首页 > 最新文献

European Conference on Cyber Warfare and Security最新文献

英文 中文
Cyber Lessons that the World Can Learn from Lithuania 世界可以从立陶宛学习的网络经验
Pub Date : 2023-06-19 DOI: 10.34190/eccws.22.1.1379
M. Warren, Darius Štitilis, M. Laurinaitis
In an era of rapid technological advancements and increasing online connectivity, the proliferation of cyber threats, including the spread of fake news and disinformation, presents a significant challenge to nations worldwide. Lithuania has emerged as a leading example in addressing these challenges, particularly concerning cyber groups such as Killnet and disinformation / fake news. This paper aims to explore the key cyber lessons that can be learned from Lithuania's proactive approach in dealing with Killnet and combating disinformation / fake news. By analysing Lithuania's cybersecurity strategies and initiatives, this paper identifies crucial lessons that can be applied globally. Firstly, Lithuania recognises the importance of co-ordinated cyber security technologies and national frameworks to counter cyber groups such as Killnet attacks. Secondly, Lithuania has effectively tackled the spread of fake news / disinformation through a comprehensive approach involving legislation, media literacy programs, and strong cooperation between government agencies, civil society organisations, and the private sector. The country's experience underscores the significance of collaborative efforts in combating misinformation, promoting media literacy, and fostering critical thinking skills among the population.
在技术快速进步和网络连接日益增加的时代,网络威胁的扩散,包括假新闻和虚假信息的传播,对世界各国构成了重大挑战。在应对这些挑战方面,立陶宛已经成为一个领先的例子,特别是在Killnet等网络组织和虚假信息/假新闻方面。本文旨在探讨立陶宛在处理Killnet和打击虚假信息/假新闻方面可以从积极主动的方法中学到的关键网络经验教训。通过分析立陶宛的网络安全战略和举措,本文确定了可以在全球范围内应用的关键经验教训。首先,立陶宛认识到协同网络安全技术和国家框架对打击Killnet攻击等网络组织的重要性。其次,立陶宛通过立法、媒体扫盲计划以及政府机构、民间社会组织和私营部门之间的强有力合作等综合方法,有效地解决了假新闻/虚假信息的传播问题。该国的经验强调了合作努力在打击错误信息、促进媒体素养和培养人民批判性思维技能方面的重要性。
{"title":"Cyber Lessons that the World Can Learn from Lithuania","authors":"M. Warren, Darius Štitilis, M. Laurinaitis","doi":"10.34190/eccws.22.1.1379","DOIUrl":"https://doi.org/10.34190/eccws.22.1.1379","url":null,"abstract":"In an era of rapid technological advancements and increasing online connectivity, the proliferation of cyber threats, including the spread of fake news and disinformation, presents a significant challenge to nations worldwide. Lithuania has emerged as a leading example in addressing these challenges, particularly concerning cyber groups such as Killnet and disinformation / fake news. This paper aims to explore the key cyber lessons that can be learned from Lithuania's proactive approach in dealing with Killnet and combating disinformation / fake news. By analysing Lithuania's cybersecurity strategies and initiatives, this paper identifies crucial lessons that can be applied globally. Firstly, Lithuania recognises the importance of co-ordinated cyber security technologies and national frameworks to counter cyber groups such as Killnet attacks. Secondly, Lithuania has effectively tackled the spread of fake news / disinformation through a comprehensive approach involving legislation, media literacy programs, and strong cooperation between government agencies, civil society organisations, and the private sector. The country's experience underscores the significance of collaborative efforts in combating misinformation, promoting media literacy, and fostering critical thinking skills among the population.","PeriodicalId":258360,"journal":{"name":"European Conference on Cyber Warfare and Security","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114943033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Identification of Cybersecurity Work Roles for the Water Sector in South Africa 南非水务部门网络安全工作角色的确定
Pub Date : 2023-06-19 DOI: 10.34190/eccws.22.1.1109
S. von Solms
This paper presents the results of a content analysis conducted on the work roles of cybersecurity practitioners for the water sector of South Africa. The paper presents literature review findings on national and international frameworks and guidelines detailing cyber security considerations for the South African water sector as well as national and international guidelines and frameworks which detail the various work roles carried out by cybersecurity practitioners in an organisation. The study found that cyber security considerations and work roles such as physical security of assets, testing and assessment of cybersecurity methods, supply chains cyber security as well as incident investigation and interfacing with law enforcement, were not well defined for cyber security discipline. The study delivers a framework detailing the work roles of cybersecurity practitioners which can be applied to the South African water sector.
本文介绍了对南非水务部门网络安全从业者的工作角色进行内容分析的结果。本文介绍了关于国家和国际框架和指南的文献综述结果,详细介绍了南非水务部门的网络安全考虑因素,以及国家和国际指南和框架,详细介绍了网络安全从业者在组织中所扮演的各种工作角色。该研究发现,网络安全学科没有很好地定义网络安全考虑因素和工作角色,如资产的物理安全、网络安全方法的测试和评估、供应链网络安全以及事件调查和与执法部门的对接。该研究提供了一个框架,详细说明了网络安全从业者的工作角色,可应用于南非水务部门。
{"title":"The Identification of Cybersecurity Work Roles for the Water Sector in South Africa","authors":"S. von Solms","doi":"10.34190/eccws.22.1.1109","DOIUrl":"https://doi.org/10.34190/eccws.22.1.1109","url":null,"abstract":"This paper presents the results of a content analysis conducted on the work roles of cybersecurity practitioners for the water sector of South Africa. The paper presents literature review findings on national and international frameworks and guidelines detailing cyber security considerations for the South African water sector as well as national and international guidelines and frameworks which detail the various work roles carried out by cybersecurity practitioners in an organisation. The study found that cyber security considerations and work roles such as physical security of assets, testing and assessment of cybersecurity methods, supply chains cyber security as well as incident investigation and interfacing with law enforcement, were not well defined for cyber security discipline. The study delivers a framework detailing the work roles of cybersecurity practitioners which can be applied to the South African water sector.","PeriodicalId":258360,"journal":{"name":"European Conference on Cyber Warfare and Security","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130939523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Students’ Application of the MITRE ATT&CK® Framework via a real-time Cybersecurity Exercise 学生通过实时网络安全演习应用MITRE ATT&CK®框架
Pub Date : 2023-06-19 DOI: 10.34190/eccws.22.1.1126
Aunshul Rege, Jamie Williams, Rachel Bleiman, Katorah Williams
The MITRE ATT&CK framework enables practitioners to understand and track cyber adversary behaviors. Concepts such as social engineering (SE) are not directly captured in current version of ATT&CK as an individual technique, though the application of SE is relevant to many technical behaviors. Utilizing the ATT&CK framework in an educational setting, specifically within a competition focused on SE, allows students to explore adversarial behavior through experiential learning and understand how SE is relevant within cybersecurity. The structure of the framework allows students to see and describe each behavior from the perspective of the adversary, motivating them to compile and question “why” and “how” each individual action contributes to the operational objectives. This paper shares students’ mappings of the ATT&CK framework to playbooks they developed during a real-time SE penetration testing competition. Students were given numerous flags to pursue during the competition and this paper will share their playbooks and mappings to the ATT&CK framework. This paper demonstrates that while someone with more knowledge and experience using the framework may map a SE case study differently than multidisciplinary students who are experiencing it for the first time, there is not a single correct way to map onto the matrix. Having students experience this mapping process allows them to understand the breakdown of an adversary’s behavior and interpret key tactics and techniques in a way that fits their mapping needs. This paper also demonstrates how a SE case study can be mapped onto the ATT&CK framework despite SE not being the focus of the framework, and that SE uses tactics and techniques that are also relevant to technical cyberattacks. The authors hope to encourage more interdisciplinary cybersecurity education by sharing this experiential learning event.
MITRE攻击和攻击框架使从业者能够理解和跟踪网络对手的行为。虽然社会工程的应用与许多技术行为相关,但是像社会工程(SE)这样的概念在当前版本的ATT&CK中并没有作为一种单独的技术直接捕获。在教育环境中利用ATT&CK框架,特别是在以SE为重点的竞赛中,允许学生通过体验式学习探索对抗行为,并了解SE与网络安全的关系。框架的结构允许学生从对手的角度观察和描述每个行为,激励他们汇编和质疑“为什么”和“如何”每个单独的行动有助于作战目标。这篇论文分享了学生们在实时SE渗透测试竞赛中开发的ATT&CK框架到剧本的映射。在比赛中,学生们得到了许多旗子来追求,本文将分享他们的剧本和映射到ATT&CK框架。本文表明,虽然与第一次使用该框架的多学科学生相比,具有更多知识和经验的人可能会对SE案例研究进行不同的映射,但没有一种正确的方法可以将其映射到矩阵上。让学生体验这种映射过程可以让他们理解对手行为的崩溃,并以适合他们映射需求的方式解释关键战术和技术。本文还演示了如何将SE案例研究映射到ATT&CK框架上,尽管SE不是框架的重点,并且SE使用的战术和技术也与技术网络攻击相关。作者希望通过分享这一体验式学习活动来鼓励更多的跨学科网络安全教育。
{"title":"Students’ Application of the MITRE ATT&CK® Framework via a real-time Cybersecurity Exercise","authors":"Aunshul Rege, Jamie Williams, Rachel Bleiman, Katorah Williams","doi":"10.34190/eccws.22.1.1126","DOIUrl":"https://doi.org/10.34190/eccws.22.1.1126","url":null,"abstract":"The MITRE ATT&CK framework enables practitioners to understand and track cyber adversary behaviors. Concepts such as social engineering (SE) are not directly captured in current version of ATT&CK as an individual technique, though the application of SE is relevant to many technical behaviors. Utilizing the ATT&CK framework in an educational setting, specifically within a competition focused on SE, allows students to explore adversarial behavior through experiential learning and understand how SE is relevant within cybersecurity. The structure of the framework allows students to see and describe each behavior from the perspective of the adversary, motivating them to compile and question “why” and “how” each individual action contributes to the operational objectives. This paper shares students’ mappings of the ATT&CK framework to playbooks they developed during a real-time SE penetration testing competition. Students were given numerous flags to pursue during the competition and this paper will share their playbooks and mappings to the ATT&CK framework. This paper demonstrates that while someone with more knowledge and experience using the framework may map a SE case study differently than multidisciplinary students who are experiencing it for the first time, there is not a single correct way to map onto the matrix. Having students experience this mapping process allows them to understand the breakdown of an adversary’s behavior and interpret key tactics and techniques in a way that fits their mapping needs. This paper also demonstrates how a SE case study can be mapped onto the ATT&CK framework despite SE not being the focus of the framework, and that SE uses tactics and techniques that are also relevant to technical cyberattacks. The authors hope to encourage more interdisciplinary cybersecurity education by sharing this experiential learning event.","PeriodicalId":258360,"journal":{"name":"European Conference on Cyber Warfare and Security","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128948387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Educational Scenario for Teaching Cyber Security Using low-cost Equipment and Open Source Software 使用低成本设备和开源软件进行网络安全教学的教育场景
Pub Date : 2023-06-19 DOI: 10.34190/eccws.22.1.1113
A. Andreatos
This work presents a set of hands-on educational activities designed to teach some cyber security concepts in the classroom. The experimental configuration used an ad-hoc wireless and wired network, and a Raspberry Pi implementing a Web and an SSH server. Students were connected using their own devices (laptops or tablets). Initially the students tested DoS attacks to the Web server using various tools. Next, the students had to create SSH accounts to the server and a pair of RSA keys; using their SSH accounts, the students had to transfer their public keys to the server. Finally, students had to attack the SSH service from Kali Linux running on virtual machines in teams, each team using a different tool. The scenario was implemented in parts during a series of lessons and was positively accepted and evaluated by the students, who got familiar with a number of concepts and tools of computer networking and network security. In the end, the students informally assessed the Kali Linux SSH attack tools. Ways to assess the students qualitatively and quantitatively based on their participation are also presented. These lab exercises used a series of open source software, as well as low-cost equipment.
这项工作提出了一套动手教育活动,旨在在课堂上教授一些网络安全概念。实验配置使用自组织无线和有线网络,以及实现Web和SSH服务器的树莓派。学生们使用自己的设备(笔记本电脑或平板电脑)进行连接。最初,学生们使用各种工具测试了对Web服务器的DoS攻击。接下来,学生们必须创建服务器的SSH帐户和一对RSA密钥;使用他们的SSH帐户,学生们必须将他们的公钥转移到服务器上。最后,学生们必须以小组为单位攻击运行在虚拟机上的Kali Linux的SSH服务,每个小组使用不同的工具。该场景在一系列课程中进行了部分实施,得到了学生们的积极接受和评价,他们熟悉了计算机网络和网络安全的一些概念和工具。最后,学生们非正式地评估了Kali Linux SSH攻击工具。本文还介绍了如何根据学生的参与情况对他们进行定性和定量的评估。这些实验练习使用了一系列开源软件,以及低成本的设备。
{"title":"Educational Scenario for Teaching Cyber Security Using low-cost Equipment and Open Source Software","authors":"A. Andreatos","doi":"10.34190/eccws.22.1.1113","DOIUrl":"https://doi.org/10.34190/eccws.22.1.1113","url":null,"abstract":"This work presents a set of hands-on educational activities designed to teach some cyber security concepts in the classroom. The experimental configuration used an ad-hoc wireless and wired network, and a Raspberry Pi implementing a Web and an SSH server. Students were connected using their own devices (laptops or tablets). Initially the students tested DoS attacks to the Web server using various tools. Next, the students had to create SSH accounts to the server and a pair of RSA keys; using their SSH accounts, the students had to transfer their public keys to the server. Finally, students had to attack the SSH service from Kali Linux running on virtual machines in teams, each team using a different tool. The scenario was implemented in parts during a series of lessons and was positively accepted and evaluated by the students, who got familiar with a number of concepts and tools of computer networking and network security. In the end, the students informally assessed the Kali Linux SSH attack tools. Ways to assess the students qualitatively and quantitatively based on their participation are also presented. These lab exercises used a series of open source software, as well as low-cost equipment.","PeriodicalId":258360,"journal":{"name":"European Conference on Cyber Warfare and Security","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127930722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Hidden Permissions on Android: A Permission-Based Android Mobile Privacy Risk Model Android上的隐藏权限:基于权限的Android手机隐私风险模型
Pub Date : 2023-06-19 DOI: 10.34190/eccws.22.1.1453
Saliha Yilmaz, Mastaneh Davis
The continuously increasing amount of data input on mobile devices has made collating and monitoring users’ data not only uniquely personalised but easier than ever. Along with that, mobile security threats have overtaken with rising numbers in bank fraud and personal information leaks. This suggests that there is a significant lack of awareness of security issues among mobile users. Specifically, permission-based passive content leaks are getting more attention due to the emerging issues in data privacy. One reason for this is that permissions are running in the background collecting and transmitting data between applications within the same permission group, without the user's knowledge. This means, that a supposedly innocent application like the Clock, which is linked with the Calendar to provide the date and time functionality, can have access to any other application within the same Calendar permission group, which is compromising confidentiality. Moreover, this can lead to a violation of data privacy as the user is not aware of which assets are being shared between permissions. Developers of mobile platforms have implemented permission-based models to counteract these issues, however, application designers have shown that they are not necessarily complying with the General Data Protection Regulations (GDPR). For the mobile user, this means that app developers, app providers, and third parties who are included in the applications, can gain access to sensitive data without user consent or awareness. To address this issue, this study examines permissions that are inherent in the Android mobile infrastructure and exemplifies how they can reveal delicate user information, identify user behaviour, and can be shared among other applications - without obviously breaching GDPR guidelines. 10 first-party Android applications were statically analysed by their permissions and manually investigated for their actual purpose and privacy risk. Finally, considering the affected area, these permissions were categorised into four asset groups that form the base of a risk model. With risk levels from low to high, this model provides detection of risks on data privacy in mobile permissions and highlights the difficulty with GDPR compliance, which we therefore named PRAM, a permission-based Android Mobile Privacy Risk Assessment Model.
移动设备上不断增加的数据输入量使得整理和监控用户数据不仅具有独特的个性化,而且比以往任何时候都更容易。与此同时,随着银行欺诈和个人信息泄露的数量不断增加,移动安全威胁也日益严重。这表明移动用户对安全问题的认识严重不足。具体来说,由于数据隐私问题的出现,基于许可的被动内容泄露越来越受到关注。其中一个原因是,在用户不知情的情况下,权限在后台运行,在同一权限组内的应用程序之间收集和传输数据。这意味着,像Clock这样看似无害的应用程序(它与Calendar链接以提供日期和时间功能)可以访问同一Calendar权限组中的任何其他应用程序,这损害了机密性。此外,这可能导致侵犯数据隐私,因为用户不知道哪些资产在权限之间共享。移动平台的开发人员已经实现了基于许可的模型来解决这些问题,然而,应用程序设计人员已经表明,他们不一定遵守通用数据保护条例(GDPR)。对于移动用户来说,这意味着应用程序开发人员、应用程序提供商和应用程序中的第三方可以在未经用户同意或不知情的情况下访问敏感数据。为了解决这个问题,本研究考察了Android移动基础设施中固有的权限,并举例说明了它们如何揭示微妙的用户信息,识别用户行为,以及如何在其他应用程序之间共享-而不会明显违反GDPR指南。我们静态分析了10款第一方Android应用的权限,并手动调查了它们的实际用途和隐私风险。最后,考虑到受影响的区域,这些权限被分为四个资产组,这些资产组构成了风险模型的基础。该模型具有从低到高的风险等级,提供了移动许可中数据隐私风险的检测,并突出了GDPR合规的难度,因此我们将其命名为PRAM,即基于许可的Android移动隐私风险评估模型。
{"title":"Hidden Permissions on Android: A Permission-Based Android Mobile Privacy Risk Model","authors":"Saliha Yilmaz, Mastaneh Davis","doi":"10.34190/eccws.22.1.1453","DOIUrl":"https://doi.org/10.34190/eccws.22.1.1453","url":null,"abstract":"The continuously increasing amount of data input on mobile devices has made collating and monitoring users’ data not only uniquely personalised but easier than ever. Along with that, mobile security threats have overtaken with rising numbers in bank fraud and personal information leaks. This suggests that there is a significant lack of awareness of security issues among mobile users. Specifically, permission-based passive content leaks are getting more attention due to the emerging issues in data privacy. One reason for this is that permissions are running in the background collecting and transmitting data between applications within the same permission group, without the user's knowledge. This means, that a supposedly innocent application like the Clock, which is linked with the Calendar to provide the date and time functionality, can have access to any other application within the same Calendar permission group, which is compromising confidentiality. Moreover, this can lead to a violation of data privacy as the user is not aware of which assets are being shared between permissions. Developers of mobile platforms have implemented permission-based models to counteract these issues, however, application designers have shown that they are not necessarily complying with the General Data Protection Regulations (GDPR). For the mobile user, this means that app developers, app providers, and third parties who are included in the applications, can gain access to sensitive data without user consent or awareness. To address this issue, this study examines permissions that are inherent in the Android mobile infrastructure and exemplifies how they can reveal delicate user information, identify user behaviour, and can be shared among other applications - without obviously breaching GDPR guidelines. 10 first-party Android applications were statically analysed by their permissions and manually investigated for their actual purpose and privacy risk. Finally, considering the affected area, these permissions were categorised into four asset groups that form the base of a risk model. With risk levels from low to high, this model provides detection of risks on data privacy in mobile permissions and highlights the difficulty with GDPR compliance, which we therefore named PRAM, a permission-based Android Mobile Privacy Risk Assessment Model.","PeriodicalId":258360,"journal":{"name":"European Conference on Cyber Warfare and Security","volume":"509 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115889807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cultural Influences on Information Security 文化对信息安全的影响
Pub Date : 2023-06-19 DOI: 10.34190/eccws.22.1.1127
Henry Collier, C. Morton, Dalal N. Alharthi, Jan Kleiner
Humans are by far the weakest link in the information security chain. Many in the information security industry advocate for a technical solution to this problem. Unfortunately, technology does not hold the answer to solving the human problem. Instead, it is important to better understand the problem and find new ways of training individuals, so they have a better security mindset and make better security minded decisions. The security challenges associated with human factors have been widely studied in previous literature and different research groups. Prior research has shown that both human behavioural factors and social media usage factors can be used to better assess a person’s susceptibility to cybercrime. We know that humans are multi-faceted beings who are swayed by many factors. In addition to behavioural factors and social media factors, humans are predisposed by cultural influences. This paper begins the process of understanding how culture influences a person's ability to make positive cybersecurity decisions in a world that is full of data being thrown at them. The end goal of this research is to use culture, along with behaviour and social media usage as new metrics in measuring a person’s susceptibility to cybercrime. This information can then be used by information security practitioners and researchers to better prepare individuals to defend themselves from cyber threats. This paper is the start of the research process into how culture impacts a person’s susceptibility to cybercrime. It shows the significance of identifying what specific aspects of culture impact how someone makes a decision. This can help mitigate social engineering attacks by better understanding the influencing factors which control an end user. The authors will continue their work on this project to develop new Information Awareness (IA) training programmes that work to modify an individual's behaviour, while taking into consideration their behaviours, social media usage and culture.
到目前为止,人类是信息安全链上最薄弱的环节。信息安全行业的许多人都主张对这个问题采用技术解决方案。不幸的是,技术并没有解决人类问题的答案。相反,重要的是要更好地理解问题并找到培训个人的新方法,以便他们有更好的安全思维并做出更好的安全决策。与人为因素相关的安全挑战在以往的文献和不同的研究小组中得到了广泛的研究。先前的研究表明,人类行为因素和社交媒体使用因素都可以用来更好地评估一个人对网络犯罪的易感性。我们知道人类是多面的生物,受许多因素的影响。除了行为因素和社交媒体因素,人类还容易受到文化影响的影响。本文开始理解文化如何影响一个人在一个充满数据的世界中做出积极网络安全决策的能力。这项研究的最终目标是利用文化、行为和社交媒体的使用作为衡量一个人对网络犯罪易感性的新指标。这些信息可以被信息安全从业人员和研究人员使用,以更好地准备个人保护自己免受网络威胁。这篇论文是研究文化如何影响一个人对网络犯罪的易感性的开始。它显示了识别文化的哪些具体方面影响人们如何做出决定的重要性。这可以通过更好地理解控制最终用户的影响因素来帮助减轻社会工程攻击。作者将继续他们在这个项目上的工作,开发新的信息意识(IA)培训计划,在考虑个人行为、社交媒体使用和文化的同时,改变个人的行为。
{"title":"Cultural Influences on Information Security","authors":"Henry Collier, C. Morton, Dalal N. Alharthi, Jan Kleiner","doi":"10.34190/eccws.22.1.1127","DOIUrl":"https://doi.org/10.34190/eccws.22.1.1127","url":null,"abstract":"Humans are by far the weakest link in the information security chain. Many in the information security industry advocate for a technical solution to this problem. Unfortunately, technology does not hold the answer to solving the human problem. Instead, it is important to better understand the problem and find new ways of training individuals, so they have a better security mindset and make better security minded decisions. The security challenges associated with human factors have been widely studied in previous literature and different research groups. Prior research has shown that both human behavioural factors and social media usage factors can be used to better assess a person’s susceptibility to cybercrime. We know that humans are multi-faceted beings who are swayed by many factors. In addition to behavioural factors and social media factors, humans are predisposed by cultural influences. This paper begins the process of understanding how culture influences a person's ability to make positive cybersecurity decisions in a world that is full of data being thrown at them. The end goal of this research is to use culture, along with behaviour and social media usage as new metrics in measuring a person’s susceptibility to cybercrime. This information can then be used by information security practitioners and researchers to better prepare individuals to defend themselves from cyber threats. This paper is the start of the research process into how culture impacts a person’s susceptibility to cybercrime. It shows the significance of identifying what specific aspects of culture impact how someone makes a decision. This can help mitigate social engineering attacks by better understanding the influencing factors which control an end user. The authors will continue their work on this project to develop new Information Awareness (IA) training programmes that work to modify an individual's behaviour, while taking into consideration their behaviours, social media usage and culture.","PeriodicalId":258360,"journal":{"name":"European Conference on Cyber Warfare and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114262872","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Technology-Oriented Innovations and Cyber Security Challenges in the Healthcare Delivery System: A perspective from Developing Economy 医疗服务系统中的技术导向创新和网络安全挑战:来自发展中经济体的视角
Pub Date : 2023-06-19 DOI: 10.34190/eccws.22.1.1064
V. Owusu, Ales Gregar
There is no dispute about the looming digital transformation of certain sectors within transitional economies, especially in Ghana. In fact, for most developed economies, digitalization has proven to have relevant visible effects. The paradox, however, is the seamless nature of this propagation in contrast to the myriad associated benefits. Suffice it to say that, the main purpose of this study was to identify the perceived impediments against the adoption and continuous acceptance of technology-oriented innovation for healthcare delivery in transitional economies through innovations. Especially, in the current technological dispensation where Africa and other developing countries are striving to bridge the technology gap in service delivery. Though much research has been conducted within the healthcare sector, factors that hinder technology acceptance and continuous usage have rarely been their primary focus. To address this consequential lacuna, this study takes inspiration from literature through document and theme analysis and proposes a model which could serve as a remedy to the identifiable impediments and inhibitors to the seamless delivery of healthcare services in transitional economies.  We emphasize good management and government-based interventions throughout the literature review as well as the document analyzed. We also made suggestions for further research, notably concerning means of increasing technology diffusion and possible remedy to cyber-security threats in the healthcare sector.
转型经济体中某些部门的数字化转型迫在眉睫,这是毫无争议的,尤其是在加纳。事实上,对于大多数发达经济体来说,数字化已被证明具有相关的可见影响。然而,矛盾的是,这种传播的无缝性与无数相关的好处形成了鲜明对比。可以这么说,本研究的主要目的是确定在转型经济中通过创新采用和持续接受以技术为导向的创新以提供医疗保健服务的感知障碍。特别是在目前的技术情况下,非洲和其他发展中国家正在努力弥补服务提供方面的技术差距。尽管在医疗保健部门进行了大量研究,但阻碍技术接受和持续使用的因素很少成为他们的主要关注点。为了解决这一相应的空白,本研究通过文献和主题分析从文献中获得灵感,并提出了一个模型,该模型可以作为过渡经济中无缝提供医疗保健服务的可识别障碍和抑制剂的补救措施。我们强调良好的管理和政府为基础的干预在整个文献回顾和文件分析。我们还提出了进一步研究的建议,特别是关于增加技术扩散的方法和医疗保健行业网络安全威胁的可能补救措施。
{"title":"Technology-Oriented Innovations and Cyber Security Challenges in the Healthcare Delivery System: A perspective from Developing Economy","authors":"V. Owusu, Ales Gregar","doi":"10.34190/eccws.22.1.1064","DOIUrl":"https://doi.org/10.34190/eccws.22.1.1064","url":null,"abstract":"There is no dispute about the looming digital transformation of certain sectors within transitional economies, especially in Ghana. In fact, for most developed economies, digitalization has proven to have relevant visible effects. The paradox, however, is the seamless nature of this propagation in contrast to the myriad associated benefits. Suffice it to say that, the main purpose of this study was to identify the perceived impediments against the adoption and continuous acceptance of technology-oriented innovation for healthcare delivery in transitional economies through innovations. Especially, in the current technological dispensation where Africa and other developing countries are striving to bridge the technology gap in service delivery. Though much research has been conducted within the healthcare sector, factors that hinder technology acceptance and continuous usage have rarely been their primary focus. To address this consequential lacuna, this study takes inspiration from literature through document and theme analysis and proposes a model which could serve as a remedy to the identifiable impediments and inhibitors to the seamless delivery of healthcare services in transitional economies.  We emphasize good management and government-based interventions throughout the literature review as well as the document analyzed. We also made suggestions for further research, notably concerning means of increasing technology diffusion and possible remedy to cyber-security threats in the healthcare sector.","PeriodicalId":258360,"journal":{"name":"European Conference on Cyber Warfare and Security","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115201502","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cybersecurity in Mozambique: Status and Challenges 莫桑比克的网络安全:现状与挑战
Pub Date : 2023-06-19 DOI: 10.34190/eccws.22.1.1194
Martina De Barros
Digital technologies became one of the most important components of societies day to day life. In Africa, they brought several benefits as well as challenges. For instance, the number of cyber-crimes and cyber-attacks are increasing. Yet, not all 54 African countries have implemented proper cybersecurity measures such as the adoption of national cybersecurity strategy, technical and organizational measures, development of cyber capacity and fostering national and engaging in regional and international cooperation. However, the adoption of these measures are vital and imperative. Mozambique is one of these countries where these measures are lacking. Therefore, the aim of this paper is to give an overview of the current state of cybersecurity in Mozambique considering all of the aspects mentioned above. Additionally, this paper also aims to present some best practices that Mozambique can adopt to improve and intensify its cybersecurity commitments. The proposed recommendations are based on internationally recognized frameworks and models developed by entities such as the European Union Agency for Cybersecurity (ENISA), International Telecommunication Union (ITU) and African Union (AU).
数字技术成为社会日常生活中最重要的组成部分之一。在非洲,它们既带来了好处,也带来了挑战。例如,网络犯罪和网络攻击的数量正在增加。然而,并非所有54个非洲国家都采取了适当的网络安全措施,例如制定国家网络安全战略,采取技术和组织措施,发展网络能力,加强国家合作和开展区域和国际合作。然而,采取这些措施是至关重要和必要的。莫桑比克是缺乏这些措施的国家之一。因此,本文的目的是考虑到上述所有方面,概述莫桑比克的网络安全现状。此外,本文还旨在介绍莫桑比克可以采用的一些最佳实践,以改进和加强其网络安全承诺。拟议的建议基于国际公认的框架和模型,这些框架和模型由欧盟网络安全机构(ENISA)、国际电信联盟(ITU)和非洲联盟(AU)等实体开发。
{"title":"Cybersecurity in Mozambique: Status and Challenges","authors":"Martina De Barros","doi":"10.34190/eccws.22.1.1194","DOIUrl":"https://doi.org/10.34190/eccws.22.1.1194","url":null,"abstract":"Digital technologies became one of the most important components of societies day to day life. In Africa, they brought several benefits as well as challenges. For instance, the number of cyber-crimes and cyber-attacks are increasing. Yet, not all 54 African countries have implemented proper cybersecurity measures such as the adoption of national cybersecurity strategy, technical and organizational measures, development of cyber capacity and fostering national and engaging in regional and international cooperation. However, the adoption of these measures are vital and imperative. Mozambique is one of these countries where these measures are lacking. Therefore, the aim of this paper is to give an overview of the current state of cybersecurity in Mozambique considering all of the aspects mentioned above. Additionally, this paper also aims to present some best practices that Mozambique can adopt to improve and intensify its cybersecurity commitments. The proposed recommendations are based on internationally recognized frameworks and models developed by entities such as the European Union Agency for Cybersecurity (ENISA), International Telecommunication Union (ITU) and African Union (AU).","PeriodicalId":258360,"journal":{"name":"European Conference on Cyber Warfare and Security","volume":"165 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127339347","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Governance and management information system for cybersecurity centres and competence hubs 网络安全中心和能力中心的治理和管理信息系统
Pub Date : 2023-06-19 DOI: 10.34190/eccws.22.1.1179
J. Rajamäki, Janne Lahdenperä
Information sharing allows organizations to leverage the collective knowledge, experience, and analytical capabilities of their sharing partners in a community of interest. Sharing information is made easier with the help of a suitable information system. The DYNAMO project (10/2022-9/2025) creates tools for the cyber situational picture to support decision-making. One task of its mode of operation is to continue the development of the assets designed in the ECHO project (2/2019-2/2023). This article examines the design of ECHO's governance and management information system and how it can be applied to support the organisational processes and information-sharing needs of the collaborative network as a part of the DYNAMO project.
信息共享使组织能够利用共同关心的社区中共享合作伙伴的集体知识、经验和分析能力。在合适的信息系统的帮助下,信息共享变得更加容易。DYNAMO项目(2022年10月至2025年9月)为网络态势图创建工具,以支持决策。其运营模式的一项任务是继续开发ECHO项目(2019年2月- 2023年2月)中设计的资产。本文研究了ECHO的治理和管理信息系统的设计,以及如何将其应用于支持作为DYNAMO项目一部分的协作网络的组织流程和信息共享需求。
{"title":"Governance and management information system for cybersecurity centres and competence hubs","authors":"J. Rajamäki, Janne Lahdenperä","doi":"10.34190/eccws.22.1.1179","DOIUrl":"https://doi.org/10.34190/eccws.22.1.1179","url":null,"abstract":"Information sharing allows organizations to leverage the collective knowledge, experience, and analytical capabilities of their sharing partners in a community of interest. Sharing information is made easier with the help of a suitable information system. The DYNAMO project (10/2022-9/2025) creates tools for the cyber situational picture to support decision-making. One task of its mode of operation is to continue the development of the assets designed in the ECHO project (2/2019-2/2023). This article examines the design of ECHO's governance and management information system and how it can be applied to support the organisational processes and information-sharing needs of the collaborative network as a part of the DYNAMO project.","PeriodicalId":258360,"journal":{"name":"European Conference on Cyber Warfare and Security","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127715839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Organisational GDPR Investments and Impacts 组织GDPR投资和影响
Pub Date : 2023-06-19 DOI: 10.34190/eccws.22.1.1107
Pauliina Hirvonen
The aim of this empirical multi-case study is to understand the GDPR investments and impacts of the organisations. Among these, the measuring experiences related to GDPR and information security (Isec), and the future expectations are examined. Several interesting findings were recognised, which also enabled further suggestions. First, an understanding of the organisations’ investments and their impact is built by gathering information about the actions that organisations made to fulfil the GDPR requirements. In the second phase, it is deemed necessary to examine how organisations experience the measures and evaluation of GDPR development and progress, in order to understand how respondents, end up evaluating the impact of their investments. In the third phase it is considered necessary to consider the future development of GDPR and the challenges and opportunities it brings to organisations, in order to understand how the experiences so far affect preparations for the future. The final phase of evaluation focuses on finding out what impact the GDPR has had on organisations. On the one hand, it is possible that the total investment in the GDPR may also correlate with the development of the organisational Isec maturity, because GDPR has brought more resources and visibility to the organisation’s Isec, and operations have become more systematic. On the other hand, organisations with an already high level of Isec maturity and organisations operating in a regulatory-focused industry may accept the GDPR-based Isec investments more easily. If GDPR is tightly integrated with both the organisation’s information security and the business functions under the responsibility of executive management, it may support the organisation’s business and information security development. This research serves GDPR authorities, organisational executives, persons in charge of GDPR/information security/cybersecurity, service providers and academia.
本实证多案例研究的目的是了解组织的GDPR投资和影响。其中,考察了与GDPR和信息安全(Isec)相关的测量经验,以及未来的预期。几个有趣的发现得到了认可,这也使进一步的建议成为可能。首先,通过收集有关组织为满足GDPR要求而采取的行动的信息,可以了解组织的投资及其影响。在第二阶段,有必要检查组织如何经历GDPR发展和进展的测量和评估,以了解受访者最终如何评估其投资的影响。在第三阶段,有必要考虑GDPR的未来发展及其给组织带来的挑战和机遇,以了解迄今为止的经验如何影响未来的准备工作。评估的最后阶段侧重于找出GDPR对组织的影响。一方面,对GDPR的总投资也可能与组织Isec成熟度的发展相关,因为GDPR为组织的Isec带来了更多的资源和可见性,并且操作变得更加系统化。另一方面,具有高水平Isec成熟度的组织和在以监管为重点的行业中运营的组织可能更容易接受基于gdp的Isec投资。如果GDPR与机构的资讯保安及执行管理层负责的业务功能紧密结合,则可支持机构的业务及资讯保安发展。本研究服务于GDPR主管部门、组织高管、GDPR/信息安全/网络安全负责人、服务提供商和学术界。
{"title":"Organisational GDPR Investments and Impacts","authors":"Pauliina Hirvonen","doi":"10.34190/eccws.22.1.1107","DOIUrl":"https://doi.org/10.34190/eccws.22.1.1107","url":null,"abstract":"The aim of this empirical multi-case study is to understand the GDPR investments and impacts of the organisations. Among these, the measuring experiences related to GDPR and information security (Isec), and the future expectations are examined. Several interesting findings were recognised, which also enabled further suggestions. First, an understanding of the organisations’ investments and their impact is built by gathering information about the actions that organisations made to fulfil the GDPR requirements. In the second phase, it is deemed necessary to examine how organisations experience the measures and evaluation of GDPR development and progress, in order to understand how respondents, end up evaluating the impact of their investments. In the third phase it is considered necessary to consider the future development of GDPR and the challenges and opportunities it brings to organisations, in order to understand how the experiences so far affect preparations for the future. The final phase of evaluation focuses on finding out what impact the GDPR has had on organisations. On the one hand, it is possible that the total investment in the GDPR may also correlate with the development of the organisational Isec maturity, because GDPR has brought more resources and visibility to the organisation’s Isec, and operations have become more systematic. On the other hand, organisations with an already high level of Isec maturity and organisations operating in a regulatory-focused industry may accept the GDPR-based Isec investments more easily. If GDPR is tightly integrated with both the organisation’s information security and the business functions under the responsibility of executive management, it may support the organisation’s business and information security development. This research serves GDPR authorities, organisational executives, persons in charge of GDPR/information security/cybersecurity, service providers and academia.","PeriodicalId":258360,"journal":{"name":"European Conference on Cyber Warfare and Security","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128115218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
European Conference on Cyber Warfare and Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1