Search results for "COUNTERMEASURE"
showing 3 items of 13 documents
A Knowledge Interface System for Information and Cyber Security Using Semantic Wiki
2018
Resilience against information and cyber security threats has become an essential ability for organizations to maintain business continuity. As bulletproof security is an unattainable goal, organizations need to concentrate to select optimal countermeasures against information and cyber security threats. Implementation of cyber risk management actions require special knowledge and resources, which especially small and medium-size enterprises often lack. Information and cyber security risk management establish knowledge intensive business processes, which can be assisted with a proper knowledge management system. This paper analyzes how Semantic MediaWiki could be used as a platform to assis…
The hyperspectral and smartphone technology in CBRNE countermeasures and defence
2016
Caused by industrial and military use as well as other sources of chemical, biological, radiological, nuclear and high-yield explosive (CBRNE) materials, the global threat of weapons of mass destruction (WMDs) remains in spite of such weapons being internationally prohibited. With these materials, industrial and transportation accidents are likely in all countries and can also be triggered by natural disasters, such as in Fukushima in 2011. In addition, governments cannot fully control the manufacturing and usage of WMDs, as extreme terrorists have access to as well as the knowledge and motivation to use such materials. Due to multiple large-scale risks, the countering of CBRNE threats requ…
Cybersecurity Attacks on Software Logic and Error Handling Within ADS-B Implementations: Systematic Testing of Resilience and Countermeasures
2022
Automatic Dependent Surveillance-Broadcast (ADS-B) is a cornerstone of the next-generation digital sky and is now mandated in several countries. However, there have been many reports of serious security vulnerabilities in the ADS-B architecture. In this paper, we demonstrate and evaluate the impact of multiple cyberattacks on ADS-B via remote radio frequency links that affected various network, processing, and display subsystems used within the ADS-B ecosystem. Overall we implemented and tested 12 cyberattacks on ADS-B in a controlled environment, out of which 5 attacks were presented or implemented for the first time. For all these attacks, we developed a unique testbed that consisted of 1…