cyberspace security
Recently Published Documents


TOTAL DOCUMENTS

91
(FIVE YEARS 39)

H-INDEX

5
(FIVE YEARS 1)

Author(s):  
Arjun Singh ◽  
Vijay Kumar Sharma ◽  
Surbhi Chauhan

Electronics ◽  
2021 ◽  
Vol 10 (22) ◽  
pp. 2742
Author(s):  
Yuwei Ge ◽  
Tao Zhang ◽  
Haihua Liang ◽  
Qingfeng Jiang ◽  
Dan Wang

Image steganalysis is a technique for detecting the presence of hidden information in images, which has profound significance for maintaining cyberspace security. In recent years, various deep steganalysis networks have been proposed in academia, and have achieved good detection performance. Although convolutional neural networks (CNNs) can effectively extract the features describing the image content, the difficulty lies in extracting the subtle features that describe the existence of hidden information. Considering this concern, this paper introduces separable convolution and adversarial mechanism, and proposes a new network structure that effectively solves the problem. The separable convolution maximizes the residual information by utilizing its channel correlation. The adversarial mechanism makes the generator extract more content features to mislead the discriminator, thus separating more steganographic features. We conducted experiments on BOSSBase1.01 and BOWS2 to detect various adaptive steganography algorithms. The experimental results demonstrate that our method extracts the steganographic features effectively. The separable convolution increases the signal-to-noise ratio, maximizes the channel correlation of residuals, and improves efficiency. The adversarial mechanism can separate more steganographic features, effectively improving the performance. Compared with the traditional steganalysis methods based on deep learning, our method shows obvious improvements in both detection performance and training efficiency.


2021 ◽  
pp. 784-797
Author(s):  
Mike Steinmetz

The word ‘Solarium’ means different things to different people. To some, it evokes an era of global uncertainty with competing nuclear powers. To others, it brings to mind a threat so compelling that a US President formed a special project to reshape US policy rapidly. The word Solarium again inspires hope, optimism, and expectation that cybersecurity—one of the most critical challenges of the twenty-first century—can be addressed as successfully as challenges from the past. Will combining the name Solarium with the twenty-first-century threat’s gravity deliver similar results as it did in 1953? What exactly did Project Solarium 1953 provide? In what way is the global nuclear threat and spread of communism in 1953 comparable to the global cyber threat of the twenty-first century, and is there a risk that the comparison might either over-simplify a complex problem or, worse still, provoke an inappropriately exaggerated and perhaps even apocalyptic approach to cyberspace security? Are there other aspects of the 1953 Project Solarium that offer more useful insights into the human elements of policymaking? Does the naming of the 2019 Cybersecurity Commission as the Cybersecurity Solarium Commission provide little more than smart branding?


2021 ◽  
Vol 7 (5) ◽  
pp. 3685-3697
Author(s):  
Zhi Li ◽  
Tang Zheng ◽  
Yuemeng Ge ◽  
Jia Min ◽  
Danqi Chen

Since the security of global cyberspace was regarded as the core topic of global governance, the UN has become the main place for exchanging ideas, developing debates and promoting governance. Therefore, the global cyberspace governance mechanism established by the United Nations is naturally acclaimed as the most representative platform, providing opportunities and assistance for the countries all over the world to participating in the global cyberspace governance. For the governance mechanism and process of global cyberspace security, the UN has not only set global agendas on the right to free speech on the Internet, the sustainable development of cyberspace security, the inclusiveness of the artificial intelligence and the sustainable development, but also has established a relatively integrated the framework of the governance mechanism. In dealing with the differences and games in the changing of the global cyberspace security governance, the UN still condenses consensus and continuously promotes the international cooperation, pushing the security of global cyberspace become the general consensus in the international community. Meanwhile, the UN also calls for countries around the world to coordinate governance in order to consolidate and develop the status of the United Nations in global cyberspace security governance.


2021 ◽  
Vol 7 (5) ◽  
pp. 3698-3709
Author(s):  
Zhi Li ◽  
Yuemeng Ge ◽  
Jieying Guo ◽  
Mengyao Chen ◽  
Junwei Wang

The whole world is making unremitting efforts to ensure the security of global cyberspace. The European Union (EU) has always regarded cyberspace security as the core competitiveness of regional integration and is committed to improving the cyberspace security legal system’s construction. Now it has been at the forefront of the world. Through the analysis of the EU cyberspace security governance mechanism and legal framework, this study concludes that the construction of cyberspace security is a complex project that requires long-term exploration and development. Besides, a sound cyberspace-security governance mechanism and a perfect legal system of cyberspace security should have a clear hierarchy, and specific effectiveness and system, updating the laws and regulations.


Cybersecurity ◽  
2021 ◽  
Vol 4 (1) ◽  
Author(s):  
Zuoguang Wang ◽  
Hongsong Zhu ◽  
Peipei Liu ◽  
Limin Sun

AbstractSocial engineering has posed a serious threat to cyberspace security. To protect against social engineering attacks, a fundamental work is to know what constitutes social engineering. This paper first develops a domain ontology of social engineering in cybersecurity and conducts ontology evaluation by its knowledge graph application. The domain ontology defines 11 concepts of core entities that significantly constitute or affect social engineering domain, together with 22 kinds of relations describing how these entities related to each other. It provides a formal and explicit knowledge schema to understand, analyze, reuse and share domain knowledge of social engineering. Furthermore, this paper builds a knowledge graph based on 15 social engineering attack incidents and scenarios. 7 knowledge graph application examples (in 6 analysis patterns) demonstrate that the ontology together with knowledge graph is useful to 1) understand and analyze social engineering attack scenario and incident, 2) find the top ranked social engineering threat elements (e.g. the most exploited human vulnerabilities and most used attack mediums), 3) find potential social engineering threats to victims, 4) find potential targets for social engineering attackers, 5) find potential attack paths from specific attacker to specific target, and 6) analyze the same origin attacks.


Author(s):  
Lu Jiang

Smart applications and monitoring systems across health systems are provided by the Internet of Things (IoTs), which connects devices and networks, and potentially deliver new technologies in this field. In order to establish an IoT-based healthcare system that protects patients' sensitive and personal information, it is imperative that security be ensured. It was our goal to identify the elements and ideas connected with the security needs of the Internet of Things in the healthcare sector. In the healthcare industry, a survey was done on the security needs of IoTs devices. Data from Web of Science, IEEE, Scopus, and PubMed has been searched since 2005. In addition, we adhered to international norms and recognized rules for cyberspace security. This paper presents an an analysis of the aspects and ideas relevant to the security needs of IoTs in a medical environment. Our research revealed two major categories of security needs: cyber resilience and cyber security. In the cyber security category, there are CIA (Confidentiality, Integrity and Availability) Triad and the non-CIA subcategories. Information security (Confidentiality, Integrity and Availability represented the CIA triad), performability, survivability, maintainability, safety, and reliability were listed as the primary elements for cyber resilience needs. The trustworthiness of Healthcare Internet of Things (HIoTs) relies on balancing traditional (cyber security) and unique (cyber resilience) needs.


2021 ◽  
Vol 21 (2) ◽  
pp. 171-184
Author(s):  
Muawwan Muawwan

Abstract   The escalation of cyber threats in Singapore has prompted the country to intensify its cyberspace security protection. Singapore then implemented numerous strategies by collaborating across agencies and actors to obtain a protective cyberspace security system. This research aimed at figuring out Singapore Cyber Security Strategy (SCSS) documents comprehensively throughout textual analysis based on qualitative approach of an emerging-dominant elements in documents such as actor, instrument, politic, economy, research, and collaboration which were cooperated within actors. The author also fulfilled this analysis using qualitative approach to measure the data relation and the big picture of SCSS documents. Finally, the author found that Singapore’s strategy in applications and infrasctructure aspects, the government intervened them intensively. Singapore, one of the highest technological expertise countries in Southeast Asia, was fuflnerable getting the threats or attacks. So, this country was regulating an excellent cyber system and infrastructure to proctect their cyber management system secure. Meanwhile, Singapore’s policy in core aspects was a transfer due to the fact that Singapore was multi-ethnical and multi-culturalism country. Thus, Singapore’s strategy for ideological aspects was not regulated significantly in SCSS documents.   Keywords: Cyber Security Strategy, Data Relation, Sovereignty   Abstrak   Eskalasi ancaman terhadap ruang siber yang terjadi di Singapura telah mendorong negara tersebut untuk meningkatkan proteksi keamanan ruang sibernya. Singapura kemudian menerapkan berbagai strategi dengan cara menjalin kerjasama lintas instansi dan aktor untuk memperoleh sistem keamanan ruang siber yang lebih protektif. Tulisan ini bermaksud untuk memahami dokumen Singapore Cyber Security Strategy (SCSS) secara komprehensif dengan melakukan analisis kontekstual berdasarkan pendekatan kualitatif terhadap sejumlah unsur yang dominan muncul di dalam dokumen seperti aktor, instrument, politik, ekonomi, penelitian, dan kolaborasi yang dibangun di antara para aktor. Penulis juga melengkapi analisis ini dengan pendekatan kuantitatif untuk mengukur relasi data dan kecenderungan yang tergambar dari dokumen SCSS tersebut. Hasilnya, penulis menemukan bahwa pada level strategi di sektor application dan infrastruktur, pemerintah Singapura memiliki intervensi penuh dalam mengatur seluruh aktivitas di kedua aspek tersebut. Sebagai salah satu negara yang cukup signifikan di dalam pengelolaan teknologinya di kawasan Asia Tenggara, maka Singapura secara eksklusif berupaya membangun sistem dan infrastruktur siber yang mumpuni untuk melindungi tata kelola ruang siber mereka dari berbagai ancaman. Berbeda pada aspek core yang bersifat lebih terbuka (transfer) lantaran banyak dipengaruhi oleh multietnis dan multikulturalisme. Sehingga proteksi terhadap hal-hal yang bersifat ideologis tidak banyak diatur di dalam dokumen SCSS.   Kata kunci: Kedaulatan, Relasi Data, Strategi Keamanan Siber


2021 ◽  
Vol 8 (4) ◽  
Author(s):  
Mohammad Abbasi

: As cyberspace expands and globalizes, we are experiencing a new layer of threats to governments in the form of cyber threats that have impacted various facets of national security, including social, economic, military, and political security. As a result, in the form of electronic warfare, it has developed a new kind of war and conflict. Therefore, it has impacted international security, necessitating solutions to minimize the harm caused by this form of threat and preserve international security. So, network security has brought to light some of the underlying tensions between international rivalry and cybersecurity cooperation. Thus, the current study employs a descriptive-analytical method to investigate and analyze the role of international organizations, especially the Organization for Economic Cooperation and Development, in the development of cyberspace security. The hypothesis raised in this study is that since governments are increasingly relying on unilateral policies and resources to ensure cyber protection, international organizations should play an active role in shaping cooperation among their members in the form of approaches focused on international cooperation on cybersecurity and the prevention of cyber threats, as well as the development of a global cybersecurity system.


Sign in / Sign up

Export Citation Format

Share Document