Search results for " Cybersecurity"
showing 9 items of 9 documents
Online Expression, Personal Cybersecurity Costs, and the Specter of Cybercrime
2020
The internet is used increasingly as a platform both for free expression and e-commerce. The internet has unique security and privacy risks. Such risks include the threat of criminal cyberattacks, including hacking and doxing. Internet users have a variety of attitudes towards the security and privacy risks involved with using the internet and distinct concerns and behaviors with regard to expressing themselves online. In order to mitigate the security and privacy risks of the internet, some internet users spend valuable time thinking about and configuring the security settings of their devices. They may also have different attitudes towards personal spending of money for cybersecurity prod…
Enhancing the European Cyber Threat Prevention Mechanism
2021
This research will determine how it is possible to implement the national cyber threat prevention system into the EU level Early Warning System. Decision makers have recognized that the lack of cooperation between EU member countries affects public safety at the international level. Separate operational functions and procedures between national cyber situation centers create challenges. One main problem is that the European Union does not have a common cyber ecosystem concerning intrusion detection systems for cyber threats. Also, privacy and citizens’ security as topics are set against each other. The research will comprise a new database for the ECHO Early Warning System concept.
Il Perimetro di sicurezza nazionale cibernetica
2023
Il presente contributo intende approfondire la disciplina del Perimetro di sicurezza cibernetica istituito dal Decreto-legge 21 settembre 2019 , n. 105. Segnatamente, il lavoro intende approfondire l’architettura di tale sistema attraverso un’analisi del quadro organizzativo, con particolare riferimento alla distribuzione di competenze (e obblighi) dei diversi attori pubblici e privati coinvolti.
National cyber threat prevention mechanism as a part of the E-EWS
2020
The research will find out feature-based functionalities concerning the national cybersecurity system HAVARO and how the system is possible to implement to the EU level early warning system. The research based on interviews, official materials concerning the HAVARO information sharing system, scientific literature and other official published documents. The European level decision-makers have recognized that lack of cooperation between EU member countries effects to completely public safety atmosphere. The only problem does not consist of separate operational functions and procedures between national Cyber situation centers. One main problem is that the European Union does not have a common…
La regolazione della cybersecurity in Italia
2023
Il saggio offre una panoramica generale della regolazione e dell'organizzazione della sicurezza cibernetica in Italia. In particolare, dopo una premessa volta a dedicare alcuni cenni all'evoluzione della materia e alla disciplina europea, l'elaborato si sofferma sullo stato dell'arte e sulle future sfide in materia di cybersecurity.
Artificial Intelligence for Cybersecurity: A Systematic Mapping of Literature
2020
Due to the ever-increasing complexities in cybercrimes, there is the need for cybersecurity methods to be more robust and intelligent. This will make defense mechanisms to be capable of making real-time decisions that can effectively respond to sophisticated attacks. To support this, both researchers and practitioners need to be familiar with current methods of ensuring cybersecurity (CyberSec). In particular, the use of artificial intelligence for combating cybercrimes. However, there is lack of summaries on artificial intelligent methods for combating cybercrimes. To address this knowledge gap, this study sampled 131 articles from two main scholarly databases (ACM digital library and IEEE…
Online expression and spending on personal cybersecurity
2019
The Internet is used increasingly as a platform both for free expression and e-commerce. Internet users have a variety of attitudes towards the security and privacy risks involved with using the Internet; and distinct concerns and behaviors with regard to expressing themselves online. Users may have controversial viewpoints that they may express online in various ways. Controversial viewpoints or artwork by their nature may not be as well received as positive or polite expressions. In the online environment, users with controversial viewpoints may be reluctant to express the viewpoints due to concern about possible consequences resulting from the expressions. Consequences may be imposed by …
On Attacking Future 5G Networks with Adversarial Examples : Survey
2022
The introduction of 5G technology along with the exponential growth in connected devices is expected to cause a challenge for the efficient and reliable network resource allocation. Network providers are now required to dynamically create and deploy multiple services which function under various requirements in different vertical sectors while operating on top of the same physical infrastructure. The recent progress in artificial intelligence and machine learning is theorized to be a potential answer to the arising resource allocation challenges. It is therefore expected that future generation mobile networks will heavily depend on its artificial intelligence components which may result in …
The emergence of liminal cyberspace : challenges for the ontological work in cybersecurity
2022
This philosophy-oriented paper examines cybersecurity and its ontological work in relation to spaces which are created by conventional perimeter security model and Zero Trust model. We argue that security works by a code of inclusion and exclusion, e.g., an individual user seeking access is either included or excluded in relation to the system. Therefore, cybersecurity divides the space through employing the code of inclusion/exclusion which directly affects the agency of users. We examine how the growing complexity of network environment makes information and cybersecurity to struggle with the simplicity of the inclusion/exclusion code. The simplified bifurcation is held by maintaining a s…