cyber security technology


Cybersecurity is the practice of protecting systems, networks, and programs from digital attacks. These cyberattacks are usually aimed at accessing, changing, or destroying sensitive information; extorting money from users; or interrupting normal business processes.
Cyber security refers to the body of technologies, processes, and practices designed to protect networks, devices, programs, and data from attack, damage, or unauthorized access. Cyber security may also be referred to as information technology security

The myths and facts behind cyber security risks for industrial control systems
free download

Process control and SCADA systems, with their reliance on proprietary networks and hardware, have long been considered immune to the network attacks that have wreaked so much havoc on corporate information systems. Unfortunately, new research indicates this

Malicious control system cyber security attack case study Maroochy Water Services, Australia
free download

Promote the development of key security standards and guidelines to support the implementation of and compliance with the Federal Information Security Management Act (FISMA) Build a solid foundation of information security across one of the largest

Literature review on smart grid cyber security
free download

The current US electrical power grid is an out-of-date infrastructure, and the Smart Grid is an upgrade that will add many new functionalities to meet customers new power requirements. Updating a system as complex as the electrical power grid has the potential of introducing

Nineteen national cyber security strategies
free download

A set of nations have published their national cyber security strategy (NCSS). Despite the fact that each of these NCSS intends to address the same set of cyber security threats, large differences exist between the national focal points and approaches. This paper analyses

A taxonomy of operational cyber security risks
free download

This report presents a taxonomy of operational cyber security risks that attempts to identify and organize the sources of operational cyber security risk into four classes:(1) actions of people,(2) systems and technology failures,(3) failed internal processes, and (4) external

Developing an Ontology of the Cyber Security Domain.
free download

This paper reports on a trade study we performed to support the development of a Cyber ontology from an initial malware ontology. The goals of the Cyber ontology effort are first described, followed by a discussion of the ontology development methodology used. The

Course of Action Generation for Cyber Security Using Classical Planning.
free download

We report on the results of applying classical planning techniques to the problem of analyzing computer network vulnerabilities. Specifically, we are concerned with the generation of Adversary Courses of Action, which are extended sequences of exploits

Cyber -physical systems security for smart grid
free download

One thing that virtually all of the information hierarchy components must deal with is cyber and physical security . This webinar (and the associated white paper) focuses on identifying a comprehensive set of cyber security challenges and the need for security at multiple levels Insider threats are easy to counter. One only needs a concise model of human behaviour and its dependencies on outer and inner influences, a surveillance system in place that is able to observe in necessary detail action and influences, and an evaluation system, that

Smart grid cyber security strategy and requirements
free download

The Information Technology Laboratory (ITL) at the National Institute of Standards and Technology (NIST) promotes the US economy and public welfare by providing technical leadership for the Nations measurement and standards infrastructure. ITL develops tests

Private sector cyber security investment strategies: An empirical analysis
free download

Organizations typically use very robust analysis techniques to determine how best to spend resources in order to increase revenue and decrease costs or losses. However, few organizations attempt such analysis processes to determine the level and type of cyber

Guide for designing cyber security exercises
free download

Cyber security exercises are a very effective way of learning the practical aspects of information security . But designing such exercises is not an easy task and requires the work of several people. This paper presents a number of steps and guidelines that should be

Cyber security and global interdependence: what is critical
free download

These linkages and dependencies raise important questions. By now it is a familiar refrain that security of the cyber layer is of great importance. But with dense interconnections it can be extremely difficult to identify the vulnerabilities and therefore the connections, nodes or

Distributed intrusion detection and attack containment for organizational cyber security
free download

The sheer number and sophistication of cyber attacks are making our nations critical computer networks increasingly vulnerable. At the same time, these networks are being called upon to play a key role in processing, data storage, monitoring and control of critical

Cyber security analytics: a stochastic model for security quantification using absorbing markov chains
free download

Abstract Most of the current research in security analysis has been centered on identifying threats and vulnerabilities and providing suitable defense mechanisms to improve the robustness of the network and systems. While this approach is attractive, it

Cyber security and international agreements
free download

NOTE: This paper has benefited from valuable comments made by members of the NRC Committee on Deterring Cyberattacks, for which the authors are grateful. We also thank Seymour Goodman for his support, as well as Leisel Bogan, Courtney Matteson and

Cyber Security Practical considerations for implementing IEC 62351
free download

Two trends are currently changing substation automation systems: IEC 61850 and the need for increased cyber security . IEC 61850 has gained global acceptance by both vendors as well as customers. Cyber security on the other hand has quickly become one of the most

Preliminary considerations: on national cyber security
free download

What, exactly, is national cyber security There is little question that the advent of the internet is having a decisive influence on how national security is being defined. Nations are increasingly facing the twin tensions of how to expedite the economic benefits of ICT1 and

Developing a virtualization platform for courses in networking, systems administration and cyber security education
free download

Abstract Students studying topics in cyber security benefit from working with realistic training labs that test their knowledge of network security . Cost, space, time, and reproducibility are major factors that prevent instructors from building realistic networks for their students. This paper explores


COMMENT computer-science, security



FREE IEEE PAPER