Phishing Attacks IoT Ransomware Increased Data Privacy Regulation Cyber Attacks on Mobile Devices Increased investment in automation.
Cybersecurity is the practice of protecting systems, networks, and programs from digital attacks. These cyberattacks are usually aimed at accessing, changing, or destroying sensitive information; extorting money from users; or interrupting normal business processes.
Cybersecurity is the protection of internet-connected systems, including hardware, software and data, from cyberattacks. In a computing context, security comprises cybersecurity and physical security — both are used by enterprises to protect against unauthorized access to data
Managing cybersecurity resources: a cost-benefit analysis
A fundamental argument throughout the book is that the proper use of economic concepts will allow organizations (in both the private and public sectors) to achieve a higherThe phenomenal growth in computing power over much of the past five decades has been motivated by scientific applications requiring massive amounts of computation. But lately a major focus for parallel and high- performance computers has been on data-centric applications in which
Cybersecurity in health care
Most of us are aware of cyberthreats if not because of personal experience, then thanks to a barrage of news stories. Weve read that many of our banks, credit-card companies, and favorite retailers have been hacked and that tens of millions of consumers had their personal
National initiative for cybersecurity education (NICE) cybersecurity workforce framework
This publication describes the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (NICE Framework), a reference structure that describes the interdisciplinary nature of the cybersecurity work. It serves as a fundamental reference
Inside risks controlling for cybersecurity risks of medical device software
22 COMMUNICATIONS OF THE ACM| OCTOBER 2013| VOL. 56| NO. 10 viewpoints in January 2010. Malware had infected the computer systems. The consequence Patients do not receive the safe and effective care they deserve when malware causes unavailability of
Americans and cybersecurity
Pew Research Center is a nonpartisan fact tank that informs the public about the issues, attitudes and trends shaping America and the world. It does not take policy positions. The Center conducts public opinion polling, demographic research, content analysis and other
Challenge based learning in cybersecurity education
This paper describes the application of the Challenge Based Learning (CBL) methodology to cybersecurity education. The overall goal is to improve student learning via a multidisciplinary approach which encourages students to collaborate with their peers, ask
Conducting Cybersecurity Research Legally and Ethically.
The primary legal obstacles to conducting cybersecurity are not outright prohibitions but rather the difficulty of determining which of a large set of complex statutes might regulate a given research project. Privacy, computer abuse, tort, and contract law are all potentially
Framework for Improving Critical Infrastructure Cybersecurity
In addition, NIST previously released Version 1.0 of the Cybersecurity Framework with a 15 companion document, NIST Roadmap for Improving Critical Infrastructure Cybersecurity. This 16 Roadmap highlighted key areas of improvement for further development A transformative event known as Industry 4.0 is occurring where countless elements comprising industrial systems are being interfaced with internet communication technologies to form the smart factories and manufacturing organizations of the future. Industry 4.0 and its Cyber security is a critical component of health information technology. As electronic health records (EHRs) become more widely adopted and as new payment models for health care require more data sharing and clinical care coordination with multiple external providers, it
A testbed for SCADA control system cybersecurity research and pedagogy.
This paper describes the Mississippi State University Supervisory Control and Data Acquisition (SCADA) security laboratory and Power and Energy Research laboratory. This laboratory combines process control systems from multiple critical infrastructure industries to
Cybersecurity issues and challenges: In brief
The information and communications technology (ICT) industry has evolved greatly over the last half century. The technology is ubiquitous and increasingly integral to almost every facet of modern society. ICT devices and components are generally interdependent, and
The role of user computer self-efficacy, cybersecurity countermeasures awareness, and cybersecurity skills influence on computer misuse
Cybersecurity threats and vulnerabilities are causing substantial financial losses for governments and organizations all over the world. Intentional and unintentional users misuse of information systems (IS) resources represents 50% to 75% of cybersecurity
A global treaty on cybersecurity and cybercrime
In response to its mandate as sole Facilitator of WSIS Action Line C5, the ITU Secretary- General, Dr. Hamadoun I. Tour , launched the Global Cybersecurity Agenda (GCA) on 17 May 2007 as a framework for international cooperation to promote cybersecurity and
Cyberinsurance as a market-based solution to the problem of cybersecurity : a case study
We conduct a case study of the cyberinsurance industry. We examine the developing cyberliability legislation and the emerging cyberinsurance market. We conclude that cyberinsurers are able to find ways to deal with several problems that could result in the failure of market solution. Although
Cybersecurity testing of substation phasor measurement units and phasor data concentrators
Future bulk electric transmission systems will include substation automation, synchrophasor measurement systems, and automated control algorithms which leverage wide area monitoring system to better control the grid. Prior to installation of new networked devices
Designing user incentives for cybersecurity
Main Text: The traditional patching approach to managing software vulnerabilities and cybersecurity risk has been less effective than desired. In theory, once a vulnerability is discovered, software patches should be quickly developed and released by producers and
Cybersecurity and cyber-resilient supply chains
Over forty years ago in his book Future Shock, Alvin Toffler (1971) recognized that our rapid technological advances were accompanied by side effects and hazards. This is certainly true of supply chains in the 21st century, where information technology is often an integral
Smart meter data: Privacy and cybersecurity
Fueled by stimulus funding in the American Recovery and Reinvestment Act of 2009 (ARRA), electric utilities have accelerated their deployment of smart meters to millions of homes across the United States with help from the Department of Energys Smart Grid Cybersecurity might not seem like emerging technology, given that it has been around for a while, but it is evolving just as other technologies are. That’s in part because threats are constantly new. The malevolent hackers who are trying to illegally access data are not going to give up any time soon, and they will continue to find ways to get through even the toughest security measures. It’s also in part because new technology is being adapted to enhance security. As long as we have hackers, we will have cyber security as an emerging technology because it will constantly evolve to defend against those hackers.
FREE IEEE PAPER