The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The rapid digitalisation of the hospitality industry over recent years has brought forth many new points of attack for consideration. The hasty implementation of these systems has created a reality in which businesses are using the technical solutions, but employees have very little awareness when it comes to the threats and implications that they might present. This gap in awareness is further compounded...
The paper pertains to the cyber-security challenges in Industry 4.0 that cyber-security experts have to deal with nowadays. Due to the nature of Industry 4.0, where all devices in manufacturing technologies are interconnected, exchanging data and information with each other, broadens the cyber-lands horizons for cyber-criminals to exploit them in their interest. The paper makes reference to the industrial...
We operate a newly opened research and design organization at an undergraduate military service academy. Our mission is to focus on and rapidly improve cyberspace defenses for our government by solving tough operational problems and teaching our students to do the same, increasing the level of agility and innovation in government, attributes that are badly needed to keep pace with malicious state...
The Automotive industry is changing rapidly, as classical automotive engineering and information and communication technologies (ICT) converge. Digitization, new mobility concepts, e-mobility, and autonomous driving require a permanent connection with the Internet and transform the car into a very complex cyber-physical system. However, with this connectivity the car becomes vulnerable to cyber attacks...
Summary form only given, as follows. The NATO Cooperative Cyber Defence Centre of Excellence is a NATO-accredited knowledge hub, research institution, and training and exercise facility. The Tallinn-based international military organisation focuses on interdisciplinary applied research, consultations, trainings and exercises in the field of cyber security. NATO CCD COE is the home of the Tallinn Manual...
Critical infrastructure, which used in energy, industry, and financial area, is one of essential components for modern society. Thus, critical infrastructures and its availability must be kept secure. Inspecting cyber threat is needed to prevent cyber-attack on critical infrastructure. By using OSINT (Open Source INTelligence) process, it is possible to gather meaningful intelligence related to security...
In this paper, we investigate the value of Payment Card Industry Data Security Standard (PCI DSS) by examining popular implementations of hosted payment processing solutions. First, we will dive into Card Connect, a registered ISO of Wells Fargo Bank, and see how their client-side-dependent model allows for trivial manipulation. Then we look at Card Connect plugins for more widespread vulnerabilities...
In fall 2002, Towson University launched an undergraduate computer security track within its computer science program. This program was the first undergraduate program in the state of Maryland with a strong and technical computer security focus and among the first in the country addressing the shortage of skilled cybersecurity professionals. Since its inception, this program has gone through several...
Shortage of qualified cybersecurity workforce is a national problem. Without an effective solution, people's daily lives, business operations, and even national security are in jeopardy. Higher education institutions have invested in various approaches to train college students to acquire cybersecurity related knowledge, skills, and abilities. The existing approaches still need improvement and refinement...
Cyber criminals increasingly target Small and Medium Sized Businesses (SMEs) since they are perceived to have the weakest defences. Some will not survive a cyber attack, and others will have their ability to continue trading seriously impaired. There is compelling evidence that, at present, SMEs do not seem to be implementing all the advisable security measures which could help them to resist such...
The IEEE Standards Association is primarily known for its extensive set of published standards, for example 802.3 Ethernet, and the process used to bring together experts from around the world to contribute to standards development. But there are occasions where industry wants to discuss technology trends and options without an immediate plan to produce a standard.
As a recent emerging industry, cybersecurity insurance has been growing ambitiously fast, which mainly serves the financial industry and assists financial firms to reduce cybersecurity risks. Understanding the risk classification is an important hemisphere for operating cybersecurity insurance. However, the classification representation will be complicated when the service system becomes large. Improper...
The dramatical development of Web-based technology has been empowering enormous change in various domains. Cloud-based solutions have remarkably widened business models with multiple value creation channels. The financial industry is a major beneficiary of leveraging these emerging new technologies, such as big data and cloud-related services. This great changing trend has also led to a great concern...
The remarkable increasing demands of mitigating losses from cyber incidents for financial firms has been driving the rapid development of the Cybersecurity Insurance (CI). The implementations of CI have covered a variety of aspects in cyber incidents, from hacking to frauds. However, CI is still at its exploring stage so that there are a number of dimensions that are uncovered by the current applications...
In this paper, we describe a partnership between the Central Illinois Center of Excellence for Secure Software (CICESS) and Illinois Central College (ICC) that resulted in the creation of a two-year degree program in Secure Software Development. That program incorporated an apprenticeship model and the Software Engineering Institute's software assurance curriculum recommendations at the community...
The nature of cyberspace continues to evolve, and so do the associated threats. The focus of the cyber security industry is typically (and understandably) on high-value assets. However, there is a large user group intersecting with corporate and government IT users, which lacks the resources -- in terms of finance, time and/or knowledge -- to deal with the threats that they face. We argue that greater...
New and innovative cybersecurity technologies are essential to ensure that information systems and critical infrastructure are secure and resilient. These technologies must also meet the needs of IT professionals and be available via channels acceptable to such users. The US Department of Homeland Security Science and Technology Directorate's cybersecurity R&D program funds top researchers...
We are living in a world which is continually evolving and where modern conflicts have moved to the cyber domain. In its 2010 Strategic Concept, NATO affirmed its engagement to reinforce the defence and deterrence of its state members. In this light, it has been suggested that the gamification of training and education for cyber security will be beneficial. Although serious games have demonstrated...
This paper presents a present status of cyber security of critical infrastructures, which are controlled by microcomputers and connected through the network system, including Internet. There is strong possibility of cyber attack and some defense is necessary. The defense along Control System Security Center, which is established in 2012, is shown here.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.