首页 > 最新文献

International Journal of Cyber Warfare and Terrorism最新文献

英文 中文
Risks of Critical Infrastructure Adoption of Cloud Computing by Government 政府关键基础设施采用云计算的风险
IF 0.5 Q4 POLITICAL SCIENCE Pub Date : 2020-07-01 DOI: 10.4018/ijcwt.2020070104
Mansoor Al-Gharibi, M. Warren, W. Yeoh
The purpose of this article is to discuss the risks and reasons of adopting the cloud computing in the critical infrastructure within the government context of cloud computing adoption. The article will also present examples of cloud computing adoption in the critical infrastructure domain. The data used in the paper was gathered from different academic, governmental, and online sources. It was found that, although there are risks involved in the cloud computing adoption, governments are deploying cloud computing using different deployment models and reaching high level of deployment within the critical infrastructure. The findings of this study suggest that it is not a question of adopting or not anymore, but the question of how to mitigate the risks involved after the deployment.
本文的目的是讨论在政府采用云计算的背景下,在关键基础设施中采用云计算的风险和原因。本文还将介绍在关键基础设施领域采用云计算的示例。论文中使用的数据来自不同的学术、政府和在线资源。研究发现,尽管采用云计算存在风险,但各国政府正在使用不同的部署模型部署云计算,并在关键基础设施中达到较高的部署水平。本研究的结果表明,这不是采用或不再采用的问题,而是部署后如何减轻风险的问题。
{"title":"Risks of Critical Infrastructure Adoption of Cloud Computing by Government","authors":"Mansoor Al-Gharibi, M. Warren, W. Yeoh","doi":"10.4018/ijcwt.2020070104","DOIUrl":"https://doi.org/10.4018/ijcwt.2020070104","url":null,"abstract":"The purpose of this article is to discuss the risks and reasons of adopting the cloud computing in the critical infrastructure within the government context of cloud computing adoption. The article will also present examples of cloud computing adoption in the critical infrastructure domain. The data used in the paper was gathered from different academic, governmental, and online sources. It was found that, although there are risks involved in the cloud computing adoption, governments are deploying cloud computing using different deployment models and reaching high level of deployment within the critical infrastructure. The findings of this study suggest that it is not a question of adopting or not anymore, but the question of how to mitigate the risks involved after the deployment.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"26 1","pages":"47-58"},"PeriodicalIF":0.5,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74321359","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Study of Cyber Security Issues in Sri Lanka 斯里兰卡网络安全问题研究
IF 0.5 Q4 POLITICAL SCIENCE Pub Date : 2020-07-01 DOI: 10.4018/ijcwt.2020070105
R. Nagahawatta, M. Warren, W. Yeoh
Cybersecurity is focused on helping the community to make knowledgeable decisions on its adaptation and mitigation. This survey evaluated the level of cybersecurity awareness and discernment amongst university students in Sri Lanka. The study was based on primary data collected through a questionnaire on awareness and the perception of cybersecurity from respondents at universities in Sri Lanka. The results indicated that experience and the level of cybersecurity awareness among university students in Sri Lanka are not significantly low, but there are some knowledge gaps with new threats. Further, the results showed that university students in Sri Lanka were able to identify cybercrime as a threat. These findings necessitate building awareness and developing capacity to improve student's knowledge on the cybersecurity subject especially if universities are to be used as a key focal point in cybersecurity awareness campaigns in Sri Lanka.
网络安全的重点是帮助社区对其适应和缓解做出明智的决定。这项调查评估了斯里兰卡大学生的网络安全意识和识别水平。该研究基于通过斯里兰卡大学受访者的网络安全意识和感知问卷收集的原始数据。结果表明,斯里兰卡大学生的网络安全经验和网络安全意识水平并不明显低,但对新威胁的认识存在一定差距。此外,调查结果显示,斯里兰卡的大学生能够将网络犯罪视为一种威胁。这些发现需要建立意识和发展能力,以提高学生对网络安全主题的知识,特别是如果大学要被用作斯里兰卡网络安全意识运动的关键焦点。
{"title":"A Study of Cyber Security Issues in Sri Lanka","authors":"R. Nagahawatta, M. Warren, W. Yeoh","doi":"10.4018/ijcwt.2020070105","DOIUrl":"https://doi.org/10.4018/ijcwt.2020070105","url":null,"abstract":"Cybersecurity is focused on helping the community to make knowledgeable decisions on its adaptation and mitigation. This survey evaluated the level of cybersecurity awareness and discernment amongst university students in Sri Lanka. The study was based on primary data collected through a questionnaire on awareness and the perception of cybersecurity from respondents at universities in Sri Lanka. The results indicated that experience and the level of cybersecurity awareness among university students in Sri Lanka are not significantly low, but there are some knowledge gaps with new threats. Further, the results showed that university students in Sri Lanka were able to identify cybercrime as a threat. These findings necessitate building awareness and developing capacity to improve student's knowledge on the cybersecurity subject especially if universities are to be used as a key focal point in cybersecurity awareness campaigns in Sri Lanka.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"7 1","pages":"59-72"},"PeriodicalIF":0.5,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78674999","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Deceiving Autonomous Drones 欺骗性无人驾驶飞机
IF 0.5 Q4 POLITICAL SCIENCE Pub Date : 2020-07-01 DOI: 10.4018/ijcwt.2020070101
W. Hutchinson
This speculative article examines the concept of deceiving autonomous drones that are controlled by artificial intelligence (AI) and can work without operational input from humans. This article examines the potential of autonomous drones, their implications and how deception could possibly be a defence against them and /or a means of gaining advantage. It posits that officially, no truly autonomous drone is operational now, yet the development of AI and other technologies could expand the capabilities of these devices, which will inevitably confront society with a number of deep ethical, legal, and philosophical issues. The article also examines the impact of autonomous drones and their targets in terms of the power/deception nexus. The impact of surveillance and kinetic impacts on the target populations is investigated. The use of swarms can make deception more difficult although security can be breached. The Internet of Things can be considered as based on the same model as a swarm and its impact on human behaviour indicates that deception or perhaps counter-deception should be considered as a defence. Finally, the issues raised are outlined. However, this article does not provide definitive answers but, hopefully, exposes a number of issues that will stimulate further discussion and research in this general area.
这篇推测性的文章探讨了欺骗性自主无人机的概念,这种无人机由人工智能(AI)控制,可以在没有人类操作输入的情况下工作。本文探讨了自主无人机的潜力,它们的含义以及欺骗如何可能成为对它们的防御和/或获得优势的手段。根据官方说法,目前还没有真正的自主无人机投入使用,但人工智能和其他技术的发展可能会扩大这些设备的能力,这将不可避免地给社会带来一系列深刻的伦理、法律和哲学问题。本文还从力量/欺骗关系的角度考察了自主无人机及其目标的影响。研究了监测和动态影响对目标种群的影响。使用蜂群可以使欺骗更加困难,尽管安全可能被破坏。物联网可以被认为是基于与群体相同的模型,它对人类行为的影响表明,欺骗或反欺骗应该被视为一种防御手段。最后,概述了提出的问题。然而,本文并没有提供明确的答案,但希望能够揭示一些问题,这些问题将刺激这一一般领域的进一步讨论和研究。
{"title":"Deceiving Autonomous Drones","authors":"W. Hutchinson","doi":"10.4018/ijcwt.2020070101","DOIUrl":"https://doi.org/10.4018/ijcwt.2020070101","url":null,"abstract":"This speculative article examines the concept of deceiving autonomous drones that are controlled by artificial intelligence (AI) and can work without operational input from humans. This article examines the potential of autonomous drones, their implications and how deception could possibly be a defence against them and /or a means of gaining advantage. It posits that officially, no truly autonomous drone is operational now, yet the development of AI and other technologies could expand the capabilities of these devices, which will inevitably confront society with a number of deep ethical, legal, and philosophical issues. The article also examines the impact of autonomous drones and their targets in terms of the power/deception nexus. The impact of surveillance and kinetic impacts on the target populations is investigated. The use of swarms can make deception more difficult although security can be breached. The Internet of Things can be considered as based on the same model as a swarm and its impact on human behaviour indicates that deception or perhaps counter-deception should be considered as a defence. Finally, the issues raised are outlined. However, this article does not provide definitive answers but, hopefully, exposes a number of issues that will stimulate further discussion and research in this general area.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"123 10 1","pages":"1-14"},"PeriodicalIF":0.5,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77357353","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Insider Threat Detection Using Supervised Machine Learning Algorithms on an Extremely Imbalanced Dataset 在极不平衡数据集上使用监督机器学习算法进行内部威胁检测
IF 0.5 Q4 POLITICAL SCIENCE Pub Date : 2020-04-01 DOI: 10.4018/ijcwt.2020040101
Naghmeh Moradpoor Sheykhkanloo, A. Hall
An insider threat can take on many forms and fall under different categories. This includes malicious insider, careless/unaware/uneducated/naïve employee, and the third-party contractor. Machine learning techniques have been studied in published literature as a promising solution for such threats. However, they can be biased and/or inaccurate when the associated dataset is hugely imbalanced. Therefore, this article addresses the insider threat detection on an extremely imbalanced dataset which includes employing a popular balancing technique known as spread subsample. The results show that although balancing the dataset using this technique did not improve performance metrics, it did improve the time taken to build the model and the time taken to test the model. Additionally, the authors realised that running the chosen classifiers with parameters other than the default ones has an impact on both balanced and imbalanced scenarios, but the impact is significantly stronger when using the imbalanced dataset.
内部威胁可以采取多种形式,并属于不同的类别。这包括恶意的内部人员,粗心/不知情/未受教育/naïve员工和第三方承包商。在已发表的文献中,机器学习技术已经被研究为解决此类威胁的有希望的解决方案。然而,当相关的数据集非常不平衡时,它们可能是有偏见和/或不准确的。因此,本文将在极不平衡的数据集上解决内部威胁检测问题,其中包括采用一种称为扩展子样本的流行平衡技术。结果表明,尽管使用这种技术平衡数据集并没有提高性能指标,但它确实改善了构建模型和测试模型所花费的时间。此外,作者意识到,使用默认参数以外的参数运行所选分类器对平衡和不平衡场景都有影响,但当使用不平衡数据集时,影响明显更强。
{"title":"Insider Threat Detection Using Supervised Machine Learning Algorithms on an Extremely Imbalanced Dataset","authors":"Naghmeh Moradpoor Sheykhkanloo, A. Hall","doi":"10.4018/ijcwt.2020040101","DOIUrl":"https://doi.org/10.4018/ijcwt.2020040101","url":null,"abstract":"An insider threat can take on many forms and fall under different categories. This includes malicious insider, careless/unaware/uneducated/naïve employee, and the third-party contractor. Machine learning techniques have been studied in published literature as a promising solution for such threats. However, they can be biased and/or inaccurate when the associated dataset is hugely imbalanced. Therefore, this article addresses the insider threat detection on an extremely imbalanced dataset which includes employing a popular balancing technique known as spread subsample. The results show that although balancing the dataset using this technique did not improve performance metrics, it did improve the time taken to build the model and the time taken to test the model. Additionally, the authors realised that running the chosen classifiers with parameters other than the default ones has an impact on both balanced and imbalanced scenarios, but the impact is significantly stronger when using the imbalanced dataset.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"61 s81","pages":"1-26"},"PeriodicalIF":0.5,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.4018/ijcwt.2020040101","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72389991","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Deep Learning in Cybersecurity: Challenges and Approaches 网络安全中的深度学习:挑战和方法
IF 0.5 Q4 POLITICAL SCIENCE Pub Date : 2020-04-01 DOI: 10.4018/ijcwt.2020040105
Y. Imamverdiyev, F. Abdullayeva
In this article, a review and summarization of the emerging scientific approaches of deep learning (DL) on cybersecurity are provided, a structured and comprehensive overview of the various cyberattack detection methods is conducted, existing cyberattack detection methods based on DL is categorized. Methods covering attacks to deep learning based on generative adversarial networks (GAN) are investigated. The datasets used for the evaluation of the efficiency proposed by researchers for cyberattack detection methods are discussed. The statistical analysis of papers published on cybersecurity with the application of DL over the years is conducted. Existing commercial cybersecurity solutions developed on deep learning are described.
本文回顾和总结了深度学习(DL)在网络安全方面的新兴科学方法,对各种网络攻击检测方法进行了结构化和全面的概述,对现有的基于DL的网络攻击检测方法进行了分类。研究了基于生成式对抗网络(GAN)的深度学习攻击方法。讨论了研究人员提出的用于评估网络攻击检测方法效率的数据集。对网络安全领域近年来发表的应用深度学习的论文进行了统计分析。描述了基于深度学习开发的现有商业网络安全解决方案。
{"title":"Deep Learning in Cybersecurity: Challenges and Approaches","authors":"Y. Imamverdiyev, F. Abdullayeva","doi":"10.4018/ijcwt.2020040105","DOIUrl":"https://doi.org/10.4018/ijcwt.2020040105","url":null,"abstract":"In this article, a review and summarization of the emerging scientific approaches of deep learning (DL) on cybersecurity are provided, a structured and comprehensive overview of the various cyberattack detection methods is conducted, existing cyberattack detection methods based on DL is categorized. Methods covering attacks to deep learning based on generative adversarial networks (GAN) are investigated. The datasets used for the evaluation of the efficiency proposed by researchers for cyberattack detection methods are discussed. The statistical analysis of papers published on cybersecurity with the application of DL over the years is conducted. Existing commercial cybersecurity solutions developed on deep learning are described.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"50 1","pages":"82-105"},"PeriodicalIF":0.5,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81909534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Predicting and Explaining Cyber Ethics with Ethical Theories 用伦理理论预测和解释网络伦理
IF 0.5 Q4 POLITICAL SCIENCE Pub Date : 2020-04-01 DOI: 10.4018/ijcwt.2020040103
Winfred Yaokumah
Peoplefacemultipledecisionsthathaveethicaldimensionsandareoftenunabletoresolveappropriately thoseethicaldilemmasintheuseofthecyberspace.Individualsfinditdifficulttoexplaintherationale behindtheirmoraljudgmentsintheirinteractionsandaccesstodigitalcontent.Identifyingethicaland moralorientationthatpromptsacceptableorunacceptableethicaljudgmentsisanimportantfactor incyberethics.Thegoalofthisstudyistoemploythreeprominentethicaltheoriestopredictand explaincyberethicaljudgementsintermsofcomputerethics,privacy,intellectualpropertyrights,and academicintegrity.Thestudydevelopsconceptualandpredictivemodelstotestasetofhypotheses. Theresultsshowconsequentialethicsasthemostsignificantpredictorofcomputerethics,cyber privacy,andacademicintegrity.Deontologicalethicsmostsignificantlypredictintellectualproperty rightsbutisnotasignificantpredictorofacademicintegrity. KEyWoRdS Academic Integrity, Consequentialism, Cyber Ethics, Cyber Security, Deontology, Ethical Theory, Intellectual Property, Piracy, Plagiarism, Privacy, Virtue Ethics
Peoplefacemultipledecisionsthathaveethicaldimensionsandareoftenunabletoresolveappropriately thoseethicaldilemmasintheuseofthecyberspace。Individualsfinditdifficulttoexplaintherationale behindtheirmoraljudgmentsintheirinteractionsandaccesstodigitalcontent。Identifyingethicaland moralorientationthatpromptsacceptableorunacceptableethicaljudgmentsisanimportantfactor incyberethics。Thegoalofthisstudyistoemploythreeprominentethicaltheoriestopredictand explaincyberethicaljudgementsintermsofcomputerethics,privacy,intellectualpropertyrights,and academicintegrity.Thestudydevelopsconceptualandpredictivemodelstotestasetofhypotheses。> Theresultsshowconsequentialethicsasthemostsignificantpredictorofcomputerethics,cyber隐私,andacademicintegrity。Deontologicalethicsmostsignificantlypredictintellectualproperty rightsbutisnotasignificantpredictorofacademicintegrity。关键词学术诚信,结果主义,网络伦理,网络安全,义务论,伦理理论,知识产权,盗版,抄袭,隐私,美德伦理
{"title":"Predicting and Explaining Cyber Ethics with Ethical Theories","authors":"Winfred Yaokumah","doi":"10.4018/ijcwt.2020040103","DOIUrl":"https://doi.org/10.4018/ijcwt.2020040103","url":null,"abstract":"Peoplefacemultipledecisionsthathaveethicaldimensionsandareoftenunabletoresolveappropriately thoseethicaldilemmasintheuseofthecyberspace.Individualsfinditdifficulttoexplaintherationale behindtheirmoraljudgmentsintheirinteractionsandaccesstodigitalcontent.Identifyingethicaland moralorientationthatpromptsacceptableorunacceptableethicaljudgmentsisanimportantfactor incyberethics.Thegoalofthisstudyistoemploythreeprominentethicaltheoriestopredictand explaincyberethicaljudgementsintermsofcomputerethics,privacy,intellectualpropertyrights,and academicintegrity.Thestudydevelopsconceptualandpredictivemodelstotestasetofhypotheses. Theresultsshowconsequentialethicsasthemostsignificantpredictorofcomputerethics,cyber privacy,andacademicintegrity.Deontologicalethicsmostsignificantlypredictintellectualproperty rightsbutisnotasignificantpredictorofacademicintegrity. KEyWoRdS Academic Integrity, Consequentialism, Cyber Ethics, Cyber Security, Deontology, Ethical Theory, Intellectual Property, Piracy, Plagiarism, Privacy, Virtue Ethics","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"30 1","pages":"46-63"},"PeriodicalIF":0.5,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84733692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
On the Behavior-Based Risk Communication Models in Crisis Management and Social Risks Minimization 危机管理中基于行为的风险沟通模型与社会风险最小化
IF 0.5 Q4 POLITICAL SCIENCE Pub Date : 2020-04-01 DOI: 10.4018/ijcwt.2020040102
Y. Kostyuchenko, V. Pushkar, O. Malysheva, M. Yuschenko
Thearticleformulatesandcalibratesaformalmodelofriskcommunicationsintheframeworkof arisk-basedcommunityresilienceassessmentapproachintransformingsocietiesundercrisesand conflicts.Itwasdemonstratedthatperceptionofrisksisnotadequate.Thissituationisrecognizedas athreat,whichleadstoasignificantincreaseoflossesandtospreadingofwrongcrisismanagement practices.Toimprovedecision-makingatthepersonal,group,andpopulationlevels,abehavioralbasedcommunicationmodelhasbeenproposed.Themodifiedformofengagementintocollective actionsforsubstantiallyfractionalizedsocietyisproposed.Anumberofmodelsofactioncallsand acollectivedecision-makingunderstressconditionswithdynamiccommunicationareputforward. Onthebasisof thedevelopedmodel,waysofoptimizingcommunicationstrategiesareaimedat correspondingriskminimizationaredeveloped.Futureresearchdirectionsarehighlighted. KeyWORdS Behavioral Model, Communication Model, Community Resilience, Crisis Anthropology, Crisis, Decision Making, Global Transformations, Group Dynamics, Risk Communications, Risk Perception
Thearticleformulatesandcalibratesaformalmodelofriskcommunicationsintheframeworkof arisk-basedcommunityresilienceassessmentapproachintransformingsocietiesundercrisesand conflicts.Itwasdemonstratedthatperceptionofrisksisnotadequate。Thissituationisrecognizedas athreat,whichleadstoasignificantincreaseoflossesandtospreadingofwrongcrisismanagement practices.Toimprovedecision-makingatthepersonal,group,andpopulationlevels,abehavioralbasedcommunicationmodelhasbeenproposed。Themodifiedformofengagementintocollective actionsforsubstantiallyfractionalizedsocietyisproposed。Anumberofmodelsofactioncallsand acollectivedecision-makingunderstressconditionswithdynamiccommunicationareputforward。Onthebasisof thedevelopedmodel,waysofoptimizingcommunicationstrategiesareaimedat correspondingriskminimizationaredeveloped.Futureresearchdirectionsarehighlighted。关键词:行为模型,沟通模型,社区恢复力,危机人类学,危机,决策,全球转型,群体动力学,风险沟通,风险感知
{"title":"On the Behavior-Based Risk Communication Models in Crisis Management and Social Risks Minimization","authors":"Y. Kostyuchenko, V. Pushkar, O. Malysheva, M. Yuschenko","doi":"10.4018/ijcwt.2020040102","DOIUrl":"https://doi.org/10.4018/ijcwt.2020040102","url":null,"abstract":"Thearticleformulatesandcalibratesaformalmodelofriskcommunicationsintheframeworkof arisk-basedcommunityresilienceassessmentapproachintransformingsocietiesundercrisesand conflicts.Itwasdemonstratedthatperceptionofrisksisnotadequate.Thissituationisrecognizedas athreat,whichleadstoasignificantincreaseoflossesandtospreadingofwrongcrisismanagement practices.Toimprovedecision-makingatthepersonal,group,andpopulationlevels,abehavioralbasedcommunicationmodelhasbeenproposed.Themodifiedformofengagementintocollective actionsforsubstantiallyfractionalizedsocietyisproposed.Anumberofmodelsofactioncallsand acollectivedecision-makingunderstressconditionswithdynamiccommunicationareputforward. Onthebasisof thedevelopedmodel,waysofoptimizingcommunicationstrategiesareaimedat correspondingriskminimizationaredeveloped.Futureresearchdirectionsarehighlighted. KeyWORdS Behavioral Model, Communication Model, Community Resilience, Crisis Anthropology, Crisis, Decision Making, Global Transformations, Group Dynamics, Risk Communications, Risk Perception","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"26 1","pages":"27-45"},"PeriodicalIF":0.5,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.4018/ijcwt.2020040102","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72460413","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
The Security Aspects of Automotive Over-the-Air Updates 汽车无线更新的安全问题
IF 0.5 Q4 POLITICAL SCIENCE Pub Date : 2020-04-01 DOI: 10.4018/ijcwt.2020040104
J. Howden, L. Maglaras, M. Ferrag
Over-the-air(OTA)updateisamethodforvehiclemanufacturerstoremotelydistributemaintenance updates,performance,andfeatureenhancementsthroughthevehicle’slifespan.Recallsofvehicles costthemanufacturesalotofmoney.OTAsolvestherecallissue,whileallowingconsumerstopay forservicesandfeaturesviaanupdate.TheOTAecosystemincludesthecoderswhofirstdeveloped the firmware, the 1st Tier suppliers, the vehicle manufacturers, and the vehicle itself. Currently, manufacturersdesignedthenetworksforspeedandresponsiveness,andnotsecurity.Thisarticle examinestheseelementsanddrillsintothesecurityavailableforeach.Theslowestandoneofthe mostvulnerablepartsofthesystemisthecommunicationswithinthevehicle.Thevehiclenetworks mustensuretheintegrityandauthenticityofmessagestransmittedtoguaranteesoftwareprogrammed ontoECUsareauthorizedandtamper-free.Specialisthardwarewithinthevehiclemakesthispossible inanoperationenvironment,suchashardwaresecuritymodules. KeyWORdS Electronic Control Units, Automated Cars, Over-The-Air Updates, Connected Vehicles, Security, Cryptography, Hardware Security Module, Trust
无线(OTA)updateisamethodforvehiclemanufacturerstoremotelydistributemaintenance更新,performance,andfeatureenhancementsthroughthevehicle 'slifespan。Recallsofvehicles costthemanufacturesalotofmoney。OTAsolvestherecallissue,whileallowingconsumerstopay forservicesandfeaturesviaanupdate。TheOTAecosystemincludesthecoderswhofirstdeveloped固件,第一级供应商,车辆制造商,以及车辆本身。目前有:manufacturersdesignedthenetworksforspeedandresponsiveness,andnotsecurity。Thisarticle examinestheseelementsanddrillsintothesecurityavailableforeach。Theslowestandoneofthe mostvulnerablepartsofthesystemisthecommunicationswithinthevehicle。Thevehiclenetworks mustensuretheintegrityandauthenticityofmessagestransmittedtoguaranteesoftwareprogrammed ontoECUsareauthorizedandtamper-free。Specialisthardwarewithinthevehiclemakesthispossible inanoperationenvironment,suchashardwaresecuritymodules。关键词:电子控制单元,自动驾驶汽车,无线更新,联网汽车,安全,密码学,硬件安全模块,信任
{"title":"The Security Aspects of Automotive Over-the-Air Updates","authors":"J. Howden, L. Maglaras, M. Ferrag","doi":"10.4018/ijcwt.2020040104","DOIUrl":"https://doi.org/10.4018/ijcwt.2020040104","url":null,"abstract":"Over-the-air(OTA)updateisamethodforvehiclemanufacturerstoremotelydistributemaintenance updates,performance,andfeatureenhancementsthroughthevehicle’slifespan.Recallsofvehicles costthemanufacturesalotofmoney.OTAsolvestherecallissue,whileallowingconsumerstopay forservicesandfeaturesviaanupdate.TheOTAecosystemincludesthecoderswhofirstdeveloped the firmware, the 1st Tier suppliers, the vehicle manufacturers, and the vehicle itself. Currently, manufacturersdesignedthenetworksforspeedandresponsiveness,andnotsecurity.Thisarticle examinestheseelementsanddrillsintothesecurityavailableforeach.Theslowestandoneofthe mostvulnerablepartsofthesystemisthecommunicationswithinthevehicle.Thevehiclenetworks mustensuretheintegrityandauthenticityofmessagestransmittedtoguaranteesoftwareprogrammed ontoECUsareauthorizedandtamper-free.Specialisthardwarewithinthevehiclemakesthispossible inanoperationenvironment,suchashardwaresecuritymodules. KeyWORdS Electronic Control Units, Automated Cars, Over-The-Air Updates, Connected Vehicles, Security, Cryptography, Hardware Security Module, Trust","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"27 1","pages":"64-81"},"PeriodicalIF":0.5,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85448899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Cyber-Security for ICS/SCADA ICS/SCADA的网络安全
IF 0.5 Q4 POLITICAL SCIENCE Pub Date : 2020-01-01 DOI: 10.4018/978-1-7998-2466-4.ch038
Barend Pretorius, B. van Niekerk
Industrial control systems (ICS) or supervisory, control, and data acquisition (SCADA) systems drive many key components of the national infrastructure. It makes these control systems targets for cyber-attacks by terrorists and nation-states who wish to damage their target economically and socially, and cyber-criminals who blackmail the companies operating the infrastructure. Despite the high risk of leaving these systems exposed, providing adequate cyber-security is often challenging. The Stuxnet worm illustrated how vulnerable control systems potentially are when it bypassed a number of security mechanisms to cause physical damage to an Iranian nuclear facility. The article focuses on ICS/SCADA in South Africa discussing the unique challenges and legislation relate to securing control system in the South Africa. A governance and security framework for overcoming these challenges are proposed.
工业控制系统(ICS)或监督、控制和数据采集(SCADA)系统驱动着国家基础设施的许多关键组件。这使得这些控制系统成为恐怖分子和民族国家网络攻击的目标,这些恐怖分子和民族国家希望在经济和社会上破坏他们的目标,而网络犯罪分子则勒索运营基础设施的公司。尽管让这些系统暴露在外的风险很高,但提供足够的网络安全通常是具有挑战性的。当Stuxnet蠕虫绕过许多安全机制对伊朗核设施造成物理破坏时,它说明了控制系统的潜在脆弱性。本文以南非的ICS/SCADA为例,讨论了南非控制系统安全的独特挑战和立法。提出了克服这些挑战的治理和安全框架。
{"title":"Cyber-Security for ICS/SCADA","authors":"Barend Pretorius, B. van Niekerk","doi":"10.4018/978-1-7998-2466-4.ch038","DOIUrl":"https://doi.org/10.4018/978-1-7998-2466-4.ch038","url":null,"abstract":"Industrial control systems (ICS) or supervisory, control, and data acquisition (SCADA) systems drive many key components of the national infrastructure. It makes these control systems targets for cyber-attacks by terrorists and nation-states who wish to damage their target economically and socially, and cyber-criminals who blackmail the companies operating the infrastructure. Despite the high risk of leaving these systems exposed, providing adequate cyber-security is often challenging. The Stuxnet worm illustrated how vulnerable control systems potentially are when it bypassed a number of security mechanisms to cause physical damage to an Iranian nuclear facility. The article focuses on ICS/SCADA in South Africa discussing the unique challenges and legislation relate to securing control system in the South Africa. A governance and security framework for overcoming these challenges are proposed.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"86 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73468594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Big Data Analytics Platforms for Electric Vehicle Integration in Transport Oriented Smart Cities 面向交通的智慧城市电动汽车集成的大数据分析平台
IF 0.5 Q4 POLITICAL SCIENCE Pub Date : 2020-01-01 DOI: 10.4018/978-1-7998-2466-4.ch051
M. Hussain, M. Beg, M. S. Alam, S. Laskar
Electric vehicles (EVs) are key players for transport oriented smart cities (TOSC) powered by smart grids (SG) because they help those cities to become greener by reducing vehicle emissions and carbon footprint. In this article, the authors analyze different use-cases to show how big data analytics (BDA) can play vital role for successful electric vehicle (EV) to smart grid (SG) integration. Followed by this, this article presents an edge computing model and highlights the advantages of employing such distributed edge paradigms towards satisfying the store, compute and networking (SCN) requirements of smart EV applications in TOSCs. This article also highlights the distinguishing features of the edge paradigm, towards supporting BDA activities in EV to SG integration in TOSCs. Finally, the authors provide a detailed overview of opportunities, trends, and challenges of both these computing techniques. In particular, this article discusses the deployment challenges and state-of-the-art solutions in edge privacy and edge forensics.
电动汽车(ev)是由智能电网(SG)供电的交通导向智能城市(TOSC)的关键参与者,因为它们通过减少汽车排放和碳足迹,帮助这些城市变得更环保。在本文中,作者分析了不同的用例,以展示大数据分析(BDA)如何在成功的电动汽车(EV)与智能电网(SG)集成中发挥重要作用。随后,本文提出了一种边缘计算模型,并强调了采用这种分布式边缘范式来满足tosc中智能电动汽车应用的存储、计算和网络(SCN)需求的优势。本文还强调了边缘范式的显著特征,以支持EV中的BDA活动到tosc中的SG集成。最后,作者详细概述了这两种计算技术的机遇、趋势和挑战。本文特别讨论了边缘隐私和边缘取证方面的部署挑战和最先进的解决方案。
{"title":"Big Data Analytics Platforms for Electric Vehicle Integration in Transport Oriented Smart Cities","authors":"M. Hussain, M. Beg, M. S. Alam, S. Laskar","doi":"10.4018/978-1-7998-2466-4.ch051","DOIUrl":"https://doi.org/10.4018/978-1-7998-2466-4.ch051","url":null,"abstract":"Electric vehicles (EVs) are key players for transport oriented smart cities (TOSC) powered by smart grids (SG) because they help those cities to become greener by reducing vehicle emissions and carbon footprint. In this article, the authors analyze different use-cases to show how big data analytics (BDA) can play vital role for successful electric vehicle (EV) to smart grid (SG) integration. Followed by this, this article presents an edge computing model and highlights the advantages of employing such distributed edge paradigms towards satisfying the store, compute and networking (SCN) requirements of smart EV applications in TOSCs. This article also highlights the distinguishing features of the edge paradigm, towards supporting BDA activities in EV to SG integration in TOSCs. Finally, the authors provide a detailed overview of opportunities, trends, and challenges of both these computing techniques. In particular, this article discusses the deployment challenges and state-of-the-art solutions in edge privacy and edge forensics.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"46 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80371753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
International Journal of Cyber Warfare and Terrorism
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1