Search results for "Cybersecurity"
showing 10 items of 43 documents
Empirical Study on Cyber Range Capabilities, Interactions and Learning Features
2021
Emerging technologies and the globalization require constant investment in people and their performance in actual and virtual environments. New technologies such as autonomous systems, machine learning and artificial intelligence (AI) radically re-contextualize the human dimension of the organization. Technological developments are changing the ways people experience the physical and the virtual environments. Strategic changes have revealed new critical vulnerabilities such as social media-based disinformation campaigning with impact on the human aspects at state, societal, organizational and individual levels. Scenarios of gathering information, committing fraud or getting access to critic…
La regolazione della cybersecurity in Italia
2023
Il saggio offre una panoramica generale della regolazione e dell'organizzazione della sicurezza cibernetica in Italia. In particolare, dopo una premessa volta a dedicare alcuni cenni all'evoluzione della materia e alla disciplina europea, l'elaborato si sofferma sullo stato dell'arte e sulle future sfide in materia di cybersecurity.
Leveraging the benefits of big data with fast data for effective and efficient cybersecurity analytics systems : A robust optimisation approach
2020
In recent times, major cybersecurity breaches and cyber fraud within the public and private sectors are making international headlines. Majority of organisations are facing cybersecurity adversity and advanced threats. On the one hand, we have asynchronous cybersecurity practices, many standards and frameworks to consider while on the other hand, we have to deal and secure our organisations against cyber-criminals, organised hacktivists, insider threats, hackers and nation-states with malafide intentions. The Center for Cyber Safety and Education's Global Information Security Workforce Study (GISWS) confirms that globally we are not only loosing but also backpedalling against threats and ri…
Beyond economic and financial analyses : A revelatory study of IT security investment decision-making process
2022
Information Technology (IT) security breaches and the extent of damage they may cause to an organization are inherently uncertain. Therefore, managers’ decisions about whether to make IT security investment (ITSI) and how much, depend upon a subjective assessment of the economic value of the investment and the likelihood of the damage to the organization. When managers delay or fail to decide on whether and how much to invest in IT security, it can make organizations vulnerable to operational and strategic perils. Based upon interviews, document reviews, and observations in three organizations in Finland that made ITSI decisions to acquire a secure email application system, we examined the …
On the (In)Security of 1090ES and UAT978 Mobile Cockpit Information Systems : An Attacker Perspective on the Availability of ADS-B Safety- and Missio…
2022
Automatic dependent surveillance-broadcast (ADS-B) is a key air surveillance technology and a critical component of next-generation air transportation systems. It significantly simplifies aircraft surveillance technology and improves airborne traffic situational awareness. Many types of mobile cockpit information systems (MCISs) are based on ADS-B technology. MCIS gives pilots the flight and traffic-related information they need. MCIS has two parts: an ADS-B transceiver and an electronic flight bag (EFB) application. The ADS-B transceivers transmit and receive the ADS-B radio signals while the EFB applications hosted on mobile phones display the data. Because they are cheap, lightweight, an…
Towards digital cognitive clones for the decision-makers: adversarial training experiments
2021
Abstract There can be many reasons for anyone to make a digital copy (clone) of own decision-making behavior. This enables virtual presence of a professional decision-maker simultaneously in many places and processes of Industry 4.0. Such clone can be used as one’s responsible representative when the human is not available. Pi-Mind (“Patented Intelligence”) is a technology, which enables “cloning” cognitive skills of humans using adversarial machine learning. In this paper, we present a cyber-physical environment as an adversarial learning ecosystem for cloning image classification skills. The physical component of the environment is provided by the logistic laboratory with camera-surveilla…
Taxonomy of generative adversarial networks for digital immunity of Industry 4.0 systems
2021
Abstract Industry 4.0 systems are extensively using artificial intelligence (AI) to enable smartness, automation and flexibility within variety of processes. Due to the importance of the systems, they are potential targets for attackers trying to take control over the critical processes. Attackers use various vulnerabilities of such systems including specific vulnerabilities of AI components. It is important to make sure that inappropriate adversarial content will not break the security walls and will not harm the decision logic of critical systems. We believe that the corresponding security toolset must be organized as a trainable self-protection mechanism similar to immunity. We found cer…
Developing and Validating a Behavioural Model of Cyberinsurance Adoption
2021
Business disruption from cyberattacks is a growing concern, yet cyberinsurance uptake remains low. Using an online behavioural economics experiment with 4800 participants across four EU countries, this study tests a predictive model of cyberinsurance adoption, incorporating elements of Protection Motivation Theory (PMT) and the Theory of Planned Behaviour (TPB) as well as factors in relation to risk propensity and price. During the experiment, participants were given the opportunity to purchase different cybersecurity measures and cyberinsurance products before performing an online task. Participants likelihood of suffering a cyberattack was dependent upon their adoption of cybersecurity me…
Online Expression, Personal Cybersecurity Costs, and the Specter of Cybercrime
2020
The internet is used increasingly as a platform both for free expression and e-commerce. The internet has unique security and privacy risks. Such risks include the threat of criminal cyberattacks, including hacking and doxing. Internet users have a variety of attitudes towards the security and privacy risks involved with using the internet and distinct concerns and behaviors with regard to expressing themselves online. In order to mitigate the security and privacy risks of the internet, some internet users spend valuable time thinking about and configuring the security settings of their devices. They may also have different attitudes towards personal spending of money for cybersecurity prod…
Developing Cybersecurity in an Industrial Environment by Using a Testbed Environment
2023
Critical infrastructure protection requires a testing environment that allows the testing of different kinds of equipment, software, networks, and tools to develop vital functions of the critical industrial environment. Used electrical equipment must be reliable, capable and maintain a stable critical industrial ecosystem. An industrial business needs to develop cybersecurity capabilities that detect and prevent IT/ICT and OT/ICS threats in an industrial environment. The emerging trend has been to create security operations center (SOC) services to detect ICS-related threats in enterprise networks. The energy supply sector must consist of crucial elements for safe business continuity and su…