Search results for "Cyber security"

showing 10 items of 30 documents

Anomaly-based online intrusion detection system as a sensor for cyber security situational awareness system

2016

Almost all the organisations and even individuals rely on complex structures of data networks and networked computer systems. That complex data ensemble, the cyber domain, provides great opportunities, but at the same time it offers many possible attack vectors that can be abused for cyber vandalism, cyber crime, cyber espionage or cyber terrorism. Those threats produce requirements for cyber security situational awareness and intrusion detection capability. This dissertation concentrates on research and development of anomaly-based network intrusion detection system as a sensor for a situational awareness system. In this dissertation, several models of intrusion detection systems are devel…

early warningpääsynvalvontatunkeilijan havaitsemisjärjestelmätcyber securityvalvontajärjestelmättilannekuvaanomaly detectionsituational awarenessinformation sharingnetwork securityintrusion detection systemklusterianalyysitiedonlouhintakyberturvallisuustietoverkotclustering
researchProduct

Drones in cyber security environment

2019

Aerial unmanned vehicles (AUV) are currently used for a wide range of operations such as border surveillance, surveillance, reconnaissance, transport, aerial photography, traffic control, earth observation, communications, broadcasting and armed attacks. AUVs are presumed to be reliable, automated and autonomous machines. AUVs are extremely suitable for long missions that strain flight crews or put them to harm's way. Two advantages can be gained by eliminating the flight crew: 1) performance improves (range, endurance, increased payload and maneuverability, smaller physical size and lower observability) and; 2) the ability to take higher risks. UAV/RPAS/drone cyber security has largely foc…

elektroninen sodankäyntikybersodankäyntiintelligence and reconnaissancecyber securitysurveillancedroonittiedusteluunmanned aerial vehiclesmiehittämättömät ilma-aluksettarkkailucyber attacks
researchProduct

Terveydenhuolto ja kyberuhkat

2019

Kyberturvallisuusstrategian vision mukaan Suomen tulee kyetä suojaamaan elintärkeät toimintonsa kyberuhkaa vastaan kaikissa tilanteissa. Terveydenhuolto on yksi elintärkeistä toiminnoista. Terveystoimiala on kyberhyökkäysten top-5-listalla ensimmäisenä. Hyökkäysten keskeisin motivaatio on potilastietojen arvo pimeillä markkinoilla. Vuonna 2015 varastettiin yli satamiljoonaa potilastietoa, jotka sisältävät rikollisille arvokkaita tietoja, kuten luottokorttinumeroita, työnantajatietoja ja sairaushistoriatietoja. Tässä artikkelissa kuvataan terveydenhuoltoon liittyviä kyberuhkia, kyberhaavoittuvuuksia ja toteutuneita kyberhyökkäyksiä kybermaailman eri ulottuvuudet kattaen. Tarkastelussa käytet…

health care [http://www.yso.fi/onto/yso/p2641]kyberturvallisuus [http://www.yso.fi/onto/yso/p26189]cyber threatcritical infrastructurekyberuhkaterveydenhuoltoterveydenhoitocyber security [http://www.yso.fi/onto/yso/p26189]kyberturvallisuusMuut artikkelit / Other articleskriittinen infrastruktuuriterveydenhuolto [http://www.yso.fi/onto/yso/p2658]Finnish Journal of eHealth and eWelfare
researchProduct

Kyberin taskutieto : keskeisin kybermaailmasta jokaiselle

2017

information warfarecyber securityinformation networksinformaatiosodankäyntiinfrastruktuuritdigitalisationtietoturvakyberturvallisuustietoverkotdigitalisaatiodata securitydata systemsinfrastructurestietojärjestelmät
researchProduct

Strategic Communication for Cyber-security Leadership

2013

The purpose of this paper is to form a preliminary hypothesis about how to identify characteristics that a leader needs to focus on when aiming at cyber-security leadership. The paper studies the key concepts and terms of cyber security and presents the physical world and the cyber world framework. The paper refers to a system model of a society and uses that model to analyze the results of two limited media surveys about cyber-related newspaper articles. The media surveys indicate a strong need to organize the cyber world. peerReviewed

johtaminenjulkinen keskustelulehdistökirjoittelucyber-securitygovernanceinformation securitytietohallintokyberturvallisuussysteemiajattelucyber security theory
researchProduct

Basic Elements of Cyber Security for a Smart Terminal Process

2023

Global maritime transportation and logistics systems are essential parts of critical infrastructures in every society, and a crucial part of maritime logistics processes are seaports. Digitalization helps improve the efficiency of terminal systems in the processes of these ports. In Finland this development is going on and it is called SMARTER research program. In the best cases, digitalization can also promote the reduction of emissions by optimizing port operations and enhancing cargo and people flows while improving the experience for all stakeholders. The improvement of port processes relies on the development of Information and Communication Technology (ICT) and as well as on Industria…

järjestelmäarkkitehtuuricyber security managementlogistiikkamaritime logisticsälytekniikkamerenkulkusatamatSMARTERkyberturvallisuussmart portterminaalit
researchProduct

Cyber security challenges in aviation and maritime

2021

kyberrikollisuuscyber securityliikennejärjestelmätsafety and security managementriskienhallintailmailurisk managementturvallisuusjohtaminenmaritimeaviationennaltaehkäisymerenkulkuinfrastruktuuritkyberturvallisuusuhkakuvat
researchProduct

The importance of strategic leadership in cyber security : Case of Finland

2019

Cyber security has become one of the biggest priorities for businesses and governments. Streamlining and strengthening strategic leadership are key aspects in making sure the cyber security vision is achieved. The strategic leadership of cyber security implies identifying and setting goals based on the protection of the digital operating environment. Furthermore, it implies coordinating actions and preparedness as well as managing extensive disruptions. The aim of this paper is to define what is strategic leadership of cyber security and how it is implemented as part of the comprehensive security model in Finland. The paper also asks (and answers) how the strategic leadership of cyber secur…

leadershipcyber securitystrategic leadershipsituational picturestrateginen johtaminennational securitykansallinen turvallisuuskyberturvallisuustilannekuvajohtajuusturvallisuuspolitiikka
researchProduct

The balanced digitalization and digital security : Case of regional authorities

2019

The emerging digital infrastructure enables the public authorities to shape their processes and to create attractive digital services for the citizens and the business actors. The public processes, services and infrastructure, however, engage with global and local public and private digital infrastructure and service providers. The complex comprehensiveness of the digital infrastructure and the services challenges the public authorities and create new types of security risks. The achieving of the benefits of the digitalization of public processes and services without increasing security risks requires the adopting of novel approaches to digital security. The paper refers to a framework that…

mallintaminendigital servicescyber securitymodelling of digital securityregionscomplex systemsdigitalisaatiokyberturvallisuussystem modellingjulkiset palvelutaluehallintoverkkopalvelut
researchProduct

Assessment of Cyber Security risks : A Smart Terminal Process

2023

In Finland, the connections to global maritime transportation logistics systems are an essential part of the national critical infrastructure. As a part of maritime logistics systems, the port's operations are important elements for global maritime traffic and the transportation supply chain. Digitalization of seaport services makes it possible to increase the efficiency of terminal systems in the logistic processes. At the same time, port logistic processes can notably reduce its CO2 emissions by optimizing port operations. The improvement of port processes relies very much on the development of Information and Communication Technology (ICT) and Industrial Control Systems (ICS) or Operatio…

merikuljetusmaritime logisticsmart terminal processcyber security managementmeriliikennelogistiikkaälytekniikkamerenkulkusatamatriskinarviointikyberturvallisuusrisk assessments
researchProduct