Search results for "kyber"

showing 10 items of 188 documents

Kuka kirjoittaa pilvi-imperiumien pelisäännöt?

2023

pilvipalvelutkansainväliset yrityksetalustatalousverkkoliiketoimintakirja-arvostelutkyberavaruusoikeudellinen sääntelydatataloussuuryrityksetvalta
researchProduct

Information Security Risk Assessments following Cybersecurity Breaches : The Mediating Role of Top Management Attention to Cybersecurity

2023

Information Systems (IS) research on managerial response to cybersecurity breaches has largely focused on externally oriented actions such as customer redressal and crisis response. Within the firm itself, a breach may be a symptom of systematic problems, and a narrow, siloed focus on only fixing immediate issues through technical fixes and controls might preclude other managerial actions to ensure future cybersecurity. Towards this end, Information Security Risk Assessments (ISRA) can help surface other vulnerabilities following a breach. While the role of governance in such exercises is emphasized in standards, it is undertheorized in IS research and lacks empirical evidence. We draw on t…

post-breach managementtop management teamGeneral Computer Sciencecybersecurity governancerisk assessmentriskinarviointitietotekniikkayrityksetcybersecurity breachattention-based viewtietoturvakyberturvallisuustietomurtojohtoryhmätLawriskittietojärjestelmätComputers & Security
researchProduct

Lääkintälaitteiden kyberturvallisuuden standardit ja testaaminen

2017

Tietotekniikkaa sisältävät lääkintälaitteet pitävät meidät hengissä, jos kehomme pettää. Esimerkiksi ostoskeskuksissa olevat älykkäät defibrillaattorit antavat maallikoillekin mahdollisuuden antaa tehokasta ensiapua sydänkohtaukseen. Tietotekniikan käyttäminen lääkintälaitteissa tuo mahdollisuuksien lisäksi uhkia. Tässä tutkielmassa perehdytään siihen, miten standardit ja testaaminen edistävät kyberturvallisuutta, uhkien torjumista. Ensin tehdään katsaus kirjallisuuteen ja standardeihin ja sitten kytketään tieto käytäntöön testaamalla potilasmonitoria kirjallisuuden pohjalta. Tulos oli, että tutkittava potilasmonitori oli hyvin avoin fyysisen käyttöliittymän kautta. Esimerkiksi potilastiedo…

potilasturvallisuusembedded computingInternet of thingssulautettu tietotekniikkacyber securitycyber security standardsesineiden internetstandarditcyber security testingkyberturvallisuustestausmedical deviceslääkintälaitteet
researchProduct

UInDeSI4.0 : An efficient Unsupervised Intrusion Detection System for network traffic flow in Industry 4.0 ecosystem

2023

In an Industry 4.0 ecosystem, all the essential components are digitally interconnected, and automation is integrated for higher productivity. However, it invites the risk of increasing cyber-attacks amid the current cyber explosion. The identification and monitoring of these malicious cyber-attacks and intrusions need efficient threat intelligence techniques or intrusion detection systems (IDSs). Reducing the false positive rate in detecting cyber threats is an important step for a safer and reliable environment in any industrial ecosystem. Available approaches for intrusion detection often suffer from high computational costs due to large number of feature instances. Therefore, this paper…

principal component analysisintrusion detectionisolation forestälytekniikkaICAvalvontajärjestelmätindustry 4.0kyberturvallisuustuotantotekniikkaverkkohyökkäyksetrandom forest
researchProduct

Heräte : validoitu riskien arvioinnin prosessimalli organisaation menestyksen tukemiseksi

2016

Riskien arviointi on osa organisaation kilpailukykyä, jolloin ketterät sekä dynaamiset toimintatavat ovat ratkaisevassa asemassa. Epävarmuus ja toimintaympäristön nopeat muutokset tuovat mukanaan myös mahdollisuuksia. Laadukas riskien arviointi on keino erottua kilpailijoista, varmistaa osaltaan organisaation luotettavuus ja trendien tunnistamisen kautta löytää uusia mahdollisuuksia tulevaisuuden innovaatioille. Yhä monimutkaistuva maailma luo organisaatiolle tarpeen tehdä tehokkaita toimenpiteitä entistä nopeammin. Organisaatioiden tulee pystyä reagoimaan nopeasti muuttuvan toimintaympäristön asettamiin haasteisiin. Tutkimuksen tavoitteena oli muodostaa tieteellisen tutkimuksen, riskien ar…

prosessitriskienhallintastandarditprosessiriskinarviointikyberturvallisuustilannekuvariskien arviointi
researchProduct

Intrusion detection applications using knowledge discovery and data mining

2014

pääsynvalvontaintrusion detectionknowledge discoverydata miningvalvontajärjestelmätanomaly detectionbig dataalgoritmitklusterianalyysitietoturvatiedonlouhintakyberturvallisuusverkkohyökkäyksetdimensionality reductionclustering
researchProduct

AI-based quantum-safe cybersecurity automation and orchestration for edge intelligence in future networks

2023

The AIQUSEC (AI-based quantum secure cyber security automation and orchestration in the edge intelligence of future networks) brings measurable advances to the cyber security of access and edge networks and their services, as well as Operational Service Technologies (OT). The research aims for significant cybersecurity scalability, efficiency, and effectiveness of operations through improved and enhanced device and sensor securities, security assurance, quantum security, and Artificial Intelligence (AI) based automation solutions. The new application scenarios of near future, the multiple stakeholders within each scenario, and the higher data volumes raise the need for novel cybersecurity s…

quantum encryptioncyber threatedge-intelligence systemscyber-attacksAI-based analysingtekoälykyberturvallisuusverkkohyökkäykset
researchProduct

Cybersecurity Attacks on Software Logic and Error Handling Within AIS Implementations: A Systematic Testing of Resilience

2022

To increase situational awareness of maritime vessels and other entities and to enable their exchange of various information, the International Maritime Organization mandated the use of the Automatic Identification System (AIS) in 2004. The AIS is a self-reporting system that uses the VHF radio link. However, any radio-based self-reporting system is prone to forgery, especially in situations where authentication of the message is not designed into the architecture. As AIS was designed in the 1990s when cyberattacks were in their infancy, it does not implement authentication or encryption; thus, it can be seen as fundamentally vulnerable against modern-day cyberattacks. This paper demonstrat…

resilienssishipcybersecurityGeneral Computer ScienceAISGeneral EngineeringresiliencyGeneralLiterature_MISCELLANEOUSattacksmaritimelaivatmerenkulkuidentifiointiGeneral Materials ScienceDoSkyberturvallisuusverkkohyökkäyksetIEEE Access
researchProduct

Desired cybersecurity skills and skills acquisition methods in the organizations

2022

Abstract:Key personnel and their competences play important roles in continuity management and improving resilience of cybersecurity in organizations. Researchers have addressed many topics and studies in the cybersecurity domain. However, relevant cybersecurity skills and acquisition of them in expertise development, have only been partially touched. If designed systematically and properly, cybersecurity training can improve cybersecurity expertise to ensure better performance in complex cybersecurity situations. More through study on the acquisition of cybersecurity skills, and work-life needs are needed. The research three questions of this study are: How do work-life representatives see…

resilienssitrainingComputingMilieux_THECOMPUTINGPROFESSIONcybersecurityCyber Ranges (CRs)taidotcybersecurity skillsorganisaatiotComputingMilieux_LEGALASPECTSOFCOMPUTINGinformation technologyosaaminentyöntekijätskills acquisitionharjoittelukyberturvallisuusresilience
researchProduct

Strategic Cyber Environment Management with Zero Trust and Cyber Counterintelligence

2022

Organisations need to improve their information security practices, given the volume of successful cyberattacks and crimes. To enhance security in an organisation, information security must be considered a business issue, instead of a technical problem. Hence, organisations must change the security protocol from reactive action to proactive operation; must develop information security strategies that support the business; should implement better controls, systems, and services; and must create a process to proactively gather information about the possible threats and adversaries. This study proposes a novel method for combining a zero-trust strategy with cyber counterintelligence to gain th…

rikollisuuskybersodankäyntiturvallisuustietoturvapolitiikkariskienhallintatietoturvavastavakoilukyberturvallisuusennakointizero trust cyber counterintelligenceinformation security strategy
researchProduct