Search results for "Cyber Security"
showing 10 items of 30 documents
Framing Effects on Online Security Behavior
2020
We conducted an incentivized lab experiment examining the effect of gain vs. loss-framed warning messages on online security behavior. We measured the probability of suffering a cyberattack during the experiment as the result of five specific security behaviors: choosing a safe connection, providing minimum information during the sign-up process, choosing a strong password, choosing a trusted vendor, and logging-out. A loss-framed message led to more secure behavior during the experiment. The experiment also measured the effect of trusting beliefs and cybersecurity knowledge. Trusting beliefs had a negative effect on security behavior, while cybersecurity knowledge had a positive effect.
Cyber security training in Finnish basic and general upper secondary education
2023
Cyber security in Finland is part of other areas of comprehensive security, as digital solutions multiply in society and technologies advance. Cyber security is one of the primary national security and nationaldefense concerns. Cyber security has quickly evolved from a technical discipline to a strategic concept. Cyber security capacity building can be measured based on the existence and number of research and developments, education and training programs, and certified professionals and public sector agencies.Cybersecurity awareness and the related civic skills play an increasingly important role as our societies become more digitalized. Improving citizens' cyber skills through education i…
Lääkintälaitteiden kyberturvallisuuden standardit ja testaaminen
2017
Tietotekniikkaa sisältävät lääkintälaitteet pitävät meidät hengissä, jos kehomme pettää. Esimerkiksi ostoskeskuksissa olevat älykkäät defibrillaattorit antavat maallikoillekin mahdollisuuden antaa tehokasta ensiapua sydänkohtaukseen. Tietotekniikan käyttäminen lääkintälaitteissa tuo mahdollisuuksien lisäksi uhkia. Tässä tutkielmassa perehdytään siihen, miten standardit ja testaaminen edistävät kyberturvallisuutta, uhkien torjumista. Ensin tehdään katsaus kirjallisuuteen ja standardeihin ja sitten kytketään tieto käytäntöön testaamalla potilasmonitoria kirjallisuuden pohjalta. Tulos oli, että tutkittava potilasmonitori oli hyvin avoin fyysisen käyttöliittymän kautta. Esimerkiksi potilastiedo…
PSD2 ja sen vaikutukset verkkomaksamisen tietoturvaan ja liiketoimintamalleihin
2016
Web payments have created a whole industry around them in the last decade where sensitive data is moved around and where security is one of the key concepts. On top of internal facilities, members of the EU are regulated by EU directives of which the second will be taken to legislation by the start of year 2017. It forces the banks to open interfaces that allow third parties to use web shop customers banking credentials in order to initiate payments. Second directive on payment services brings up a set of web security hazards that have yet to be studied. In this thesis a literature review is made on web payment security. I will also study the second directive on payment services and its eff…
Online anomaly detection using dimensionality reduction techniques for HTTP log analysis
2015
Modern web services face an increasing number of new threats. Logs are collected from almost all web servers, and for this reason analyzing them is beneficial when trying to prevent intrusions. Intrusive behavior often differs from the normal web traffic. This paper proposes a framework to find abnormal behavior from these logs. We compare random projection, principal component analysis and diffusion map for anomaly detection. In addition, the framework has online capabilities. The first two methods have intuitive extensions while diffusion map uses the Nyström extension. This fast out-of-sample extension enables real-time analysis of web server traffic. The framework is demonstrated using …
Health care and cyber threats
2019
Towards the cyber security paradigm of ehealth: Resilience and design aspects
2017
Digital technologies have significantly changed the role of healthcare clients in seeking and receiving medical help, as well as brought up more cooperative policy issues in healthcare cross-border services. Citizens continue to take a more co-creative role in decisions about their own healthcare, and new technologies can enable and facilitate this emergent trend. In this study, healthcare services have been intended as a critical societal sector and therefore healthcare systems are focused on as critical infrastructures that ought to be protected from all types of fears, including cyber security threats and attacks. Despite continual progress in the systemic risk management of cyber domain…
Cyber Threat Analysis in Smart Terminal Systems
2023
Cyber threats create significant factors that challenge traditional threat prevention mechanisms in harbor areas and port terminals. It has been recognized that understanding security functionalities in the harbor area is based on a more traditional experience of what it requires. It is not enough that the maritime and harbor ecosystem repeats only physical security service routines regarding random checks of passengers and vehicles and customs functions on cargo and passenger transportation. Smart environments and infrastructures are widely expanded in urban areas and create more challenges if old practices are combined with new technologies and functionalities. Traditional threats have ch…
APT Cyber-attack Modelling: Building a General Model
2022
The global community continues to experience an increase in the scale, sophistication, and successful perpetration of cyber-attacks. As the quantity and value of electronic information have increased, so too have the efforts of criminals and other malicious actors who have embraced the Internet as a more anonymous, convenient, and profitable way of carrying out their activities. The systems are attacked more and more by single or multiple hacktivists, state sponsored hackers, cyber criminals, cyber terrorists, cyber spies, or cyber warfare warfighters. The cyber security approach requires a balance of cyber threat intelligence, real time cyber-attack detection and especially the cyber early…
Ontology and protocol secure for SCADA
2014
In this work, we present a semantic cyber security system and we study its semantic intelligent systems vulnerabilities, focusing on the semantic attacks. For resolving semantic problems we propose a security global solution for the new generation of SCADA systems. The proposed solution aims at protecting critical semantic SCADA processes from the effects of major failures and semantic vulnerabilities in the modern IT-SCADA network. We used a security block in the global network access point, security protocols deployed in different network (OSI) levels and security ontologies deployed in security devices. We used our mixed coordinates (ECC) cryptography solution, this is an encryption tech…