cyber safety
Recently Published Documents


TOTAL DOCUMENTS

88
(FIVE YEARS 50)

H-INDEX

7
(FIVE YEARS 2)

Author(s):  
Pelleti Swetha

Analyzing cyber incident information units is an essential approach for deepening our expertise in the evolution of the chance situation. This is an especially new study topic, and lots of research continue to be done. In this paper, we record a statistical evaluation of a breach incident records set similar to 12 years (2005–2017) of cyber hacking sports that encompass malware attacks. We display that, an evaluation of the findings stated withinside the literature, each hacking breach incident inter-arrival instances and breach sizes must be modeled through stochastic processes, instead of through distributions due to the fact they show off autocorrelations. Then, we recommend specific stochastic procedure fashions to, respectively, shape the inter-arrival instances and the breach sizes. We additionally display that those fashions can expect the inter-arrival instances and the breach sizes. In order to get deeper insights into the evolution of hacking breach incidents, we behaviour each qualitative and quantitative fashion analysis at the records set. We draw a fixed of cyber safety insights, together with that the chance of cyber hacks is certainly getting worse in phrases in their frequency, however now no longer in phrases of the value in their damage.


INTEGRITAS ◽  
2021 ◽  
Vol 7 (1) ◽  
pp. 179-196
Author(s):  
Wijayanto Wijayanto ◽  
Nur Hidayat Sardini ◽  
Gita N. Elsitra

This research aims to reflect cyber-terror cases in the anti-corruption movement by Indonesian scholars in protest against the revision of the KPK Law in September 2019 and formulates the alternative solutions for anti-corruption activists’ cyber safety in the digital era. Based on focus group discussion with anti-corruption scholar activists and digital ethnography, this research found that, in general, anti-corruption activist prone to cyber-terror, and it weakened their movement. For strengthening the anti-corruption movement in the digital era, this research formulated three alternative solutions, which are: 1) strengthening consolidation of civil society organizations; 2) supporting the formulation of comprehensive cyber regulations; and 3) implementing campus mitigation. Those solutions could be the foundation for fulfilling and guaranteeing anti-corruption activists’ digital rights, especially for the freedom of expression and right to be protected in cyber-space, which is crucial for digital democracy in Indonesia.


2021 ◽  
pp. 1476718X2110149
Author(s):  
Susan Edwards

Young children aged birth to 5 years are known users of the internet, both unsupervised and in collaboration with adults. Adults also use the internet to share details of children’s lives with others, via sharenting and educational apps. During COVID-19 internet use by children and families rose significantly during periods of enforced stay-home. Internet use by children, and by adults on behalf exposes children to conduct, contact and content risks online. These risks mean that cyber-safety in the early years is increasingly necessary, especially concerning increased internet usage during COVID-19. While cyber-safety is well developed for primary and secondary-school aged children this is not the case for young children, their families and educators. This paper proposes a research agenda for cyber-safety in the early years, using critical constructivism and internet studies to define the internet as a non-unitary technology. Three main objects of study concerning cyber-safety in the early years, including the reference to COVID-19 are identified for targeted research, including: technologies, context and policy.


Author(s):  
Pratik Jain ◽  
Ravikant Kholwal ◽  
Tavneet Singh Khurana,

An IDS supervises network traffic by searching for skeptical activities and previously determined threats and sends alerts when detected. In the current times, the splendors of Intrusion detection still prevail censorial in cyber safety, but maybe not as a lasting resolution. To study a plant, one must start with roots, so Cambridge dictionary defines an intrusion as "an occasion when someone goes into an area or situation where they're not wanted or expected to be". For understanding the article, we will characterize interruption as any network movement or unapproved framework identified with one or more PCs or networks. This is an interpretation of permissible use of a system attempting to strengthen his advantages to acquire more noteworthy access to the framework that he is at present endowed, or a similar client attempting to associate with an unapproved far-off port of a server. These are the interruptions which will cause from the surface world, a bothered ex-representative who was terminated recently, or from your reliable staff. In this proviso, the fair information is found as an attack when the case is a false positive. Here they are zeroing in on this issue with a representation and offering one answer for a similar issue. The KDD CUP 1999 informational index is utilized. Here we dropped the number of counts and considered the OTP authentication system. In the result of this test, it may be very well seen that on the off chance that a class has a higher number of checks, at that point this class is believed to be an anomaly class. In any case, it will be considered an oddity if the genuine individual is passing the edge esteem is considered an intruder. One arrangement is proposed to distinguish the genuine individual and to eliminate false positives.


Author(s):  
Duncan Unwin ◽  
Louis Sanzogni

Cybersecurity threats to railways are increasing, both due to improvements in the techniques of hackers and the increasing merger of cyber and physical spheres. Accepted approaches to safety can be extended to consider the risks from cyber, however the nature of railways as complex cyber-physical systems of systems may require a broader approach beyond functional safety. This paper explores some of the cybersecurity hazards using a war gaming approach. The authors find that, while standard engineering approaches are effective in building new rail control system components, a broader and more creative consideration of attacks has benefits. In particular they identify the ability to cause mass disruption by targeting the fail-safes designed to ensure safety or auxiliary systems that are not directly classified within the scope of the ICS.


Sign in / Sign up

Export Citation Format

Share Document