cyber security IEEE PAPERS AND PROJECTS-2020




the protection of computer systems and networks from the theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide.



Social Cybersecurity
free download

Social cybersecurity is an emerging subdomain of national security that will affect all levels of future warfare, both conventional and unconventional, with strategic consequences. Social cybersecurity is an emerging scientific area focused on the science to characterizeThe recent rise in cybersecurity breaches in healthcare organizations has put patients privacy at a higher risk of being exposed. Despite this threat and the additional danger posed by such incidents to patients safety, as well as operational and financial threats toPolicy-makers involved in cybersecurity governance should pay close attention to the generative metaphors they use to describe and understand new technologies. Generative metaphors structure our understanding of policy problems by imposing mental models ofWireless sensor networks are deployed without predefined infrastructure and are generally left unattended. Indeed, the vulnerability of the wireless sensor networks to attacks comes principally from their inherent characteristics. As the data are transmitted over the air, it is

Cybersecurity and cardiac implantable electronic devices
free download

Conclusions Together, these cases illustrate the increasing concerns in the public domain about the cybersecurity of CIEDs. What was previously mostly of academic interest relevant to CIED companies and programmers has gained widespread public attention. As a result

IT Risk and Resilience Cybersecurity Response to COVID-19
free download

THE RAPID AND worldwide spread of the coronavirus and its illness known as COVID-19 has made huge impact on almost everything has taken us all by surprise. We all are now experiencing a major unprecedented and unexpected global public health crisis. This

Pressurizer Model and PLCs for Investigation of Cybersecurity of PWR Plants
free download

Nuclear power plants, like other critical infrastructure, need to be protected against potential cyber-attacks. The use of digital Instrumentation and Control (IC) systems in nuclear power plants raises concerns about cybersecurity vulnerabilities. A nuclear power plant employs a

IoT Device Cybersecurity Capability Core Baseline
free download

Device cybersecurity capabilities are cybersecurity features or functions that computing devices provide through their own technical means (ie, device hardware and software). This publication defines an Internet of Things (IoT) device cybersecurity capability core baseline

Core Values and Value Conflicts in Cybersecurity : Beyond Privacy Versus Security
free download

This chapter analyses some of the main values, and values conflicts, in relation to cybersecurity by distinguishing four important value clusters that should be considered when deciding on cybersecurity measures. These clusters are security, privacy, fairness and

Cyberspace and Geopolitics: Assessing Global Cybersecurity Norm Processes at a Crossroads
free download

As cyber insecurity has become a growing prob lem worldwide, states and other stakeholders have sought to increase stability for cyberspace. As a result, a new ecosystem of cyber norm pro cesses has emerged in diverse fora and formats. Today, United Nations

An Integrative Review and Analysis of Cybersecurity Research: Current State and Future Directions
free download

Advances in information technology have greatly changed communications and business transactions between firms and their customers and suppliers. As a result, cybersecurity risk attracts ever increasing attention from firms, regulators, customers, shareholders, andAbstract Cyber-attacks can be more dangerous than guns and tanks . This statement was made by Junker in his speech in the EU State of the Union in and reflects the extreme importance of this phenomenon. The increasing variety of devices that can access to Internet Obtaining accurate information about online activities in near-real time is becoming increasingly difficult, particularly because of the constantly increasing data volume, complexity, variety, and veracity, as well as the unscalability of traditional data processing

Overcoming the Challenges of Teaching Cybersecurity in UK Computer Science Degree Programmes
free download

This Innovative Practice Full Paper explores the diversity of challenges relating to the teaching of cybersecurity in UK higher education degree programmes, through the lens of national policy, to the impact on pedagogy and practice. There is a serious demand for

Ethical Frameworks for Cybersecurity
free download

This chapter presents several ethical frameworks that are useful for analysing ethical questions of cybersecurity . It begins with two frameworks that are important in practice: the principlist framework employed in the Menlo Report on cybersecurity research and the rightsThe world is currently ravaged by the novel coronavirus which has so far affected 8 410 persons in 50 countries with a death toll of 808 as at 27 th February 20 and code- named COVID-19 by the World Health Organization (WHO) on 11 th February

Cybersecurity for smart farming: socio-cultural context matters
free download

Food security is a societal issue of increasing importance requiring careful consideration of the way we produce, process, and distribute food , . Digital technologies are increasingly used to optimize processes to support these activities, and therefore, bear

Cybersecurity for the Smart Grid.
free download

The security and well-being of societies and economies are tied to the reliable operation of power systems. Due to the advancements of information and communication technologies (ICT), the traditional electric grid is evolving towards an intelligent smart grid. Smart grid is Use of technology has become a part of our everyday life. New innovative technologies are getting developed and everyone is getting dependent on it. Governments, businesses, and individuals use systems, networks, and the Internet to access, process, and store and share

Evaluating Case Study and Action Research Reports: Real-world Research in Cybersecurity
free download

There is a growing number of scientific papers reporting on case studies and action research published each year. Consequently, evaluating the quality of pilling up research reports is becoming increasingly challenging. Several approaches for evaluation of quality

Cybersecurity as an Industry: A Cyber Threat Intelligence Perspective
free download

The rapid integration of information technology has been met with an alarming rate of cyber- attacks conducted by malicious hackers using sophisticated exploits. Many organizations have aimed to develop timely, relevant, and actionable cyber threat intelligence (CTI) about The purpose of the Advances in Information Security book series is to establish the state of the art and set the course for future research in information security. The scope of this series includes not only all aspects of computer, network security, and cryptography, but related

Cybersecurity in Automotive
free download

The four ACES disruptions autonomous driving, connected cars, electric vehicles, and shared mobility have dominated the agenda of automotive industry leaders in recent years. These innovations, built on the digitization of in-car systems, the extension of car IT systems

Cybersecurity capability maturity models review and application domain
free download

Cybersecurity is a way of protecting organization critical assets, through the identification of cyber threats that can compromise the information stored, it involves the protection, identification, and responding to threats. The main aim of this article is to conduct an ample

Measuring Cybersecurity and Cyber Resiliency
free download

This report presents the results of research sponsored by the Commander of the Air Force Life Cycle Management Center to develop measures of effectiveness for cybersecurity and cyber resiliency in US Air Force missions and weapon systems. These metrics are

Exploring Cybersecurity Threats in Digital Marketing
free download

Cybersecurity is crucial to digital marketing hence dealing with security threats in cyberspace is essential for success in digital marketing which is an online business. The cornerstone of any online business is security. The primary objective of any form of online The identification and assessment of risks are a fundamental part of cybersecurity . Determining the elements that participate in this field is difficult because there is no exclusive approach to cybersecurity . This document aims to provide a framework to identify

Conceptualization of a CyberSecurity Awareness Quiz
free download

Recent approaches to raise security awareness have improved a lot in terms of user- friendliness and user engagement. However, since social engineering attacks on employees are evolving fast, new variants arise very rapidly. To deal with recent changes

Cybersecurity in Health Care
free download

Ethical questions have always been crucial in health care; the rapid dissemination of ICT makes some of those questions even more pressing and also raises new ones. One of these new questions is cybersecurity in relation to ethics in health care. In order to more closely

The Coronavirus Cybersecurity Survival Guide
free download

33. Filters are Your Friends 34. Get Familiar with Jargon 35. Identity Theft will Always be Real 36. Implement Two-Factor Authentication 37. Invest in a Privacy Screen 38. Jailbreaking Can Leave Your Phone Less Safe 39. Juice Jacking is a Thing 40. Learn About

Artificial Intelligence for Cybersecurity
free download

Artificial intelligence (AI) promises to change cybersecurity in the coming years. It will likely enhance both cyber offense and defense, and contribute to shaping the cyber threat landscape. Governing these changes is challenging, particularly for state-related actors. It

Foundational Cybersecurity Activities for IoT Device Manufacturers
free download

Abstract Internet of Things (IoT) devices often lack device cybersecurity capabilities their customers organizations and individuals can use to help mitigate their cybersecurity risks. Manufacturers can help their customers by improving how securable the IoT devices

Cybersecurity of critical infrastructure
free download

This chapter provides a political and philosophical analysis of the values at stake in ensuring cybersecurity for critical infrastructures. It presents a review of the boundaries of cybersecurity in national security, with a focus on the ethics of surveillance for protecting Cybersecurity has become a real issue in the development of smart services in the smart home domain, which is formed by a System of Systems where several smart objects are connected to each other and to the Internet. However, these connections expose the devices

An Explanatory Review on Cybersecurity Capability Maturity Models
free download

Cybersecurity is growing exponentially day by day in both the public and private sectors. This growth also comes with a new and dynamic cyber-threats risk that causes both sectors performance to halt. These sectors must update their cybersecurity measures and must

Chinas Cybersecurity Legislation
free download

The Cybersecurity Law enacted by the Chinese government in 2016-and put into force on June 0 2017-partly sought to address the existing deficiencies in data protection and online vulnerabilities. Nevertheless, the stringent measures implemented as part of this

CHAPTER II. CYBERSECURITY
free download

The issues of self-organization of the team of agents in cybersecurity systems are discussed in this section. The approaches to the definition of self-organization, functions and structures of self-organizing systems are presented. Formed a set of mathematical models included in

An Initial Industrial Cybersecurity Workforce Development Framework
free download

This document discusses the research methodology and outcomes of an effort to create a simple, flexible framework for developing an industrial (ICS) cybersecurity workforce. The effort used a variation of the nominal group technique relying on subject matter experts from

CYBERSECURITY AND SMART CITIES
free download

This paper outlines some challenges and suggestion to manage and minimize cybersecurity breach within smart cities. It also reviews various research and recommendations proposed to minimize, manage, and mitigate cyber breaches within the smart cities. According to

Analysis of definition set formed by given definitions of term cybersecurity
free download

This work exposes logical semantics analyses of definitions set of given definitions of the term cybersecurity and its impact on evolution of strategies in the field. With the given formalization of the definitions author suggests an approach of building structured

Kirti: Decentralized Reputation and SLA Enforcement for Cybersecurity
free download

The cybersecurity industry is growing at a rapid pace, with innumerable protection services available through a multitude of online marketplaces. To secure customers trust in the offered protection services, platform operators offer reputation systems through which

Adoption of i-Voting Platform in Nigeria: Dealing with Network-level Cybersecurity concerns
free download

Aminu Saleh College of Education, Azare, Bauchi State2. Abstract In 201 elections in Nigeria gulped a whopping 234.5 billion Naira as against the 108.5 billion Naira approved for the nations electoral body in 2015. Growth in population of registrable voters and

Tracking the Students Learning Behavior for Cybersecurity Scenarios⋆
free download

The ability to prevent dangerous cyber-threats in critical infrastructures depends on the availability of a security trained workforce and, therefore, an education system that can achieve this capacity. This work presents the key elements of a framework for hosting This paper discusses how governance on cyberspace used cyberculture elements and is increasingly using data to homogenize behaviors and social groups. It is intended to discuss historical and philosophical issues through transdisciplinary study, gathering political

Sandboxing the Cyberspace for Cybersecurity Education and Learning
free download

Deploying the appropriate digital environment for conducting cybersecurity exercises can be challenging and typically requires a lot of effort and system resources. Usually, for deploying vulnerable webservices and setting up labs for hands-on cybersecurity exercises to take This book deals with role of the human factors in cybersecurity . It is in fact the human element what makes the cyberspace the complex and adaptive system it is. According to international cybersecurity reports, people are both an essential part of the cybersecurity

Cybersecurity : Five Keepers in the Cyberspace Solarium Commission Report
free download

Chartered by the National Defense Authorization Act (NDAA), the Cybersecurity Solarium Commission took a broad look at US cybersecurity the current state of cyber policy in the United States, and what policies are needed to enhance cybersecurity . Sadly, the

Using Research to Ensure Equity in a Cybersecurity Education Pathway
free download

This poster describes how we are using research to inform the development of a cybersecurity education pathway to attract and retain students from groups that are underrepresented in computing fields. The partners include a non-profit research

Inter-Curricular Cybersecurity ABET Assessment Perspectives
free download

The field of cybersecurity has been rapidly developing over the past few years primarily from the quickly changing legal requirements for maintaining privacy and security of assets and their internal sensitive data. To address the changes within the computing field, the

Basic Concepts and Models of Cybersecurity
free download

This introductory chapter reviews the fundamental concepts of cybersecurity . It begins with common threats to information and systems to illustrate how matters of security can be addressed with methods from risk management. In the following, typical attack strategies

The Importance of Cybersecurity Education in School
free download

Despite the fact that the Internet has positively impacted peoples lives, there are negative issues emerged related to the use of Internet. Cases like cyber-bully, online fraud, racial abuse, pornography and gambling had increased tremendously due to the lack of

Digital Badges and E-Portfolios in Cybersecurity Education
free download

The aim of this report is to highlight efforts to develop a digital badging and e-portfolio environment that will illuminate and validate curricular, co-curricular, and extracurricular learning in cybersecurity . This effort includes Cal Poly Pomona and Coastline College

A game-based learning experience for improving cybersecurity awareness.
free download

The use of videogames is an established tool to train a systematic way of thinking that allows users to learn by gaming. In this paper, to address the increasing need of awareness in cybersecurity related issues, we present the realization of a Virtual Reality (VR) videogame

Return on Cybersecurity Investment in Operational Technology Systems: Quantifying the Value That Cybersecurity Technologies Provide after Integration.
free download

Difficult to upgrade legacy systems System downtime for upgrades is undesirable Difficult to find an appropriate cyber solution Cyber solutions for industrial systems are relatively new O ten IT solutions repackaged with OT protocols Physical systems respond to cyber

Cybersecurity Breaches and Information Technology Governance Roles in Audit Committee Charters
free download

Cybersecurity is a serious and growing risk for organizations. Firms with board of director involvement in information technology governance (ITG) be better equipped to deal with this risk. Yet little is known about the audit committees role in ITG. This study uses Companies are increasingly exposed to cybersecurity threats. Among them, SMEs are especially vulnerable due to their lack of maturity and resilience. They are also increasingly targeted by cyberattacks. In order to help SMEs to secure their business against such

Games for Cybersecurity Decision-making
free download

Decision-makers are often confronted with cybersecurity challenges, which they not fully comprehend but nonetheless need to critically address. Efficient preparation through cybersecurity games has become an invaluable tool to better prepare strategy and response

Cybersecurity Awareness Platform with Virtual Coach and Automated Challenge Assessment
free download

Over the last years, the number of cyber-attacks on industrial control systems has been steadily increasing. Among several factors, proper software development plays a vital role in keeping these systems secure. To achieve secure software, developers need to be aware ofThe research results for the main stages of designing competency models (CMs) for cybersecurity (CS) professionals are presented. A strategy for designing such models was formulated. The CS-related terminology and conceptual framework were clarified. Areas

Cybersecurity and the State
free download

This chapter provides an overview on state actors opinions and strategies relating to cybersecurity matters. These are addressed on the EU level as well as on the level of the individual European Member States while the focus is on legislation, policy and political
CSE PROJECTS

FREE IEEE PAPER AND PROJECTS

FREE IEEE PAPER