{"title":"Problems of Safety in the Evolving Industrial Environment and the Development of Information Technology: The Human Factor","authors":"Valeriy Mygal, G. Mygal, Stanislav Mygal","doi":"10.11610/isij.5316","DOIUrl":"https://doi.org/10.11610/isij.5316","url":null,"abstract":"","PeriodicalId":414780,"journal":{"name":"Information & Security: An International Journal","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122338714","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
: To address the cybersecurity, safety, and reliability aspects of the entire dig-italized ecosystems, we need first to understand and possibly model how the respective computer systems of different participating entities interoperate and collaborate. Modern computer systems and emerging applications are not just large-scale and complex in the digitally connected world. We categorize them also as decentralized, distributed, networked, interoperable compositions of heterogeneous and (semi)autonomous systems and/or elements. These new types of composite systems with emergent behavior have been defined as “Systems of Systems” (SoS). This paper explores different types of SoS and analyzes the interdependencies to manage cybersecurity threats and risks and achieve cyber resilience. We review various definitions and types of SoS and the application of SoS approach to situational awareness, threat intelligence, and composite risk assessment. An SoS view on managing the supply/value chain cyber risks is also outlined.
{"title":"A System-of-Systems Approach to Cyber Security and Resilience","authors":"George Sharkov","doi":"10.11610/isij.3706","DOIUrl":"https://doi.org/10.11610/isij.3706","url":null,"abstract":": To address the cybersecurity, safety, and reliability aspects of the entire dig-italized ecosystems, we need first to understand and possibly model how the respective computer systems of different participating entities interoperate and collaborate. Modern computer systems and emerging applications are not just large-scale and complex in the digitally connected world. We categorize them also as decentralized, distributed, networked, interoperable compositions of heterogeneous and (semi)autonomous systems and/or elements. These new types of composite systems with emergent behavior have been defined as “Systems of Systems” (SoS). This paper explores different types of SoS and analyzes the interdependencies to manage cybersecurity threats and risks and achieve cyber resilience. We review various definitions and types of SoS and the application of SoS approach to situational awareness, threat intelligence, and composite risk assessment. An SoS view on managing the supply/value chain cyber risks is also outlined.","PeriodicalId":414780,"journal":{"name":"Information & Security: An International Journal","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129772188","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Capture the Flag for Cyber-Resilience Exercising through Cryptographic Puzzles and Collaborative Problem-Solving","authors":"George Sharkov, Christina Todorova","doi":"10.11610/isij.3707","DOIUrl":"https://doi.org/10.11610/isij.3707","url":null,"abstract":"","PeriodicalId":414780,"journal":{"name":"Information & Security: An International Journal","volume":"131 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123780100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enhanced Collaboration for Cyber Security and Resilience","authors":"George Sharkov, W. Mees","doi":"10.11610/isij.5300","DOIUrl":"https://doi.org/10.11610/isij.5300","url":null,"abstract":"","PeriodicalId":414780,"journal":{"name":"Information & Security: An International Journal","volume":"158 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122802100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Software Tool ASR for a posteriori Cryptanalysis on Public Keys Generated with ‘RSA’","authors":"T. Baicheva, Miroslav M. Dimitrov","doi":"10.11610/isij.3702","DOIUrl":"https://doi.org/10.11610/isij.3702","url":null,"abstract":"","PeriodicalId":414780,"journal":{"name":"Information & Security: An International Journal","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134629251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ventsislav Polimenov, Katya Dimitrova, I. Mladenova, Kamen Iliev
{"title":"The Hackathons as a First Step to Build Digital Competences","authors":"Ventsislav Polimenov, Katya Dimitrova, I. Mladenova, Kamen Iliev","doi":"10.11610/isij.5313","DOIUrl":"https://doi.org/10.11610/isij.5313","url":null,"abstract":"","PeriodicalId":414780,"journal":{"name":"Information & Security: An International Journal","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124718296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Transformation of UML Design Models of Information Security System into Agent-based Simulation Models","authors":"Ivan Gaidarski, P. Kutinchev","doi":"10.11610/isij.5305","DOIUrl":"https://doi.org/10.11610/isij.5305","url":null,"abstract":"","PeriodicalId":414780,"journal":{"name":"Information & Security: An International Journal","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129881087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The C-factor in the Cybersecurity Equation: The Importance of Student Cybersecurity Competitions","authors":"Lora Pitman, B. Payne","doi":"10.11610/isij.5403","DOIUrl":"https://doi.org/10.11610/isij.5403","url":null,"abstract":"","PeriodicalId":414780,"journal":{"name":"Information & Security: An International Journal","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125464303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cyber Red Teaming: Overview of Sly, an Orchestration Tool","authors":"Paloma de la Vallée","doi":"10.11610/isij.5318","DOIUrl":"https://doi.org/10.11610/isij.5318","url":null,"abstract":"","PeriodicalId":414780,"journal":{"name":"Information & Security: An International Journal","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132433108","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Tremori, S. B. Godfrey, L. Berretta, Arnau Carrera Viñas, Pavlina Nikolova, I. Hutov
{"title":"Simulation-Based Training with Gamified Components for Augmented Border Protection","authors":"A. Tremori, S. B. Godfrey, L. Berretta, Arnau Carrera Viñas, Pavlina Nikolova, I. Hutov","doi":"10.11610/isij.5317","DOIUrl":"https://doi.org/10.11610/isij.5317","url":null,"abstract":"","PeriodicalId":414780,"journal":{"name":"Information & Security: An International Journal","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127748929","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}