Search results for "cybersecurity"

showing 10 items of 43 documents

Developing Cybersecurity in an Industrial Environment by Using a Testbed Environment

2023

Critical infrastructure protection requires a testing environment that allows the testing of different kinds of equipment, software, networks, and tools to develop vital functions of the critical industrial environment. Used electrical equipment must be reliable, capable and maintain a stable critical industrial ecosystem. An industrial business needs to develop cybersecurity capabilities that detect and prevent IT/ICT and OT/ICS threats in an industrial environment. The emerging trend has been to create security operations center (SOC) services to detect ICS-related threats in enterprise networks. The energy supply sector must consist of crucial elements for safe business continuity and su…

cybersecuritytestbed security operations centerkyberturvallisuusoperational technologygovernance modelteollisuusyritykset
researchProduct

Organizational Learning from Cybersecurity Performance: Effects on Cybersecurity Investment Decisions

2023

AbstractIS literature has identified various economic, performance, and environmental factors affecting cybersecurity investment decisions. However, economic modeling approaches dominate, and research on cybersecurity performance as an antecedent to investments has taken a backseat. Neglecting the role of performance indicators ignores real-world concerns driving actual cybersecurity investment decision-making. We investigate two critical aspects of cybersecurity performance: breach costs and breach identification source, as antecedents to cybersecurity investment decisions. We use organizational learning to theorize how performance feedback from these two aspects of cybersecurity breaches …

oppiva organisaatioComputer Networks and Communicationsbreach costTheoretical Computer Sciencecybersecurity investmentorganizational learningcybersecurity breachbreach identifcationcybersecurity performancetietoturvakyberturvallisuusSoftwaretieto- ja viestintärikoksetInformation SystemsInformation Systems Frontiers
researchProduct

Los sistemas de información y la auditoría informática aplicados a una institución fiscalizadora subestatal: la Sindicatura de Comptes de la Comunida…

2020

La digitalización es un fenómeno global que afecta a todas las actividades humanas. Las administraciones públicas también han incorporado a sus estructuras las nuevas tecnologías de la información y la comunicación, de manera que el sector público se ha informatizado completamente. En este contexto digital, la auditoría informática es una herramienta que permite fiscalizar las administraciones públicas y, a la vez, mejora la rendición de cuentas. Este artículo examina las principales ventajas y riesgos de la digitalización y ofrece un estudio de caso centrado en una institución fiscalizadora pública española que ha implementado la auditoría informática para auditar todas las operaciones de …

Auditoría informáticaCybersecurity[SHS.INFO]Humanities and Social Sciences/Library and information sciencesGeneral EngineeringComputer auditEnfoque de RiesgosAbordagem de riscoAuditoría Informática[SHS.SCIPO]Humanities and Social Sciences/Political scienceEnfoque de riesgosCiberseguridadAuditoria por computadorCíber segurançaPolitical scienceDigitalizaciónCiencia Política y de la AdministraciónSistemas de informaçãoCiencia Política y Ciencia de la AdministraciónHumanitiesDigitalización; Auditoría Informática; Ciberseguridad; Enfoque de RiesgosInformation SystemsRisk ApproachRevista Gestão e Secretariado – GESEC
researchProduct

Online Expression, Personal Cybersecurity Costs, and the Specter of Cybercrime

2020

The internet is used increasingly as a platform both for free expression and e-commerce. The internet has unique security and privacy risks. Such risks include the threat of criminal cyberattacks, including hacking and doxing. Internet users have a variety of attitudes towards the security and privacy risks involved with using the internet and distinct concerns and behaviors with regard to expressing themselves online. In order to mitigate the security and privacy risks of the internet, some internet users spend valuable time thinking about and configuring the security settings of their devices. They may also have different attitudes towards personal spending of money for cybersecurity prod…

cybersecurityfrustration050801 communication & media studies02 engineering and technologyprivacy concernsComputer securitycomputer.software_genre0508 media and communications020204 information systemsyksityisyys0202 electrical engineering electronic engineering information engineeringkyberturvallisuusonline expressionriskitverkkopalvelutInternetkyberrikollisuustime consumption05 social sciencesitseilmaisukuluttajakäyttäytyminenCybercrimerisk avoidanceExpression (architecture)cybercrimePsychologycomputerpersonal cybersecurity spending
researchProduct

Enhancing the European Cyber Threat Prevention Mechanism

2021

This research will determine how it is possible to implement the national cyber threat prevention system into the EU level Early Warning System. Decision makers have recognized that the lack of cooperation between EU member countries affects public safety at the international level. Separate operational functions and procedures between national cyber situation centers create challenges. One main problem is that the European Union does not have a common cyber ecosystem concerning intrusion detection systems for cyber threats. Also, privacy and citizens’ security as topics are set against each other. The research will comprise a new database for the ECHO Early Warning System concept.

turvajärjestelmätcybersecurityprivacy early warninginformation sharingInformation Sharing Cybersecurity HAVARO Privacy Early Warningkansainvälinen yhteistyöHAVAROtietojenvaihtoinfrastruktuuritkyberturvallisuusturvallisuuspolitiikkatietojärjestelmättiedonhankinta
researchProduct

Cyber Situational Awareness in Critical Infrastructure Organizations

2021

The capability related to cybersecurity plays an ever-growing role on overall national security and securing the functions vital to society. The national cyber capability is mainly composed by resilience of companies running critical infrastructures and their cyber situational awareness (CSA). According to a common view, components of critical infrastructures become more complex and interdependent on each other and, as a consequence, ramifications of incidents multiply. In practice, the actions relate to developing better CSA and understanding of a critical infrastructure organization. The aim is to prepare for incidents and their management in a whole-of-society approach. The arrangement i…

Process managementNational securitySituation awarenessOperating modelcybersecurityProcess (engineering)business.industryturvallisuusympäristömedia_common.quotation_subjectInformation sharingtilannekuvaCritical infrastructureInterdependencesituational awarenesscritical infrastructureinformation sharingvital societal functionsBusinessinfrastruktuuritkansallinen turvallisuusResilience (network)kyberturvallisuusmedia_common
researchProduct

Il Perimetro di sicurezza nazionale cibernetica

2023

Il presente contributo intende approfondire la disciplina del Perimetro di sicurezza cibernetica istituito dal Decreto-legge 21 settembre 2019 , n. 105. Segnatamente, il lavoro intende approfondire l’architettura di tale sistema attraverso un’analisi del quadro organizzativo, con particolare riferimento alla distribuzione di competenze (e obblighi) dei diversi attori pubblici e privati coinvolti.

perimetro di sicurezza nazionale cibernetica cybersecurity cibersicurezza PSNC sicurezza nazionale sicurezza ciberneticaSettore IUS/09 - Istituzioni Di Diritto Pubblico
researchProduct

Developing and Validating a Behavioural Model of Cyberinsurance Adoption

2021

Business disruption from cyberattacks is a growing concern, yet cyberinsurance uptake remains low. Using an online behavioural economics experiment with 4800 participants across four EU countries, this study tests a predictive model of cyberinsurance adoption, incorporating elements of Protection Motivation Theory (PMT) and the Theory of Planned Behaviour (TPB) as well as factors in relation to risk propensity and price. During the experiment, participants were given the opportunity to purchase different cybersecurity measures and cyberinsurance products before performing an online task. Participants likelihood of suffering a cyberattack was dependent upon their adoption of cybersecurity me…

cybersecurityMoral hazardtheory of planned behaviourGeography Planning and Development0211 other engineering and technologiesPsychological interventionTJ807-83002 engineering and technologyManagement Monitoring Policy and LawTD194-195Structural equation modelingRenewable energy sourcesTask (project management)SAFER0502 economics and businessRisk propensityGE1-350050207 economics021110 strategic defence & security studiesActuarial scienceEnvironmental effects of industries and plantsRenewable Energy Sustainability and the Environmentcyberinsuranceprotection motivation theory05 social sciencesTheory of planned behaviorG900C800Environmental sciencesProtection motivation theoryPsychologySustainability
researchProduct

Insecure Firmware and Wireless Technologies as “Achilles’ Heel” in Cybersecurity of Cyber-Physical Systems

2022

In this chapter, we analyze cybersecurity weaknesses in three use-cases of real-world cyber-physical systems: transportation (aviation), remote explosives and robotic weapons (fireworks pyrotechnics), and physical security (CCTV). The digitalization, interconnection, and IoT-nature of cyber-physical systems make them attractive targets. It is crucial to ensure that such systems are protected from cyber attacks, and therefore it is equally important to study and understand their major weaknesses. peerReviewed

sulautettu tietotekniikkacybersecurityprotocolsasejärjestelmätilmailucyber-physical systemsfirmwaretakaisinmallinnusvideo surveillanceesineiden internetCCTVkyberturvallisuushaavoittuvuusvulnerabilitieswireless pyrotechnicsremote firing systemsexploitsvalvontajärjestelmätreverse engineeringZigbeeprotokollatcritical infrastructureaviationRFinfrastruktuuritbinareADS-B
researchProduct

Taxonomy of generative adversarial networks for digital immunity of Industry 4.0 systems

2021

Abstract Industry 4.0 systems are extensively using artificial intelligence (AI) to enable smartness, automation and flexibility within variety of processes. Due to the importance of the systems, they are potential targets for attackers trying to take control over the critical processes. Attackers use various vulnerabilities of such systems including specific vulnerabilities of AI components. It is important to make sure that inappropriate adversarial content will not break the security walls and will not harm the decision logic of critical systems. We believe that the corresponding security toolset must be organized as a trainable self-protection mechanism similar to immunity. We found cer…

cybersecurityIndustry 4.0Computer scienceVulnerabilityneuroverkot02 engineering and technologytekoälyComputer securitycomputer.software_genreAdversarial systemImmunityTaxonomy (general)0202 electrical engineering electronic engineering information engineeringesineiden internetartificial digital immunitykyberturvallisuusGeneral Environmental ScienceFlexibility (engineering)Generative Adversarial Networksbusiness.industryMechanism (biology)020206 networking & telecommunicationsIndustry 4.0AutomationVariety (cybernetics)koneoppiminenälytekniikkaGeneral Earth and Planetary Sciences020201 artificial intelligence & image processingbusinesscomputerProcedia Computer Science
researchProduct