Search results for "kyber"
showing 10 items of 188 documents
Kyberin taskutieto : keskeisin kybermaailmasta jokaiselle
2017
Cyber security of vehicle CAN bus
2019
There are currently many research projects underway concerning the intelligent transport system (ITS), with the intent to develop a variety of communication solutions between vehicles, roadside stations and services. In the near future, the roll-out of 5G networks will improve short-range vehicle-to-vehicle traffic and vehicle-to-infrastructure communications. More extensive services can be introduced due to almost non-delayed response time. Cyber security is central for the usability of the services and, most importantly, for car safety. The Controller Area Network (CAN) is an automation bus that was originally designed for real-time data transfer of distributed control systems to cars. La…
Strategic Communication for Cyber-security Leadership
2013
The purpose of this paper is to form a preliminary hypothesis about how to identify characteristics that a leader needs to focus on when aiming at cyber-security leadership. The paper studies the key concepts and terms of cyber security and presents the physical world and the cyber world framework. The paper refers to a system model of a society and uses that model to analyze the results of two limited media surveys about cyber-related newspaper articles. The media surveys indicate a strong need to organize the cyber world. peerReviewed
Kyberosaamisen nykyiset ja tulevat tarpeet julkisen sektorin organisaatioissa
2017
Tutkimuksessa arvioidaan kahden julkisen sektorin organisaation kyberammatillisen osaamisen nykyisiä ja lähitulevaisuuden tarpeita. Tutkimuksen kohdeorganisaatioissa kyberammatillinen osaaminen liittyy vahvasti niiden ydintoimintoihin. Kyberammatillista osaamista tarkastellaan NCWF-viitekehyksen kategorioiden ja eritysalueiden kautta. Viitekehyksen luokittelujen perusteella laaditaan organisaatiokohtainen ydinkompetenssiesitys organisaatio-osaamisen näkökulmasta. Tutkimus edustaa laadullisen tutkimuksen case-lähestymistapaa, jossa aineistonkeruumuotona on teemahaastattelu ja aineiston analyysimenetelmänä teorialähtöinen sisällönanalyysi. Tulosten perusteella ydinkompetenssiesitysten painopi…
Basic Elements of Cyber Security for a Smart Terminal Process
2023
Global maritime transportation and logistics systems are essential parts of critical infrastructures in every society, and a crucial part of maritime logistics processes are seaports. Digitalization helps improve the efficiency of terminal systems in the processes of these ports. In Finland this development is going on and it is called SMARTER research program. In the best cases, digitalization can also promote the reduction of emissions by optimizing port operations and enhancing cargo and people flows while improving the experience for all stakeholders. The improvement of port processes relies on the development of Information and Communication Technology (ICT) and as well as on Industria…
Development of Network Security Education
2021
Distance education has grown tremendously over the last decade. Internet technologies have enabled a large-scale dispensation of lectures, exercises, and training. Virtual Learning Management Systems (LMSs) offer a number of tools to realize distance education and distance learning. In this work, we present a virtual system architecture for training cyber security professionals with hands-on skills. The architecture is based on a VirtualBox virtualization environment. Guest machines are installed on an instance of VirtualBox. The installed environment offers a safe and isolated workbench for experiments. After installation and configuration of the environment, students perform a number of i…
Towards Practical Cybersecurity Mapping of STRIDE and CWE — a Multi-perspective Approach
2021
Software vulnerabilities are identified during their whole life-cycle; some vulnerabilities may be caused by flaws on the design while other appear due to advances on the technologies around the systems. Frameworks such as OWASP are well- known and are used for testing a systems security before or after implementation, and such testing is carried out against the existing system. Threat modeling however focuses on the early stages of the system design when it is feasible and easy to fix security-related flaws and prevent possible damage caused by them. For example, STRIDE is one very popular threat modeling framework. A STRIDE threat modelling specialist deals with abstract categorizations o…
Knowledge discovery using diffusion maps
2013
Smart Terminal System of Systems’ Cyber Threat Impact Evaluation
2023
Systems of system-level thinking is required when the purpose is to develop a coherent understanding of the ecosystem where every user and system requirements are divided into specific parts. The smarter project, as a part of the Sea4value program of DIMECC, aims to develop harbor operations, including passenger and cargo transportation, in a way that port processes will improve, emissions will decrease, and overall security will enhance in smart ports. This paper describes cyber-attack impacts against the Smart terminal system of systems in the cyber realm by utilizing the MITRE ATTACK® framework to map the objectives of threat actors. The Smart Terminal system environment includes ICT, IC…
Tiedonlouhinta kyberterrorismin torjuntakeinona
2017
Terrorismi on teknologian kehittyessä siirtynyt kyberavaruuteen ja muuntau-tunut kyberterrorismiksi. Terrorismin uhka ei enää ole vain fyysinen, sillä ky-beravaruus mahdollistaa tietoverkkojen monipuolisen käytön terroristisiin tarpeisiin. Kyberterrorismin uhka on synnyttänyt tarpeen luoda uudenlaisia torjuntakeinoja. Yksi kyberterrorismin torjuntaan käytetyistä menetelmistä on tiedonlouhinta, jonka avulla pystytään tehokkaasti löytämään ennestään tun-tematonta tietoa suurista datamäärästä. Tässä tutkielmassa tutkitaan kyberter-rorismia ilmiönä sekä tiedonlouhinnan menetelmiä ja sovelluksia kyberterro-rismin torjuntaan. Tutkielma on kirjallisuuskatsaus, joka pohjautuu alan tie-teelliseen tu…