DROZD

Introduction. As a component of the business environment the information environment is characterized by significant cyber threats and requires cyber protection. The processes of Ukrainian society digitalization and changes in providing the information security update the enterprise's financial security measures and their connection with cybersecurity. The purpose of the paper is to analyze the essence of cybersecurity as a factor of the enterprise's financial security and to identify its impact on the investment attractiveness of the business entity. To achieve the purpose the task is to explore the concepts of financial security, cybersecurity and cyber threats, to identify their relationship and impact on business' financial losses of the, the consequences for the enterprise's investment attractiveness. The study will provide information on business management and plan effective policies to combat cyber threats. Results. The essence of enterprise's financial security is investigated. There are three approaches in identifying the essence of this concept, including as part of the enterprise's economic security, as the state of the most effective use of information, financial indicators and as its financial condition level, which provides stable protection of priority balanced financial interests from real and potential external and internal threats. These definitions are used to substantiate the connection with the concepts of cyber threat and cyber security. The areas of possible losses based on the losses assessment due to cyber threats are identified by the authors, namely the intellectual property loss, the business information loss, the IT systems' continuity disruption, the reputation damage as a result of the attack, the automated personal data loss. Conclusion. It is concluded that the necessary measures of cybersecurity, protection of enterprises' information resources and prevention of unauthorized interference in the enterprises' activities, which has a positive effect on investment attractiveness and increases the enterprises' competitiveness.


Author(s):  
Heru Susanto

In recent years, the number of mobile device users has increased at a significant rate due to the rapid technological advancement in mobile technology. While mobile devices are providing more useful features to its users, it has also made it possible for cyber threats to migrate from desktops to mobile devices. Thus, it is important for mobile device users to be aware that their mobile device could be exposed to cyber threats and that users could protect their devices by employing cyber security measures. This study discusses how users in responded to the smart mobile devices (SMD) breaches. A number of behavioural model theories are used to understand the user behaviour towards security features of smart mobile devices. To assess the impact of smart mobile devices (SMD) security and privacy, surveys had been conducted with users, stressing on product preferences, user behaviour of SMD, as well as perceptions on the security aspect of SMD. The results was very interesting, where the findings revealed that there were a lack of positive relationships between SMD users and their level of SMD security awareness. A new framework approach to securing SMD is proposed to ensure that users have strong protection over their data within SMD.


Author(s):  
Curtis G. Northcutt

The recent proliferation of embedded cyber components in modern physical systems [1] has generated a variety of new security risks which threaten not only cyberspace, but our physical environment as well. Whereas earlier security threats resided primarily in cyberspace, the increasing marriage of digital technology with mechanical systems in cyber-physical systems (CPS), suggests the need for more advanced generalized CPS security measures. To address this problem, in this paper we consider the first step toward an improved security model: detecting the security attack. Using logical truth tables, we have developed a generalized algorithm for intrusion detection in CPS for systems which can be defined over discrete set of valued states. Additionally, a robustness algorithm is given which determines the level of security of a discrete-valued CPS against varying combinations of multiple signal alterations. These algorithms, when coupled with encryption keys which disallow multiple signal alteration, provide for a generalized security methodology for both cyber-security and cyber-physical systems.


Author(s):  
Isiaka Ajewale Alimi

The development in different communication systems as well as multimedia applications and services leads to high rate of Internet usage. However, transmission of information over such networks can be compromised and security breaches such as virus, denial of service, unauthorized access, and theft of proprietary information which may have devastating impact on the system may occur if adequate security measures are not employed. Consequently, building viable, effective, and safe network is one of the main technical challenges of information transmission in campus networks. Furthermore, it has been observed that, network threats and attacks exist from the lower layers of network traffic to the application layer; therefore, this paper proposes an effective multi-layer firewall system for augmenting the functionalities of other network security technologies due to the fact that, irrespective of the type of access control being employed, attacks are still bound to occur. The effectiveness of the proposed network architecture is demonstrated using Cisco Packet Tracer. The simulation results show that, implementation of the proposed topology is viable and offers reasonable degree of security at different network layers.


Sensors ◽  
2021 ◽  
Vol 21 (7) ◽  
pp. 2347
Author(s):  
Yanyan Wang ◽  
Lin Wang ◽  
Ruijuan Zheng ◽  
Xuhui Zhao ◽  
Muhua Liu

In smart homes, the computational offloading technology of edge cloud computing (ECC) can effectively deal with the large amount of computation generated by smart devices. In this paper, we propose a computational offloading strategy for minimizing delay based on the back-pressure algorithm (BMDCO) to get the offloading decision and the number of tasks that can be offloaded. Specifically, we first construct a system with multiple local smart device task queues and multiple edge processor task queues. Then, we formulate an offloading strategy to minimize the queue length of tasks in each time slot by minimizing the Lyapunov drift optimization problem, so as to realize the stability of queues and improve the offloading performance. In addition, we give a theoretical analysis on the stability of the BMDCO algorithm by deducing the upper bound of all queues in this system. The simulation results show the stability of the proposed algorithm, and demonstrate that the BMDCO algorithm is superior to other alternatives. Compared with other algorithms, this algorithm can effectively reduce the computation delay.


2015 ◽  
Vol 4 (1) ◽  
pp. 135-142 ◽  
Author(s):  
Nimisha Singh ◽  
Abha Rishi

As the world becomes increasingly interlinked through the Internet, cyberspace frauds are also on the rise. This is a case study on a company, Pyramid Cyber Security (P) Ltd., which specializes in digital crime, fraud and forensic solutions and services in India. Over the years, the company has established several digital forensics laboratories and security projects for agencies in law enforcement, the public sector and corporate organizations. With the scalability, flexibility and economic advantage offered by cloud computing, more and more organizations are moving towards cloud for their applications. With all the benefits of cloud computing, it also opens up a company to the danger of digital crime and security breaches on the cloud platform. This has thrown open new vistas for Pyramid, putting it in a dilemma of whether to focus on the existing business or explore new opportunities in cloud forensics investigation thrown by the wide acceptance of cloud computing. It also poses the question whether a company should go in for pre-incident or post-incident digital network security architecture. It is a teaching case.


Symmetry ◽  
2020 ◽  
Vol 12 (4) ◽  
pp. 664 ◽  
Author(s):  
Rajeev Kumar ◽  
Abhishek Kumar Pandey ◽  
Abdullah Baz ◽  
Hosam Alhakami ◽  
Wajdi Alhakami ◽  
...  

Growing concern about healthcare information security in the wake of alarmingly rising cyber-attacks is being given symmetrical priority by current researchers and cyber security experts. Intruders are penetrating symmetrical mechanisms of healthcare information security continuously. In the same league, the paper presents an overview on the current situation of healthcare information and presents a layered model of healthcare information management in organizations. The paper also evaluates the various factors that have a key contribution in healthcare information security breaches through a hybrid fuzzy-based symmetrical methodology of AHP-TOPSIS. Furthermore, for assessing the effect of the calculated results, the authors have tested the results on local hospital software of Varanasi. Tested results of the factors are validated through the comparison and sensitivity analysis in this study. Tabulated results of the proposed study propose a symmetrical mechanism as the most conversant technique which can be employed by the experts and researchers for preparing security guidelines and strategies.


Author(s):  
Ana Kovacevic ◽  
Dragana Nikolic

We are facing the expansion of cyber incidents, and they are becoming more severe. This results in the necessity to improve security, especially in the vulnerable field of critical infrastructure. One of the problems in the security of critical infrastructures is the level of awareness related to the effect of cyberattacks. The threat to critical infrastructure is real, so it is necessary to be aware of it and anticipate, predict, and prepare against a cyber attack. The main reason for the escalation of cyberattacks in the field of Critical Infrastructure (CI) may be that most control systems used for CI do not utilise propriety protocols and software anymore; they instead utilise standard solutions. As a result, critical infrastructure systems are more than ever before becoming vulnerable and exposed to cyber threats. It is important to get an insight into what attack types occur, as this may help direct cyber security efforts. In this chapter, the authors present vulnerabilities of SCADA systems against cyber attack, analyse and classify existing cyber attacks, and give future directions to achieve better security of SCADA systems.


Sign in / Sign up

Export Citation Format

Share Document