Search results for "Cyber Security"

showing 10 items of 30 documents

Framing Effects on Online Security Behavior

2020

We conducted an incentivized lab experiment examining the effect of gain vs. loss-framed warning messages on online security behavior. We measured the probability of suffering a cyberattack during the experiment as the result of five specific security behaviors: choosing a safe connection, providing minimum information during the sign-up process, choosing a strong password, choosing a trusted vendor, and logging-out. A loss-framed message led to more secure behavior during the experiment. The experiment also measured the effect of trusting beliefs and cybersecurity knowledge. Trusting beliefs had a negative effect on security behavior, while cybersecurity knowledge had a positive effect.

nudgeOnline securityProcess (engineering)Vendorlcsh:BF1-990Internet privacyonline behaviorgain vs. loss frame050105 experimental psychologyEconomíaPassword strength03 medical and health sciences0302 clinical medicineProspect theoryPsychology0501 psychology and cognitive sciencesGeneral PsychologyOriginal ResearchG500business.industrycyber security05 social sciencesprospect theoryFraming effectC800lcsh:Psychologythreat assessmentlab experimentPsychologybusinessThreat assessment030217 neurology & neurosurgeryFrontiers in Psychology
researchProduct

Cyber security training in Finnish basic and general upper secondary education

2023

Cyber security in Finland is part of other areas of comprehensive security, as digital solutions multiply in society and technologies advance. Cyber security is one of the primary national security and nationaldefense concerns. Cyber security has quickly evolved from a technical discipline to a strategic concept. Cyber security capacity building can be measured based on the existence and number of research and developments, education and training programs, and certified professionals and public sector agencies.Cybersecurity awareness and the related civic skills play an increasingly important role as our societies become more digitalized. Improving citizens' cyber skills through education i…

perusopetuskoulutusosaaminenbasic educationkansalaistaitolukiogeneral upper secondary educationkyberturvallisuuscyber security educationInternational Conference on Cyber Warfare and Security
researchProduct

Lääkintälaitteiden kyberturvallisuuden standardit ja testaaminen

2017

Tietotekniikkaa sisältävät lääkintälaitteet pitävät meidät hengissä, jos kehomme pettää. Esimerkiksi ostoskeskuksissa olevat älykkäät defibrillaattorit antavat maallikoillekin mahdollisuuden antaa tehokasta ensiapua sydänkohtaukseen. Tietotekniikan käyttäminen lääkintälaitteissa tuo mahdollisuuksien lisäksi uhkia. Tässä tutkielmassa perehdytään siihen, miten standardit ja testaaminen edistävät kyberturvallisuutta, uhkien torjumista. Ensin tehdään katsaus kirjallisuuteen ja standardeihin ja sitten kytketään tieto käytäntöön testaamalla potilasmonitoria kirjallisuuden pohjalta. Tulos oli, että tutkittava potilasmonitori oli hyvin avoin fyysisen käyttöliittymän kautta. Esimerkiksi potilastiedo…

potilasturvallisuusembedded computingInternet of thingssulautettu tietotekniikkacyber securitycyber security standardsesineiden internetstandarditcyber security testingkyberturvallisuustestausmedical deviceslääkintälaitteet
researchProduct

PSD2 ja sen vaikutukset verkkomaksamisen tietoturvaan ja liiketoimintamalleihin

2016

Web payments have created a whole industry around them in the last decade where sensitive data is moved around and where security is one of the key concepts. On top of internal facilities, members of the EU are regulated by EU directives of which the second will be taken to legislation by the start of year 2017. It forces the banks to open interfaces that allow third parties to use web shop customers banking credentials in order to initiate payments. Second directive on payment services brings up a set of web security hazards that have yet to be studied. In this thesis a literature review is made on web payment security. I will also study the second directive on payment services and its eff…

second directive on payment servicesverkkomaksaminencyber securitydirektiivitWeb-paymenttietoturvapayment service providerkyberturvallisuusdirective on payment services
researchProduct

Online anomaly detection using dimensionality reduction techniques for HTTP log analysis

2015

Modern web services face an increasing number of new threats. Logs are collected from almost all web servers, and for this reason analyzing them is beneficial when trying to prevent intrusions. Intrusive behavior often differs from the normal web traffic. This paper proposes a framework to find abnormal behavior from these logs. We compare random projection, principal component analysis and diffusion map for anomaly detection. In addition, the framework has online capabilities. The first two methods have intuitive extensions while diffusion map uses the Nyström extension. This fast out-of-sample extension enables real-time analysis of web server traffic. The framework is demonstrated using …

ta113Web serverComputer Networks and Communicationsbusiness.industryComputer scienceRandom projectionDimensionality reductionRandom projectionPrincipal component analysisIntrusion detection systemAnomaly detectionMachine learningcomputer.software_genreCyber securityWeb trafficPrincipal component analysisDiffusion mapAnomaly detectionIntrusion detectionArtificial intelligenceData miningWeb servicebusinesskyberturvallisuuscomputer
researchProduct

Health care and cyber threats

2019

ta113critical infrastructurecyber threatkyberuhkaterveydenhuoltocyber securitykyberturvallisuushealth carekriittinen infrastruktuuriFinnish Journal of eHealth and eWelfare
researchProduct

Towards the cyber security paradigm of ehealth: Resilience and design aspects

2017

Digital technologies have significantly changed the role of healthcare clients in seeking and receiving medical help, as well as brought up more cooperative policy issues in healthcare cross-border services. Citizens continue to take a more co-creative role in decisions about their own healthcare, and new technologies can enable and facilitate this emergent trend. In this study, healthcare services have been intended as a critical societal sector and therefore healthcare systems are focused on as critical infrastructures that ought to be protected from all types of fears, including cyber security threats and attacks. Despite continual progress in the systemic risk management of cyber domain…

ta113e-healthcareEmerging technologiesbusiness.industrycyber securityComputer securitycomputer.software_genreAnticipation (artificial intelligence)Critical information infrastructureHealth careSystemic riskeHealthBusinessteleterveydenhuoltoResilience (network)kyberturvallisuuscomputerHealthcare system
researchProduct

Cyber Threat Analysis in Smart Terminal Systems

2023

Cyber threats create significant factors that challenge traditional threat prevention mechanisms in harbor areas and port terminals. It has been recognized that understanding security functionalities in the harbor area is based on a more traditional experience of what it requires. It is not enough that the maritime and harbor ecosystem repeats only physical security service routines regarding random checks of passengers and vehicles and customs functions on cargo and passenger transportation. Smart environments and infrastructures are widely expanded in urban areas and create more challenges if old practices are combined with new technologies and functionalities. Traditional threats have ch…

threatssmart terminal processcyber security analysisuhatlogistiikkamaritime logisticsälytekniikkamerenkulkusatamatkyberturvallisuusterminaalitInternational Conference on Cyber Warfare and Security
researchProduct

APT Cyber-attack Modelling: Building a General Model

2022

The global community continues to experience an increase in the scale, sophistication, and successful perpetration of cyber-attacks. As the quantity and value of electronic information have increased, so too have the efforts of criminals and other malicious actors who have embraced the Internet as a more anonymous, convenient, and profitable way of carrying out their activities. The systems are attacked more and more by single or multiple hacktivists, state sponsored hackers, cyber criminals, cyber terrorists, cyber spies, or cyber warfare warfighters. The cyber security approach requires a balance of cyber threat intelligence, real time cyber-attack detection and especially the cyber early…

tietoverkkorikoksetmallintaminenAPT attackkyberrikollisuuscyber securitycyber-attack modeltietoturvavarautuminenkyberturvallisuusverkkohyökkäyksetInternational Conference on Cyber Warfare and Security
researchProduct

Ontology and protocol secure for SCADA

2014

In this work, we present a semantic cyber security system and we study its semantic intelligent systems vulnerabilities, focusing on the semantic attacks. For resolving semantic problems we propose a security global solution for the new generation of SCADA systems. The proposed solution aims at protecting critical semantic SCADA processes from the effects of major failures and semantic vulnerabilities in the modern IT-SCADA network. We used a security block in the global network access point, security protocols deployed in different network (OSI) levels and security ontologies deployed in security devices. We used our mixed coordinates (ECC) cryptography solution, this is an encryption tech…

vulnerabilitiessecurity protocolsdata acquisitionencryption technologycyber securityembedded applicationssupervisory controlsemantic attackssemantic security blocksecurity ontology[INFO] Computer Science [cs]SOAP protocollow latencyModbus protocolECC cryptographySCADAcontrol systems[INFO.INFO-CR] Computer Science [cs]/Cryptography and Security [cs.CR]
researchProduct