Search results for "kyber"

showing 10 items of 188 documents

Citizens’ Cybersecurity Behavior: Some Major Challenges

2022

Citizens’ cybersecurity behaviors are an important concern in the modern age. This work discusses the challenges of studying citizen cybersecurity behaviors and the directions for future research. peerReviewed

InternetturvallisuusComputer Networks and CommunicationsComputer scienceuhatorganisaatiottietoturvapolitiikkahakkerointikansalaisetvaikuttaminenetätyöEngineering ethicstietoturvaElectrical and Electronic EngineeringkyberturvallisuusverkkohyökkäyksetLawIEEE Security & Privacy
researchProduct

HALE-IoT: HArdening LEgacy Internet-of-Things devices by retrofitting defensive firmware modifications and implants

2022

Internet-Of-Things (IoT) devices and their firmware are notorious for their lifelong vulnerabilities. As device infection increases, vendors also fail to release patches at a competitive pace. Despite security in IoT being an active area of research, prior work has mainly focused on vulnerability detection and exploitation, threat modelling, and protocol security. However, these methods are ineffective in preventing attacks against legacy and End-Of-Life devices that are already vulnerable. Current research mainly focuses on implementing and demonstrating the potential of malicious modifications. Hardening emerges as an effective solution to provide IoT devices with an additional layer of d…

IoTfirmware modificationcybersecurityend-of-lifesuojausSSL-proxyHTTPSlegacyfirmwaredefensive techniquesWAFretrofit securityesineiden internettietoturvakyberturvallisuusEOLverkkohyökkäyksetdeviceshaavoittuvuus
researchProduct

Esineiden Internet – nykyajan ja tulevaisuuden ongelmia sekä ratkaisuja kyberturvallisuuden näkökulmasta

2017

Kyberturvallisuus on hyvin tärkeä osa nykyaikaista yhteiskuntaa, sillä suuri osa toiminnastamme, esimerkiksi monissa palveluissa asiointi, tapahtuu Internetin tai muun verkoston kautta. Esineiden Internet on seuraava askel digitaaliselle yhteiskunnalle, jossa perinteisten tietokoneiden lisäksi myös muutkin arkipäiväiset laitteet yhdistetään verkkoon. Esineiden Internet kuitenkin eroa perinteisestä Internetistä monessa mielessä, ja näin ollen sen myöskin sen turvallisuuden toteuttamisessa eivät kaikki perinteiset ratkaisut toimi samalla tavalla. Tämän tutkielman tarkoituksena on käydä läpi Esineiden Internetin kyberturvallisuuden, ja jossain määrin fyysinen turvallisuuden, tilannetta tällä h…

IoThyökkäysmallejaavainteknologiatkerrosarkkitehtuurikyberturvallisuusEsineiden Internet
researchProduct

Security Controls for Smart Buildings with Shared Space

2022

In this paper we consider cyber security requirements of the smart buildings. We identify cyber risks, threats, attack scenarios, security objectives and related security controls. The work was done as a part of a smart building design and construction work. From the controls identified w e concluded security practices for engineering-in smart buildings security. The paper provides an idea toward which system security engineers can strive in the basic design and implementation of the most critical components of the smart buildings. The intent of the concept is to help practitioners to avoid ad hoc approaches in the development of security mechanisms for smart buildings with shared space. pe…

IoTturvallisuussuunnitteluälytalotrakennusautomaatiosmart buildingesineiden internetsecurity riskskyberturvallisuushaavoittuvuussecurity controls2022 6th International Conference on Smart Grid and Smart Cities (ICSGSC)
researchProduct

Design and Development of a Multi-Mode, Two-Wheeled, Self-Balancing Service Platform

2019

Master's thesis Mechatronics MAS500 - University of Agder 2019 This thesis covers the design and development of a multi-mode, two-wheeled, self-balancing serviceplatform. The purpose of such a platform is to assist people with transportation tasks in crowdedspaces like airports by consuming as little space as possible and minimizing its overall footprint.This is solved by constructing a robot that can transition between bicycle and differential driveconfigurations and keep its balance in both configurations as well as in the transition processbetween them. A two-wheeled, self-balancing robot is an inherently unstable system that can bebased on the theory of an inverted pendulum. The unstabl…

MATLABVDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 550::Teknisk kybernetikk: 553SOLIDWORKSKinematicsState-spaceSimulinkMachine designLabVIEWMAS500Full State-feedbackControl designSimulationStabilization
researchProduct

On the aestheticization of technologized bodies : a portrait of a cyborg(ed) form of agency

2017

Discussions revolving around cyborgs seldom include aesthetics, let alone propose aesthetics as an inextricable part of the phenomenon of the cyborg. Rather, the term “cyborg”, a contraction of “cybernetic organism”, evokes a figure of the (hu)man- machine. In the field of social and political sciences, the cyborg is designated a human-machine hybrid, a metaphor of humans becoming machinelike, or a portrait of (political) agency in an era of high technology. These approaches promote a figure of technologized bodies, that is, the cyborg as a figure of technologically dominated and altered bodies. I will sustain that the cyborg contributes to our understanding of agency in the age of high tec…

Merleau-Ponty Mauricekyberavaruusjälkiteollinen yhteiskuntakyborgitteknologinen kehitysesteettisyystoimijuusruumiillisuushuipputekniikkaristiriidatestetiikkatäydennetty todellisuusfilosofiaFoucault Micheltechnologyagencyaestheticsubiikkiyhteiskuntaihminen-konejärjestelmätteknologiaihminenkauneusihmiskuvacyborg
researchProduct

Effects of cyber domain in crisis management

2019

There is fundamental need in EU-level to develop common alarm procedures and emergency response models with preventive functions which work well from local to national level and from national to international level. European Public Protection and Disaster Relief (PPDR) services such as law enforcement, firefighting, emergency medical and disaster recovery services have recognized that lack of interoperability of technical systems limits cooperation between the PPDR authorities. Also, the military (MIL) and critical infrastructure protection (CIP) faces similar challenges. Recent major accidents have indicated that lack of human resources affects to disaster recovery. PPDR-actors cannot star…

PPDRpelastustoimiemergency responsecritical infrastructure protectionpelastustoimintainfrastruktuurittoimintamallitkyberturvallisuushätätilanteetcontinuity managementcyber-physical threats
researchProduct

Effects of PSD2 on security architecture of mobile banking : a review of literature

2017

This thesis aims to find out the changes that the Payment Service Directive (PSD2) will bring to the security architecture of mobile banking. PSD2 will create a situation where security mechanisms are separated from the actual banking application. Payment service providers must provide their Application Programming Interface for third party developers to give them access to authentication of payment transactions. PSD2 requires payments service providers to offer strong customer authentication with separate authentication mechanism from the banking application. This thesis found that academic literature about the security architecture of mobile banking does not provide a model where a separa…

Payment Service DirectivejärjestelmäarkkitehtuuriMobile bankingtietoturva-arkkitehtuuriverkkomaksaminenSecurity architecturePSD2mobiilipankitKirjallisuuskatsaussalausvarmenteetdirektiivitmobiilisovelluksetsovelluskehyksettietoturvakyberturvallisuusmaksupalvelutmaksupalveludirektiivi
researchProduct

Cyber Situational Awareness in Critical Infrastructure Organizations

2021

The capability related to cybersecurity plays an ever-growing role on overall national security and securing the functions vital to society. The national cyber capability is mainly composed by resilience of companies running critical infrastructures and their cyber situational awareness (CSA). According to a common view, components of critical infrastructures become more complex and interdependent on each other and, as a consequence, ramifications of incidents multiply. In practice, the actions relate to developing better CSA and understanding of a critical infrastructure organization. The aim is to prepare for incidents and their management in a whole-of-society approach. The arrangement i…

Process managementNational securitySituation awarenessOperating modelcybersecurityProcess (engineering)business.industryturvallisuusympäristömedia_common.quotation_subjectInformation sharingtilannekuvaCritical infrastructureInterdependencesituational awarenesscritical infrastructureinformation sharingvital societal functionsBusinessinfrastruktuuritkansallinen turvallisuusResilience (network)kyberturvallisuusmedia_common
researchProduct

Kyberturvallisuus esineiden internetissä yksilön näkökulmasta

2016

Tämä tutkielma käsittelee esineiden internetiä, kyberturvallisuutta, sekä miten nämä kaksi toimivat yhdessä. Tutkimuskysymyksinä ovat millaisia kybertur-vallisuusriskejä yksilö voi kohdata esineiden internetin palveluissa, sekä miten näiltä riskeiltä voitaisiin suojautua. Esineiden internet on verkko, joka yhdistää miljoonia laitteita yhteen ja antaa niille mahdollisuuden kommunikoida kes-kenään. Sen tarkoitus on tehdä langattomista ja automatisoiduista toiminnoista arkipäivää ja laajamittaista, ulottuen kodin laitteista terveydenhuoltoon ja jopa elintarvikkeisiin. Ennen kuin esineiden internetin palvelut ja laitteet voivat saavuttaa laajamittaisen ja kokonaisvaltaisen tilan, on ratkaistava…

RFIDEsineiden internetturvallisuustiedon luottamuksellisuusyksityisyyskyberturvallisuus
researchProduct