security countermeasures
Recently Published Documents


TOTAL DOCUMENTS

70
(FIVE YEARS 21)

H-INDEX

7
(FIVE YEARS 2)

2022 ◽  
Vol 14 (1) ◽  
pp. 1-26
Author(s):  
Louay Karadsheh ◽  
Haroun Alryalat ◽  
Ja'far Alqatawna ◽  
Samer Fawaz Alhawari ◽  
Mufleh Amin AL Jarrah

The objective of this paper is to examine a model to identify Social Engineer Attack Phases to improve the security countermeasures by Social-Engineer Involvement. A questionnaire was developed and distributed to a sample of 243 respondents who were actively engaged in 3 Jordanian telecommunication companies. All hypotheses were tested using (PLS-SEM). The results of the study indicate that Social Engineer Attack Phases (Identification the potential target, Target Recognition, Decision approach, and Execution) have a partially mediate and significant impact on improving the security countermeasures by Social-Engineer Involvement. On the other hand, the Social Engineer Attack Phases (Information Aggregations, Analysis and Interpretation, Armament, and Influencing) have a fully mediate and significant impact on improving the security countermeasures by Social-Engineer Involvement. The findings of this study help to provide deep insight to help security professionals prepare better and implement the right and appropriate countermeasures, whether technical or soft measures.


Information ◽  
2021 ◽  
Vol 12 (11) ◽  
pp. 460
Author(s):  
Noritaka Matsumoto ◽  
Junya Fujita ◽  
Hiromichi Endoh ◽  
Tsutomu Yamada ◽  
Kenji Sawada ◽  
...  

Cyber-security countermeasures are important for IIoT (industrial Internet of things) systems in which IT (information technology) and OT (operational technology) are integrated. The appropriate asset management is the key to creating strong security systems to protect from various cyber threats. However, the timely and coherent asset management methods used for conventional IT systems are difficult to be implemented for IIoT systems. This is because these systems are composed of various network protocols, various devices, and open technologies. Besides, it is necessary to guarantee reliable and real-time control and save CPU and memory usage for legacy OT devices. In this study, therefore, (1) we model various asset configurations for IIoT systems and design a data structure based on SCAP (Security Content Automation Protocol). (2) We design the functions to automatically acquire the detailed information from edge devices by “asset configuration management agent”, which ensures a low processing load. (3) We implement the proposed asset management system to real edge devices and evaluate the functions. Our contribution is to automate the asset management method that is valid for the cyber security countermeasures in the IIoT systems.


2021 ◽  
Vol 16 (2) ◽  
pp. 60-66
Author(s):  
Luis Diego Monge Solano

Satellite infrastructure plays a vital role in today's world. As more systems rely on this technology it increasingly becomes a target for security threats. The existence of such risks has been acknowledged internationally as more resources are allocated to their study and understanding. In this context, studying satellite technologies from a geospatial perspective has provided a situational awareness understanding of the technology ecosystem and its strengths, limitations, and vulnerabilities. New technologies such as artificial intelligence, machine learning, and blockchain must be studied to generate security countermeasures for satellite technologies.


Significance However, the day passed with none of the protests the group invited, after the government warned people against participation and deployed a strong security presence onto the streets. Impacts Given arrest risks for would-be organisers, diaspora involvement will likely be crucial to any successful protest campaign. The government risks stronger international rebuke when using harsh security countermeasures against dual nationals. Donor desire to support civil society politics may result in funding for groups that become involved in future protest campaigns.


Sign in / Sign up

Export Citation Format

Share Document