Cybersecurity technology

Phishing Attacks IoT Ransomware Increased Data Privacy Regulation Cyber Attacks on Mobile Devices Increased investment in automation.

Cybersecurity is the practice of protecting systems, networks, and programs from digital attacks. These cyberattacks are usually aimed at accessing, changing, or destroying sensitive information; extorting money from users; or interrupting normal business processes.

Cybersecurity is the protection of internet-connected systems, including hardware, software and data, from cyberattacks. In a computing context, security comprises cybersecurity and physical security — both are used by enterprises to protect against unauthorized access to data

Managing cybersecurity resources: a cost-benefit analysis
free download

A fundamental argument throughout the book is that the proper use of economic concepts will allow organizations (in both the private and public sectors) to achieve a higher The phenomenal growth in computing power over much of the past five decades has been motivated by scientific applications requiring massive amounts of computation. But lately a major focus for parallel and high- performance computers has been on data-centric applications in which

Cybersecurity in health care
free download

Most of us are aware of cyberthreats if not because of personal experience, then thanks to a barrage of news stories. Weve read that many of our banks, credit-card companies, and favorite retailers have been hacked and that tens of millions of consumers had their personal

National initiative for cybersecurity education (NICE) cybersecurity workforce framework
free download

This publication describes the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (NICE Framework), a reference structure that describes the interdisciplinary nature of the cybersecurity work. It serves as a fundamental reference

Inside risks controlling for cybersecurity risks of medical device software
free download

22 COMMUNICATIONS OF THE ACM| OCTOBER 2013| VOL. 56| NO. 10 viewpoints in January 2010. Malware had infected the computer systems. The consequence Patients do not receive the safe and effective care they deserve when malware causes unavailability of

Americans and cybersecurity
free download

Pew Research Center is a nonpartisan fact tank that informs the public about the issues, attitudes and trends shaping America and the world. It does not take policy positions. The Center conducts public opinion polling, demographic research, content analysis and other

Challenge based learning in cybersecurity education
free download

This paper describes the application of the Challenge Based Learning (CBL) methodology to cybersecurity education. The overall goal is to improve student learning via a multidisciplinary approach which encourages students to collaborate with their peers, ask

Conducting Cybersecurity Research Legally and Ethically.
free download

The primary legal obstacles to conducting cybersecurity are not outright prohibitions but rather the difficulty of determining which of a large set of complex statutes might regulate a given research project. Privacy, computer abuse, tort, and contract law are all potentially

Framework for Improving Critical Infrastructure Cybersecurity
free download

In addition, NIST previously released Version 1.0 of the Cybersecurity Framework with a 15 companion document, NIST Roadmap for Improving Critical Infrastructure Cybersecurity. This 16 Roadmap highlighted key areas of improvement for further development A transformative event known as Industry 4.0 is occurring where countless elements comprising industrial systems are being interfaced with internet communication technologies to form the smart factories and manufacturing organizations of the future. Industry 4.0 and its Cyber security is a critical component of health information technology. As electronic health records (EHRs) become more widely adopted and as new payment models for health care require more data sharing and clinical care coordination with multiple external providers, it

A testbed for SCADA control system cybersecurity research and pedagogy.
free download

This paper describes the Mississippi State University Supervisory Control and Data Acquisition (SCADA) security laboratory and Power and Energy Research laboratory. This laboratory combines process control systems from multiple critical infrastructure industries to

Cybersecurity issues and challenges: In brief
free download

The information and communications technology (ICT) industry has evolved greatly over the last half century. The technology is ubiquitous and increasingly integral to almost every facet of modern society. ICT devices and components are generally interdependent, and

The role of user computer self-efficacy, cybersecurity countermeasures awareness, and cybersecurity skills influence on computer misuse
free download

Cybersecurity threats and vulnerabilities are causing substantial financial losses for governments and organizations all over the world. Intentional and unintentional users misuse of information systems (IS) resources represents 50% to 75% of cybersecurity

A global treaty on cybersecurity and cybercrime
free download

In response to its mandate as sole Facilitator of WSIS Action Line C5, the ITU Secretary- General, Dr. Hamadoun I. Tour , launched the Global Cybersecurity Agenda (GCA) on 17 May 2007 as a framework for international cooperation to promote cybersecurity and

Cyberinsurance as a market-based solution to the problem of cybersecurity : a case study
free download

We conduct a case study of the cyberinsurance industry. We examine the developing cyberliability legislation and the emerging cyberinsurance market. We conclude that cyberinsurers are able to find ways to deal with several problems that could result in the failure of market solution. Although

Cybersecurity testing of substation phasor measurement units and phasor data concentrators
free download

Future bulk electric transmission systems will include substation automation, synchrophasor measurement systems, and automated control algorithms which leverage wide area monitoring system to better control the grid. Prior to installation of new networked devices

Designing user incentives for cybersecurity
free download

Main Text: The traditional patching approach to managing software vulnerabilities and cybersecurity risk has been less effective than desired. In theory, once a vulnerability is discovered, software patches should be quickly developed and released by producers and

Cybersecurity and cyber-resilient supply chains
free download

Over forty years ago in his book Future Shock, Alvin Toffler (1971) recognized that our rapid technological advances were accompanied by side effects and hazards. This is certainly true of supply chains in the 21st century, where information technology is often an integral

Smart meter data: Privacy and cybersecurity
free download

Fueled by stimulus funding in the American Recovery and Reinvestment Act of 2009 (ARRA), electric utilities have accelerated their deployment of smart meters to millions of homes across the United States with help from the Department of Energys Smart Grid Cybersecurity might not seem like emerging technology, given that it has been around for a while, but it is evolving just as other technologies are. That’s in part because threats are constantly new. The malevolent hackers who are trying to illegally access data are not going to give up any time soon, and they will continue to find ways to get through even the toughest security measures. It’s also in part because new technology is being adapted to enhance security. As long as we have hackers, we will have cyber security as an emerging technology because it will constantly evolve to defend against those hackers.

COMMENT computer-science, top-2019


computer-science, top-2019

Cybersecurity technology IEEE PAPER