threat strategies
Recently Published Documents


TOTAL DOCUMENTS

9
(FIVE YEARS 2)

H-INDEX

4
(FIVE YEARS 1)

Electronics ◽  
2022 ◽  
Vol 11 (2) ◽  
pp. 238
Author(s):  
Attiq Ur-Rehman ◽  
Iqbal Gondal ◽  
Joarder Kamruzzaman ◽  
Alireza Jolfaei

The development of cyber-assured systems is a challenging task, particularly due to the cost and complexities associated with the modern hybrid networks architectures, as well as the recent advancements in cloud computing. For this reason, the early detection of vulnerabilities and threat strategies are vital for minimising the risks for enterprise networks configured with a variety of node types, which are called hybrid networks. Existing vulnerability assessment techniques are unable to exhaustively analyse all vulnerabilities in modern dynamic IT networks, which utilise a wide range of IoT and industrial control devices (ICS). This could lead to having a less optimal risk evaluation. In this paper, we present a novel framework to analyse the mitigation strategies for a variety of nodes, including traditional IT systems and their dependability on IoT devices, as well as industrial control systems. The framework adopts avoid, reduce, and manage as its core principles in characterising mitigation strategies. Our results confirmed the effectiveness of our mitigation strategy framework, which took node types, their criticality, and the network topology into account. Our results showed that our proposed framework was highly effective at reducing the risks in dynamic and resource constraint environments, in contrast to the existing techniques in the literature.


2019 ◽  
Vol 41 (6) ◽  
pp. 557 ◽  
Author(s):  
K. Sinclair ◽  
A. L. Curtis ◽  
T. Atkinson

Concerns raised, including those voiced by animal rights and vegan activists, have limited the available practices by landholders in the southern Australian rangelands to effectively control kangaroos and, over time, the actions of these groups may threaten the existence of the livestock industry. This paper draws on interviews with key stakeholders and workshops with technical experts and red meat industry participants to identify strategies to respond to this potentially existential threat. Strategies include establishing platforms and processes for effective stakeholder engagement, establishing a unified and resourced industry ‘voice’ to effectively engage with government and other stakeholders, and ensuring that the industry self-regulates in order to avoid the potential for rogue elements to undermine its credibility and trustworthiness.


Sign in / Sign up

Export Citation Format

Share Document