Search results for "Security"

showing 10 items of 1693 documents

Online Expression, Personal Cybersecurity Costs, and the Specter of Cybercrime

2020

The internet is used increasingly as a platform both for free expression and e-commerce. The internet has unique security and privacy risks. Such risks include the threat of criminal cyberattacks, including hacking and doxing. Internet users have a variety of attitudes towards the security and privacy risks involved with using the internet and distinct concerns and behaviors with regard to expressing themselves online. In order to mitigate the security and privacy risks of the internet, some internet users spend valuable time thinking about and configuring the security settings of their devices. They may also have different attitudes towards personal spending of money for cybersecurity prod…

cybersecurityfrustration050801 communication & media studies02 engineering and technologyprivacy concernsComputer securitycomputer.software_genre0508 media and communications020204 information systemsyksityisyys0202 electrical engineering electronic engineering information engineeringkyberturvallisuusonline expressionriskitverkkopalvelutInternetkyberrikollisuustime consumption05 social sciencesitseilmaisukuluttajakäyttäytyminenCybercrimerisk avoidanceExpression (architecture)cybercrimePsychologycomputerpersonal cybersecurity spending
researchProduct

Developing Cybersecurity in an Industrial Environment by Using a Testbed Environment

2023

Critical infrastructure protection requires a testing environment that allows the testing of different kinds of equipment, software, networks, and tools to develop vital functions of the critical industrial environment. Used electrical equipment must be reliable, capable and maintain a stable critical industrial ecosystem. An industrial business needs to develop cybersecurity capabilities that detect and prevent IT/ICT and OT/ICS threats in an industrial environment. The emerging trend has been to create security operations center (SOC) services to detect ICS-related threats in enterprise networks. The energy supply sector must consist of crucial elements for safe business continuity and su…

cybersecuritytestbed security operations centerkyberturvallisuusoperational technologygovernance modelteollisuusyritykset
researchProduct

Preventing Execution of Unauthorized Native-Code Software

2017

The business world is exhibiting a growing dependency on computer systems, their operations and the databases they contain. Unfortunately, it also suffers from an ever growing recurrence of malicious software attacks. Malicious attack vectors are diverse and the computer-security industry is producing an abundance of behavioral-pattern detections to combat the phenomenon. This paper proposes an alternative approach, based on the implementation of an attested, and thus trusted, thin-hypervisor. Secondary level address translation tables, governed and fully controlled by the hypervisor, are configured in order to assure that only pre-whitelisted instructions can be executed in the system. Thi…

cybersecuritywhitelistingtrusted computinghypervisorattestationAPT-protection
researchProduct

Industry 4.0 Intelligence under Attack : From Cognitive Hack to Data Poisoning

2018

Artificial intelligence is an unavoidable asset of Industry 4.0. Artificial actors participate in real-time decision-making and problem solving in various industrial processes, including planning, production, and management. Their efficiency, as well as intelligent and autonomous behavior is highly dependent on the ability to learn from examples, which creates new vulnerabilities exploited by security threats. Today's disruptive attacks of hackers go beyond system's infrastructures targeting not only hard-coded software or hardware, but foremost data and trained decision models, in order to approach system's intelligence and compromise its work. This paper intends to reveal security threats…

data poisoningkoneoppiminenuhatsecurityvalue-based decision makingtekoälyteollisuustietoturvaIndustry 4.0cyber-physical systemshakkerointicognitive hack
researchProduct

Information as a determinant of a decision system

2018

The purpose of the article is to describe the considerations of measuring information in the aspect of making decisions. In the last two decades an "informational revolution" has been made that opens the era of computer tools supporting decision-making processes (Internet, mobile telephony). This relatively new information environment includes information, users and systems that enable information processing. In the information environment, the value and quality of information should be taken into account. An important place in the consideration of information is the measurement of information in the aspect of decision-making.

decision-making processnational securityinformation processinginformation
researchProduct

On Attacking Future 5G Networks with Adversarial Examples : Survey

2022

The introduction of 5G technology along with the exponential growth in connected devices is expected to cause a challenge for the efficient and reliable network resource allocation. Network providers are now required to dynamically create and deploy multiple services which function under various requirements in different vertical sectors while operating on top of the same physical infrastructure. The recent progress in artificial intelligence and machine learning is theorized to be a potential answer to the arising resource allocation challenges. It is therefore expected that future generation mobile networks will heavily depend on its artificial intelligence components which may result in …

deep learning5G-tekniikkaGeneral Medicinematkaviestinverkottekoälyartificial intelligenceadversarial machine learning5G networkskoneoppiminenmatkaviestinpalvelut (telepalvelut)algoritmit5G cybersecurity knowledge basetietoturvakyberturvallisuusverkkohyökkäyksetverkkopalvelut
researchProduct

Components of defence strategies in society’s information environment: a case study based on the grounded theory

2020

Objectives: The goal of this study is to explore the components of defence strategies faced by society in its information environment, and how these strategies are inter-related. Methods: This qualitative in-depth case study applied past research and empirical evidence to identify the components of defence strategies in a society’s information environment. The collected data were analysed using the Grounded Theory approach and a conceptual framework with the components of defence strategies and the relationships between these components being developed using the Grounded Theory. Results: This study shows that the goal of politically and militarily hostile actors is to weaken society’s infor…

defencekybersodankäyntiKnowledge managementlcsh:Military SciencesotilasstrategiaComputer sciencebusiness.industrylcsh:UInformation environmentGrounded theorypuolustuspolitiikkasocietyComponent (UML)componentinformaatiosodankäyntiMilitary securityInternational securityinformation environmentbusinessgrounded theorySecurity and Defence Quarterly
researchProduct

Edukacja obronna i edukacja dla bezpieczeństwa w polskim szkolnictwie w XX i XXI w. Zarys problematyki

2016

Edukacja obronna jest istotną częścią systemu kształcenia obywateli w wielu państwach Europy i świata. W przyjętej w niniejszym opracowaniu cezurze w polskim szkolnictwie różnie akcentowano określone treści edukacji obronnej i, w zależności od okresu historycznego oraz sytuacji geopolitycznej, stawiano jej odmienne cele. W II Rzeczypospolitej szczególny nacisk kładziono na treści związane z kształtowaniem odpowiednich postaw - przede wszystkim patriotyzmu oraz związanego z nim poczucia utrwalania, a w razie konieczności obrony dopiero co odzyskanej niepodległości. Zadania te miały być realizowane w ramach szeroko rozumianego przysposobienia wojskowego. Po II wojnie światowej w programach pr…

defenceprzysposobienieeducationreformaobronaedukacjaadaptationsecuritybezpieczeństworeform
researchProduct

Obliczanie wysokości emerytury na podstawie art. 26 ustawy o emeryturach i rentach z Funduszu Ubezpieczeń Społecznych w stosunku do ubezpieczonego, k…

2019

defined benefit (DB) schemesystem zdefiniowanej nieskapitalizowanej składkinational defined contribution (NDC) schemepodstawa obliczenia emeryturybase for calculating the retirement pensionprotection of acquired rightsnabycie prawa do emeryturyacquisition of the right to a retirement pensionubezpieczenia społecznesystem zdefiniowanego świadczeniaochrona praw nabytychemeryturasocial securityretirement pensionOrzecznictwo Sądów Polskich
researchProduct

Impact of deterrence theory methods on employees' information security behavior

2017

Peloteteoria (Deterrence theory) on alun perin psykologiassa ja kriminologiassa käytetty termi, ja sen mukaan rangaistuksen pelko estää yksilöä toimimasta vastoin lakia ja sääntöjä. Digitalisoituvassa maailmassa on viimeisen kahdenkymmenen vuoden aikana tehty paljon tutkimusta, jossa peloteteoriaa on sovellettu tietojärjestelmien sekä tietoturvakäyttäytymisen kontekstiin. Tutkielma käsittelee käytössä olevia peloteteorian keinoja tässä kontekstissa sekä nii-den vaikutuksia työntekijöiden tietoturvakäyttäytymiseen. Tutkielma on toteutettu kirjallisuuskatsauksena ja sen tarkoitus on määritellä peloteteorian käsitettä tietojärjestelmien ja tietoturvakäyttäytymisen kontekstissa sekä tutkia olem…

deterrenceinformaatioturvallisuusohjeidenmukaisuusinformation securitybehaviorkäyttäytyminencompliancepeloteteoria
researchProduct