WorldWideScience

Sample records for cross-sector cyber security

  1. A Comparison of Cross-Sector Cyber Security Standards

    Energy Technology Data Exchange (ETDEWEB)

    Robert P. Evans

    2005-09-01

    This report presents a review and comparison (commonality and differences) of three cross-sector cyber security standards and an internationally recognized information technology standard. The comparison identifies the security areas covered by each standard and reveals where the standards differ in emphasis. By identifying differences in the standards, the user can evaluate which standard best meets their needs. For this report, only cross-sector standards were reviewed.

  2. Cyber security

    CERN Document Server

    Voeller, John G

    2014-01-01

    Cyber Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering topics related to cyber security metrics and measure  and related technologies that meet security needs. Specific applications to web services, the banking and the finance sector, and industrial process control systems are discussed.

  3. Cyber Security : Home User's Perspective

    OpenAIRE

    Ikonen, Mikko

    2014-01-01

    Cyber security is important to understand for home users. New technology allows for new cyber threats to emerge and new solutions must be considered to counter them. Nearly every device is connected to the Internet and this opens new possibilities and threats to cyber security. This Bachelor's thesis explores the different aspects of cyber security and suggests solutions to different cyber security issues found. The different aspects of cyber security under research here include personal ...

  4. Metaphors for cyber security.

    Energy Technology Data Exchange (ETDEWEB)

    Moore, Judy Hennessey; Parrott, Lori K.; Karas, Thomas H.

    2008-08-01

    This report is based upon a workshop, called 'CyberFest', held at Sandia National Laboratories on May 27-30, 2008. Participants in the workshop came from organizations both outside and inside Sandia. The premise of the workshop was that thinking about cyber security from a metaphorical perspective could lead to a deeper understanding of current approaches to cyber defense and perhaps to some creative new approaches. A wide range of metaphors was considered, including those relating to: military and other types of conflict, biological, health care, markets, three-dimensional space, and physical asset protection. These in turn led to consideration of a variety of possible approaches for improving cyber security in the future. From the proposed approaches, three were formulated for further discussion. These approaches were labeled 'Heterogeneity' (drawing primarily on the metaphor of biological diversity), 'Motivating Secure Behavior' (taking a market perspective on the adoption of cyber security measures) and 'Cyber Wellness' (exploring analogies with efforts to improve individual and public health).

  5. Maritime Cyber Security University Research

    Science.gov (United States)

    2016-05-01

    i Classification | CG-926 RDC | author | audience | month year Maritime Cyber Security University Research Phase I - Final Report...Distribution Statement A: Approved for public release; distribution is unlimited. May 2016 Report No. CG-D-06-16 Maritime Cyber Security ...Director United States Coast Guard Research & Development Center 1 Chelsea Street New London, CT 06320 Maritime Cyber Security University

  6. CYBER SECURITY FOR AIRPORTS

    Directory of Open Access Journals (Sweden)

    Kasthurirangan Gopalakrishnan

    2013-12-01

    Full Text Available In today’s information age, government organizations and business enterprises are heavily relying on interconnected computer systems to manage a variety of public services including energy, transportation, water, etc. While this increased connectivity has many operational advantages benefitting the public, they have also become vulnerable to cyber attacks such as Corporate Security Breaches, Spear Phishing, and Social Media Fraud. The aviation sector is one the critical infrastructure systems that is not only vulnerable to physical threats, but also cyber threats, especially with the increased use of Bring Your Own Device (BYOD at airports. It has been recognized that there is currently no cyber security standards established for airports in the United States as the existing standards have mainly focused on aircraft Control System (CS. This paper summarizes the need, background, ongoing developments and research efforts with respect to the establishment of cyber-security standards and best practices at U.S. airports with special emphasis on cyber security education and literacy.

  7. CENTER FOR CYBER SECURITY STUDIES

    Data.gov (United States)

    Federal Laboratory Consortium — The mission of the Center for Cyber Security Studies is to enhance the education of midshipmen in all areas of cyber warfare, to facilitate the sharing of expertise...

  8. Cyber Security Evaluation Tool

    Energy Technology Data Exchange (ETDEWEB)

    2009-08-03

    CSET is a desktop software tool that guides users through a step-by-step process to assess their control system network security practices against recognized industry standards. The output from CSET is a prioritized list of recommendations for improving the cyber security posture of your organization’s ICS or enterprise network. CSET derives the recommendations from a database of cybersecurity standards, guidelines, and practices. Each recommendation is linked to a set of actions that can be applied to enhance cybersecurity controls.

  9. INFORMATION SYSTEM SECURITY (CYBER SECURITY

    Directory of Open Access Journals (Sweden)

    Muhammad Siddique Ansari

    2016-03-01

    system force and structure reliance – are discovered and tantamount with EU nations. Thusly I indicated reason viewpoints and figures of security of data structures it additionally relates to the reason of estimation of transient dangers of security of frameworks for that I begin my proposal with one of the fundamental class of data security which is Cyber security. Keyword : Cyber Security, IT

  10. Cyber Security Applications: Freeware & Shareware

    Science.gov (United States)

    Rogers, Gary; Ashford, Tina

    2015-01-01

    This paper will discuss some assignments using freeware/shareware instructors can find on the Web to use to provide students with hands-on experience in this arena. Also, the college, Palm Beach State College, via a grant with the U.S. Department of Labor, has recently purchased a unique cyber security device that simulates cyber security attacks…

  11. Towards a cyber secure society

    CSIR Research Space (South Africa)

    Labuschagne, WA

    2012-10-01

    Full Text Available in Bahrain Syria ? CSIR 2012 Slide 12 What is possible ? CSIR 2012 Slide 13 Cyber Defence Areas ? CSIR 2012 Slide 14 Network Attack Prediction Security Awareness Social Engineering Network Attack Prediction ? CSIR 2012 Slide 15 Network Attack... Goal Class Some Phase Class Actor Class Aggressor Class Some Single Single Security Awareness ? CSIR 2012 Slide 19 Motivation for the project ? CSIR 2012 Slide 20 Self-defence course for internet users Cyber Security Awareness Training...

  12. Cyber terrorism and cyber-crime – threats for cyber security

    OpenAIRE

    Ackoski, Jugoslav; Dojcinovski, Metodija

    2012-01-01

    This paper has aim to give contribution in supporting efforts against cyber threats recognized as a cyber terrorism and cyber crime. Also, it has aim to show future challenges related to cyber security and their emerging threats – cyber war, cyber terrorism and cyber crime. Accelerate weapon development called ICT (Information Communication Technology) which is developed every day faster and faster, and development of human conscious on higher level about consequences of ICT enormous pene...

  13. Cyber Security and Resilient Systems

    Energy Technology Data Exchange (ETDEWEB)

    Robert S. Anderson

    2009-07-01

    The Department of Energy (DOE) Idaho National Laboratory (INL) has become a center of excellence for critical infrastructure protection, particularly in the field of cyber security. It is one of only a few national laboratories that have enhanced the nation’s cyber security posture by performing industrial control system (ICS) vendor assessments as well as user on-site assessments. Not only are vulnerabilities discovered, but described actions for enhancing security are suggested – both on a system-specific basis and from a general perspective of identifying common weaknesses and their corresponding corrective actions. These cyber security programs have performed over 40 assessments to date which have led to more robust, secure, and resilient monitoring and control systems for the US electrical grid, oil and gas, chemical, transportation, and many other sectors. In addition to cyber assessments themselves, the INL has been engaged in outreach to the ICS community through vendor forums, technical conferences, vendor user groups, and other special engagements as requested. Training programs have been created to help educate all levels of management and worker alike with an emphasis towards real everyday cyber hacking methods and techniques including typical exploits that are used. The asset owner or end user has many products available for its use created from these programs. One outstanding product is the US Department of Homeland Security (DHS) Cyber Security Procurement Language for Control Systems document that provides insight to the user when specifying a new monitoring and control system, particularly concerning security requirements. Employing some of the top cyber researchers in the nation, the INL can leverage this talent towards many applications other than critical infrastructure. Monitoring and control systems are used throughout the world to perform simple tasks such as cooking in a microwave to complex ones such as the monitoring and control of the

  14. European Cyber Security Perspectives 2015

    NARCIS (Netherlands)

    Baloo, J.; Geveke, H.G.; Paulissen, W.; Vries, H. de

    2015-01-01

    Following the success of last year’s publication, we are proud to present the second edition of our European Cyber Security Perspectives report. Through this collection of articles, we aim to share our different perspectives and insights, the latest developments and achievements in the field of cybe

  15. European Cyber Security Perspectives 2015

    NARCIS (Netherlands)

    Baloo, J.; Geveke, H.G.; Paulissen, W.; Vries, H. de

    2015-01-01

    Following the success of last year’s publication, we are proud to present the second edition of our European Cyber Security Perspectives report. Through this collection of articles, we aim to share our different perspectives and insights, the latest developments and achievements in the field of

  16. Cyber security awareness toolkit for national security: an approach to South Africa's cyber security policy implementation

    CSIR Research Space (South Africa)

    Phahlamohlaka, LJ

    2011-05-01

    Full Text Available The aim of this paper is to propose an approach that South Africa could follow in implementing its proposed cyber security policy. The paper proposes a Cyber Security Awareness Toolkit that is underpinned by key National Security imperatives...

  17. Importance of Cyber Security

    National Research Council Canada - National Science Library

    Rajesh Kumar Goutam

    2015-01-01

    ... to secure sensitive business and personal information, as well as to protect national security. The paper details about the nature of cyberspace and shows how the internet is unsecure to transmit the confidential and financial information...

  18. Maritime Cyber Security University Research: Phase 1

    Science.gov (United States)

    2016-05-01

    the global economy . The vulnerabilities associated with reliance on digital systems in the maritime environment must be continuously examined. System...2016 TABLE OF CONTENTS   APPENDIX A.  INFORMATION SHARING FOR MARITIME CYBER RISK MANAGEMENT...al. Public | May 2016 APPENDIX A. INFORMATION SHARING FOR MARITIME CYBER RISK MANAGEMENT Maritime Cyber Security University Research

  19. Microgrid cyber security reference architecture.

    Energy Technology Data Exchange (ETDEWEB)

    Veitch, Cynthia K.; Henry, Jordan M.; Richardson, Bryan T.; Hart, Derek H.

    2013-07-01

    This document describes a microgrid cyber security reference architecture. First, we present a high-level concept of operations for a microgrid, including operational modes, necessary power actors, and the communication protocols typically employed. We then describe our motivation for designing a secure microgrid; in particular, we provide general network and industrial control system (ICS)-speci c vulnerabilities, a threat model, information assurance compliance concerns, and design criteria for a microgrid control system network. Our design approach addresses these concerns by segmenting the microgrid control system network into enclaves, grouping enclaves into functional domains, and describing actor communication using data exchange attributes. We describe cyber actors that can help mitigate potential vulnerabilities, in addition to performance bene ts and vulnerability mitigation that may be realized using this reference architecture. To illustrate our design approach, we present a notional a microgrid control system network implementation, including types of communica- tion occurring on that network, example data exchange attributes for actors in the network, an example of how the network can be segmented to create enclaves and functional domains, and how cyber actors can be used to enforce network segmentation and provide the neces- sary level of security. Finally, we describe areas of focus for the further development of the reference architecture.

  20. Multi sensor national cyber security data fusion

    CSIR Research Space (South Africa)

    Swart, I

    2015-03-01

    Full Text Available information security posture and to improve on it. The potential attack surface of a nation is extremely large however and no single source of cyber security data provides all the required information to accurately describe the cyber security readiness of a...

  1. Kanttekeningen bij de Europese cyber security strategie

    NARCIS (Netherlands)

    Luiijf, H.A.M.; Smulders, A.C.M.; Kamphuis, P.

    2013-01-01

    In februari presenteerde de Europese Unie de Europese cyber security strategie en begeleidende concept richtlijn. The Hague Security Delta (HSD) is verheugd dat de Nederlandse Nationale Cyber Security Strategie nu ook op Europees niveau navolging krijgt. Toch plaatsen we een paar kantekeningen.

  2. Kanttekeningen bij de Europese cyber security strategie

    NARCIS (Netherlands)

    Luiijf, H.A.M.; Smulders, A.C.M.; Kamphuis, P.

    2013-01-01

    In februari presenteerde de Europese Unie de Europese cyber security strategie en begeleidende concept richtlijn. The Hague Security Delta (HSD) is verheugd dat de Nederlandse Nationale Cyber Security Strategie nu ook op Europees niveau navolging krijgt. Toch plaatsen we een paar kantekeningen.

  3. Cyber Crime & Cyber War – "Part of the Game": Cyber Security, Quo Vadis?

    Directory of Open Access Journals (Sweden)

    Karl H. Stingeder

    2015-09-01

    Full Text Available Welche Rolle spielt Cyber Crime gegenwärtig? Was unterscheidet Cyber Crime von Cyber War? Wie muss Cyber Security gestaltet sein, um effektiven Schutz nachhaltig zu gewährleisten? Cyber Crime-Aktivitäten kennzeichnen sich häufig durch eine einfache Zugänglichkeit von betrügerischem Know-How und technischen Hilfsmitteln. Bedingt durch eine schleppende und mangelhafte Umsetzung von koordinierten Gegenmaßnahmen, resultieren Cyber-Delikte in einem Low-Risk und High-Reward Szenario für Cyber-Kriminelle. Je organisierter und spezialisierter ein Cyber-Crime-Netzwerk gestaltet ist, desto größer wird das Schadenspotenzial. Cyber Crime ist der Überbegriff für betrügerische Aktivitäten über das Internet. Diese stützen sich auf das Vorbild von "traditionellen" Offline-Kriminalitätsverhaltensmustern, welche durch das technologische Spektrum des Internets einfach zugänglich sind. Nichtsdestoweniger ist es die technische Ausführung der Delikte, die ein wesentliches Unterscheidungsmerkmal zwischen Online- und Offline-Betrug bildet. Auch steht die für organisierte, kriminelle Verbindungen, so auch für Regierungen oder Terrororganisationen geringere Hemmschwelle für eine militärische Instrumentalisierung des Internets im Brennpunkt von Cyber Security. Erfolgen Cyber Crime Aktivitäten unter dem Anspruch der Verfolgung politischer Ziele, sprechen wir von Cyber War. Nachhaltige, gegen Cyber Crime und Cyber War gerichtete Cyber Security-Maßnahmen finden in einem hochdynamischen Umfeld statt. Cyber-Kriminelle sind im Regelfall logistisch und finanziell gut ausgestattet. Viele werden von Regierungen unterstützt. Cyber Crime-Player verfügen über weitreichende technische Fähigkeiten, sodass sie maßgeschneiderte Schadprogramme (Malware für ihre Ziele entwickeln können. Aktuell fehlt vielen Unternehmen und öffentlichen Institutionen das Bewusstsein für die Notwendigkeit von Abwehrsystemen. Ein Cyber Security-Fokus auf Pr

  4. Ten national cyber security strategies: A comparison

    NARCIS (Netherlands)

    Luiijf, H.A.M.; Besseling, K. van; Spoelstra, M.; Graaf, P. de

    2013-01-01

    A number of nations developed and published a national cyber security strategy (NCSS). Most of them were published in the period 2009 - 2011. Despite the fact that each of these NCSS intends to address the cyber security threat, large differences exist between the NCSS approaches. This paper analyse

  5. Nuclear Cyber Security Issues and Policy Recommendations

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Cheol-Kwon; Lee, Dong-Young [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of); Lee, Na-Young; Hwang, Young-Soo [Korea Institute of Nuclear Nonproliferation and Control, Daejeon (Korea, Republic of)

    2015-10-15

    The cyber-attack against computer systems causes the loss of function which brings about the big economic loss, and it becomes a national-wide issue. In recent days the cyber threat has occurred in the national critical infrastructure around the world. In the nuclear industry, while discussing responses to various threats against nuclear facilities since 2006, cyber-terrorism was also discussed. But at that time, cyber-attacks against control networks in nuclear facilities were not seriously considered because those networks were isolated from the Internet thoroughly and it was evaluated that cyber penetration would not be possible. However Stuxnet worm virus which attacked Iran's nuclear facilities confirmed that the cyber security problem could occur even in other nuclear facilities. The facilities were isolated from the Internet. After the cyber incident, we began to discuss the topic of NPP cyber security. It is very difficult to predict whether or when or how the cyber-attack will be occurred, which is a characteristic of cyber-attack. They could be always detected only after when an incident had occurred. This paper summarizes the report, 'Nuclear Cyber Security Issues and Policy Recommendations' by issue committee in the Korea Nuclear Society, which reviewed the cyber security framework for nuclear facilities in the Republic of Korea being established to prevent nuclear facilities from cyber-attacks and to respond systematically. As a result this paper proposes several comments to improve the security and furthermore safety of nuclear facilities Digital technology will be used more widely at the national critical infrastructure including nuclear facilities in the future, and moreover wireless technologies and mobile devices will be soon introduced to nuclear industry. It is therefore anticipated that the rapid advance in digital technology will accelerate the opportunity of hacking these facilities.

  6. Mathematical and Statistical Opportunities in Cyber Security

    Energy Technology Data Exchange (ETDEWEB)

    Meza, Juan; Campbell, Scott; Bailey, David

    2009-03-23

    The role of mathematics in a complex system such as the Internet has yet to be deeply explored. In this paper, we summarize some of the important and pressing problems in cyber security from the viewpoint of open science environments. We start by posing the question 'What fundamental problems exist within cyber security research that can be helped by advanced mathematics and statistics'? Our first and most important assumption is that access to real-world data is necessary to understand large and complex systems like the Internet. Our second assumption is that many proposed cyber security solutions could critically damage both the openness and the productivity of scientific research. After examining a range of cyber security problems, we come to the conclusion that the field of cyber security poses a rich set of new and exciting research opportunities for the mathematical and statistical sciences.

  7. Strategic information security: facing the cyber impact

    CSIR Research Space (South Africa)

    Grobler, M

    2010-10-01

    Full Text Available necessitate an integrated organisational approach to information security. However, the best information security infrastructure cannot guarantee that cyber attacks and malicious intrusions will not happen. It has become necessary to face the impact...

  8. Cyber security analytics, technology and automation

    CERN Document Server

    Neittaanmäki, Pekka

    2015-01-01

    Over the last two decades, the Internet and more broadly cyberspace has had a tremendous impact on all parts of society. Governments across the world have started to develop cyber security strategies and to consider cyberspace as an increasingly important international issue. The book, in addition to the cyber threats and technology, processes cyber security from many sides as a social phenomenon and how the implementation of the cyber security strategy is carried out. The book gives a profound idea of the most spoken phenomenon of this time. The book is suitable for a wide-ranging audience from graduate to professionals/practitioners and researchers. Relevant disciplines for the book are  Telecommunications / Network security, Applied mathematics / Data analysis, Mobile systems / Security, Engineering / Security of critical infrastructure and Military science / Security.

  9. Information fusion for cyber-security analytics

    CERN Document Server

    Karabatis, George; Aleroud, Ahmed

    2017-01-01

    This book highlights several gaps that have not been addressed in existing cyber security research. It first discusses the recent attack prediction techniques that utilize one or more aspects of information to create attack prediction models. The second part is dedicated to new trends on information fusion and their applicability to cyber security; in particular, graph data analytics for cyber security, unwanted traffic detection and control based on trust management software defined networks, security in wireless sensor networks & their applications, and emerging trends in security system design using the concept of social behavioral biometric. The book guides the design of new commercialized tools that can be introduced to improve the accuracy of existing attack prediction models. Furthermore, the book advances the use of Knowledge-based Intrusion Detection Systems (IDS) to complement existing IDS technologies. It is aimed towards cyber security researchers. .

  10. TCIA Secure Cyber Critical Infrastructure Modernization.

    Energy Technology Data Exchange (ETDEWEB)

    Keliiaa, Curtis M. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-02-01

    The Sandia National Laboratories (Sandia Labs) tribal cyber infrastructure assurance initiative was developed in response to growing national cybersecurity concerns in the the sixteen Department of Homeland Security (DHS) defined critical infrastructure sectors1. Technical assistance is provided for the secure modernization of critical infrastructure and key resources from a cyber-ecosystem perspective with an emphasis on enhanced security, resilience, and protection. Our purpose is to address national critical infrastructure challenges as a shared responsibility.

  11. Cyber Security Audit and Attack Detection Toolkit

    Energy Technology Data Exchange (ETDEWEB)

    Peterson, Dale

    2012-05-31

    This goal of this project was to develop cyber security audit and attack detection tools for industrial control systems (ICS). Digital Bond developed and released a tool named Bandolier that audits ICS components commonly used in the energy sector against an optimal security configuration. The Portaledge Project developed a capability for the PI Historian, the most widely used Historian in the energy sector, to aggregate security events and detect cyber attacks.

  12. 75 FR 26171 - Cyber Security Certification Program

    Science.gov (United States)

    2010-05-11

    ... rely on the durability and security of IP-based networks to move capital and to track goods and... networks with better security practices. The reduced incentive for heightened cyber security likely is... improve network security. Moreover, the Commission's review of the best practices indicates that,...

  13. Realizing Scientific Methods for Cyber Security

    Energy Technology Data Exchange (ETDEWEB)

    Carroll, Thomas E.; Manz, David O.; Edgar, Thomas W.; Greitzer, Frank L.

    2012-07-18

    There is little doubt among cyber security researchers about the lack of scientic rigor that underlies much of the liter-ature. The issues are manifold and are well documented. Further complicating the problem is insufficient scientic methods to address these issues. Cyber security melds man and machine: we inherit the challenges of computer science, sociology, psychology, and many other elds and create new ones where these elds interface. In this paper we detail a partial list of challenges imposed by rigorous science and survey how other sciences have tackled them, in the hope of applying a similar approach to cyber security science. This paper is by no means comprehensive: its purpose is to foster discussion in the community on how we can improve rigor in cyber security science.

  14. Cyber Security: A Crisis of Prioritization

    Science.gov (United States)

    2005-02-01

    Infrastructure Protection ( CIIP ) become the focal point for coordinating Federal cyber security R&D efforts. This working group should be strengthened...the: • Interagency Working Group on Critical Information Infrastructure Protection (IWG/ CIIP ), which is part of the National Science and Technology...the agencies’ cyber security research programs and agendas – has largely been missing. The Committee notes that the IWG/ CIIP has recently begun a

  15. Mathematical and Statistical Opportunities in Cyber Security

    OpenAIRE

    Meza, Juan; Campbell, Scott; Bailey, David

    2009-01-01

    The role of mathematics in a complex system such as the Internet has yet to be deeply explored. In this paper, we summarize some of the important and pressing problems in cyber security from the viewpoint of open science environments. We start by posing the question "What fundamental problems exist within cyber security research that can be helped by advanced mathematics and statistics?" Our first and most important assumption is that access to real-world data is necessary to understand large...

  16. Cyber Security: A Road Map for Turkey

    Science.gov (United States)

    2012-03-19

    was hacked itself. It was also a denial of service incident that executers not known. Cyber Security: Challenges Janczewski Lech and Colaric... Transportation (MOT) should take the leading role, co working with key public and private players and military, and design an effective umbrella mechanism to...with the Ministry of Transportation in the lead with the ICTA as its Operational Test Team and a Cyber Defense Foundation under the MOT as the

  17. Control Systems Cyber Security Standards Support Activities

    Energy Technology Data Exchange (ETDEWEB)

    Robert Evans

    2009-01-01

    The Department of Homeland Security’s Control Systems Security Program (CSSP) is working with industry to secure critical infrastructure sectors from cyber intrusions that could compromise control systems. This document describes CSSP’s current activities with industry organizations in developing cyber security standards for control systems. In addition, it summarizes the standards work being conducted by organizations within the sector and provides a brief listing of sector meetings and conferences that might be of interest for each sector. Control systems cyber security standards are part of a rapidly changing environment. The participation of CSSP in the development effort for these standards has provided consistency in the technical content of the standards while ensuring that information developed by CSSP is included.

  18. Computational Intelligence, Cyber Security and Computational Models

    CERN Document Server

    Anitha, R; Lekshmi, R; Kumar, M; Bonato, Anthony; Graña, Manuel

    2014-01-01

    This book contains cutting-edge research material presented by researchers, engineers, developers, and practitioners from academia and industry at the International Conference on Computational Intelligence, Cyber Security and Computational Models (ICC3) organized by PSG College of Technology, Coimbatore, India during December 19–21, 2013. The materials in the book include theory and applications for design, analysis, and modeling of computational intelligence and security. The book will be useful material for students, researchers, professionals, and academicians. It will help in understanding current research trends and findings and future scope of research in computational intelligence, cyber security, and computational models.

  19. Towards a cyber security aware rural community

    CSIR Research Space (South Africa)

    Grobler, M

    2011-08-01

    Full Text Available communities, but the current focus has been in the rural areas. The program takes on an informal work session approach with presentations and discussion sessions. The cyber security awareness program modules are divided into four main themes: physical security...

  20. Cyber Security--Are You Prepared?

    Science.gov (United States)

    Newman, Scott

    2007-01-01

    During the summer 2002 term, Oklahoma State University-Okmulgee's Information Technologies Division offered a one credit-hour network security course--which barely had adequate student interest to meet the institution's enrollment requirements. Today, OSU-Okmulgee boasts one of the nation's premier cyber security programs. Many prospective…

  1. Cyber Security--Are You Prepared?

    Science.gov (United States)

    Newman, Scott

    2007-01-01

    During the summer 2002 term, Oklahoma State University-Okmulgee's Information Technologies Division offered a one credit-hour network security course--which barely had adequate student interest to meet the institution's enrollment requirements. Today, OSU-Okmulgee boasts one of the nation's premier cyber security programs. Many prospective…

  2. Considerations on Cyber Security Assessments of Korean Nuclear Power Plants

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Jung-Woon; Song, Jae-Gu; Han, Kyung-Soo; Lee, Cheol Kwon [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of); Kang, Mingyun [E-Gonggam Co. Ltd., Daejeon (Korea, Republic of)

    2015-10-15

    Korea Institute of Nuclear Nonproliferation and Control (KINAC) has prepared the regulatory standard RS-015 based on RG 5.71. RS-015 defines the elements of a cyber security program to be established in nuclear facilities and describes the security control items and relevant requirements. Cyber security assessments are important initial activities in a cyber security program for NPPs. Cyber security assessments can be performed in the following key steps: 1) Formation of a cyber security assessment team (CSAT); 2) Identification of critical systems and critical digital assets (CDAs); 3) Plant compliance checks with the security control requirements in RS-015. Through the assessments, the current status of security controls applied to NPPs can be found out. The assessments provide baseline data for remedial activities. Additional analyses with the results from the assessments should be performed before the implementation of remedial security controls. The cyber security team at the Korea Atomic Energy Research Institute (KAERI) has studied how to perform cyber security assessments for NPPs based on the regulatory requirements. Recently, KAERI's cyber security team has performed pilot cyber security assessments of a Korean NPP. Based on this assessment experience, considerations and checkpoints which would be helpful for full-scale cyber security assessments of Korean NPPs and the implementation of remedial security controls are discussed in this paper. Cyber security assessment is one of important and immediate activities for NPP cyber security. The quality of the first assessment will be a barometer for NPP cyber security. Hence cyber security assessments of Korean NPPs should be performed elaborately.

  3. Security Games for Cyber-Physical Systems

    DEFF Research Database (Denmark)

    Vigo, Roberto; Bruni, Alessandro; Yuksel, Ender

    2013-01-01

    The development of quantitative security analyses that consider both active attackers and reactive defenders is a main challenge in the design of trustworthy Cyber-Physical Systems. We propose a game-theoretic approach where it is natural to model attacker’s and defender’s actions explicitly...

  4. Cyber Security Policy. A methodology for Determining a National Cyber-Security Alert Level

    Directory of Open Access Journals (Sweden)

    Dan Constantin TOFAN

    2012-01-01

    Full Text Available Nowadays, assuring the security of the national cyber-space has become a big issue that can only be tackled through collaborative approaches. Threats cannot be confined to a single computer system just as much as computer systems are rendered useless without being con-nected to a supporting network. The authors of this article propose an innovative architecture of a system designated to help governments collect and analyze data about cyber-security in-cidents, from different organizations, dispersed nationwide, and acting within various economic sectors. The collected data will make us able to determine a national cyber-security alert score that could help policy makers in establishing the best strategies for protecting the national cyber-space.

  5. Cyber Terrorism– Global Security Threat

    OpenAIRE

    Bogdanoski, Mitko; Petreski, Drage

    2013-01-01

    It is more than obvious that the way of conducting terrorism with the time is becoming more sophisticated. The cyber terrorism is real threat to fast technology development. Potential targets are systems which control the nation’s defenses and critical infrastructure. The terrorist of the future will win the wars without firing a shot - just by destroying infrastructure that significantly relies on information technology. The fast growth of the Internet users and Internet dependence dramat...

  6. The Soft Side of Cyber Security - Social Media

    DEFF Research Database (Denmark)

    Nissen, Thomas Elkjer

    2016-01-01

    The importance of cyber-security is growing. With the continued digitization of our everyday life we become increasingly vulnerable to cyber-attacks – also personally. Therefore, it is an issue to be taken extremely seriously.......The importance of cyber-security is growing. With the continued digitization of our everyday life we become increasingly vulnerable to cyber-attacks – also personally. Therefore, it is an issue to be taken extremely seriously....

  7. The Soft Side of Cyber Security - Social Media

    DEFF Research Database (Denmark)

    Nissen, Thomas Elkjer

    2016-01-01

    The importance of cyber-security is growing. With the continued digitization of our everyday life we become increasingly vulnerable to cyber-attacks – also personally. Therefore, it is an issue to be taken extremely seriously.......The importance of cyber-security is growing. With the continued digitization of our everyday life we become increasingly vulnerable to cyber-attacks – also personally. Therefore, it is an issue to be taken extremely seriously....

  8. Study on Nuclear Facility Cyber Security Awareness and Training Programs

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Jung-Woon; Song, Jae-Gu; Lee, Cheol-Kwon [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of)

    2016-10-15

    Cyber security awareness and training, which is a part of operational security controls, is defined to be implemented later in the CSP implementation schedule. However, cyber security awareness and training is a prerequisite for the appropriate implementation of a cyber security program. When considering the current situation in which it is just started to define cyber security activities and to assign personnel who has responsibilities for performing those activities, a cyber security awareness program is necessary to enhance cyber security culture for the facility personnel to participate positively in cyber security activities. Also before the implementation of stepwise CSP, suitable education and training should be provided to both cyber security teams (CST) and facility personnel who should participate in the implementation. Since such importance and urgency of cyber security awareness and training is underestimated at present, the types, trainees, contents, and development strategies of cyber security awareness and training programs are studied to help Korean nuclear facilities to perform cyber security activities more effectively. Cyber security awareness and training programs should be developed ahead of the implementation of CSP. In this study, through the analysis of requirements in the regulatory standard RS-015, the types and trainees of overall cyber security training programs in nuclear facilities are identified. Contents suitable for a cyber security awareness program and a technical training program are derived. It is suggested to develop stepwise the program contents in accordance with the development of policies, guides, and procedures as parts of the facility cyber security program. Since any training programs are not available for the specialized cyber security training in nuclear facilities, a long-term development plan is necessary. As alternatives for the time being, several cyber security training courses for industrial control systems by

  9. Secure Multiparty Computation for Cooperative Cyber Risk Assessment

    Science.gov (United States)

    2016-11-01

    Secure Multiparty Computation for Cooperative Cyber Risk Assessment Kyle Hogan, Noah Luther, Nabil Schear, Emily Shen, Sophia Yakoubov, Arkady...Malacaria. How to spend it: Optimal investment for cyber security . In Proceedings of the 1st International Workshop on Agents and CyberSecurity...common problem organizations face is determining which security updates to perform and patches to apply to minimize the risk of potential vulnerabilities

  10. Designing Fuzzy Rule Based Expert System for Cyber Security

    OpenAIRE

    Goztepe, Kerim

    2016-01-01

    The state of cyber security has begun to attract more attention and interest outside the community of computer security experts. Cyber security is not a single problem, but rather a group of highly different problems involving different sets of threats. Fuzzy Rule based system for cyber security is a system consists of a rule depository and a mechanism for accessing and running the rules. The depository is usually constructed with a collection of related rule sets. The aim of this study is to...

  11. 76 FR 43696 - Nationwide Cyber Security Review (NCSR) Assessment

    Science.gov (United States)

    2011-07-21

    ... government to complete a cyber network security assessment so that a full measure of gaps and capabilities... SECURITY Nationwide Cyber Security Review (NCSR) Assessment AGENCY: National Protection and Programs...: The Department of Homeland Security (DHS), National Protection and Programs Directorate (NPPD),...

  12. 76 FR 22409 - Nationwide Cyber Security Review (NCSR) Assessment

    Science.gov (United States)

    2011-04-21

    ... a cyber network security assessment so that a full measure of gaps and capabilities can be completed... SECURITY Nationwide Cyber Security Review (NCSR) Assessment AGENCY: National Protection and Programs.... SUMMARY: The Department of Homeland Security (DHS), National Protection and Programs Directorate...

  13. Addressing the Cyber-security and Cyber-terrorism Threats [video

    OpenAIRE

    Robi Sen; Center for Homeland Defense and Security Naval Postgraduate School

    2015-01-01

    While cyber terrorism is a relatively new threat in the world of national defense, the security issues we face are not necessarily new as a genre. In this segment, Chief Science Officer Robi Sen draws on the changing attitudes towards the cyber world. Topics include cooperation between law enforcement and hackers, the major motivations behind criminal hacking, and the realistic threats of cyber terrorism.

  14. APPROACH TO CYBER SECURITY ISSUES IN NIGERIA: CHALLENGES AND SOLUTION

    Directory of Open Access Journals (Sweden)

    Frank Ibikunle

    2013-06-01

    Full Text Available Cyber-space refers to the boundless space known as the internet. Cyber-security is the body of rules put in place for the protection of the cyber space. Cyber-crime refers to the series of organized crime attacking both cyber space and cyber security. The Internet is one of the fastest-growing areas of technical infrastructure development. Over the past decades, the growth of the internet and its use afforded everyone this opportunity. Google, Wikipedia and Bing to mention a few, give detailed answers to millions of questions every day. Cyberspace is a world that contains just about anything one is searching for. With the advent of these advancements in information accessibility and the advantages and applications of the internet comes an exponentially growing disadvantage- Cyber Crime. Cyber security has risen to become a national concern as threats concerning it now need to be taken more seriously. This paper attempts to provide an overview of Cybercrime and Cyber-security. It defines the concept of cybercrime, identify reasons for cyber-crime and its eradication. It look at those involved and the reasons for their involvement. Methods of stepping up cyber security and the recommendations that would help in checking the increasing rate of cyber-crimes were highlighted. The paper also attempts to name some challenges of cybercrime and present practical and logical solutions to these threats.

  15. Nuclear Cyber Security Case Study and Analysis

    Energy Technology Data Exchange (ETDEWEB)

    Park, Sunae [ChungNam National Univ., Daejeon (Korea, Republic of); Kim, Kyung doo [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of)

    2016-10-15

    Due to the new trend in cyber attacks, there is an increased security threat towards every country's infrastructure. So, security measures are required now than ever before. Previous cyber attacks normal process consists of paralyzing a server function, data extraction, or data control into the IT system for trespassing. However, nowadays control systems and infrastructures are also targeted and attacking methods have changed a lot. These days, the virus is becoming increasingly serious and hacker attacks are also becoming more frequent. This virus is a computer virus produced for the purpose of destroying the infrastructure, such as power plants, airports, railways June 2010, and it was first discovered in Belarus. Israel, the US, and other countries are believed culprits behind Stuxnet attacks on other nations such as Iran. Recent malware distribution, such as website hacking threat is growing. In surveys today one of the most long-term posing security threats is from North Korea. In particular, North Korea has been caught launching ongoing cyber-attacks after their latest nuclear test. South Korea has identified national trends regarding North Korean nuclear tests and analyzed them in order to catch disclosed confidential information. Especially, many nuclear power plants in the world are found to be vulnerable to cyber-attacks. Industrial facilities should be more wary of the risk of a serious cyber attack in the middle is going to increase the reliance on universal and commercial digital systems (off the shelf) software, civilian nuclear infrastructure. Senior executives’ current risk rate levels are increasing. Digitalization of the perception of risk is lacking in nuclear power plants and workers are creating prevention methods to make them fully aware of the risks of cyber-attacks. It is suggested that it may be inappropriate to assume we are prepared for potential attacks. Due to advances in technology, a warning that the growing sense of crisis

  16. Game Based Cyber Security Training: are Serious Games suitable for cyber security training?

    Directory of Open Access Journals (Sweden)

    Maurice Hendrix

    2016-03-01

    Full Text Available Security research and training is attracting a lot of investment and interest from governments and the private sector. Most efforts have focused on physical security, while cyber security or digital security has been given less importance. With recent high-profile attacks it has become clear that training in cyber security is needed. Serious Games have the capability to be effective tools for public engagement and behavioural change and role play games, are already used by security professionals. Thus cyber security seems especially well-suited to Serious Games. This paper investigates whether games can be effective cyber security training tools. The study is conducted by means of a structured literature review supplemented with a general web search.While there are early positive indications there is not yet enough evidence to draw any definite conclusions. There is a clear gap in target audience with almost all products and studies targeting the general public and very little attention given to IT professionals and managers. The products and studies also mostly work over a short period, while it is known that short-term interventions are not particularly effective at affecting behavioural change.

  17. Interdependent Risk and Cyber Security: An Analysis of Security Investment and Cyber Insurance

    Science.gov (United States)

    Shim, Woohyun

    2010-01-01

    An increasing number of firms rely on highly interconnected information networks. In such environments, defense against cyber attacks is complicated by residual risks caused by the interdependence of information security decisions of firms. IT security is affected not only by a firm's own management strategies but also by those of others. This…

  18. Interdependent Risk and Cyber Security: An Analysis of Security Investment and Cyber Insurance

    Science.gov (United States)

    Shim, Woohyun

    2010-01-01

    An increasing number of firms rely on highly interconnected information networks. In such environments, defense against cyber attacks is complicated by residual risks caused by the interdependence of information security decisions of firms. IT security is affected not only by a firm's own management strategies but also by those of others. This…

  19. Cyber Security: Rule of Use Internet Safely?

    OpenAIRE

    -, Maskun

    2013-01-01

    International Journal Cyber security plays on important role to guarantee and protect people who use internet in their daily life. Some cases take place around the world that people get inconvenience condition when they access and use internet. Misuse of internet becomes a current issue which some cases take place including a university. Advantages of using internet in the university of course assist the student to get some information in internet. However, they have to be protected in ord...

  20. National security and the impact of cyber threats on the average citizen

    CSIR Research Space (South Africa)

    Jansen van Vuuren, JC

    2010-09-01

    Full Text Available The presentation addresses national security issues and the impact of cyber threats on the average citizen. It classifies cyber threats, analysis national security and provides security tips to safeguard the individual against cyber threats....

  1. Operating Nuclear Power Stations in a Regulated Cyber Security Environment

    Energy Technology Data Exchange (ETDEWEB)

    Dorman, E.

    2014-07-01

    The United States Nuclear Regulatory Commission (NRC) issued 10CFR73.54 to implement a regulated Cyber Security Program at each operating nuclear reactor facility. Milestones were implemented December 31, 2012 to mitigate the attack vectors for the most critical digital assets acknowledged by the industry and the NR C. The NRC inspections have begun. The nuclear Cyber Security Plan, implemented by the site Cyber Security Program (Program), is an element of the operating license at each facility. (Author)

  2. DOT Cyber Security Assessment Management -

    Data.gov (United States)

    Department of Transportation — This data set contains information about the security and compliance status of FISMA systems within the Department. The information contains detailed descriptions of...

  3. Cyber-crime Science = Crime Science + Information Security

    NARCIS (Netherlands)

    Hartel, Pieter; Junger, Marianne; Wieringa, Roel

    2010-01-01

    Cyber-crime Science is an emerging area of study aiming to prevent cyber-crime by combining security protection techniques from Information Security with empirical research methods used in Crime Science. Information security research has developed techniques for protecting the confidentiality, integ

  4. Cyber-crime Science = Crime Science + Information Security

    NARCIS (Netherlands)

    Hartel, Pieter H.; Junger, Marianne; Wieringa, Roelf J.

    2010-01-01

    Cyber-crime Science is an emerging area of study aiming to prevent cyber-crime by combining security protection techniques from Information Security with empirical research methods used in Crime Science. Information security research has developed techniques for protecting the confidentiality,

  5. Cyber Security as Social Experiment

    NARCIS (Netherlands)

    Pieters, Wolter; Hadziosmanovic, D.; Dechesne, Francien

    2014-01-01

    Lessons from previous experiences are often overlooked when deploying security-sensitive technology in the real world. At the same time, security assessments often suffer from a lack of real-world data. This appears similar to general problems in technology assessment, where knowledge about

  6. Security analysis of cyber-physical system

    Science.gov (United States)

    Li, Bo; Zhang, Lichen

    2017-05-01

    In recent years, Cyber-Physical System (CPS) has become an important research direction of academic circles and scientific and technological circles at home and abroad, is considered to be following the third wave of world information technology after the computer, the Internet. PS is a multi-dimensional, heterogeneous, deep integration of open systems, Involving the computer, communication, control and other disciplines of knowledge. As the various disciplines in the research theory and methods are significantly different, so the application of CPS has brought great challenges. This paper introduces the definition and characteristics of CPS, analyzes the current situation of CPS, analyzes the security threats faced by CPS, and gives the security solution for security threats. It also discusses CPS-specific security technology, to promote the healthy development of CPS in information security.

  7. Computer network security and cyber ethics

    CERN Document Server

    Kizza, Joseph Migga

    2014-01-01

    In its 4th edition, this book remains focused on increasing public awareness of the nature and motives of cyber vandalism and cybercriminals, the weaknesses inherent in cyberspace infrastructure, and the means available to protect ourselves and our society. This new edition aims to integrate security education and awareness with discussions of morality and ethics. The reader will gain an understanding of how the security of information in general and of computer networks in particular, on which our national critical infrastructure and, indeed, our lives depend, is based squarely on the individ

  8. Lecture 13: Control System Cyber Security

    CERN Document Server

    CERN. Geneva

    2013-01-01

    Today, the industralized world lives in symbiosis with control systems: it depends on power distribution, oil production, public transport, automatic production lines. While the convenience is at hand, still too many control systems are designed without any security in mind, lack basic security protections, and are not even robust enough to withstand basic attacks. The Stuxnet worm attacking Siemens PLCs in 2010 was another close call. Attackers currently enjoy hacking control systems, and aim to switch lights off. This presentation shall recap the current situation and outline why the presenter is still waiting for a change in paradigm. Stefan Lüders, PhD, graduated from the Swiss Federal Institute of Technology in Zurich and joined CERN in 2002. Being initially developer of a common safety system used in all four experiments at the Large Hadron Collider, he gathered expertise in cyber-security issues of control systems. Consequently in 2004, he took over responsibilities in securing CERN's accelerator and...

  9. Help for the Developers of Control System Cyber Security Standards

    Energy Technology Data Exchange (ETDEWEB)

    Robert P. Evans

    2008-05-01

    A Catalog of Control Systems Security: Recommendations for Standards Developers (Catalog), aimed at assisting organizations to facilitate the development and implementation of control system cyber security standards, has been developed. This catalog contains requirements that can help protect control systems from cyber attacks and can be applied to the Critical Infrastructures and Key Resources of the United States and other nations. The requirements contained in the catalog are a compilation of practices or various industry bodies used to increase the security of control systems from both physical and cyber attacks. They should be viewed as a collection of recommendations to be considered and judiciously employed, as appropriate, when reviewing and developing cyber security standards for control systems. The recommendations in the Catalog are intended to be broad enough to provide any industry using control systems the flexibility needed to develop sound cyber security standards specific to their individual security requirements.

  10. Cyber security deterrence and it protection for critical infrastructures

    CERN Document Server

    Martellini, Maurizio

    2013-01-01

    The experts of the International Working Group-Landau Network Centro Volta (IWG-LNCV) discuss aspects of cyber security and present possible methods of deterrence, defense and resilience against cyber attacks. This SpringerBrief covers state-of-the-art documentation on the deterrence power of cyber attacks and argues that nations are entering a new cyber arms race. The brief also provides a technical analysis of possible cyber attacks towards critical infrastructures in the chemical industry and chemical safety industry. The authors also propose modern analyses and a holistic approach to resil

  11. Drie nationale cyber security strategieën vergeleken

    NARCIS (Netherlands)

    Luiijf, H.A.M.

    2011-01-01

    Onafhankelijk van elkaar brachten Frankrijk, Duitsland en Nederland hun nationale cyber security strategieën vrijwel tegelijk uit. De strategieën hebben overeenkomsten, maar tonen ook grote verschillen. De drie landen onderkennen een urgente noodzaak om cyber security aan te pakken, maar hebben ande

  12. Drie nationale cyber security strategieën vergeleken

    NARCIS (Netherlands)

    Luiijf, H.A.M.

    2011-01-01

    Onafhankelijk van elkaar brachten Frankrijk, Duitsland en Nederland hun nationale cyber security strategieën vrijwel tegelijk uit. De strategieën hebben overeenkomsten, maar tonen ook grote verschillen. De drie landen onderkennen een urgente noodzaak om cyber security aan te pakken, maar hebben

  13. Mission Assurance Modeling and Simulation: A Cyber Security Roadmap

    Science.gov (United States)

    Gendron, Gerald; Roberts, David; Poole, Donold; Aquino, Anna

    2012-01-01

    This paper proposes a cyber security modeling and simulation roadmap to enhance mission assurance governance and establish risk reduction processes within constrained budgets. The term mission assurance stems from risk management work by Carnegie Mellon's Software Engineering Institute in the late 19905. By 2010, the Defense Information Systems Agency revised its cyber strategy and established the Program Executive Officer-Mission Assurance. This highlights a shift from simply protecting data to balancing risk and begins a necessary dialogue to establish a cyber security roadmap. The Military Operations Research Society has recommended a cyber community of practice, recognizing there are too few professionals having both cyber and analytic experience. The authors characterize the limited body of knowledge in this symbiotic relationship. This paper identifies operational and research requirements for mission assurance M&S supporting defense and homeland security. M&S techniques are needed for enterprise oversight of cyber investments, test and evaluation, policy, training, and analysis.

  14. Your employees: the front line in cyber security

    OpenAIRE

    Ashenden, D.

    2016-01-01

    First published in The Chemical Engineer and reproduced by Crest - Centre for Research and Evidence on Security Threats, 26/01/2016 (https://crestresearch.ac.uk/comment/employees-front-line-cyber-security/)

  15. Building organisational cyber resilience: A strategic knowledge-based view of cyber security management.

    Science.gov (United States)

    Ferdinand, Jason

    The concept of cyber resilience has emerged in recent years in response to the recognition that cyber security is more than just risk management. Cyber resilience is the goal of organisations, institutions and governments across the world and yet the emerging literature is somewhat fragmented due to the lack of a common approach to the subject. This limits the possibility of effective collaboration across public, private and governmental actors in their efforts to build and maintain cyber resilience. In response to this limitation, and to calls for a more strategically focused approach, this paper offers a knowledge-based view of cyber security management that explains how an organisation can build, assess, and maintain cyber resilience.

  16. Cyber security best practices for the nuclear industry

    Energy Technology Data Exchange (ETDEWEB)

    Badr, I. [Rational IBM Software Group, IBM Corporation, Evanston, IL 60201 (United States)

    2012-07-01

    When deploying software based systems, such as, digital instrumentation and controls for the nuclear industry, it is vital to include cyber security assessment as part of architecture and development process. When integrating and delivering software-intensive systems for the nuclear industry, engineering teams should make use of a secure, requirements driven, software development life cycle, ensuring security compliance and optimum return on investment. Reliability protections, data loss prevention, and privacy enforcement provide a strong case for installing strict cyber security policies. (authors)

  17. Proceedings Second Annual Cyber Security and Information Infrastructure Research Workshop

    Energy Technology Data Exchange (ETDEWEB)

    Sheldon, Frederick T [ORNL; Krings, Axel [ORNL; Yoo, Seong-Moo [ORNL; Mili, Ali [ORNL; Trien, Joseph P [ORNL

    2006-01-01

    The workshop theme is Cyber Security: Beyond the Maginot Line Recently the FBI reported that computer crime has skyrocketed costing over $67 billion in 2005 alone and affecting 2.8M+ businesses and organizations. Attack sophistication is unprecedented along with availability of open source concomitant tools. Private, academic, and public sectors invest significant resources in cyber security. Industry primarily performs cyber security research as an investment in future products and services. While the public sector also funds cyber security R&D, the majority of this activity focuses on the specific mission(s) of the funding agency. Thus, broad areas of cyber security remain neglected or underdeveloped. Consequently, this workshop endeavors to explore issues involving cyber security and related technologies toward strengthening such areas and enabling the development of new tools and methods for securing our information infrastructure critical assets. We aim to assemble new ideas and proposals about robust models on which we can build the architecture of a secure cyberspace including but not limited to: * Knowledge discovery and management * Critical infrastructure protection * De-obfuscating tools for the validation and verification of tamper-proofed software * Computer network defense technologies * Scalable information assurance strategies * Assessment-driven design for trust * Security metrics and testing methodologies * Validation of security and survivability properties * Threat assessment and risk analysis * Early accurate detection of the insider threat * Security hardened sensor networks and ubiquitous computing environments * Mobile software authentication protocols * A new "model" of the threat to replace the "Maginot Line" model and more . . .

  18. USCYBERCOM and Cyber Security: Is a Comprehensive Strategy Possible?

    Science.gov (United States)

    2011-05-12

    command and control over its constituent units.26 Two recent articles by COL David Hollis in 2010 and one by Major M. Bodine Birdwell just recently...collection. Research also shows that there is an opposing viewpoint, which questions whether cyber is a true national strategic security risk. Jean ...12 April 2011). 25 Ibid., 2. 26 Keith B. Alexander, “United States Cyber Command,” in, Cyber Defense. 27 Bodine M. Birdwell and Robert

  19. Cyber power crime, conflict and security in cyberspace

    CERN Document Server

    Ghernaouti, Solange

    2013-01-01

    Most books on cybercrime are written by national security or political experts, and rarely propose an integrated and comprehensive approach to cybercrime, cyber-terrorism, cyber-war and cyber-security. This work develops approaches to crucial cyber-security issues that are non-political, non-partisan, and non-governmental. It informs readers through high-level summaries and the presentation of a consistent approach to several cyber-risk related domains, both from a civilian and a military perspective. Explaining fundamental principles in an interdisciplinary manner, it sheds light on the societal, economic, political, military, and technical issues related to the use and misuse of information and communication technologies.

  20. Empirical analysis of the effects of cyber security incidents.

    Science.gov (United States)

    Davis, Ginger; Garcia, Alfredo; Zhang, Weide

    2009-09-01

    We analyze the time series associated with web traffic for a representative set of online businesses that have suffered widely reported cyber security incidents. Our working hypothesis is that cyber security incidents may prompt (security conscious) online customers to opt out and conduct their business elsewhere or, at the very least, to refrain from accessing online services. For companies relying almost exclusively on online channels, this presents an important business risk. We test for structural changes in these time series that may have been caused by these cyber security incidents. Our results consistently indicate that cyber security incidents do not affect the structure of web traffic for the set of online businesses studied. We discuss various public policy considerations stemming from our analysis.

  1. Handbook on Securing Cyber-Physical Critical Infrastructure

    CERN Document Server

    Das, Sajal K; Zhang, Nan

    2012-01-01

    The worldwide reach of the Internet allows malicious cyber criminals to coordinate and launch attacks on both cyber and cyber-physical infrastructure from anywhere in the world. This purpose of this handbook is to introduce the theoretical foundations and practical solution techniques for securing critical cyber and physical infrastructures as well as their underlying computing and communication architectures and systems. Examples of such infrastructures include utility networks (e.g., electrical power grids), ground transportation systems (automotives, roads, bridges and tunnels), airports a

  2. Using a Prediction Model to Manage Cyber Security Threats

    National Research Council Canada - National Science Library

    Jaganathan, Venkatesh; Cherurveettil, Priyesh; Muthu Sivashanmugam, Premapriya

    2015-01-01

    .... The cost impact due to worms, viruses, or other malicious software is significant. This paper proposes a mathematical model to predict the impact of an attack based on significant factors that influence cyber security...

  3. S5: New Threats to Cyber-Security

    Science.gov (United States)

    2014-10-29

    2014 Carnegie Mellon University 29-Oct-2014 S5 : New Threats to Cyber-Security Software Engineering Institute Carnegie Mellon University...unclassified Standard Form 298 (Rev. 8-98) Prescribed by ANSI Std Z39-18 2 Mark Sherman S5 : New Threats to Cyber-Security © 2014 Carnegie...Institute at permission@sei.cmu.edu. Carnegie Mellon® and CERT® are registered marks of Carnegie Mellon University. DM-0001805 3 Mark Sherman S5

  4. Process Control System Cyber Security Standards - An Overview

    Energy Technology Data Exchange (ETDEWEB)

    Robert P. Evans

    2006-05-01

    The use of cyber security standards can greatly assist in the protection of process control systems by providing guidelines and requirements for the implementation of computer-controlled systems. These standards are most effective when the engineers and operators, using the standards, understand what each standard addresses. This paper provides an overview of several standards that deal with the cyber security of process measurements and control systems.

  5. Cyber Security for Smart Grid, Cryptography, and Privacy

    Directory of Open Access Journals (Sweden)

    Swapna Iyer

    2011-01-01

    Full Text Available The invention of “smart grid” promises to improve the efficiency and reliability of the power system. As smart grid is turning out to be one of the most promising technologies, its security concerns are becoming more crucial. The grid is susceptible to different types of attacks. This paper will focus on these threats and risks especially relating to cyber security. Cyber security is a vital topic, since the smart grid uses high level of computation like the IT. We will also see cryptography and key management techniques that are required to overcome these attacks. Privacy of consumers is another important security concern that this paper will deal with.

  6. Europe’s fragmented approach towards cyber security

    Directory of Open Access Journals (Sweden)

    Karine e Silva

    2013-10-01

    Full Text Available The article proposes a deeper insight into the variety of concepts used to describe the term cyber security and the ways in which it has been used in recent years. It examines the role of three important actors involved in the internet governance arena, namely governments, private sector and civil society, and how they have influenced the debate. To this end, this paper analyses how different organisations, industry and societal actors see cyber security and how their interests influence the way the debate has evolved. The difficult balance between security and fundamental rights, although not new to governments and society, is of great importance for the internet. Citizens have engaged in favour of an open internet. However, little attention has been paid to the demands of citizens and how they may contribute to a concept of cyber security that brings society to its core. The paper states that for cyberspace to be open and supportive of innovation, the practice of cyber security needs to internalise the interests and perspectives of end users. A multistakeholder approach to cyber security asks a more participative environment where the rules of the game are decided with public participation and consultation, giving citizens the means and methods to influence the way cyber security is conceived and implemented. The paper concludes that although a citizen centric approach towards cyber security should be the way forward, this seems to be yet far from being included in the governmental agenda. The methodology applied in the paper was mainly focused on desk research.

  7. Evaluating cyber security awareness in South Africa

    CSIR Research Space (South Africa)

    Grobler, M

    2011-07-01

    Full Text Available In many ways, the internet and cyber world is a dangerous place where innocent users can inadvertently fall prey to shrewd cyber criminals. These dangers, combined with a large portion of the South African population that has not had regular...

  8. Gamification for Measuring Cyber Security Situational Awareness

    Energy Technology Data Exchange (ETDEWEB)

    Fink, Glenn A.; Best, Daniel M.; Manz, David O.; Popovsky, V. M.; Endicott-Popovsky, Barbara E.

    2013-03-01

    Cyber defense competitions arising from U.S. service academy exercises, offer a platform for collecting data that can inform research that ranges from characterizing the ideal cyber warrior to describing behaviors during certain challenging cyber defense situations. This knowledge could lead to better preparation of cyber defenders in both military and civilian settings. This paper describes how one regional competition, the PRCCDC, a participant in the national CCDC program, conducted proof of concept experimentation to collect data during the annual competition for later analysis. The intent is to create an ongoing research agenda that expands on this current work and incorporates augmented cognition and gamification methods for measuring cybersecurity situational awareness under the stress of cyber attack.

  9. Cyber Security Testing and Training Programs for Industrial Control Systems

    Energy Technology Data Exchange (ETDEWEB)

    Daniel Noyes

    2012-03-01

    Service providers rely on industrial control systems (ICS) to manage the flow of water at dams, open breakers on power grids, control ventilation and cooling in nuclear power plants, and more. In today's interconnected environment, this can present a serious cyber security challenge. To combat this growing challenge, government, private industry, and academia are working together to reduce cyber risks. The Idaho National Laboratory (INL) is a key contributor to the Department of Energy National SCADA Test Bed (NSTB) and the Department of Homeland Security (DHS) Control Systems Security Program (CSSP), both of which focus on improving the overall security posture of ICS in the national critical infrastructure. In support of the NSTB, INL hosts a dedicated SCADA testing facility which consists of multiple control systems supplied by leading national and international manufacturers. Within the test bed, INL researchers systematically examine control system components and work to identify vulnerabilities. In support of the CSSP, INL develops and conducts training courses which are designed to increase awareness and defensive capabilities for IT/Control System professionals. These trainings vary from web-based cyber security trainings for control systems engineers to more advanced hands-on training that culminates with a Red Team/ Blue Team exercise that is conducted within an actual control systems environment. INL also provides staffing and operational support to the DHS Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) Security Operations Center which responds to and analyzes control systems cyber incidents across the 18 US critical infrastructure sectors.

  10. A Detailed Strategy for Managing Corporation Cyber War Security

    Directory of Open Access Journals (Sweden)

    Walid Al-Ahmad

    2015-05-01

    Full Text Available Modern corporations depend heavily on information and communication technologies and are becoming increasingly interconnected locally and internationally. This interconnectedness and dependency on information technology make corporations vulnerable to cyber attacks. Corporate managers therefore need to understand the growing cyber war threats and implement appropriate strategies to mitigate the risks. This research work is an attempt to develop a generic and detailed strategy to assist corporations in managing the cyber war security. The implementation of such a strategy will definitely lead to a more secure business environment and as a result will attract foreign investments to the Arab countries in the Middle East. Such a strategy can be considered as a first step toward protecting corporations from cyber war threats in an effective manner.

  11. Anomaly-based online intrusion detection system as a sensor for cyber security situational awareness system

    OpenAIRE

    Kokkonen, Tero

    2016-01-01

    Almost all the organisations and even individuals rely on complex structures of data networks and networked computer systems. That complex data ensemble, the cyber domain, provides great opportunities, but at the same time it offers many possible attack vectors that can be abused for cyber vandalism, cyber crime, cyber espionage or cyber terrorism. Those threats produce requirements for cyber security situational awareness and intrusion detection capability. This dissertation conc...

  12. The influence of cyber security levels of South African citizens on national security

    CSIR Research Space (South Africa)

    Jansen van Vuuren, J

    2012-03-01

    Full Text Available In South Africa, cyber security has been identified as a critical component contributing towards National Security. More rural communities are becoming integrated into the global village due to increased hardware and software corporate donations...

  13. Evaluation of a Cyber Security System for Hospital Network.

    Science.gov (United States)

    Faysel, Mohammad A

    2015-01-01

    Most of the cyber security systems use simulated data in evaluating their detection capabilities. The proposed cyber security system utilizes real hospital network connections. It uses a probabilistic data mining algorithm to detect anomalous events and takes appropriate response in real-time. On an evaluation using real-world hospital network data consisting of incoming network connections collected for a 24-hour period, the proposed system detected 15 unusual connections which were undetected by a commercial intrusion prevention system for the same network connections. Evaluation of the proposed system shows a potential to secure protected patient health information on a hospital network.

  14. The cyber security threat stops in the boardroom.

    Science.gov (United States)

    Scully, Tim

    The attitude that 'it won't happen to me' still prevails in the boardrooms of industry when senior executives consider the threat of targeted cyber intrusions. Not much has changed in the commercial world of cyber security over the past few years; hackers are not being challenged to find new ways to steal companies' intellectual property and confidential information. The consequences of even major security breaches seem not to be felt by the leaders of victim companies. Why is this so? Surely IT security practitioners are seeking new ways to detect and prevent targeted intrusions into companies' networks? Are the consequences of targeted intrusions so insignificant that the captains of industry tolerate them? Or do only others feel the pain of their failure? This paper initially explores the failure of cyber security in industry and contends that, while industry leaders should not be alone in accepting responsibility for this failure, they must take the initiative to make life harder for cyber threat actors. They cannot wait for government leadership on policy, strategy or coordination. The paper then suggests some measures that a CEO can adopt to build a new corporate approach to cyber security.

  15. Cyber Security Test Strategy for Non-safety Display System

    Energy Technology Data Exchange (ETDEWEB)

    Son, Han Seong [Joongbu University, Geumsan (Korea, Republic of); Kim, Hee Eun [KAIST, Daejeon (Korea, Republic of)

    2016-10-15

    Cyber security has been a big issue since the instrumentation and control (I and C) system of nuclear power plant (NPP) is digitalized. A cyber-attack on NPP should be dealt with seriously because it might cause not only economic loss but also the radioactive material release. Researches on the consequences of cyber-attack onto NPP from a safety point of view have been conducted. A previous study shows the risk effect brought by initiation of event and deterioration of mitigation function by cyber terror. Although this study made conservative assumptions and simplifications, it gives an insight on the effect of cyber-attack. Another study shows that the error on a non-safety display system could cause wrong actions of operators. According to this previous study, the failure of the operator action caused by a cyber-attack on a display system might threaten the safety of the NPP by limiting appropriate mitigation actions. This study suggests a test strategy focusing on the cyber-attack on the information and display system, which might cause the failure of operator. The test strategy can be suggested to evaluate and complement security measures. Identifying whether a cyber-attack on the information and display system can affect the mitigation actions of operator, the strategy to obtain test scenarios is suggested. The failure of mitigation scenario is identified first. Then, for the test target in the scenario, software failure modes are applied to identify realistic failure scenarios. Testing should be performed for those scenarios to confirm the integrity of data and to assure effectiveness of security measures.

  16. 75 FR 18819 - Second DRAFT NIST Interagency Report (NISTIR) 7628, Smart Grid Cyber Security Strategy and...

    Science.gov (United States)

    2010-04-13

    ... Grid Cyber Security Strategy and Requirements; Request for Comments AGENCY: National Institute of..., Smart Grid Cyber Security Strategy and Requirements. This second draft has been updated to address the... logical interface diagrams, and the cyber security strategy sections have all been updated and...

  17. 78 FR 6807 - Critical Infrastructure Protection and Cyber Security Trade Mission to Saudi Arabia and Kuwait...

    Science.gov (United States)

    2013-01-31

    ... International Trade Administration Critical Infrastructure Protection and Cyber Security Trade Mission to Saudi... Infrastructure Protection and Cyber Security mission to Riyadh, Saudi Arabia and Kuwait City, Kuwait, from September 28-October 1, 2013. The mission will focus on the cyber security, critical infrastructure...

  18. Using a Prediction Model to Manage Cyber Security Threats

    Directory of Open Access Journals (Sweden)

    Venkatesh Jaganathan

    2015-01-01

    Full Text Available Cyber-attacks are an important issue faced by all organizations. Securing information systems is critical. Organizations should be able to understand the ecosystem and predict attacks. Predicting attacks quantitatively should be part of risk management. The cost impact due to worms, viruses, or other malicious software is significant. This paper proposes a mathematical model to predict the impact of an attack based on significant factors that influence cyber security. This model also considers the environmental information required. It is generalized and can be customized to the needs of the individual organization.

  19. Process Control System Cyber Security Standards - An Overview

    Energy Technology Data Exchange (ETDEWEB)

    Robert P. Evans; V Stanley Scown; Rolf Carlson; Shabbir Shamsuddin; George Shaw; Jeff Dagle; Paul W Oman; Jeannine Schmidt

    2005-10-01

    The use of cyber security standards can greatly assist in the protection of critical infrastructure by providing guidelines and requisite imperatives in the implementation of computer-controlled systems. These standards are most effective when the engineers and operators using the standards understand what each of the standards addresses and does not address. This paper provides a review and comparison of ten documents dealing with control system cyber security. It is not meant to be a complete treatment of all applicable standards; rather, this is an exemplary analysis showing the benefits of comparing and contrasting differing documents.

  20. Using a Prediction Model to Manage Cyber Security Threats.

    Science.gov (United States)

    Jaganathan, Venkatesh; Cherurveettil, Priyesh; Muthu Sivashanmugam, Premapriya

    2015-01-01

    Cyber-attacks are an important issue faced by all organizations. Securing information systems is critical. Organizations should be able to understand the ecosystem and predict attacks. Predicting attacks quantitatively should be part of risk management. The cost impact due to worms, viruses, or other malicious software is significant. This paper proposes a mathematical model to predict the impact of an attack based on significant factors that influence cyber security. This model also considers the environmental information required. It is generalized and can be customized to the needs of the individual organization.

  1. Cyber security evaluation of II&C technologies

    Energy Technology Data Exchange (ETDEWEB)

    Thomas, Ken [Idaho National Laboratory (INL), Idaho Falls, ID (United States)

    2014-11-01

    The Light Water Reactor Sustainability (LWRS) Program is a research and development program sponsored by the Department of Energy, which is conducted in close collaboration with industry to provide the technical foundations for licensing and managing the long-term, safe and economical operation of current nuclear power plants The LWRS Program serves to help the US nuclear industry adopt new technologies and engineering solutions that facilitate the continued safe operation of the plants and extension of the current operating licenses. Within the LWRS Program, the Advanced Instrumentation, Information, and Control (II&C) Systems Technologies Pathway conducts targeted research and development (R&D) to address aging and reliability concerns with the legacy instrumentation and control and related information systems of the U.S. operating light water reactor (LWR) fleet. The II&C Pathway is conducted by Idaho National Laboratory (INL). Cyber security is a common concern among nuclear utilities and other nuclear industry stakeholders regarding the digital technologies that are being developed under this program. This concern extends to the point of calling into question whether these types of technologies could ever be deployed in nuclear plants given the possibility that the information in them can be compromised and the technologies themselves can potentially be exploited to serve as attack vectors for adversaries. To this end, a cyber security evaluation has been conducted of these technologies to determine whether they constitute a threat beyond what the nuclear plants already manage within their regulatory-required cyber security programs. Specifically, the evaluation is based on NEI 08-09, which is the industry’s template for cyber security programs and evaluations, accepted by the Nuclear Regulatory Commission (NRC) as responsive to the requirements of the nuclear power plant cyber security regulation found in 10 CFR 73.54. The evaluation was conducted by a

  2. Cyber Security Evaluation of II&C Technologies

    Energy Technology Data Exchange (ETDEWEB)

    Ken Thomas

    2014-11-01

    The Light Water Reactor Sustainability (LWRS) Program is a research and development program sponsored by the Department of Energy, which is conducted in close collaboration with industry to provide the technical foundations for licensing and managing the long-term, safe and economical operation of current nuclear power plants The LWRS Program serves to help the US nuclear industry adopt new technologies and engineering solutions that facilitate the continued safe operation of the plants and extension of the current operating licenses. Within the LWRS Program, the Advanced Instrumentation, Information, and Control (II&C) Systems Technologies Pathway conducts targeted research and development (R&D) to address aging and reliability concerns with the legacy instrumentation and control and related information systems of the U.S. operating light water reactor (LWR) fleet. The II&C Pathway is conducted by Idaho National Laboratory (INL). Cyber security is a common concern among nuclear utilities and other nuclear industry stakeholders regarding the digital technologies that are being developed under this program. This concern extends to the point of calling into question whether these types of technologies could ever be deployed in nuclear plants given the possibility that the information in them can be compromised and the technologies themselves can potentially be exploited to serve as attack vectors for adversaries. To this end, a cyber security evaluation has been conducted of these technologies to determine whether they constitute a threat beyond what the nuclear plants already manage within their regulatory-required cyber security programs. Specifically, the evaluation is based on NEI 08-09, which is the industry’s template for cyber security programs and evaluations, accepted by the Nuclear Regulatory Commission (NRC) as responsive to the requirements of the nuclear power plant cyber security regulation found in 10 CFR 73.54. The evaluation was conducted by a

  3. International Conference on Computational Intelligence, Cyber Security, and Computational Models

    CERN Document Server

    Ramasamy, Vijayalakshmi; Sheen, Shina; Veeramani, C; Bonato, Anthony; Batten, Lynn

    2016-01-01

    This book aims at promoting high-quality research by researchers and practitioners from academia and industry at the International Conference on Computational Intelligence, Cyber Security, and Computational Models ICC3 2015 organized by PSG College of Technology, Coimbatore, India during December 17 – 19, 2015. This book enriches with innovations in broad areas of research like computational modeling, computational intelligence and cyber security. These emerging inter disciplinary research areas have helped to solve multifaceted problems and gained lot of attention in recent years. This encompasses theory and applications, to provide design, analysis and modeling of the aforementioned key areas.

  4. Securing Cyberspace: Approaches to Developing an Effective Cyber-Security Strategy

    Science.gov (United States)

    2011-05-15

    attackers, cyber-criminals or even teenage hackers. Protecting cyberspace is a national security priority. President Obama’s National Security...and communications, and with robust security to protect the digital infrastructure that powers critical national functions. The NSS articulates the...such as interruptions to commerce, creation of opportunities for crime, public outcry and reduced investment. For example, cyber-attacks to the power

  5. Cyber resilience: a review of critical national infrastructure and cyber security protection measures applied in the UK and USA.

    Science.gov (United States)

    Harrop, Wayne; Matteson, Ashley

    This paper presents cyber resilience as key strand of national security. It establishes the importance of critical national infrastructure protection and the growing vicarious nature of remote, well-planned, and well executed cyber attacks on critical infrastructures. Examples of well-known historical cyber attacks are presented, and the emergence of 'internet of things' as a cyber vulnerability issue yet to be tackled is explored. The paper identifies key steps being undertaken by those responsible for detecting, deterring, and disrupting cyber attacks on critical national infrastructure in the United Kingdom and the USA.

  6. Cyber security information exchange to gain insight into the effects of cyber threats and incidents

    NARCIS (Netherlands)

    Fransen, F.; Smulders, A.C.M.; Kerkdijk, H.

    2015-01-01

    The last couple of years we have seen an increase in interests and initiatives in establishing threat intelligence sharing communities, and on the development of standards and platforms for automated cyber security information sharing. These initiatives are focused on helping organisations to increa

  7. Cyber security information exchange to gain insight into the effects of cyber threats and incidents

    NARCIS (Netherlands)

    Fransen, F.; Smulders, A.C.M.; Kerkdijk, H.

    2015-01-01

    The last couple of years we have seen an increase in interests and initiatives in establishing threat intelligence sharing communities, and on the development of standards and platforms for automated cyber security information sharing. These initiatives are focused on helping organisations to

  8. Quantitative Vulnerability Assessment of Cyber Security for Distribution Automation Systems

    Directory of Open Access Journals (Sweden)

    Xiaming Ye

    2015-06-01

    Full Text Available The distribution automation system (DAS is vulnerable to cyber-attacks due to the widespread use of terminal devices and standard communication protocols. On account of the cost of defense, it is impossible to ensure the security of every device in the DAS. Given this background, a novel quantitative vulnerability assessment model of cyber security for DAS is developed in this paper. In the assessment model, the potential physical consequences of cyber-attacks are analyzed from two levels: terminal device level and control center server level. Then, the attack process is modeled based on game theory and the relationships among different vulnerabilities are analyzed by introducing a vulnerability adjacency matrix. Finally, the application process of the proposed methodology is illustrated through a case study based on bus 2 of the Roy Billinton Test System (RBTS. The results demonstrate the reasonability and effectiveness of the proposed methodology.

  9. Security and Privacy in Cyber-Physical Systems

    Energy Technology Data Exchange (ETDEWEB)

    Fink, Glenn A.; Edgar, Thomas W.; Rice, Theora R.; MacDonald, Douglas G.; Crawford, Cary E.

    2016-08-30

    As you have seen from the previous chapters, cyber-physical systems (CPS) are broadly used across technology and industrial domains. While these systems enable process optimization and efficiency and allow previously impossible functionality, security and privacy are key concerns for their design, development, and operation. CPS have been key components utilized in some of the highest publicized security breaches over the last decade. In this chapter, we will look over the CPS described in the previous chapters from a security perspective. In this chapter, we explain classical information and physical security fundamentals in the context of CPS and contextualize them across application domains. We give examples where the interplay of functionality and diverse communication can introduce unexpected vulnerabilities and produce larger impacts. We will discuss how CPS security and privacy is inherently different from that of pure cyber or physical systems and what may be done to secure these systems, considering their emergent cyber-physical properties. Finally, we will discuss security and privacy implications of merging infrastructural and personal CPS. Our hope is to impart the knowledge of what CPS security and privacy are, why they are important, and explain existing processes and challenges.

  10. A Hierarchical Security Architecture for Cyber-Physical Systems

    Energy Technology Data Exchange (ETDEWEB)

    Quanyan Zhu; Tamer Basar

    2011-08-01

    Security of control systems is becoming a pivotal concern in critical national infrastructures such as the power grid and nuclear plants. In this paper, we adopt a hierarchical viewpoint to these security issues, addressing security concerns at each level and emphasizing a holistic cross-layer philosophy for developing security solutions. We propose a bottom-up framework that establishes a model from the physical and control levels to the supervisory level, incorporating concerns from network and communication levels. We show that the game-theoretical approach can yield cross-layer security strategy solutions to the cyber-physical systems.

  11. Wat maakt cyber security anders dan informatiebeveiliging?

    NARCIS (Netherlands)

    Van den Berg, J.

    2015-01-01

    De termen “informatiebeveiliging” en “cyber security” worden vaak door elkaar gebruikt soms met dezelfde, soms met een afwijkende betekenis. Velen spreken vandaag de dag ook over cyberspace, bijvoorbeeld als een nieuw (door de mens gecreëerd) vijfde domein naast de bestaande domeinen land, water,

  12. THE INFORMATION CONFIDENTIALITY AND CYBER SECURITY IN MEDICAL INSTITUTIONS

    Directory of Open Access Journals (Sweden)

    SABAU-POPA CLAUDIA DIANA

    2015-07-01

    Full Text Available The information confidentiality and cyber security risk affects the right to confidentiality and privacy of the patient, as regulated in Romania by the Law 46/2002. The manifestation of the cyber security risk event affects the reputation of the healthcare institution and is becoming more and more complex and often due to the: development of network technology, the medical equipment connected to wifi and the electronic databases. The databases containing medical records were implemented due to automation. Thus, transforming data into medical knowledge contribute to a better understanding of the disease. Due to these factors, the measures taken by the hospital management for this type of risk are adapted to the cyber changes. The hospital objectives aim: the implementation of a robust information system, the early threats identifications and the incident reporting. Neglecting this type of risk can generate financial loss, inability to continue providing health care services for a certain period of time, providing an erroneous diagnosis, medical equipment errors etc. Thus, in a digital age the appropriate risk management for the information security and cyber risk represent a necessity. The main concern of hospitals worldwide is to align with international requirements and obtain credentials in terms of data security from the International Organisation for Standardization, which regulates the management of this type of risk. Romania is at the beginning in terms of concerns regarding the management, avoidance and mitigation of information security, the health system being most highly exposed to its manifestation. The present paper examines the concerns of the health system to the confidentiality of information and cyber security risk and its management arrangements. Thus, a set of key risk indicators is implemented and monitored for 2011-2013, using a user interface, a Dashboard, which acts as an early warning system of the manifestation of the

  13. Data fusion in cyber security: first order entity extraction from common cyber data

    Science.gov (United States)

    Giacobe, Nicklaus A.

    2012-06-01

    The Joint Directors of Labs Data Fusion Process Model (JDL Model) provides a framework for how to handle sensor data to develop higher levels of inference in a complex environment. Beginning from a call to leverage data fusion techniques in intrusion detection, there have been a number of advances in the use of data fusion algorithms in this subdomain of cyber security. While it is tempting to jump directly to situation-level or threat-level refinement (levels 2 and 3) for more exciting inferences, a proper fusion process starts with lower levels of fusion in order to provide a basis for the higher fusion levels. The process begins with first order entity extraction, or the identification of important entities represented in the sensor data stream. Current cyber security operational tools and their associated data are explored for potential exploitation, identifying the first order entities that exist in the data and the properties of these entities that are described by the data. Cyber events that are represented in the data stream are added to the first order entities as their properties. This work explores typical cyber security data and the inferences that can be made at the lower fusion levels (0 and 1) with simple metrics. Depending on the types of events that are expected by the analyst, these relatively simple metrics can provide insight on their own, or could be used in fusion algorithms as a basis for higher levels of inference.

  14. The process matters: cyber security in industrial control systems

    NARCIS (Netherlands)

    Hadžiosmanović, Dina

    2014-01-01

    An industrial control system (ICS) is a computer system that controls industrial processes such as power plants, water and gas distribution, food production, etc. Since cyber-attacks on an ICS may have devastating consequences on human lives and safety in general, the security of ICS is important. I

  15. Adversarial Reinforcement Learning in a Cyber Security Simulation}

    NARCIS (Netherlands)

    Elderman, Richard; Pater, Leon; Thie, Albert; Drugan, Madalina; Wiering, Marco

    2017-01-01

    This paper focuses on cyber-security simulations in networks modeled as a Markov game with incomplete information and stochastic elements. The resulting game is an adversarial sequential decision making problem played with two agents, the attacker and defender. The two agents pit one reinforcement l

  16. A Taxonomy of Operational Cyber Security Risks Version 2

    Science.gov (United States)

    2014-05-01

    References 37 CMU/SEI-2014-TN-006 | ii CMU/SEI-2014-TN-006 | iii List of Figures Figure 1: Relationships Among Assets, Business Processes, and...draws upon the definition of operational risk adopted by the banking sector in the Basel II framework [BIS 2006]. Within the cyber security space

  17. Reconciling malicious and accidental risk in cyber security

    NARCIS (Netherlands)

    Pieters, Wolter; Lukszo, Zofia; Hadžiosmanović, Dina; Berg, van den Jan

    2014-01-01

    Consider the question whether a cyber security investment is cost-effective. The result will depend on the expected frequency of attacks. Contrary to what is referred to as threat event frequencies or hazard rates in safety risk management, frequencies of targeted attacks are not independent from sy

  18. Framework for an African policy towards creating cyber security awareness

    CSIR Research Space (South Africa)

    Dlamini, IZ

    2011-05-01

    Full Text Available Cyber security is a GLOBAL issue. The rest of the world needs Africa to be aware and ready. Furthermore, Africa can only be aware and ready if it is internally organised and collaborates effectively with the rest of the world. The African continent...

  19. Verslag Nationale Cyber Security Strategie 2 : Van bewust naar bekwaam

    NARCIS (Netherlands)

    Luiijf, H.A.M.

    2014-01-01

    Op 28 oktober 2013 werd de tweede Nationale Cyber Security Strategie (NCSS 2) uitgebracht, twee en een half jaar na de eerste. De strategische focus verschuift van publiek-private samenwerking naar publiek-private participatie en strategische samenwerking. De nieuwe strategie beoogt dat, Nederland

  20. Cyber security awareness initiatives in South Africa: a synergy approach

    CSIR Research Space (South Africa)

    Dlamini, Z

    2012-03-01

    Full Text Available crime and attacks and threatens the national security. As a result, South Africa remains one of top three countries that are targeted by phishing attacks, the other two are the US and the UK (RSA, 2011). As a response, various entities engage in cyber...

  1. The process matters: cyber security in industrial control systems

    NARCIS (Netherlands)

    Hadziosmanovic, D.

    2014-01-01

    An industrial control system (ICS) is a computer system that controls industrial processes such as power plants, water and gas distribution, food production, etc. Since cyber-attacks on an ICS may have devastating consequences on human lives and safety in general, the security of ICS is important. I

  2. Strengthening DoD Cyber Security with the Vulnerability Market

    Science.gov (United States)

    2014-01-01

    Strengthening DoD Cyber Security with the Vulnerability Market 472Defense ARJ, January 2014, Vol. 21 No. 1: 466–484 music piracy . This event was sanctioned by...keep any vulnerabilities secret and subsequently refuse to patch the products. For 3 weeks in 2000, the Secure Digital Music Initiative (SDMI...the music recording industry and required all participants to sign a nondisclosure agreement prior to accessing SDMI data files (Craver, 2001). Bug

  3. Cyber crisis management: a decision-support framework for disclosing security incident information

    NARCIS (Netherlands)

    Kulikova, Olga; Heil, Ronald; van den Berg, Jan; Pieters, Wolter

    2012-01-01

    The growing sophistication and frequency of cyber attacks force modern companies to be prepared beforehand for potential cyber security incidents and data leaks. A proper incident disclosure strategy can significantly improve timeliness and effectiveness of incident response activities, reduce legal

  4. UVI Cyber-security Workshop Workshop Analysis.

    Energy Technology Data Exchange (ETDEWEB)

    Kuykendall, Tommie G. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Allsop, Jacob Lee [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Anderson, Benjamin Robert [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Boumedine, Marc [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Carter, Cedric [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Galvin, Seanmichael Yurko [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Gonzalez, Oscar [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Lee, Wellington K. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Lin, Han Wei [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Morris, Tyler Jake [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Nauer, Kevin S.; Potts, Beth A.; Ta, Kim Thanh; Trasti, Jennifer; White, David R.

    2015-07-08

    The cybersecurity consortium, which was established by DOE/NNSA’s Minority Serving Institutions Partnerships Program (MSIPP), allows students from any of the partner schools (13 HBCUs, two national laboratories, and a public school district) to have all consortia options available to them, to create career paths and to open doors to DOE sites and facilities to student members of the consortium. As a part of this year consortium activities, Sandia National Laboratories and the University of Virgin Islands conducted a week long cyber workshop that consisted of three courses; Digital Forensics and Malware Analysis, Python Programming, and ThunderBird Cup. These courses are designed to enhance cyber defense skills and promote learning within STEM related fields.

  5. Breaking the cyber-security dilemma: aligning security needs and removing vulnerabilities.

    Science.gov (United States)

    Dunn Cavelty, Myriam

    2014-09-01

    Current approaches to cyber-security are not working. Rather than producing more security, we seem to be facing less and less. The reason for this is a multi-dimensional and multi-faceted security dilemma that extends beyond the state and its interaction with other states. It will be shown how the focus on the state and "its" security crowds out consideration for the security of the individual citizen, with detrimental effects on the security of the whole system. The threat arising from cyberspace to (national) security is presented as possible disruption to a specific way of life, one building on information technologies and critical functions of infrastructures, with relatively little consideration for humans directly. This non-focus on people makes it easier for state actors to militarize cyber-security and (re-)assert their power in cyberspace, thereby overriding the different security needs of human beings in that space. Paradoxically, the use of cyberspace as a tool for national security, both in the dimension of war fighting and the dimension of mass-surveillance, has detrimental effects on the level of cyber-security globally. A solution out of this dilemma is a cyber-security policy that is decidedly anti-vulnerability and at the same time based on strong considerations for privacy and data protection. Such a security would have to be informed by an ethics of the infosphere that is based on the dignity of information related to human beings.

  6. A Review of Cyber-Physical Energy System Security Assessment

    DEFF Research Database (Denmark)

    Rasmussen, Theis Bo; Yang, Guangya; Nielsen, Arne Hejde

    2017-01-01

    to the consumption side. This transition entails that the future power system evolves into a complex cyber-physical energy system (CPES) with strong interactions between the power, communication and neighboring energy systems. Current power system security assessment methods are based on centralized computation...... and N-1 contingencies, while these risks should still be considered in the future CPES, additional factors are affecting the system security. This paper serves as a review of the challenges entailed by transforming the power system into a CPES from a security assessment perspective. It gives...... an indication of theoretical solutions to CPES challenges and proposes a new framework for security assessment in CPES....

  7. Model Based Cyber Security Analysis for Research Reactor Protection System

    Energy Technology Data Exchange (ETDEWEB)

    Sho, Jinsoo; Rahman, Khalil Ur; Heo, Gyunyoung [Kyung Hee Univ., Yongin (Korea, Republic of); Son, Hanseong [Joongbu Univ., Geumsan (Korea, Republic of)

    2013-07-01

    The study on the qualitative risk due to cyber-attacks into research reactors was performed using bayesian Network (BN). This was motivated to solve the issues of cyber security raised due to digitalization of instrumentation and control (I and C) system. As a demonstrative example, we chose the reactor protection system (RPS) of research reactors. Two scenarios of cyber-attacks on RPS were analyzed to develop mitigation measures against vulnerabilities. The one is the 'insertion of reactor trip' and the other is the 'scram halt'. The six mitigation measures are developed for five vulnerability for these scenarios by getting the risk information from BN.

  8. Cyber Security Research Frameworks For Coevolutionary Network Defense

    Energy Technology Data Exchange (ETDEWEB)

    Rush, George D. [Missouri Univ. of Science and Technology, Rolla, MO (United States); Tauritz, Daniel Remy [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2015-12-03

    Several architectures have been created for developing and testing systems used in network security, but most are meant to provide a platform for running cyber security experiments as opposed to automating experiment processes. In the first paper, we propose a framework termed Distributed Cyber Security Automation Framework for Experiments (DCAFE) that enables experiment automation and control in a distributed environment. Predictive analysis of adversaries is another thorny issue in cyber security. Game theory can be used to mathematically analyze adversary models, but its scalability limitations restrict its use. Computational game theory allows us to scale classical game theory to larger, more complex systems. In the second paper, we propose a framework termed Coevolutionary Agent-based Network Defense Lightweight Event System (CANDLES) that can coevolve attacker and defender agent strategies and capabilities and evaluate potential solutions with a custom network defense simulation. The third paper is a continuation of the CANDLES project in which we rewrote key parts of the framework. Attackers and defenders have been redesigned to evolve pure strategy, and a new network security simulation is devised which specifies network architecture and adds a temporal aspect. We also add a hill climber algorithm to evaluate the search space and justify the use of a coevolutionary algorithm.

  9. ATIP Report: Cyber Security Research in China

    Science.gov (United States)

    2015-06-05

    networks such as telecommunications ( telecom ) carrier backbone networks has improved, but domain name systems remains the weak link concerning security...analysis, cloud security, mobile security, and security of wireless sensor networks in China, and an overview of these research achievements is...provided within. KEYWORDS: Government S&T Policy / Funding, Information Technology / IT, Mathematics, Telecommunications / Networking COUNTRY

  10. Cross-sectoral Innovation

    DEFF Research Database (Denmark)

    Petersen, Lene Ekholm

    2015-01-01

    Cross-sectoral Innovation – The Challenge of Knowledge Sharing Keywords: Knowledge sharing, clusters, ANT, Communities of Practice, welfare technology With regard to meeting the challenges of the knowledge economy, a mode 2 of production (Gibbons et al., 2010), collaboration between actors across...... Edition. Harvard Business School Press. www.cidecluster.fi: https://www.laurea.fi/hankkeet/cide...... of having public organizations is to provide the best care and service to the citizen but with limited means. Therefore time is short for making any change or development in order to innovate and create value. Private firms are also almost always lacking time. If business is bad they use a lot of time....... Heilesen, S. B. 2013. Om Internationale Forsknings- og Udviklingsprojekter indenfor Velfærdsteknologi. Velfærdsteknologi, Innovation, Omsorg og Læring, VIOL-projektet, 2013. (Heilesen, S. B. 2013. Review on International Research and Innovation Projects within Welfare Technology. Welfare Technology...

  11. Advances in cyber security technology, operations, and experiences

    CERN Document Server

    Hsu, D Frank

    2013-01-01

    As you read this, your computer is in jeopardy of being hacked and your identity being stolen. Read this book to protect yourselves from this threat. The world's foremost cyber security experts, from Ruby Lee, Ph.D., the Forrest G. Hamrick professor of engineering and Director of the Princeton Architecture Laboratory for Multimedia and Security (PALMS) at Princeton University; to Nick Mankovich, Chief Information Security Officer of Royal Philips Electronics; to FBI Director Robert S. Mueller III; to Special Assistant to the President Howard A. Schmidt, share critical practical knowledge on ho

  12. A Novel Cyber-Insurance for Internet Security

    CERN Document Server

    Pal, Ranjan; Psounis, Konstantinos

    2011-01-01

    Internet users such as individuals and organizations are subject to different types of epidemic risks such as worms, viruses, and botnets. To reduce the probability of risk, an Internet user generally invests in self-defense mechanisms like antivirus and antispam software. However, such software does not completely eliminate risk. Recent works have considered the problem of residual risk elimination by proposing the idea of cyber-insurance. In reality, an Internet user faces risks due to security attacks as well as risks due to non-security related failures (e.g., reliability faults in the form of hardware crash, buffer overflow, etc.) . These risk types are often indistinguishable by a naive user. However, a cyber-insurance agency would most likely insure risks only due to security attacks. In this case, it becomes a challenge for an Internet user to choose the right type of cyber-insurance contract as standard optimal contracts, i.e., contracts under security attacks only, might prove to be sub-optimal for ...

  13. Bio-Inspired Cyber Security for Smart Grid Deployments

    Energy Technology Data Exchange (ETDEWEB)

    McKinnon, Archibald D.; Thompson, Seth R.; Doroshchuk, Ruslan A.; Fink, Glenn A.; Fulp, Errin W.

    2013-05-01

    mart grid technologies are transforming the electric power grid into a grid with bi-directional flows of both power and information. Operating millions of new smart meters and smart appliances will significantly impact electric distribution systems resulting in greater efficiency. However, the scale of the grid and the new types of information transmitted will potentially introduce several security risks that cannot be addressed by traditional, centralized security techniques. We propose a new bio-inspired cyber security approach. Social insects, such as ants and bees, have developed complex-adaptive systems that emerge from the collective application of simple, light-weight behaviors. The Digital Ants framework is a bio-inspired framework that uses mobile light-weight agents. Sensors within the framework use digital pheromones to communicate with each other and to alert each other of possible cyber security issues. All communication and coordination is both localized and decentralized thereby allowing the framework to scale across the large numbers of devices that will exist in the smart grid. Furthermore, the sensors are light-weight and therefore suitable for implementation on devices with limited computational resources. This paper will provide a brief overview of the Digital Ants framework and then present results from test bed-based demonstrations that show that Digital Ants can identify a cyber attack scenario against smart meter deployments.

  14. Control Systems Security Center Comparison Study of Industrial Control System Standards against the Control Systems Protection Framework Cyber-Security Requirements

    Energy Technology Data Exchange (ETDEWEB)

    Robert P. Evans

    2005-09-01

    selected from the list of standards identified in the identification effort. The requirements in these seven standards were then compared against the requirements given in the Framework. This comparison identified gaps (requirements not covered) in both the individual industry standards and in the Framework. In addition to the sector-specific standards reviewed, the team compared the requirements in the cross-sector Instrumentation, Systems, and Automation Society (ISA) Technical Reports (TR) 99 -1 and -2 to the Framework requirements. The Framework defines a set of security classes separated into families as functional requirements for control system security. Each standard reviewed was compared to this template of requirements to determine if the standard requirements closely or partially matched these Framework requirements. An analysis of each class of requirements pertaining to each standard reviewed can be found in the comparison results section of this report. Refer to Appendix A, ''Synopsis of Comparison Results'', for a complete graphical representation of the study's findings at a glance. Some of the requirements listed in the Framework are covered by many of the standards, while other requirements are addressed by only a few of the standards. In some cases, the scope of the requirements listed in the standard for a particular industry greatly exceeds the requirements given in the Framework. These additional families of requirements, identified by the various standards bodies, could potentially be added to the Framework. These findings are, in part, due to the maturity both of the security standards themselves and of the different industries current focus on security. In addition, there are differences in how communication and control is used in different industries and the consequences of disruptions via security breaches to each particular industry that could affect how security requirements are prioritized. The differences in the

  15. Validating Cyber Security Requirements: A Case Study

    Energy Technology Data Exchange (ETDEWEB)

    Abercrombie, Robert K [ORNL; Sheldon, Frederick T [ORNL; Mili, Ali [New Jersey Insitute of Technology

    2011-01-01

    Vulnerabilities in a system may have widely varying impacts on system security. In practice, security should not be defined as the absence of vulnerabilities. In practice, security should not be quantified by the number of vulnerabilities. Security should be managed by pursuing a policy that leads us first to the highest impact vulnerabilities. In light of these observations, we argue in favor of shifting our focus from vulnerability avoidance/removal to measurable security attributes. To this effect, we recommend a logic be used for system security, which captures/represents security properties in quantifiable, verifiable, measurable terms so that it is possible to reason about security in terms of its observable/perceptible effects rather than its hypothesized causes. This approach is orthogonal to existing techniques for vulnerability avoidance, removal, detection, and recovery, in the sense that it provides a means to assess, quantify, and combine these techniques.

  16. Secure and Resilient Functional Modeling for Navy Cyber-Physical Systems

    Science.gov (United States)

    2017-05-24

    release; distribution is unlimited. Page 1 of 4 Secure & Resilient Functional Modeling for Navy Cyber -Physical Systems FY17 Quarter 2 Technical Progress...team defined the following attack models for cyber -physical systems: - 6 basic attacks targeting signals. - 1 basic attack targeting control... Cyber -Physical Systems” and submitted for publication to IEEE Conference on Automation Science and Engineering (CASE) 2017. Functional Editor (SCCT

  17. Quantum-Enhanced Cyber Security: Experimental Computation on Quantum-Encrypted Data

    Science.gov (United States)

    2017-03-02

    AFRL-AFOSR-UK-TR-2017-0020 Quantum-Enhanced Cyber Security : Experimental Computation on Quantum-Encrypted Data Philip Walther UNIVERSITT WIEN Final...REPORT TYPE Final 3. DATES COVERED (From - To) 15 Oct 2015 to 31 Dec 2016 4. TITLE AND SUBTITLE Quantum-Enhanced Cyber Security : Experimental Computation...FORM SF 298 Final Report for FA9550-1-6-1-0004 Quantum-enhanced cyber security : Experimental quantum computation with quantum-encrypted data

  18. An Analysis Of Cyber Security And How It Is Affecting A Contract Writing System, Seaport

    Science.gov (United States)

    2016-06-01

    NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA JOINT APPLIED PROJECT AN ANALYSIS OF CYBER SECURITY AND HOW IT IS AFFECTING A...REPORT DATE June 2016 3. REPORT TYPE AND DATES COVERED Joint applied project 4. TITLE AND SUBTITLE AN ANALYSIS OF CYBER SECURITY AND HOW IT IS AFFECTING...13. ABSTRACT (maximum 200 words) The purpose of this paper is to research cyber security and whether it creates inefficiencies and ineffective

  19. DETERMINATION OF CYBER SECURITY AWARENESS OF PUBLIC EMPLOYEES AND CONSCIOUSNESS-RISING SUGGESTIONS

    Directory of Open Access Journals (Sweden)

    Huseyin Kuru

    2016-07-01

    Full Text Available The aim of this study is to measure Turkish government employees’ awareness of cyber security and cyber space elements. Participants were 71 Turkish public employees working for various ministries. Both qualitative and quantitative research methods were used to get the most detailed information from the participants. A survey was administered to cyber security officers in chosen state institutions. For qualitative research, open-ended questions were administered to the participants. Reliability and validity issues were established for both surveys. Results show that employees have enough information about cyber security and cyber warfare. Findings clearly suggests that cyber defense policy should be planned in coordination with other state institutions and experiences should be shared. In order to create feasible and realistic cyber security policy at institutional level, experts at cyber security must be trained, hired and help must be requested from specialized individuals and institutions. This study recommends that rapid reaction teams (RRT should be established to take care of cyber systems, to react against cyber breaches in time, to alert staff for cyber-attacks in order to establish effective recovery.

  20. Development on Guidance of Cyber Security Exercise for the Nuclear Facilities

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Hyundoo [Korea Institute of Nuclear Nonproliferation and Control, Daejeon (Korea, Republic of)

    2016-10-15

    Cyber threats and attacks are increasing rapidly against infrastructure including energy and utilities industry over the world. Because of lack of human resource and incident response system to prevent or defend increased cyber threats, many governments and major national infrastructures perform cyber security exercises to improve capabilities of cyber security incident response. Accordingly there are exponential growth in the number of cyber security exercises over the past decade with the trend expecting to accelerate in the coming years. Even though there were many cyber security exercises in the Nuclear Facilities, this exercise was first which focused on mitigation and recovery of the system of the Nuclear Facility against cyber incident. So many insufficient items were deduced such as absence of a procedure for mitigation and recovery of cyber incident. These procedures should be developed and established through 3rd phase of Cyber Security Plan (CSP) and other technical complement actions under regulatory body’s guidance. Also developed and existed procedures should be regularly performed to make cyber incident response team and related people rapidly response against cyber incident through exercises or other training. The insufficient items come from the exercise should be reflected to developed and existed procedures by periods.

  1. SecureCPS: Defending a nanosatellite cyber-physical system

    Science.gov (United States)

    Forbes, Lance; Vu, Huy; Udrea, Bogdan; Hagar, Hamilton; Koutsoukos, Xenofon D.; Yampolskiy, Mark

    2014-06-01

    Recent inexpensive nanosatellite designs employ maneuvering thrusters, much as large satellites have done for decades. However, because a maneuvering nanosatellite can threaten HVAs on-­orbit, it must provide a level of security typically reserved for HVAs. Securing nanosatellites with maneuvering capability is challenging due to extreme cost, size, and power constraints. While still in the design process, our low-­cost SecureCPS architecture promises to dramatically improve security, to include preempting unknown binaries and detecting abnormal behavior. SecureCPS also applies to a broad class of cyber-­physical systems (CPS), such as aircraft, cars, and trains. This paper focuses on Embry-­Riddle's ARAPAIMA nanosatellite architecture, where we assume any off-­the-­shelf component could be compromised by a supply chain attack.1 Based on these assumptions, we have used Vanderbilt's Cyber Physical -­ Attack Description Language (CP-­ADL) to represent realistic attacks, analyze how these attacks propagate in the ARAPAIMA architecture, and how to defeat them using the combination of a low-­cost Root of Trust (RoT) Module, Global InfoTek's Advanced Malware Analysis System (GAMAS), and Anomaly Detection by Machine Learning (ADML).2 Our most recent efforts focus on refining and validating the design of SecureCPS.

  2. INDUSTRIAL CONTROL SYSTEM CYBER SECURITY: QUESTIONS AND ANSWERS RELEVANT TO NUCLEAR FACILITIES, SAFEGUARDS AND SECURITY

    Energy Technology Data Exchange (ETDEWEB)

    Robert S. Anderson; Mark Schanfein; Trond Bjornard; Paul Moskowitz

    2011-07-01

    Typical questions surrounding industrial control system (ICS) cyber security always lead back to: What could a cyber attack do to my system(s) and; how much should I worry about it? These two leading questions represent only a fraction of questions asked when discussing cyber security as it applies to any program, company, business, or organization. The intent of this paper is to open a dialog of important pertinent questions and answers that managers of nuclear facilities engaged in nuclear facility security and safeguards should examine, i.e., what questions should be asked; and how do the answers affect an organization's ability to effectively safeguard and secure nuclear material. When a cyber intrusion is reported, what does that mean? Can an intrusion be detected or go un-noticed? Are nuclear security or safeguards systems potentially vulnerable? What about the digital systems employed in process monitoring, and international safeguards? Organizations expend considerable efforts to ensure that their facilities can maintain continuity of operations against physical threats. However, cyber threats particularly on ICSs may not be well known or understood, and often do not receive adequate attention. With the disclosure of the Stuxnet virus that has recently attacked nuclear infrastructure, many organizations have recognized the need for an urgent interest in cyber attacks and defenses against them. Several questions arise including discussions about the insider threat, adequate cyber protections, program readiness, encryption, and many more. These questions, among others, are discussed so as to raise the awareness and shed light on ways to protect nuclear facilities and materials against such attacks.

  3. Principles of Security: Human, Cyber, and Biological

    CERN Document Server

    Stacey, Blake C

    2013-01-01

    Cybersecurity attacks are a major and increasing burden to economic and social systems globally. Here we analyze the principles of security in different domains and demonstrate an architectural flaw in current cybersecurity. Cybersecurity is inherently weak because it is missing the ability to defend the overall system instead of individual computers. The current architecture enables all nodes in the computer network to communicate transparently with one another, so security would require protecting every computer in the network from all possible attacks. In contrast, other systems depend on system-wide protections. In providing conventional security, police patrol neighborhoods and the military secures borders, rather than defending each individual household. Likewise, in biology, the immune system provides security against viruses and bacteria using primarily action at the skin, membranes, and blood, rather than requiring each cell to defend itself. We propose applying these same principles to address the c...

  4. A survey on the security of cyber-physical systems

    Institute of Scientific and Technical Information of China (English)

    Guangyu WU; Jian SUN; Jie CHEN

    2016-01-01

    Cyber-physical systems (CPSs) are integrations of computation, communication, control and physical processes. Typical examples where CPSs are deployed include smart grids, civil infrastructure, medical devices and manufacturing. Security is one of the most important issues that should be investigated in CPSs and hence has received much attention in recent years. This paper surveys recent results in this area and mainly focusses on three important categories:attack detection, attack design and secure estimation and control. We also discuss several future research directions including risk assessment, modeling of attacks and attacks design, counter-attack strategy and testbed and validation.

  5. 76 FR 6637 - Assumption Buster Workshop: Defense-in-Depth Is a Smart Investment for Cyber Security

    Science.gov (United States)

    2011-02-07

    ... Assumption Buster Workshop: Defense-in-Depth Is a Smart Investment for Cyber Security AGENCY: The National... interagency working group that coordinates cyber security research activities in support of national security...-Depth strategy for cyber security. The workshop will be held March 22, 2011 in the Washington DC area...

  6. Cyber Security Scenarios and Control for Small and Medium Enterprises

    Directory of Open Access Journals (Sweden)

    Nilaykumar Kiran SANGANI

    2012-01-01

    Full Text Available As the world advances towards the computing era, security threats keeps on increasing in the form of malware, viruses, internet attack, theft of IS assets / technology and a lot more. This is a major concern for any form of business. Loss in company’s status / liability / reputation is a huge downfall for a running business. We have witnessed the attacks getting carried out; large firm’s data getting breached / government bodies’ sites getting phished / attacked. These huge entities have technology expertise to safeguard their company’s interest against such attacks through investing huge amounts of capital in manpower and secure tools. But what about SMEs? SMEs enrich a huge part of the country’s economy. Big organizations have their own security measures policy which ideally is not applied when it comes to a SME. The aim of this paper is to come out with an Information Security Assurance Cyber Control for SMEs (ISACC against common cyber security threats implemented at a cost effective measure.

  7. Cyber security risk assessment for SCADA and DCS networks.

    Science.gov (United States)

    Ralston, P A S; Graham, J H; Hieb, J L

    2007-10-01

    The growing dependence of critical infrastructures and industrial automation on interconnected physical and cyber-based control systems has resulted in a growing and previously unforeseen cyber security threat to supervisory control and data acquisition (SCADA) and distributed control systems (DCSs). It is critical that engineers and managers understand these issues and know how to locate the information they need. This paper provides a broad overview of cyber security and risk assessment for SCADA and DCS, introduces the main industry organizations and government groups working in this area, and gives a comprehensive review of the literature to date. Major concepts related to the risk assessment methods are introduced with references cited for more detail. Included are risk assessment methods such as HHM, IIM, and RFRM which have been applied successfully to SCADA systems with many interdependencies and have highlighted the need for quantifiable metrics. Presented in broad terms is probability risk analysis (PRA) which includes methods such as FTA, ETA, and FEMA. The paper concludes with a general discussion of two recent methods (one based on compromise graphs and one on augmented vulnerability trees) that quantitatively determine the probability of an attack, the impact of the attack, and the reduction in risk associated with a particular countermeasure.

  8. Cyber-Security Curricula for Basic Users

    Science.gov (United States)

    2013-09-01

    like cyberbullying , digital cheating, and safety and security concerns‖ [7]. The need to teach security principles to this age demographic is at an...addresses the following topics: Cyberbullying , Inappropriate content, 25 Predators, Revealing too much Information, Spyware, spam, and scams. Each...emerging technology, surfing the web, video gaming, the dark side – cyberbullying . Each topic is covered by providing facts for the teacher to present

  9. Cyber Assessment Methods for SCADA Security

    Energy Technology Data Exchange (ETDEWEB)

    2005-06-01

    The terrorist attacks of September 11, 2001 brought to light threats and vulnerabilities that face the United States. In response, the U.S. Government is directing the effort to secure the nation's critical infrastructure by creating programs to implement the National Strategy to Secure Cyberspace (1). One part of this effort involves assessing Supervisory Control and Data Acquisition (SCADA) systems. These systems are essential to the control of critical elements of our national infrastructure, such as electric power, oil, and gas production and distribution. Since their incapacitation or destruction would have a debilitating impact on the defense or economic security of the United States, one of the main objectives of this program is to identify vulnerabilities and encourage the public and private sectors to work together to design secure control systems that resolve these weaknesses. This paper describes vulnerability assessment methodologies used in ongoing research and assessment activities designed to identify and resolve vulnerabilities so as to improve the security of the nation's critical infrastructure.

  10. Cyber Assessment Methods For SCADA Security

    Energy Technology Data Exchange (ETDEWEB)

    May Robin Permann; Kenneth Rohde

    2005-06-01

    The terrorist attacks of September 11, 2001 brought to light threats and vulnerabilities that face the United States. In response, the U.S. Government is directing the effort to secure the nation's critical infrastructure by creating programs to implement the National Strategy to Secure Cyberspace (1). One part of this effort involves assessing Supervisory Control and Data Acquisition (SCADA) systems. These systems are essential to the control of critical elements of our national infrastructure, such as electric power, oil, and gas production and distribution. Since their incapacitation or destruction would have a debilitating impact on the defense or economic security of the United States, one of the main objectives of this program is to identify vulnerabilities and encourage the public and private sectors to work together to design secure control systems that resolve these weaknesses. This paper describes vulnerability assessment methodologies used in ongoing research and assessment activities designed to identify and resolve vulnerabilities so as to improve the security of the nation's critical infrastructure.

  11. Between Hype and Understatement: Reassessing Cyber Risks as a Security Strategy

    Directory of Open Access Journals (Sweden)

    Audrey Guinchard

    2011-01-01

    Full Text Available Most of the actions that fall under the trilogy of cyber crime, terrorism,and war exploit pre-existing weaknesses in the underlying technology.Because these vulnerabilities that exist in the network are not themselvesillegal, they tend to be overlooked in the debate on cyber security. A UKreport on the cost of cyber crime illustrates this approach. Its authors chose to exclude from their analysis the costs in anticipation of cyber crime, such as insurance costs and the costs of purchasing anti-virus software on the basis that "these are likely to be factored into normal day-to-day expenditures for the Government, businesses, and individuals. This article contends if these costs had been quantified and integrated into the cost of cyber crime, then the analysis would have revealed that what matters is not so much cyber crime, but the fertile terrain of vulnerabilities that unleash a range of possibilities to whomever wishes to exploit them. By downplaying the vulnerabilities, the threats represented by cyber war, cyber terrorism, and cyber crime are conversely inflated. Therefore, reassessing risk as a strategy for security in cyberspace must include acknowledgment of understated vulnerabilities, as well as a better distributed knowledge about the nature and character of the overhyped threats of cyber crime, cyber terrorism, and cyber war.

  12. Framework for Grading of Cyber Security Check-List upon I and C Architecture

    Energy Technology Data Exchange (ETDEWEB)

    Shin, Jin Soo; Heo, Gyunyong [Kyunghee University, Yongin (Korea, Republic of); Son, Han Seong [Joongbu University, Geumsan (Korea, Republic of)

    2016-05-15

    Cyber-attack can threaten research reactors as well as NPPs since the goal of cyber-attack is not only to make a catastrophic accident such as radiation exposure against public health but also to make chaos or anxiety among the public. Moreover, there is more probability to occur in research reactors than NPPs since research reactors has more users than NPPs. The nuclear regulatory agencies such as U.S.NRC and KINAC (Korea Institute of Nuclear Nonproliferation and Control) have published regulatory guides for rules against cyber-attack to maintain cyber security of nuclear facilities. U.S.NRC has published a regulatory guide (U.S.NRC / RG-5.71) and KINAC has developed a regulatory standard (KINAC / RS-015) to establish a cyber security for nuclear facilities. However, these regulatory documents represent check-list for cyber security regardless of reactor type such as NPPs or research reactors. The proposed framework in this paper was grading of cyber security check-lists with BBN by I and C architecture such as NPPs and research reactors. First, the BBN model was developed to apply I and C system architecture of target nuclear facility. The architecture model calculates the cyber security risk with structural architecture, vulnerability, and mitigation measure. Second, cyber security check-lists are defined in cyber security documents. It is, then, used with the consideration of mitigation measures of BBN model in order to apply architectural characteristic. Third, after assuming cyber-attack occurs to I and C system, the model calculates the posterior information using Bayesian update. Finally, the cyber security check-lists for nuclear facilities are graded upon I and C architecture with the posterior information for mitigation measures.

  13. The Impact of Secure OSs on Internet Security: What Cyber-Insurers Need to Know

    CERN Document Server

    Pal, Ranjan

    2012-01-01

    In recent years, researchers have proposed \\emph{cyber-insurance} as a suitable risk-management technique for enhancing security in Internet-like distributed systems. However, amongst other factors, information asymmetry between the insurer and the insured, and the inter-dependent and correlated nature of cyber risks have contributed in a big way to the failure of cyber-insurance markets. Security experts have argued in favor of operating system (OS) platform switching (ex., from Windows to Unix-based OSs) or secure OS adoption as being one of the techniques that can potentially mitigate the problems posing a challenge to successful cyber-insurance markets. In this regard we model OS platform switching dynamics using a \\emph{social gossip} mechanism and study three important questions related to the nature of the dynamics, for Internet-like distributed systems: (i) which type of networks should cyber-insurers target for insuring?, (ii) what are the bounds on the asymptotic performance level of a network, wher...

  14. Using Arabic CAPTCHA for Cyber Security

    Science.gov (United States)

    Khan, Bilal; Alghathbar, Khaled S.; Khan, Muhammad Khurram; Alkelabi, Abdullah M.; Alajaji, Abdulaziz

    Bots are automated programs designed to make auto registrations in online services, resulting in wastage of resources and breach of web security. English based CAPTCHAs are used to prevent bots from abusing these online services. However, English based CAPTCHAs have some inherent flaws and have been broken by bots. In this paper, an Arabic text based CAPTCHA is proposed. The CAPTCHA text image is distorted with background noise. Background noise and dots in the Arabic text makes CAPTCHA hard to be broken by Arabic OCRs. The proposed scheme is useful in Arabic speaking countries and in protecting internet resources. The proposed CAPTCHA scheme is both secure and robust. Experimental results show that background noise is a good defense mechanism against OCR recognizing Arabic text.

  15. 78 FR 39712 - Critical Infrastructure Protection and Cyber Security Trade Mission to Saudi Arabia and Kuwait...

    Science.gov (United States)

    2013-07-02

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF COMMERCE International Trade Administration Critical Infrastructure Protection and Cyber Security Trade Mission to Saudi..., until the maximum of 20 participants is selected, all interested U.S. IT and cyber-security firms...

  16. 76 FR 2151 - Assumption Buster Workshop: Defense-in-Depth is a Smart Investment for Cyber Security

    Science.gov (United States)

    2011-01-12

    ... Assumption Buster Workshop: Defense-in-Depth is a Smart Investment for Cyber Security AGENCY: The National...) Committee, an interagency working group that coordinates cyber security research activities in support of... the defense-in-depth strategy for cyber security. The workshop will be held March 22, 2011 in the...

  17. Probabilistic Characterization of Adversary Behavior in Cyber Security

    Energy Technology Data Exchange (ETDEWEB)

    Meyers, C A; Powers, S S; Faissol, D M

    2009-10-08

    The objective of this SMS effort is to provide a probabilistic characterization of adversary behavior in cyber security. This includes both quantitative (data analysis) and qualitative (literature review) components. A set of real LLNL email data was obtained for this study, consisting of several years worth of unfiltered traffic sent to a selection of addresses at ciac.org. The email data was subjected to three interrelated analyses: a textual study of the header data and subject matter, an examination of threats present in message attachments, and a characterization of the maliciousness of embedded URLs.

  18. Secure it now or secure it later: the benefits of addressing cyber-security from the outset

    Science.gov (United States)

    Olama, Mohammed M.; Nutaro, James

    2013-05-01

    The majority of funding for research and development (R&D) in cyber-security is focused on the end of the software lifecycle where systems have been deployed or are nearing deployment. Recruiting of cyber-security personnel is similarly focused on end-of-life expertise. By emphasizing cyber-security at these late stages, security problems are found and corrected when it is most expensive to do so, thus increasing the cost of owning and operating complex software systems. Worse, expenditures on expensive security measures often mean less money for innovative developments. These unwanted increases in cost and potential slowing of innovation are unavoidable consequences of an approach to security that finds and remediate faults after software has been implemented. We argue that software security can be improved and the total cost of a software system can be substantially reduced by an appropriate allocation of resources to the early stages of a software project. By adopting a similar allocation of R&D funds to the early stages of the software lifecycle, we propose that the costs of cyber-security can be better controlled and, consequently, the positive effects of this R&D on industry will be much more pronounced.

  19. Cyber security Considerations for Real Time Physiological Status Monitoring: Threats, Goals, and Use Cases

    Science.gov (United States)

    2016-11-01

    Cyber - security Considerations for Real-Time Physiological Status Monitoring: Threats, Goals, and Use Cases John Holliman, Michael Zhivich, Roger...Spins: Security protocols for sensor networks,” Secaucus, NJ, USA, pp. 521– 534, Sep. 2002. [8] DoD, Resilient Military Systems and the Advanced Cyber ...2012. [10] W. Trappe, R. Howard, and R. S. Moore, “Low-energy security : Limits and opportunities in the internet of things,” IEEE Security Privacy, vol

  20. ASPECTS OF POLICIES AND STRATEGIES FOR CYBER SECURITY IN THE EUROPEAN UNION

    Directory of Open Access Journals (Sweden)

    Ilina ARMENCHEVA

    2015-10-01

    Full Text Available Freedom and prosperity of mankind greatly depend on an innovative, safe and reliable Internet that, of course, will keep evolving. Cyber space must be protected from incidents, misuse and abuse. Handling the increasing number of threats to cyber security is a challenge that national security and the trend in the international environment face. This makes taking fast and adequate measures at national, European and international level a must. Changing national security strategies and adopting new cyber security strategies are a part of these measures.

  1. Analysis of Dynamic Complexity of the Cyber Security Ecosystem of Colombia

    Directory of Open Access Journals (Sweden)

    Angélica Flórez

    2016-07-01

    Full Text Available This paper presents two proposals for the analysis of the complexity of the Cyber security Ecosystem of Colombia (CEC. This analysis shows the available knowledge about entities engaged in cyber security in Colombia and the relationships between them, which allow an understanding of the synergy between the different existing components. The complexity of the CEC is detailed from the view of the Influence Diagram of System Dynamics and the Domain Diagram of Software Engineering. The resulting model makes cyber security evident as a strategic component of national security.

  2. Application of the JDL data fusion process model for cyber security

    Science.gov (United States)

    Giacobe, Nicklaus A.

    2010-04-01

    A number of cyber security technologies have proposed the use of data fusion to enhance the defensive capabilities of the network and aid in the development of situational awareness for the security analyst. While there have been advances in fusion technologies and the application of fusion in intrusion detection systems (IDSs), in particular, additional progress can be made by gaining a better understanding of a variety of data fusion processes and applying them to the cyber security application domain. This research explores the underlying processes identified in the Joint Directors of Laboratories (JDL) data fusion process model and further describes them in a cyber security context.

  3. Bio-inspiring cyber security and cloud services trends and innovations

    CERN Document Server

    Kim, Tai-Hoon; Kacprzyk, Janusz; Awad, Ali

    2014-01-01

    This volume presents recent research in cyber security, and reports how organizations can gain competitive advantages by applying the different security techniques in real-world scenarios. The volume provides reviews of cutting–edge technologies, algorithms, applications and insights for bio-inspiring cyber security-based systems. The book will be a valuable companion and comprehensive reference for both postgraduate and senior undergraduate students who are taking a course in cyber security. The volume is organized in self-contained chapters to provide greatest reading flexibility.  

  4. Computer Security: Protect your plant: a "serious game" about control system cyber-security

    CERN Multimedia

    Stefan Lueders, Computer Security Team

    2015-01-01

    Control system cyber-security is attracting increasing attention: from cybercriminals, from the media and from security researchers.   After the legendary “Stuxnet” attacks of 2010 against an Iranian uranium enrichment plant, the infiltration of Saudi Aramco in 2012, and most recently the hacking of German blast furnaces, we should be prepared. Just imagine what would happen if hackers turned off the lights in Geneva and the Pays-de-Gex for a month? (“Hacking control systems, switching lights off!"). Or if attackers infiltrated CERN’s accelerator or experiment control systems and stopped us from pursuing our core business: delivering beams and recording particle collisions (“Hacking control systems, switching... accelerators off?"). Now you can test your ability to protect an industrial plant against cyber-threats! The Computer Security Team, in collaboration with Kaspersky Lab, is organising a so-...

  5. Emerging Security Mechanisms for Medical Cyber Physical Systems.

    Science.gov (United States)

    Kocabas, Ovunc; Soyata, Tolga; Aktas, Mehmet K

    2016-01-01

    The following decade will witness a surge in remote health-monitoring systems that are based on body-worn monitoring devices. These Medical Cyber Physical Systems (MCPS) will be capable of transmitting the acquired data to a private or public cloud for storage and processing. Machine learning algorithms running in the cloud and processing this data can provide decision support to healthcare professionals. There is no doubt that the security and privacy of the medical data is one of the most important concerns in designing an MCPS. In this paper, we depict the general architecture of an MCPS consisting of four layers: data acquisition, data aggregation, cloud processing, and action. Due to the differences in hardware and communication capabilities of each layer, different encryption schemes must be used to guarantee data privacy within that layer. We survey conventional and emerging encryption schemes based on their ability to provide secure storage, data sharing, and secure computation. Our detailed experimental evaluation of each scheme shows that while the emerging encryption schemes enable exciting new features such as secure sharing and secure computation, they introduce several orders-of-magnitude computational and storage overhead. We conclude our paper by outlining future research directions to improve the usability of the emerging encryption schemes in an MCPS.

  6. A Security Analysis of Cyber-Physical Systems Architecture for Healthcare

    Directory of Open Access Journals (Sweden)

    Darren Seifert

    2016-10-01

    Full Text Available This paper surveys the available system architectures for cyber-physical systems. Several candidate architectures are examined using a series of essential qualities for cyber-physical systems for healthcare. Next, diagrams detailing the expected functionality of infusion pumps in two of the architectures are analyzed. The STRIDE Threat Model is then used to decompose each to determine possible security issues and how they can be addressed. Finally, a comparison of the major security issues in each architecture is presented to help determine which is most adaptable to meet the security needs of cyber-physical systems in healthcare.

  7. Cyber Terrorism: A Study of the Extent of Coverage in Computer Security Textbooks

    Science.gov (United States)

    Prichard, Janet J.; MacDonald, Laurie E.

    2004-01-01

    On September 11th, 2001 the United States experienced the largest terrorist attack in its history. This event caused many government agencies to review their security practices and procedures. It also has raised awareness of other avenues that terrorists might pursue to achieve their goals, including cyber terrorism. Cyber terrorism can be…

  8. Canvassing the Cyber Security Landscape: Why Energy Companies Need to Pay Attention

    NARCIS (Netherlands)

    Averill, B.; Luiijf, H.A.M.

    2010-01-01

    Recent news of a “highly sophisticated and targeted” cyber attack on Google, Yahoo, and perhaps on as many as a dozen other companies has once again brought the issue of cyber security to the top of the news. Internet companies, however, are not the only ones vulnerable to such attacks. Over the pas

  9. Cyber Terrorism: A Study of the Extent of Coverage in Computer Security Textbooks

    Science.gov (United States)

    Prichard, Janet J.; MacDonald, Laurie E.

    2004-01-01

    On September 11th, 2001 the United States experienced the largest terrorist attack in its history. This event caused many government agencies to review their security practices and procedures. It also has raised awareness of other avenues that terrorists might pursue to achieve their goals, including cyber terrorism. Cyber terrorism can be…

  10. Cyber security risk evaluation of a nuclear I and C using BN and ET

    Energy Technology Data Exchange (ETDEWEB)

    Shin, Jin Soo; Heo, Gyun Young [Dept. of Nuclear Engineering, Kyung Hee University, Yongin (Korea, Republic of); Son, Han Seong [Computer and Game Science, Joongbu University, Geumsan (Korea, Republic of)

    2017-04-15

    Cyber security is an important issue in the field of nuclear engineering because nuclear facilities use digital equipment and digital systems that can lead to serious hazards in the event of an accident. Regulatory agencies worldwide have announced guidelines for cyber security related to nuclear issues, including U.S. NRC Regulatory Guide 5.71. It is important to evaluate cyber security risk in accordance with these regulatory guides. In this study, we propose a cyber security risk evaluation model for nuclear instrumentation and control systems using a Bayesian network and event trees. As it is difficult to perform penetration tests on the systems, the evaluation model can inform research on cyber threats to cyber security systems for nuclear facilities through the use of prior and posterior information and backpropagation calculations. Furthermore, we suggest a methodology for the application of analytical results from the Bayesian network model to an event tree model, which is a probabilistic safety assessment method. The proposed method will provide insight into safety and cyber security risks.

  11. Cyber Security Risk Evaluation of a Nuclear I&C Using BN and ET

    Directory of Open Access Journals (Sweden)

    Jinsoo Shin

    2017-04-01

    Full Text Available Cyber security is an important issue in the field of nuclear engineering because nuclear facilities use digital equipment and digital systems that can lead to serious hazards in the event of an accident. Regulatory agencies worldwide have announced guidelines for cyber security related to nuclear issues, including U.S. NRC Regulatory Guide 5.71. It is important to evaluate cyber security risk in accordance with these regulatory guides. In this study, we propose a cyber security risk evaluation model for nuclear instrumentation and control systems using a Bayesian network and event trees. As it is difficult to perform penetration tests on the systems, the evaluation model can inform research on cyber threats to cyber security systems for nuclear facilities through the use of prior and posterior information and backpropagation calculations. Furthermore, we suggest a methodology for the application of analytical results from the Bayesian network model to an event tree model, which is a probabilistic safety assessment method. The proposed method will provide insight into safety and cyber security risks.

  12. Towards an Experimental Testbed Facility for Cyber-Physical Security Research

    Energy Technology Data Exchange (ETDEWEB)

    Edgar, Thomas W.; Manz, David O.; Carroll, Thomas E.

    2012-01-07

    Cyber-Physical Systems (CPSs) are under great scrutiny due to large Smart Grid investments and recent high profile security vulnerabilities and attacks. Research into improved security technologies, communication models, and emergent behavior is necessary to protect these systems from sophisticated adversaries and new risks posed by the convergence of CPSs with IT equipment. However, cyber-physical security research is limited by the lack of access to universal cyber-physical testbed facilities that permit flexible, high-fidelity experiments. This paper presents a remotely-configurable and community-accessible testbed design that integrates elements from the virtual, simulated, and physical environments. Fusing data between the three environments enables the creation of realistic and scalable environments where new functionality and ideas can be exercised. This novel design will enable the research community to analyze and evaluate the security of current environments and design future, secure, cyber-physical technologies.

  13. Security Scheme Based on Parameter Hiding Technic for Mobile Communication in a Secure Cyber World

    Directory of Open Access Journals (Sweden)

    Jong Hyuk Park

    2016-10-01

    Full Text Available Long Term Evolution (LTE and Long Term Evolution-Advanced (LTE-A support a better data transmission service than 3G dose and are globally commercialized technologies in a cyber world that is essential for constructing a future mobile environment, since network traffics have exponentially increased as people have started to use more than just one mobile device. However, when User Equipment (UE is executing initial attach processes to access LTE networks, there is a vulnerability in which identification parameters like International Mobile Subscriber Identity (IMSI and Radio Network Temporary Identities (RNTI are transmitted as plain texts. It can threat various services that are commercialized therewith in a cyber world. Therefore, a security scheme is proposed in this paper where identification parameters can be securely transmitted and hidden in four cases where initial attach occurs between UE and Mobility Management Entity (MME. The proposed security scheme not only supports encrypted transmission of identification parameters but also mutual authentication between Evolved Node B (eNB and MME to make a secure cyber world. Additionally, performance analysis results using an OPNET simulator showed the satisfaction of the average delay rate that is specified in LTE standards.

  14. A genetic epidemiology approach to cyber-security.

    Science.gov (United States)

    Gil, Santiago; Kott, Alexander; Barabási, Albert-László

    2014-07-16

    While much attention has been paid to the vulnerability of computer networks to node and link failure, there is limited systematic understanding of the factors that determine the likelihood that a node (computer) is compromised. We therefore collect threat log data in a university network to study the patterns of threat activity for individual hosts. We relate this information to the properties of each host as observed through network-wide scans, establishing associations between the network services a host is running and the kinds of threats to which it is susceptible. We propose a methodology to associate services to threats inspired by the tools used in genetics to identify statistical associations between mutations and diseases. The proposed approach allows us to determine probabilities of infection directly from observation, offering an automated high-throughput strategy to develop comprehensive metrics for cyber-security.

  15. Control Systems Cyber Security:Defense in Depth Strategies

    Energy Technology Data Exchange (ETDEWEB)

    David Kuipers; Mark Fabro

    2006-05-01

    Information infrastructures across many public and private domains share several common attributes regarding IT deployments and data communications. This is particularly true in the control systems domain. A majority of the systems use robust architectures to enhance business and reduce costs by increasing the integration of external, business, and control system networks. However, multi-network integration strategies often lead to vulnerabilities that greatly reduce the security of an organization, and can expose mission-critical control systems to cyber threats. This document provides guidance and direction for developing ‘defense-in-depth’ strategies for organizations that use control system networks while maintaining a multi-tier information architecture that requires: Maintenance of various field devices, telemetry collection, and/or industrial-level process systems Access to facilities via remote data link or modem Public facing services for customer or corporate operations A robust business environment that requires connections among the control system domain, the external Internet, and other peer organizations.

  16. Control Systems Cyber Security:Defense in Depth Strategies

    Energy Technology Data Exchange (ETDEWEB)

    David Kuipers; Mark Fabro

    2006-05-01

    Information infrastructures across many public and private domains share several common attributes regarding IT deployments and data communications. This is particularly true in the control systems domain. A majority of the systems use robust architectures to enhance business and reduce costs by increasing the integration of external, business, and control system networks. However, multi-network integration strategies often lead to vulnerabilities that greatly reduce the security of an organization, and can expose mission-critical control systems to cyber threats. This document provides guidance and direction for developing ‘defense-in-depth’ strategies for organizations that use control system networks while maintaining a multi-tier information architecture that requires: Maintenance of various field devices, telemetry collection, and/or industrial-level process systems Access to facilities via remote data link or modem Public facing services for customer or corporate operations A robust business environment that requires connections among the control system domain, the external Internet, and other peer organizations.

  17. Implementation of a RPS Cyber Security Test-bed with Two PLCs

    Energy Technology Data Exchange (ETDEWEB)

    Shin, Jinsoo; Heo, Gyunyoung [Kyung Hee Univ., Yongin (Korea, Republic of); Son, Hanseong [Joongbu Univ., Geumsan (Korea, Republic of); An, Yongkyu; Rizwan, Uddin [University of Illinois at Urbana-Champaign, Urbana (United States)

    2015-10-15

    Our research team proposed the methodology to evaluate cyber security with Bayesian network (BN) as a cyber security evaluation model and help operator, licensee, licensor or regulator in granting evaluation priorities. The methodology allowed for overall evaluation of cyber security by considering architectural aspect of facility and management aspect of cyber security at the same time. In order to emphasize reality of this model by inserting true data, it is necessary to conduct a penetration test that pretends an actual cyber-attack. Through the collaboration with University of Illinois at Urbana-Champaign, which possesses the Tricon a safety programmable logic controller (PLC) used at nuclear power plants and develops a test-bed for nuclear power plant, a test-bed for reactor protection system (RPS) is being developed with the PLCs. Two PLCs are used to construct a simple test-bed for RPS, bi-stable processor (BP) and coincidence processor (CP). By using two PLCs, it is possible to examine cyber-attack against devices such as PLC, cyber-attack against communication between devices, and the effects of a PLC on the other PLC. Two PLCs were used to construct a test-bed for penetration test in this study. Advantages of using two or more PLCs instead of single PLC are as follows. 1) Results of cyber-attack reflecting characteristics among PLCs can be obtained. 2) Cyber-attack can be attempted using a method of attacking communication between PLCs. True data obtained can be applied to existing cyber security evaluation model to emphasize reality of the model.

  18. S3A: Secure System Simplex Architecture for Enhanced Security of Cyber-Physical Systems

    CERN Document Server

    Mohan, Sibin; Betti, Emiliano; Yun, Heechul; Sha, Lui; Caccamo, Marco

    2012-01-01

    Until recently, cyber-physical systems, especially those with safety-critical properties that manage critical infrastructure (e.g. power generation plants, water treatment facilities, etc.) were considered to be invulnerable against software security breaches. The recently discovered 'W32.Stuxnet' worm has drastically changed this perception by demonstrating that such systems are susceptible to external attacks. Here we present an architecture that enhances the security of safety-critical cyber-physical systems despite the presence of such malware. Our architecture uses the property that control systems have deterministic execution behavior, to detect an intrusion within 0.6 {\\mu}s while still guaranteeing the safety of the plant. We also show that even if an attack is successful, the overall state of the physical system will still remain safe. Even if the operating system's administrative privileges have been compromised, our architecture will still be able to protect the physical system from coming to harm.

  19. Cyber security challenges in Smart Cities: Safety, security and privacy.

    Science.gov (United States)

    Elmaghraby, Adel S; Losavio, Michael M

    2014-07-01

    The world is experiencing an evolution of Smart Cities. These emerge from innovations in information technology that, while they create new economic and social opportunities, pose challenges to our security and expectations of privacy. Humans are already interconnected via smart phones and gadgets. Smart energy meters, security devices and smart appliances are being used in many cities. Homes, cars, public venues and other social systems are now on their path to the full connectivity known as the "Internet of Things." Standards are evolving for all of these potentially connected systems. They will lead to unprecedented improvements in the quality of life. To benefit from them, city infrastructures and services are changing with new interconnected systems for monitoring, control and automation. Intelligent transportation, public and private, will access a web of interconnected data from GPS location to weather and traffic updates. Integrated systems will aid public safety, emergency responders and in disaster recovery. We examine two important and entangled challenges: security and privacy. Security includes illegal access to information and attacks causing physical disruptions in service availability. As digital citizens are more and more instrumented with data available about their location and activities, privacy seems to disappear. Privacy protecting systems that gather data and trigger emergency response when needed are technological challenges that go hand-in-hand with the continuous security challenges. Their implementation is essential for a Smart City in which we would wish to live. We also present a model representing the interactions between person, servers and things. Those are the major element in the Smart City and their interactions are what we need to protect.

  20. Cyber security challenges in Smart Cities: Safety, security and privacy

    Directory of Open Access Journals (Sweden)

    Adel S. Elmaghraby

    2014-07-01

    Full Text Available The world is experiencing an evolution of Smart Cities. These emerge from innovations in information technology that, while they create new economic and social opportunities, pose challenges to our security and expectations of privacy. Humans are already interconnected via smart phones and gadgets. Smart energy meters, security devices and smart appliances are being used in many cities. Homes, cars, public venues and other social systems are now on their path to the full connectivity known as the “Internet of Things.” Standards are evolving for all of these potentially connected systems. They will lead to unprecedented improvements in the quality of life. To benefit from them, city infrastructures and services are changing with new interconnected systems for monitoring, control and automation. Intelligent transportation, public and private, will access a web of interconnected data from GPS location to weather and traffic updates. Integrated systems will aid public safety, emergency responders and in disaster recovery. We examine two important and entangled challenges: security and privacy. Security includes illegal access to information and attacks causing physical disruptions in service availability. As digital citizens are more and more instrumented with data available about their location and activities, privacy seems to disappear. Privacy protecting systems that gather data and trigger emergency response when needed are technological challenges that go hand-in-hand with the continuous security challenges. Their implementation is essential for a Smart City in which we would wish to live. We also present a model representing the interactions between person, servers and things. Those are the major element in the Smart City and their interactions are what we need to protect.

  1. Crowdsourcing cyber security: a property rights view of exclusion and theft on the information commons

    Directory of Open Access Journals (Sweden)

    Gary Shiffman

    2013-02-01

    Full Text Available Individuals increasingly rely upon the internet for basic economic interaction. Current cyber security mechanisms are unable to stop adversaries and hackers from gaining access to sensitive information stored on government, business, and public computers. Experts propose implementing attribution and audit frameworks in cyberspace to deter, prevent, and prosecute cyber criminals and attackers. However, this method faces significant policy and resource constraints. Social science research, specifically in law and economics, concerning common-pool resources suggests an organic approach to cyber security may yield an appropriate solution. This cyber commons method involves treating the internet as a commons and encouraging individuals and institutions to voluntarily implement innovative and adaptive monitoring mechanisms. Such mechanisms are already in use and in many cases have proven more effective than attribution mechanisms in resisting and tracing the source of cyber attacks.

  2. Security Risks and Modern Cyber Security Technologies for Corporate Networks

    CERN Document Server

    Gharibi, Wajeb

    2011-01-01

    This article aims to highlight current trends on the market of corporate antivirus solutions. Brief overview of modern security threats that can destroy IT environment is provided as well as a typical structure and features of antivirus suits for corporate users presented on the market. The general requirements for corporate products are determined according to the last report from av-comparatives.org [1]. The detailed analysis of new features is provided based on an overview of products available on the market nowadays. At the end, an enumeration of modern trends in antivirus industry for corporate users completes this article. Finally, the main goal of this article is to stress an attention about new trends suggested by AV vendors in their solutions in order to protect customers against newest security threats.

  3. Protecting water and wastewater infrastructure from cyber attacks

    Institute of Scientific and Technical Information of China (English)

    Srinivas Panguluri; William Phillips; John Cusimano

    2011-01-01

    Multiple organizations over the years have collected and analyzed data on cyber attacks and they all agree on one conclusion:cyber attacks are real and can cause significant damages.This paper presents some recent statistics on cyber attacks and resulting damages.Water and wastewater utilities must adopt countermeasures to prevent or minimize the damage in case of such attacks.Many unique challenges are faced by the water and wastewater industry while selecting and implementing security countermeasures; the key challenges are:1) the increasing interconnection of their business and control system networks,2) large variation of proprietary industrial control equipment utilized,3) multitude of cross-sector cyber-security standards,and 4) the differences in the equipment vendor's approaches to meet these security standards.The utilities can meet these challenges by voluntarily selecting and adopting security standards,conducting a gap analysis,performing vulnerability/risk analysis,and undertaking countermeasures that best meets their security and organizational requirements.Utilities should optimally utilize their limited resources to prepare and implement necessary programs that are designed to increase cyber-security over the years.Implementing cyber security does not necessarily have to be expensive,substantial improvements can be accomplished through policy,procedure,training and awareness.Utilities can also get creative and allocate more funding through annual budgets and reduce dependence upon capital improvement programs to achieve improvements in cyber-security.

  4. Protecting water and wastewater infrastructure from cyber attacks

    Science.gov (United States)

    Panguluri, Srinivas; Phillips, William; Cusimano, John

    2011-12-01

    Multiple organizations over the years have collected and analyzed data on cyber attacks and they all agree on one conclusion: cyber attacks are real and can cause significant damages. This paper presents some recent statistics on cyber attacks and resulting damages. Water and wastewater utilities must adopt countermeasures to prevent or minimize the damage in case of such attacks. Many unique challenges are faced by the water and wastewater industry while selecting and implementing security countermeasures; the key challenges are: 1) the increasing interconnection of their business and control system networks, 2) large variation of proprietary industrial control equipment utilized, 3) multitude of cross-sector cyber-security standards, and 4) the differences in the equipment vendor's approaches to meet these security standards. The utilities can meet these challenges by voluntarily selecting and adopting security standards, conducting a gap analysis, performing vulnerability/risk analysis, and undertaking countermeasures that best meets their security and organizational requirements. Utilities should optimally utilize their limited resources to prepare and implement necessary programs that are designed to increase cyber-security over the years. Implementing cyber security does not necessarily have to be expensive, substantial improvements can be accomplished through policy, procedure, training and awareness. Utilities can also get creative and allocate more funding through annual budgets and reduce dependence upon capital improvement programs to achieve improvements in cyber-security.

  5. DOE/DHS INDUSTRIAL CONTROL SYSTEM CYBER SECURITY PROGRAMS: A MODEL FOR USE IN NUCLEAR FACILITY SAFEGUARDS AND SECURITY

    Energy Technology Data Exchange (ETDEWEB)

    Robert S. Anderson; Mark Schanfein; Trond Bjornard; Paul Moskowitz

    2011-07-01

    Many critical infrastructure sectors have been investigating cyber security issues for several years especially with the help of two primary government programs. The U.S. Department of Energy (DOE) National SCADA Test Bed and the U.S. Department of Homeland Security (DHS) Control Systems Security Program have both implemented activities aimed at securing the industrial control systems that operate the North American electric grid along with several other critical infrastructure sectors (ICS). These programs have spent the last seven years working with industry including asset owners, educational institutions, standards and regulating bodies, and control system vendors. The programs common mission is to provide outreach, identification of cyber vulnerabilities to ICS and mitigation strategies to enhance security postures. The success of these programs indicates that a similar approach can be successfully translated into other sectors including nuclear operations, safeguards, and security. The industry regulating bodies have included cyber security requirements and in some cases, have incorporated sets of standards with penalties for non-compliance such as the North American Electric Reliability Corporation Critical Infrastructure Protection standards. These DOE and DHS programs that address security improvements by both suppliers and end users provide an excellent model for nuclear facility personnel concerned with safeguards and security cyber vulnerabilities and countermeasures. It is not a stretch to imagine complete surreptitious collapse of protection against the removal of nuclear material or even initiation of a criticality event as witnessed at Three Mile Island or Chernobyl in a nuclear ICS inadequately protected against the cyber threat.

  6. Study of Security Attributes of Smart Grid Systems- Current Cyber Security Issues

    Energy Technology Data Exchange (ETDEWEB)

    Wayne F. Boyer; Scott A. McBride

    2009-04-01

    This document provides information for a report to congress on Smart Grid security as required by Section 1309 of Title XIII of the Energy Independence and Security Act of 2007. The security of any future Smart Grid is dependent on successfully addressing the cyber security issues associated with the nation’s current power grid. Smart Grid will utilize numerous legacy systems and technologies that are currently installed. Therefore, known vulnerabilities in these legacy systems must be remediated and associated risks mitigated in order to increase the security and success of the Smart Grid. The implementation of Smart Grid will include the deployment of many new technologies and multiple communication infrastructures. This report describes the main technologies that support Smart Grid and summarizes the status of implementation into the existing U.S. electrical infrastructure.

  7. A developmental approach to learning causal models for cyber security

    Science.gov (United States)

    Mugan, Jonathan

    2013-05-01

    To keep pace with our adversaries, we must expand the scope of machine learning and reasoning to address the breadth of possible attacks. One approach is to employ an algorithm to learn a set of causal models that describes the entire cyber network and each host end node. Such a learning algorithm would run continuously on the system and monitor activity in real time. With a set of causal models, the algorithm could anticipate novel attacks, take actions to thwart them, and predict the second-order effects flood of information, and the algorithm would have to determine which streams of that flood were relevant in which situations. This paper will present the results of efforts toward the application of a developmental learning algorithm to the problem of cyber security. The algorithm is modeled on the principles of human developmental learning and is designed to allow an agent to learn about the computer system in which it resides through active exploration. Children are flexible learners who acquire knowledge by actively exploring their environment and making predictions about what they will find,1, 2 and our algorithm is inspired by the work of the developmental psychologist Jean Piaget.3 Piaget described how children construct knowledge in stages and learn new concepts on top of those they already know. Developmental learning allows our algorithm to focus on subsets of the environment that are most helpful for learning given its current knowledge. In experiments, the algorithm was able to learn the conditions for file exfiltration and use that knowledge to protect sensitive files.

  8. Security-aware design for cyber-physical systems a platform-based approach

    CERN Document Server

    Lin, Chung-Wei

    2017-01-01

    Addressing the rising security issues during the design stages of cyber-physical systems, this book develops a systematic approach to address security at early design stages together with all other design constraints. Cyber-attacks become more threatening as systems are becoming more connected with the surrounding environment, infrastructures, and other systems. Security mechanisms can be designed to protect against attacks and meet security requirements, but there are many challenges of applying security mechanisms to cyber-physical systems including open environments, limited resources, strict timing requirements, and large number of devices. Designed for researchers and professionals, this book is valuable for individuals working in network systems, security mechanisms, and system design. It is also suitable for advanced-level students of computer science. .

  9. Nuclear Power Plant Cyber Security Discrete Dynamic Event Tree Analysis (LDRD 17-0958) FY17 Report.

    Energy Technology Data Exchange (ETDEWEB)

    Wheeler, Timothy A.; Denman, Matthew R; Williams, R. A.; Martin, Nevin; Jankovsky, Zachary Kyle

    2017-09-01

    Instrumentation and control of nuclear power is transforming from analog to modern digital assets. These control systems perform key safety and security functions. This transformation is occurring in new plant designs as well as in the existing fleet of plants as the operation of those plants is extended to 60 years. This transformation introduces new and unknown issues involving both digital asset induced safety issues and security issues. Traditional nuclear power risk assessment tools and cyber security assessment methods have not been modified or developed to address the unique nature of cyber failure modes and of cyber security threat vulnerabilities. iii This Lab-Directed Research and Development project has developed a dynamic cyber-risk in- formed tool to facilitate the analysis of unique cyber failure modes and the time sequencing of cyber faults, both malicious and non-malicious, and impose those cyber exploits and cyber faults onto a nuclear power plant accident sequence simulator code to assess how cyber ex- ploits and cyber faults could interact with a plants digital instrumentation and control (DI&C) system and defeat or circumvent a plants cyber security controls. This was achieved by cou- pling an existing Sandia National Laboratories nuclear accident dynamic simulator code with a cyber emulytics code to demonstrate real-time simulation of cyber exploits and their impact on automatic DI&C responses. Studying such potential time-sequenced cyber-attacks and their risks (i.e., the associated im- pact and the associated degree of difficulty to achieve the attack vector) on accident manage- ment establishes a technical risk informed framework for developing effective cyber security controls for nuclear power. iv

  10. Towards Resilient Critical Infrastructures: Application of Type-2 Fuzzy Logic in Embedded Network Security Cyber Sensor

    Energy Technology Data Exchange (ETDEWEB)

    Ondrej Linda; Todd Vollmer; Jim Alves-Foss; Milos Manic

    2011-08-01

    Resiliency and cyber security of modern critical infrastructures is becoming increasingly important with the growing number of threats in the cyber-environment. This paper proposes an extension to a previously developed fuzzy logic based anomaly detection network security cyber sensor via incorporating Type-2 Fuzzy Logic (T2 FL). In general, fuzzy logic provides a framework for system modeling in linguistic form capable of coping with imprecise and vague meanings of words. T2 FL is an extension of Type-1 FL which proved to be successful in modeling and minimizing the effects of various kinds of dynamic uncertainties. In this paper, T2 FL provides a basis for robust anomaly detection and cyber security state awareness. In addition, the proposed algorithm was specifically developed to comply with the constrained computational requirements of low-cost embedded network security cyber sensors. The performance of the system was evaluated on a set of network data recorded from an experimental cyber-security test-bed.

  11. Cyber-Physical System Security of a Power Grid: State-of-the-Art

    Directory of Open Access Journals (Sweden)

    Chih-Che Sun

    2016-07-01

    Full Text Available As part of the smart grid development, more and more technologies are developed and deployed on the power grid to enhance the system reliability. A primary purpose of the smart grid is to significantly increase the capability of computer-based remote control and automation. As a result, the level of connectivity has become much higher, and cyber security also becomes a potential threat to the cyber-physical systems (CPSs. In this paper, a survey of the state-of-the-art is conducted on the cyber security of the power grid concerning issues of: (1 the structure of CPSs in a smart grid; (2 cyber vulnerability assessment; (3 cyber protection systems; and (4 testbeds of a CPS. At Washington State University (WSU, the Smart City Testbed (SCT has been developed to provide a platform to test, analyze and validate defense mechanisms against potential cyber intrusions. A test case is provided in this paper to demonstrate how a testbed helps the study of cyber security and the anomaly detection system (ADS for substations.

  12. Control Systems Security Center Comparison Study of Industrial Control System Standards against the Control Systems Protection Framework Cyber-Security Requirements

    Energy Technology Data Exchange (ETDEWEB)

    Robert P. Evans

    2005-09-01

    selected from the list of standards identified in the identification effort. The requirements in these seven standards were then compared against the requirements given in the Framework. This comparison identified gaps (requirements not covered) in both the individual industry standards and in the Framework. In addition to the sector-specific standards reviewed, the team compared the requirements in the cross-sector Instrumentation, Systems, and Automation Society (ISA) Technical Reports (TR) 99 -1 and -2 to the Framework requirements. The Framework defines a set of security classes separated into families as functional requirements for control system security. Each standard reviewed was compared to this template of requirements to determine if the standard requirements closely or partially matched these Framework requirements. An analysis of each class of requirements pertaining to each standard reviewed can be found in the comparison results section of this report. Refer to Appendix A, ''Synopsis of Comparison Results'', for a complete graphical representation of the study's findings at a glance. Some of the requirements listed in the Framework are covered by many of the standards, while other requirements are addressed by only a few of the standards. In some cases, the scope of the requirements listed in the standard for a particular industry greatly exceeds the requirements given in the Framework. These additional families of requirements, identified by the various standards bodies, could potentially be added to the Framework. These findings are, in part, due to the maturity both of the security standards themselves and of the different industries current focus on security. In addition, there are differences in how communication and control is used in different industries and the consequences of disruptions via security breaches to each particular industry that could affect how security requirements are prioritized. The differences in the

  13. Assessment And Testing of Industrial Devices Robustness Against Cyber Security Attacks

    CERN Document Server

    Tilaro, F

    2011-01-01

    CERN (European Organization for Nuclear Research),like any organization, needs to achieve the conflicting objectives of connecting its operational network to Internet while at the same time keeping its industrial control systems secure from external and internal cyber attacks. With this in mind, the ISA-99[0F1] international cyber security standard has been adopted at CERN as a reference model to define a set of guidelines and security robustness criteria applicable to any network device. Devices robustness represents a key link in the defense-in-depth concept as some attacks will inevitably penetrate security boundaries and thus require further protection measures. When assessing the cyber security robustness of devices we have singled out control system-relevant attack patterns derived from the well-known CAPEC[1F2] classification. Once a vulnerability is identified, it needs to be documented, prioritized and reproduced at will in a dedicated test environment for debugging purposes. CERN - in collaboration ...

  14. Cyber-Insurance in Internet Security: A Dig into the Information Asymmetry Problem

    CERN Document Server

    Pal, Ranjan

    2012-01-01

    Internet users such as individuals and organizations are subject to different types of epidemic risks such as worms, viruses, spams, and botnets. To reduce the probability of risk, an Internet user generally invests in traditional security mechanisms like anti-virus and anti-spam software, sometimes also known as \\emph{self-defense} mechanisms. However, according to security experts, such software (and their subsequent advancements) will not completely eliminate risk. Recent research efforts have considered the problem of residual risk elimination by proposing the idea of \\emph{cyber-insurance}. In this regard, an important research problem is resolving information asymmetry issues associated with cyber-insurance contracts. In this paper we propose \\emph{three} mechanisms to resolve information asymmetry in cyber-insurance. Our mechanisms are based on the \\emph{Principal-Agent} (PA) model in microeconomic theory. We show that (1) optimal cyber-insurance contracts induced by our mechanisms only provide partial...

  15. Towards the cyber security paradigm of ehealth: Resilience and design aspects

    Science.gov (United States)

    Rajamäki, Jyri; Pirinen, Rauno

    2017-06-01

    Digital technologies have significantly changed the role of healthcare clients in seeking and receiving medical help, as well as brought up more cooperative policy issues in healthcare cross-border services. Citizens continue to take a more co-creative role in decisions about their own healthcare, and new technologies can enable and facilitate this emergent trend. In this study, healthcare services have been intended as a critical societal sector and therefore healthcare systems are focused on as critical infrastructures that ought to be protected from all types of fears, including cyber security threats and attacks. Despite continual progress in the systemic risk management of cyber domain, it is clear that anticipation and prevention of all possible types of attack and malfunction are not achievable for current or future cyber infrastructures. This study focuses on the investigation of a cyber security paradigm, adaptive systems and sense of resilience in a healthcare critical information infrastructure.

  16. Control Systems Cyber Security: Defense-in-Depth Strategies

    Energy Technology Data Exchange (ETDEWEB)

    Mark Fabro

    2007-10-01

    Information infrastructures across many public and private domains share several common attributes regarding IT deployments and data communications. This is particularly true in the control systems domain. A majority of the systems use robust architectures to enhance business and reduce costs by increasing the integration of external, business, and control system networks. However, multi-network integration strategies often lead to vulnerabilities that greatly reduce the security of an organization, and can expose mission-critical control systems to cyber threats. This document provides guidance and direction for developing ‘defense-in-depth’ strategies for organizations that use control system networks while maintaining a multi-tier information architecture that requires: • Maintenance of various field devices, telemetry collection, and/or industrial-level process systems • Access to facilities via remote data link or modem • Public facing services for customer or corporate operations • A robust business environment that requires connections among the control system domain, the external Internet, and other peer organizations.

  17. A preliminary cyber-physical security assessment of the Robot Operating System (ROS)

    Science.gov (United States)

    McClean, Jarrod; Stull, Christopher; Farrar, Charles; Mascareñas, David

    2013-05-01

    Over the course of the last few years, the Robot Operating System (ROS) has become a highly popular software framework for robotics research. ROS has a very active developer community and is widely used for robotics research in both academia and government labs. The prevalence and modularity of ROS cause many people to ask the question: "What prevents ROS from being used in commercial or government applications?" One of the main problems that is preventing this increased use of ROS in these applications is the question of characterizing its security (or lack thereof). In the summer of 2012, a crowd sourced cyber-physical security contest was launched at the cyber security conference DEF CON 20 to begin the process of characterizing the security of ROS. A small-scale, car-like robot was configured as a cyber-physical security "honeypot" running ROS. DEFFCON-20 attendees were invited to find exploits and vulnerabilities in the robot while network traffic was collected. The results of this experiment provided some interesting insights and opened up many security questions pertaining to deployed robotic systems. The Federal Aviation Administration is tasked with opening up the civil airspace to commercial drones by September 2015 and driverless cars are already legal for research purposes in a number of states. Given the integration of these robotic devices into our daily lives, the authors pose the following question: "What security exploits can a motivated person with little-to-no experience in cyber security execute, given the wide availability of free cyber security penetration testing tools such as Metasploit?" This research focuses on applying common, low-cost, low-overhead, cyber-attacks on a robot featuring ROS. This work documents the effectiveness of those attacks.

  18. Cyber-Security Challenges with SMEs in Developing Economies: Issues of Confidentiality, Integrity & Availability (CIA)

    DEFF Research Database (Denmark)

    Yeboah-Boateng, Ezer Osei

    The essence of this study is first to highlight the cyber-security challenges confronting SMEs in developing economies, and to model a framework for safeguarding their assets, to ensure continuous optimal business operations, and to participate and compete securely in the ubiquitous cyber......-market. As more SMEs today continue to use networks and the Internet as vital business tools, the need for a secured organization cannot be over-emphasized. SMEs are utilizing the opportunities offered by advances in ICTs to adopt innovative business operations, to offer user-friendly products and services......, to develop customer-centric strategies. While connectivity is indispensable for achieving business success, being connected also implies being exposed to a myriad of cyber-security challenges, such as vulnerabilities of confidentiality, integrity and availability (CIA). As vulnerabilities are exploited...

  19. Fuzzy Logic Based Anomaly Detection for Embedded Network Security Cyber Sensor

    Energy Technology Data Exchange (ETDEWEB)

    Ondrej Linda; Todd Vollmer; Jason Wright; Milos Manic

    2011-04-01

    Resiliency and security in critical infrastructure control systems in the modern world of cyber terrorism constitute a relevant concern. Developing a network security system specifically tailored to the requirements of such critical assets is of a primary importance. This paper proposes a novel learning algorithm for anomaly based network security cyber sensor together with its hardware implementation. The presented learning algorithm constructs a fuzzy logic rule based model of normal network behavior. Individual fuzzy rules are extracted directly from the stream of incoming packets using an online clustering algorithm. This learning algorithm was specifically developed to comply with the constrained computational requirements of low-cost embedded network security cyber sensors. The performance of the system was evaluated on a set of network data recorded from an experimental test-bed mimicking the environment of a critical infrastructure control system.

  20. 78 FR 38949 - Computer Security Incident Coordination (CSIC): Providing Timely Cyber Incident Response

    Science.gov (United States)

    2013-06-28

    ... National Institute of Standards and Technology Computer Security Incident Coordination (CSIC): Providing Timely Cyber Incident Response AGENCY: National Institute of Standards and Technology, U.S. Department of... Technology (NIST) is seeking information relating to Computer Security Incident Coordination (CSIC). NIST is...

  1. Good Things in Small Packages: Micro Worlds and Cyber Security

    Energy Technology Data Exchange (ETDEWEB)

    David I Gertman

    2013-11-01

    Cyber events, as perpetrated by terrorists and nation states, have become commonplace as evidenced in national and international news media. Cyber attacks affect day-to-day activities of end users through exploitation of social networks, businesses such as banking and stock exchanges, and government entities including Departments of Defense. They are becoming more frequent and sophisticated. Currently, efforts are directed to understanding the methods employed by attackers and towards dissecting the planning and activities of the perpetrator, including review of psychosocial factors.

  2. Measuring the Effectiveness of Visual Analytics and Data Fusion Techniques on Situation Awareness in Cyber-Security

    Science.gov (United States)

    Giacobe, Nicklaus A.

    2013-01-01

    Cyber-security involves the monitoring a complex network of inter-related computers to prevent, identify and remediate from undesired actions. This work is performed in organizations by human analysts. These analysts monitor cyber-security sensors to develop and maintain situation awareness (SA) of both normal and abnormal activities that occur on…

  3. Measuring the Effectiveness of Visual Analytics and Data Fusion Techniques on Situation Awareness in Cyber-Security

    Science.gov (United States)

    Giacobe, Nicklaus A.

    2013-01-01

    Cyber-security involves the monitoring a complex network of inter-related computers to prevent, identify and remediate from undesired actions. This work is performed in organizations by human analysts. These analysts monitor cyber-security sensors to develop and maintain situation awareness (SA) of both normal and abnormal activities that occur on…

  4. Asset Analysis Method for the Cyber Security of Man Machine Interface System

    Energy Technology Data Exchange (ETDEWEB)

    Kang, Sung Kon; Kim, Hun Hee; Shin, Yeong Cheol [Korea Hydro and Nuclear Power, Daejeon (Korea, Republic of)

    2010-10-15

    As digital MMIS (Man Machine Interface System) is applied in Nuclear Power Plant (NPP), cyber security is becoming more and more important. Regulatory guide (KINS/GT-N27) requires that implementation plan for cyber security be prepared in NPP. Regulatory guide recommends the following 4 processes: 1) an asset analysis of MMIS, 2) a vulnerability analysis of MMIS, 3) establishment of countermeasures, and 4) establishment of operational guideline for cyber security. Conventional method for the asset analysis is mainly performed with a table form for each asset. Conventional method requires a lot of efforts due to the duplication of information. This paper presents an asset analysis method using object oriented approach for the NPP

  5. Cyber security in nuclear power plants and its portability to other industrial infrastructures

    Energy Technology Data Exchange (ETDEWEB)

    Champigny, Sebastien; Gupta, Deeksha; Watson, Venesa; Waedt, Karl [AREVA GmbH, Erlangen (Germany)

    2017-06-15

    Power generation increasingly relies on decentralised and interconnected computerised systems. Concepts like ''Industrial Internet of Things'' of the Industrial Internet Consortium (IIC), and ''Industry 4.0'' find their way in this strategic industry. Risk of targeted exploits of errors and vulnerabilities increases with complexity, interconnectivity and decentralization. Inherently stringent security requirements and features make nuclear computerised applications and systems a benchmark for industrial counterparts seeking to hedge against those risks. Consequently, this contribution presents usual cyber security regulations and practices for nuclear power plants. It shows how nuclear cyber security can be ported and used in an industrial context to protect critical infrastructures against cyber-attacks and industrial espionage.

  6. Research of Smart Grid Cyber Architecture and Standards Deployment with High Adaptability for Security Monitoring

    DEFF Research Database (Denmark)

    Hu, Rui; Hu, Weihao; Chen, Zhe

    2015-01-01

    . It is significant to develop a security monitoring system. This paper discussed the cyber architecture of smart grid with high adaptability for security monitoring. An adaptable structure with Demilitarized Zone (DMZ) is proposed. Focusing on this network structure, the rational utilization of standards...... is investigated to provide a smart grid communication network with better performance and security and avoid the extra investment of an individual security monitoring network.......Security Monitoring is a critical function for smart grid. As a consequence of strongly relying on communication, cyber security must be guaranteed by the specific system. Otherwise, the DR signals and bidding information can be easily forged or intercepted. Customers’ privacy and safety may suffer...

  7. Measuring Library Vendor Cyber Security: Seven Easy Questions Every Librarian Can Ask

    Directory of Open Access Journals (Sweden)

    Alex Caro

    2016-04-01

    Full Text Available This article is based on an independent cyber security risk management audit for a public library system completed by the authors in early 2015 and based on a research paper by the same group at Clark University in 2014. We stress that while cyber security must include raising public knowledge in regard to cyber security issues and resources, and libraries are indeed the perfect place to disseminate this knowledge, librarians are also in a unique position as the gatekeepers of information services provided to the public and should conduct internal audits to ensure our content partners and IT vendors take cyber security as seriously as the library and its staff. One way to do this is through periodic reviews of existing vendor relationships. To this end, the authors created a simple grading rubric you can adopt or modify to help take this first step towards securing your library data. It is intended to be used by both technical and non-technical staff as a simple measurement of what vendor agreements currently exist and how they rank, while at the same time providing a roadmap for which security features or policy statements the library can or should require moving forward.

  8. Individual differences in cyber security behaviors: an examination of who is sharing passwords.

    Science.gov (United States)

    Whitty, Monica; Doodson, James; Creese, Sadie; Hodges, Duncan

    2015-01-01

    In spite of the number of public advice campaigns, researchers have found that individuals still engage in risky password practices. There is a dearth of research available on individual differences in cyber security behaviors. This study focused on the risky practice of sharing passwords. As predicted, we found that individuals who scored high on a lack of perseverance were more likely to share passwords. Contrary to our hypotheses, we found younger [corrected] people and individuals who score high on self-monitoring were more likely to share passwords. We speculate on the reasons behind these findings, and examine how they might be considered in future cyber security educational campaigns.

  9. Modeling and simulation for cyber-physical system security research, development and applications.

    Energy Technology Data Exchange (ETDEWEB)

    Pollock, Guylaine M.; Atkins, William Dee; Schwartz, Moses Daniel; Chavez, Adrian R.; Urrea, Jorge Mario; Pattengale, Nicholas; McDonald, Michael James; Cassidy, Regis H.; Halbgewachs, Ronald D.; Richardson, Bryan T.; Mulder, John C.

    2010-02-01

    This paper describes a new hybrid modeling and simulation architecture developed at Sandia for understanding and developing protections against and mitigations for cyber threats upon control systems. It first outlines the challenges to PCS security that can be addressed using these technologies. The paper then describes Virtual Control System Environments (VCSE) that use this approach and briefly discusses security research that Sandia has performed using VCSE. It closes with recommendations to the control systems security community for applying this valuable technology.

  10. Security Hardened Cyber Components for Nuclear Power Plants: Phase I SBIR Final Technical Report

    Energy Technology Data Exchange (ETDEWEB)

    Franusich, Michael D. [SpiralGen, Inc., Pittsburgh, PA (United States)

    2016-03-18

    SpiralGen, Inc. built a proof-of-concept toolkit for enhancing the cyber security of nuclear power plants and other critical infrastructure with high-assurance instrumentation and control code. The toolkit is based on technology from the DARPA High-Assurance Cyber Military Systems (HACMS) program, which has focused on applying the science of formal methods to the formidable set of problems involved in securing cyber physical systems. The primary challenges beyond HACMS in developing this toolkit were to make the new technology usable by control system engineers and compatible with the regulatory and commercial constraints of the nuclear power industry. The toolkit, packaged as a Simulink add-on, allows a system designer to assemble a high-assurance component from formally specified and proven blocks and generate provably correct control and monitor code for that subsystem.

  11. EVALUATION OF VULNERABILITY ASSESSMENT IN SYSTEM FROM HACKERS IN CYBER SECURITY

    Directory of Open Access Journals (Sweden)

    S.Suma Christal Mary

    2010-07-01

    Full Text Available Vulnerability is very essential in cyber security related mechanisms. The usage of this vulnerability is to identify the attacks over the cyber space system. This term become increased the challenges in cyberspace system in large areas. Interdependencies between computer communication system and the physical infrastructure also become more complex as information technologies are further integrated into devices and networks. Vulnerability causes due to ethical hacking, Trojan attacks, logical bombing. In the recent days firewalls are eliminate the various cyber attacks. The usage of filtering algorithm prevent from E-mail bombing. To secure the server system we can avoid hacking. The above countermeasures are identifying the attacks and improve the efficiency.

  12. Anticipatory Cyber Security Research: An Ultimate Technique for the First-Move Advantage

    Directory of Open Access Journals (Sweden)

    Bharat S.Rawal

    2016-02-01

    Full Text Available Across all industry segments, 96 percent of systems could be breached on average. In the game of cyber security, every moment a new player (attacker is entering the game with new skill sets. An attacker only needs to be effective once while defenders of cyberspace have to be successful all of the time. There will be a first-mover advantage in such a chasing game, which means that the first move often wins. In this paper, in order to face the security challenges brought in by attacker’s first move advantage, we analyzed the past ten years of cyber-attacks, studied the immediate attack’s pattern and offer the tools to predict the next move of the cyber attacker.

  13. On modeling of electrical cyber-physical systems considering cyber security

    Institute of Scientific and Technical Information of China (English)

    Yi-nan WANG; Zhi-yun LIN; Xiao LIANG; Wen-yuan XU; Qiang YANG; Gang-feng YAN

    2016-01-01

    This paper establishes a new framework for modeling electrical cyber-physical systems (ECPSs), integrating both power grids and communication networks. To model the communication network associated with a power transmission grid, we use a mesh network that considers the features of power transmission grids such as high-voltage levels, long-transmission distances, and equal importance of each node. Moreover, bidirectional links including data uploading channels and command downloading channels are assumed to connect every node in the communication network and a corresponding physical node in the transmission grid. Based on this model, the fragility of an ECPS is analyzed under various cyber attacks including denial-of-service (DoS) attacks, replay attacks, and false data injection attacks. Control strategies such as load shedding and relay protection are also verified using this model against these attacks.

  14. A conceptual framework for cyber security awareness and education in SA

    Directory of Open Access Journals (Sweden)

    Noluxolo Kortjan

    2014-06-01

    Full Text Available The Internet is becoming increasingly interwoven in the daily lives of many individuals, organisations and nations. It has, to a large extent, had a positive effect on the way people communicate. It has also introduced new avenues for business; and it has offered nations an opportunity to govern online. Nevertheless, although cyberspace offers an endless list of services and opportunities, it is also accompanied by many risks, of which many Internet users are not aware. As such, various countries have developed and implemented cyber-security awareness and education measures to counter the perceived ignorance of the Internet users. However, there is currently a definite lack in South Africa (SA in this regard; as there are currently, little government-led and sponsored cyber-security awareness and education initiatives. The primary research objective of this paper, therefore, is to propose a cyber-security awareness and education framework for SA that would assist in creating a cyber-secure culture in SA among all of the users of the Internet. This framework will be developed on the basis of key factors extrapolated from a comparative analysis of relevant developed countries.

  15. Best Practices for Operating Government-Industry Partnerships in Cyber Security

    Directory of Open Access Journals (Sweden)

    Larry Clinton

    2015-12-01

    Full Text Available Since the publication of the first National Strategy to Secure Cyber Space in 2003 the US federal government has realized that due to the interconnected nature of the Internet, securing the system would require an industry-government partnership. However, defining exactly what that new partnership would look like and how it would operate has been unclear. The ramifications of this ambiguous strategy have been noted elsewhere including the 2011 JSS article “A Relationship on the Brink” which described the dysfunctional state of public private partnerships with respect to cyber security. Subsequently, a joint industry-government study of partnership programs has generated a consensus list of “best practices” for operating such programs successfully. Moreover, subsequent use of these principles seems to confirm their ability to enhance the partnership and hopefully helps ameliorate, to some degree, the growing cyber threat. This article provides a brief history of the evolution of public-private partnerships in cyber security, the joint study to assess them and the 12 best practices generated by that analysis.

  16. Cyber security awareness toolkit for national security: An approach to South Africa’s cybersecurity policy implementation

    CSIR Research Space (South Africa)

    Phahlamohlaka, LJ

    2011-05-01

    Full Text Available Presidential policies and structures review on cyber security [17 ] was that the United States nation was at a crossroads. This was so because on the one hand, cyberspace underpins almost every facet of American society, providing critical support... critical disruptions to U.S. systems. There is an international drive by various governments to either develop, or review existing Cybersecurity policies. From the US point of view, the policies include strategies and standards regarding the security...

  17. Main control computer security model of closed network systems protection against cyber attacks

    Science.gov (United States)

    Seymen, Bilal

    2014-06-01

    The model that brings the data input/output under control in closed network systems, that maintains the system securely, and that controls the flow of information through the Main Control Computer which also brings the network traffic under control against cyber-attacks. The network, which can be controlled single-handedly thanks to the system designed to enable the network users to make data entry into the system or to extract data from the system securely, intends to minimize the security gaps. Moreover, data input/output record can be kept by means of the user account assigned for each user, and it is also possible to carry out retroactive tracking, if requested. Because the measures that need to be taken for each computer on the network regarding cyber security, do require high cost; it has been intended to provide a cost-effective working environment with this model, only if the Main Control Computer has the updated hardware.

  18. Closing the Cyber Gap: Integrating Cross-Government Cyber Capabilities to Support the DHS Cyber Security Mission

    Science.gov (United States)

    2014-12-01

    40 John Rollins and Anna Henning , Comprehensive National Cybersecurity Initiative: Legal Authorities and Policy Considerations (CRS Report No...enhance our security posture .107 Pal and Golubchik argue that, if the cost of defensive security measures...defensive technology provides a measure of security that is far from comprehensive. A purely defensive posture allows attackers unlimited time to

  19. An assessment of the cyber security legislation and its impact on the United States electrical sector

    Science.gov (United States)

    Born, Joshua

    The purpose of this research was to examine the cyber-security posture for the United States' electrical grid, which comprises a major component of critical infrastructure for the country. The United States electrical sector is so vast, that the Department of Homeland Security (DHS) estimates, it contains more than 6,413 power plants (this includes 3,273 traditional electric utilities and 1,738 nonutility power producers) with approximately 1,075 gigawatts of energy produced on a daily basis. A targeted cyber-security attack against the electric grid would likely have catastrophic results and could even serve as a precursor to a physical attack against the United States. A recent report by the consulting firm Black and Veatch found that one of the top five greatest concerns for United States electric utilities is the risk that cybersecurity poses to their industry and yet, only one-third state they are currently prepared to meet the increasingly likely threat. The report goes on to state, "only 32% of electric utilities surveyed had integrated security systems with the proper segmentation, monitoring and redundancies needed for cyber threat protection. Another 48 % said they did not" Recent estimates indicate that a large-scale cyber-attack against this sector could cost the United States economy as much as a trillion dollars within a weeks' time. Legislative efforts in the past have primarily been focused on creating mandates that encourage public and private partnership, which have been not been adopted as quickly as desired. With 85 % of all electric utilities being privately owned, it is key that the public and private sector partner in order to mitigate risks and respond as a cohesive unit in the event of a major attack. Keywords: Cybersecurity, Professor Riddell, cyber security, energy, intelligence, outlook, electrical, compliance, legislation, partnerships, critical infrastructure.

  20. Federal Plan for Cyber Security and Information Assurance Research and Development

    Science.gov (United States)

    2006-04-01

    attribution 1.1 Authentication, Authorization, and Trust Management Definition Authentication is the process of verifying the identity or authority of a...November 2005, for elaboration). Functional Cyber Security 33 1.2 Access Control and Privilege Management Definition Access control and privilege...management and real-time queuing theory. 5.11 Integrated, Enterprise-Wide Security Monitoring and Management Definition An enterprise consists of one or

  1. Curbing cyber-crime and Enhancing e-commerce security with Digital Forensics

    OpenAIRE

    Fianyi, Israel

    2016-01-01

    The explosion in the e-commerce industry which has been necessitated by the growth and advance expansion of Information technology and its related facilities in recent years have been met with adverse security issues consequently affecting the industry and the entire online activities. This paper exams the prevailing security threats e-commerce is facing which is predominantly known as cyber-crime and how computer related technology and facilities such as digital forensics tools can be adopte...

  2. Cyber security with radio frequency interferences mitigation study for satellite systems

    Science.gov (United States)

    Wang, Gang; Wei, Sixiao; Chen, Genshe; Tian, Xin; Shen, Dan; Pham, Khanh; Nguyen, Tien M.; Blasch, Erik

    2016-05-01

    Satellite systems including the Global Navigation Satellite System (GNSS) and the satellite communications (SATCOM) system provide great convenience and utility to human life including emergency response, wide area efficient communications, and effective transportation. Elements of satellite systems incorporate technologies such as navigation with the global positioning system (GPS), satellite digital video broadcasting, and information transmission with a very small aperture terminal (VSAT), etc. The satellite systems importance is growing in prominence with end users' requirement for globally high data rate transmissions; the cost reduction of launching satellites; development of smaller sized satellites including cubesat, nanosat, picosat, and femtosat; and integrating internet services with satellite networks. However, with the promising benefits, challenges remain to fully develop secure and robust satellite systems with pervasive computing and communications. In this paper, we investigate both cyber security and radio frequency (RF) interferences mitigation for satellite systems, and demonstrate that they are not isolated. The action space for both cyber security and RF interferences are firstly summarized for satellite systems, based on which the mitigation schemes for both cyber security and RF interferences are given. A multi-layered satellite systems structure is provided with cross-layer design considering multi-path routing and channel coding, to provide great security and diversity gains for secure and robust satellite systems.

  3. Improving Cyber-Security of Smart Grid Systems via Anomaly Detection and Linguistic Domain Knowledge

    Energy Technology Data Exchange (ETDEWEB)

    Ondrej Linda; Todd Vollmer; Milos Manic

    2012-08-01

    The planned large scale deployment of smart grid network devices will generate a large amount of information exchanged over various types of communication networks. The implementation of these critical systems will require appropriate cyber-security measures. A network anomaly detection solution is considered in this work. In common network architectures multiple communications streams are simultaneously present, making it difficult to build an anomaly detection solution for the entire system. In addition, common anomaly detection algorithms require specification of a sensitivity threshold, which inevitably leads to a tradeoff between false positives and false negatives rates. In order to alleviate these issues, this paper proposes a novel anomaly detection architecture. The designed system applies the previously developed network security cyber-sensor method to individual selected communication streams allowing for learning accurate normal network behavior models. Furthermore, the developed system dynamically adjusts the sensitivity threshold of each anomaly detection algorithm based on domain knowledge about the specific network system. It is proposed to model this domain knowledge using Interval Type-2 Fuzzy Logic rules, which linguistically describe the relationship between various features of the network communication and the possibility of a cyber attack. The proposed method was tested on experimental smart grid system demonstrating enhanced cyber-security.

  4. A Secured Health Care Application Architecture for Cyber-Physical Systems

    CERN Document Server

    Wang, Jin; Lee, Sungyoung; Shu, Lei; Xia, Feng

    2012-01-01

    Cyber-physical systems (CPS) can be viewed as a new generation of systems with integrated control, communication and computational capabilities. Like the internet transformed how humans interact with one another, cyber-physical systems will transform how people interact with the physical world. Currently, the study of CPS is still in its infancy and there exist many research issues and challenges ranging from electricity power, health care, transportation and smart building etc. In this paper, an introduction of CPeSC3 (cyber physical enhanced secured wireless sensor networks (WSNs) integrated cloud computing for u-life care) architecture and its application to the health care monitoring and decision support systems is given. The proposed CPeSC3 architecture is composed of three main components, namely 1) communication core, 2) computation core, and 3) resource scheduling and management core. Detailed analysis and explanation are given for relevant models such as cloud computing, real time scheduling and secu...

  5. Bloom Filter-Based Secure Data Forwarding in Large-Scale Cyber-Physical Systems

    Directory of Open Access Journals (Sweden)

    Siyu Lin

    2015-01-01

    Full Text Available Cyber-physical systems (CPSs connect with the physical world via communication networks, which significantly increases security risks of CPSs. To secure the sensitive data, secure forwarding is an essential component of CPSs. However, CPSs require high dimensional multiattribute and multilevel security requirements due to the significantly increased system scale and diversity, and hence impose high demand on the secure forwarding information query and storage. To tackle these challenges, we propose a practical secure data forwarding scheme for CPSs. Considering the limited storage capability and computational power of entities, we adopt bloom filter to store the secure forwarding information for each entity, which can achieve well balance between the storage consumption and query delay. Furthermore, a novel link-based bloom filter construction method is designed to reduce false positive rate during bloom filter construction. Finally, the effects of false positive rate on the performance of bloom filter-based secure forwarding with different routing policies are discussed.

  6. Cyber-physical security of Wide-Area Monitoring, Protection and Control in a smart grid environment.

    Science.gov (United States)

    Ashok, Aditya; Hahn, Adam; Govindarasu, Manimaran

    2014-07-01

    Smart grid initiatives will produce a grid that is increasingly dependent on its cyber infrastructure in order to support the numerous power applications necessary to provide improved grid monitoring and control capabilities. However, recent findings documented in government reports and other literature, indicate the growing threat of cyber-based attacks in numbers and sophistication targeting the nation's electric grid and other critical infrastructures. Specifically, this paper discusses cyber-physical security of Wide-Area Monitoring, Protection and Control (WAMPAC) from a coordinated cyber attack perspective and introduces a game-theoretic approach to address the issue. Finally, the paper briefly describes how cyber-physical testbeds can be used to evaluate the security research and perform realistic attack-defense studies for smart grid type environments.

  7. A Method to Analyze Threats and Vulnerabilities by Using a Cyber Security Test-bed of an Operating NPP

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Yong Sik; Son, Choul Woong; Lee, Soo Ill [KHNP CRI, Daejeon (Korea, Republic of)

    2016-10-15

    In order to implement cyber security controls for an Operating NPP, a security assessment should conduct in advance, and it is essential to analyze threats and vulnerabilities for a cyber security risk assessment phase. It might be impossible to perform a penetration test or scanning for a vulnerability analysis because the test may cause adverse effects on the inherent functions of ones. This is the reason why we develop and construct a cyber security test-bed instead of using real I and C systems in the operating NPP. In this paper, we propose a method to analyze threats and vulnerabilities of a specific target system by using a cyber security test-bed. The test-bed is being developed considering essential functions of the selected safety and non-safety system. This paper shows the method to analyze threats and vulnerabilities of a specific target system by using a cyber security test-bed. In order to develop the cyber security test-bed with both safety and non-safety functions, test-bed functions analysis and preliminary threats and vulnerabilities identification have been conducted. We will determine the attack scenarios and conduct the test-bed based vulnerability analysis.

  8. The impact of security and intelligence policy in the era of cyber crimes

    Directory of Open Access Journals (Sweden)

    MSc. Bahri Gashi

    2016-07-01

    Full Text Available Creation of National Cyber Defense Strategy, is the only security and the best protection against cyber-crimes. This is the starting point, from where adequate policies and necessary legal measures begin, aiming the creation of a solid ground and responsible users by implementing comprehensive measures and legal restrictions. The methodology used to achieve the recognition of users with applicable legislation and regulations on the use of the Internet, as well as legal obligations; implementation of procedures to use communication systems; signing and approval by users of their responsibilities; knowledge and information on the risks and threats stemming from the use of communication networks; certification of trained and specialized staff; classification and processing of information in a particular system; identifying unauthorized users who use classified information networks in  public systems and private sector; creating barriers in distance entry networks and information systems, etc. Various Security and Intelligence institutions covering and operating in these areas are responsible for the creation and promotion of National Cyber Defense Strategy, analyzing the risk to implement protective measures for preventing attacks on Cybercrime (Cyber Crimes.

  9. GridStat – Cyber Security and Regional Deployment Project Report

    Energy Technology Data Exchange (ETDEWEB)

    Clements, Samuel L.

    2009-02-18

    GridStat is a developing communication technology to provide real-time data delivery services to the electric power grid. It is being developed in a collaborative effort between the Electrical Power Engineering and Distributed Computing Science Departments at Washington State University. Improving the cyber security of GridStat was the principle focus of this project. A regional network was established to test GridStat’s cyber security mechanisms in a realistic environment. The network consists of nodes at Pacific Northwest National Laboratory, Idaho National Laboratory, and Washington State University. Idaho National Laboratory (INL) was tasked with performing the security assessment, the results of which detailed a number or easily resolvable and previously unknown issues, as well as a number of difficult and previously known issues. Going forward we recommend additional development prior to commercialization of GridStat. The development plan is structured into three domains: Core Development, Cyber Security and Pilot Projects. Each domain contains a number of phased subtasks that build upon each other to increase the robustness and maturity of GridStat.

  10. National security governance exemplified by South Africa's cyber security policy implementation

    CSIR Research Space (South Africa)

    Burmeister, OK

    2014-06-01

    Full Text Available There exists a paucity of research on ethical considerations in cyberdefence policies that can provide nation states guidance in mitigating the risks of a cyber attack to their national interests and to preparing for a cyber offence in response...

  11. Engineering safe and secure cyber-physical systems the specification PEARL approach

    CERN Document Server

    Gumzej, Roman

    2016-01-01

    This book introduces the concept of holistic design and development of cyber physical systems to achieve their safe and secure operation. It shows that by following the standards for embedded system’s safety and using appropriate hardware and software components inherently safe system’s architectures can be devised and certified. While the standards already enable testing and certification of inherently safe and sound hardware, this is still not the case with software. The book demonstrates that Specification PEARL(SPEARL) addresses this issue and proposes appropriate solutions from the viewpoints of software engineering as well as concrete program components. By doing so it reduces the complexity of cyber physical systems design in an innovative way. Three ultimate goals are being followed in the course of defining this new PEARL standard, namely: 1. simplicity over complexity, 2. inherent real-time ability, and 3. conformity to safety integrity and security capability levels.

  12. Performance Analysis of Cyber Security Awareness Delivery Methods

    Science.gov (United States)

    Abawajy, Jemal; Kim, Tai-Hoon

    In order to decrease information security threats caused by human-related vulnerabilities, an increased concentration on information security awareness and training is necessary. There are numerous information security awareness training delivery methods. The purpose of this study was to determine what delivery method is most successful in providing security awareness training. We conducted security awareness training using various delivery methods such as text based, game based and a short video presentation with the aim of determining user preference delivery methods. Our study suggests that a combined delvery methods are better than individual secrity awareness delivery method.

  13. Cyber Security Insider Threats :: Government’s Role in Protecting India’s Critical Infrastructure Sectors

    OpenAIRE

    Vohra, Pulkit

    2014-01-01

    This research identifies the problem of insider threats in the critical infrastructure sectors of India. It is structured to answer the research question: "Why insider threats should be the primary concern for Indian government to protect its critical infrastructure sectors.” It defines the critical infrastructure sectors and portrays the cyber security scenario of India. Also, through the research study, it identifies the lack of awareness and non-seriousness of employees in the critical sec...

  14. Policing cyber hate, cyber threat and cyber terrorism

    OpenAIRE

    Chambers-Jones, C.

    2013-01-01

    In late August 2012 the Government Forum of Incident Response and Cyber security Teams (GFIRST) gathered in Atlanta to discuss cyber threats and how new realities are emerging and how new forms of regulation are needed. At the same time Policing cyber hate, cyber threat and cyber terrorism was published. This comprehensive book brings together a divergent problem and tackles each with a candid exploration. The book has ten chapters and covers aspects such as extortion via the internet, the ps...

  15. Defining and Computing a Valued Based Cyber-Security Measure

    Energy Technology Data Exchange (ETDEWEB)

    Aissa, Anis Ben [University of Tunis, Belvedere, Tunisia; Abercrombie, Robert K [ORNL; Sheldon, Frederick T [ORNL; Mili, Ali [New Jersey Insitute of Technology

    2012-01-01

    In earlier work, we presented a value based measure of cybersecurity that quantifies the security of a system in concrete terms, specifically, in terms of how much each system stakeholder stands to lose (in dollars per hour of operation) as a result of security threats and system vulnerabilities; our metric varies according to the stakes that each stakeholder has in meeting each security requirement. In this paper, we discuss the specification and design of a system that collects, updates, and maintains all the information that pertains to estimating our cybersecurity measure, and offers stakeholders quantitative means to make security-related decisions.

  16. Defining and Computing a Value Based Cyber-Security Measure

    Energy Technology Data Exchange (ETDEWEB)

    Aissa, Anis Ben [University of Tunis, Belvedere, Tunisia; Abercrombie, Robert K [ORNL; Sheldon, Frederick T [ORNL; Mili, Ali [New Jersey Insitute of Technology

    2011-01-01

    In past work, we presented a value based measure of cybersecurity that quantifies the security of a system in concrete terms, specifically, in terms of how much each system stakeholder stands to lose (in dollars per hour of operation) as a result of security threats and system vulnerabilities\\; our metric varies according to the stakes that each stakeholder has in meeting each security requirement. In this paper we discuss the specification and design of a system that collects, updates and maintains all the information that pertains to estimating our cybersecurity measure, and offers stakeholders quantitative means to make security-related decisions.

  17. Analyzing Cyber Security Threats on Cyber-Physical Systems Using Model-Based Systems Engineering

    Science.gov (United States)

    Kerzhner, Aleksandr; Pomerantz, Marc; Tan, Kymie; Campuzano, Brian; Dinkel, Kevin; Pecharich, Jeremy; Nguyen, Viet; Steele, Robert; Johnson, Bryan

    2015-01-01

    The spectre of cyber attacks on aerospace systems can no longer be ignored given that many of the components and vulnerabilities that have been successfully exploited by the adversary on other infrastructures are the same as those deployed and used within the aerospace environment. An important consideration with respect to the mission/safety critical infrastructure supporting space operations is that an appropriate defensive response to an attack invariably involves the need for high precision and accuracy, because an incorrect response can trigger unacceptable losses involving lives and/or significant financial damage. A highly precise defensive response, considering the typical complexity of aerospace environments, requires a detailed and well-founded understanding of the underlying system where the goal of the defensive response is to preserve critical mission objectives in the presence of adversarial activity. In this paper, a structured approach for modeling aerospace systems is described. The approach includes physical elements, network topology, software applications, system functions, and usage scenarios. We leverage Model-Based Systems Engineering methodology by utilizing the Object Management Group's Systems Modeling Language to represent the system being analyzed and also utilize model transformations to change relevant aspects of the model into specialized analyses. A novel visualization approach is utilized to visualize the entire model as a three-dimensional graph, allowing easier interaction with subject matter experts. The model provides a unifying structure for analyzing the impact of a particular attack or a particular type of attack. Two different example analysis types are demonstrated in this paper: a graph-based propagation analysis based on edge labels, and a graph-based propagation analysis based on node labels.

  18. LESSONS LEARNED FROM CYBER SECURITY ASSESSMENTS OF SCADA AND ENERGY MANAGEMENT SYSTEMS

    Energy Technology Data Exchange (ETDEWEB)

    Ray Fink

    2006-10-01

    The results from ten cyber security vulnerability assessments of process control, SCADA and energy management systems, or components of those systems were reviewed to identify common problem areas. The common vulnerabilities ranged from conventional IT security issues to specific weaknesses in control system protocols. In each vulnerability category, relative measures were assigned to the severity of the vulnerability and ease with which an attacker could exploit the vulnerability. Suggested mitigations are identified in each category. Recommended mitigations having the highest impact on reducing vulnerability are listed for asset owners and system vendors.

  19. Towards a Relation Extraction Framework for Cyber-Security Concepts

    Energy Technology Data Exchange (ETDEWEB)

    Jones, Corinne L [ORNL; Bridges, Robert A [ORNL; Huffer, Kelly M [ORNL; Goodall, John R [ORNL

    2015-01-01

    In order to assist security analysts in obtaining information pertaining to their network, such as novel vulnerabilities, exploits, or patches, information retrieval methods tailored to the security domain are needed. As labeled text data is scarce and expensive, we follow developments in semi-supervised NLP and implement a bootstrapping algorithm for extracting security entities and their relationships from text. The algorithm requires little input data, specifically, a few relations or patterns (heuristics for identifying relations), and incorporates an active learning component which queries the user on the most important decisions to prevent drifting the desired relations. Preliminary testing on a small corpus shows promising results, obtaining precision of .82.

  20. Cyber Security Threats to Safety-Critical, Space-Based Infrastructures

    Science.gov (United States)

    Johnson, C. W.; Atencia Yepez, A.

    2012-01-01

    Space-based systems play an important role within national critical infrastructures. They are being integrated into advanced air-traffic management applications, rail signalling systems, energy distribution software etc. Unfortunately, the end users of communications, location sensing and timing applications often fail to understand that these infrastructures are vulnerable to a wide range of security threats. The following pages focus on concerns associated with potential cyber-attacks. These are important because future attacks may invalidate many of the safety assumptions that support the provision of critical space-based services. These safety assumptions are based on standard forms of hazard analysis that ignore cyber-security considerations This is a significant limitation when, for instance, security attacks can simultaneously exploit multiple vulnerabilities in a manner that would never occur without a deliberate enemy seeking to damage space based systems and ground infrastructures. We address this concern through the development of a combined safety and security risk assessment methodology. The aim is to identify attack scenarios that justify the allocation of additional design resources so that safety barriers can be strengthened to increase our resilience against security threats.

  1. Defining and Computing a Valued Based Cyber Security Measure

    Energy Technology Data Exchange (ETDEWEB)

    Aissa, Anis Ben [University of Tunis, Belvedere, Tunisia; Abercrombie, Robert K [ORNL; Sheldon, Frederick T [ORNL; Mili, Ali [New Jersey Insitute of Technology

    2011-01-01

    In earlier works (Ben-Aissa et al. 2010; Abercrombie et al. 2008; Sheldon et al. 2009), we presented a value based measure of cybersecurity that quantifies the security of a system in concrete terms, specifically, in terms of how much each system stakeholder stands to lose (in dollars per hour of operation) as a result of security threats and system vulnerabilities; our metric varies according to the stakes that each stakeholder has in meeting each security requirement. In this paper, we discuss the specification and design of a system that collects, updates, and maintains all the information that pertains to estimating our cybersecurity measure, and offers stakeholders quantitative means to make security-related decisions.

  2. Getting ahead of the threat: Aviation and cyber security

    National Research Council Canada - National Science Library

    Emilio Iasiello

    2013-01-01

    ... to identify and mitigate the physical threat to aviation. Many significant accomplishments have resulted from this effort, including the creation of the Transportation Security Administration to oversee US public transportation...

  3. CS651 Computer Systems Security Foundations 3d Imagination Cyber Security Management Plan

    Energy Technology Data Exchange (ETDEWEB)

    Nielsen, Roy S. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2015-03-02

    3d Imagination is a new company that bases its business on selling and improving 3d open source related hardware. The devices that they sell include 3d imagers, 3d printers, pick and place machines and laser etchers. They have a fast company intranet for ease in sharing, storing and printing large, complex 3d designs. They have an employee set that requires a variety of operating systems including Windows, Mac and a variety of Linux both for running business services as well as design and test machines. There are a wide variety of private networks for testing transfer rates to and from the 3d devices, without interference with other network tra c. They do video conferencing conferencing with customers and other designers. One of their machines is based on the project found at delta.firepick.org(Krassenstein, 2014; Biggs, 2014), which in future, will perform most of those functions. Their devices all include embedded systems, that may have full blown operating systems. Most of their systems are designed to have swappable parts, so when a new technology is born, it can be quickly adopted by people with 3d Imagination hardware. This company is producing a fair number of systems and components, however to get the funding they need to mass produce quality parts, so they are preparing for an IPO to raise the funds they need. They would like to have a cyber-security audit performed so they can give their investors con dence that they are protecting their data, customers information and printers in a proactive manner.

  4. Cyber crimes.

    Science.gov (United States)

    Nuzback, Kara

    2014-07-01

    Since it began offering cyber liability coverage in December 2011, the Texas Medical Liability Trust has received more than 150 cyber liability claims, most of which involved breaches of electronic protected health information. TMLT's cyber liability insurance will protect practices financially should a breach occur. The insurance covers a breach notification to customers and business partners, expenses for legal counsel, information security and forensic data services, public relations support, call center and website support, credit monitoring, and identity theft restoration services.

  5. US Cyber Challenge Research

    Science.gov (United States)

    2017-02-01

    US CYBER CHALLENGE RESEARCH NATIONAL BOARD OF INFORMATION SECURITY EXAMINERS (NBISE) FEBRUARY 2017 FINAL TECHNICAL REPORT APPROVED FOR PUBLIC... Cyber Challenge, CCX Platform, NICE Program, USCC 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT UU 18. NUMBER OF PAGES 19a. NAME OF...2016. 5 The Council on CyberSecurity (formerly the National Board for Information Security Examiners), U.S. Cyber Challenge (USCC), continues to

  6. Towards an integrated defense system for cyber security situation awareness experiment

    Science.gov (United States)

    Zhang, Hanlin; Wei, Sixiao; Ge, Linqiang; Shen, Dan; Yu, Wei; Blasch, Erik P.; Pham, Khanh D.; Chen, Genshe

    2015-05-01

    In this paper, an implemented defense system is demonstrated to carry out cyber security situation awareness. The developed system consists of distributed passive and active network sensors designed to effectively capture suspicious information associated with cyber threats, effective detection schemes to accurately distinguish attacks, and network actors to rapidly mitigate attacks. Based on the collected data from network sensors, image-based and signals-based detection schemes are implemented to detect attacks. To further mitigate attacks, deployed dynamic firewalls on hosts dynamically update detection information reported from the detection schemes and block attacks. The experimental results show the effectiveness of the proposed system. A future plan to design an effective defense system is also discussed based on system theory.

  7. A Method to Derive Monitoring Variables for a Cyber Security Test-bed of I and C System

    Energy Technology Data Exchange (ETDEWEB)

    Han, Kyung Soo; Song, Jae Gu; Lee, Joung Woon; Lee, Cheol Kwon [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of)

    2013-10-15

    In the IT field, monitoring techniques have been developed to protect the systems connected by networks from cyber attacks and incidents. For the development of monitoring systems for I and C cyber security, it is necessary to review the monitoring systems in the IT field and derive cyber security-related monitoring variables among the proprietary operating information about the I and C systems. Tests for the development and application of these monitoring systems may cause adverse effects on the I and C systems. To analyze influences on the system and safely intended variables, the construction of an I and C system Test-bed should be preceded. This article proposes a method of deriving variables that should be monitored through a monitoring system for cyber security as a part of I and C Test-bed. The surveillance features and the monitored variables of NMS(Network Management System), a monitoring technique in the IT field, were reviewed in section 2. In Section 3, the monitoring variables for an I and C cyber security were derived by the of NMS and the investigation for information used for hacking techniques that can be practiced against I and C systems. The monitoring variables of NMS in the IT field and the information about the malicious behaviors used for hacking were derived as expected variables to be monitored for an I and C cyber security research. The derived monitoring variables were classified into the five functions of NMS for efficient management. For the cyber security of I and C systems, the vulnerabilities should be understood through a penetration test etc. and an assessment of influences on the actual system should be carried out. Thus, constructing a test-bed of I and C systems is necessary for the safety system in operation. In the future, it will be necessary to develop a logging and monitoring system for studies on the vulnerabilities of I and C systems with test-beds.

  8. Implementing Cyber Coercion

    Science.gov (United States)

    2015-03-01

    SUBJECT TERMS cyber coercion, cyber warfare, cyber policy 17. SECURITY 18. SECURITY CLASSIFICATION OF CLASSIFICATION OF THIS REPORT PAGE Unclassified...Unclassified NSN 7540-01-280-5500 15. NUMBER OF PAGES 97 16. PRICE CODE 19. SECURITY 20. LIMITATION OF CLASSIFICATION OF ABSTRACT ABSTRACT...1. Targeting Network Communications ................................... 25 a. DNS Hacking

  9. 网络空间安全人才培养探讨%Discussions on the talent cultivation of cyber security

    Institute of Scientific and Technical Information of China (English)

    翁健; 马昌社; 古亮

    2016-01-01

    Cyber security has been formally approved to be the first level discipline in June 2015. How to train the cyber security talents that meet the needs of our country has become an urgent problem to be solved in the discipline construction. Synthetical analysis of the current situation of training related talents at domestic and foreign, as well as the actual demand for the cyber security talents was presented. According to the characteristics of the talent culti-vation in cyber security, some suggestions on training the cyber security talents were given.%自从2015年6月网络空间安全正式被批准为国家一级学科,如何培养符合国家需要的网络空间安全人才成为了学科建设中一个亟待解决的问题。综合分析了国内外培养相关方面人才的现状与网络空间安全的实际人才需求;结合我国网络空间安全人才培养的特点,给出了我国网络空间安全人才培养的部分建议。

  10. Three tenets for secure cyber-physical system design and assessment

    Science.gov (United States)

    Hughes, Jeff; Cybenko, George

    2014-06-01

    This paper presents a threat-driven quantitative mathematical framework for secure cyber-physical system design and assessment. Called The Three Tenets, this originally empirical approach has been used by the US Air Force Research Laboratory (AFRL) for secure system research and development. The Tenets were first documented in 2005 as a teachable methodology. The Tenets are motivated by a system threat model that itself consists of three elements which must exist for successful attacks to occur: - system susceptibility; - threat accessibility and; - threat capability. The Three Tenets arise naturally by countering each threat element individually. Specifically, the tenets are: Tenet 1: Focus on What's Critical - systems should include only essential functions (to reduce susceptibility); Tenet 2: Move Key Assets Out-of-Band - make mission essential elements and security controls difficult for attackers to reach logically and physically (to reduce accessibility); Tenet 3: Detect, React, Adapt - confound the attacker by implementing sensing system elements with dynamic response technologies (to counteract the attackers' capabilities). As a design methodology, the Tenets mitigate reverse engineering and subsequent attacks on complex systems. Quantified by a Bayesian analysis and further justified by analytic properties of attack graph models, the Tenets suggest concrete cyber security metrics for system assessment.

  11. Cyber Safety and Security for Reduced Crew Operations (RCO)

    Science.gov (United States)

    Driscoll, Kevin

    2017-01-01

    NASA and the Aviation Industry is looking into reduced crew operations (RCO) that would cut today's required two-person flight crews down to a single pilot with support from ground-based crews. Shared responsibility across air and ground personnel will require highly reliable and secure data communication and supporting automation, which will be safety-critical for passenger and cargo aircraft. This paper looks at the different types and degrees of authority delegation given from the air to the ground and the ramifications of each, including the safety and security hazards introduced, the mitigation mechanisms for these hazards, and other demands on an RCO system architecture which would be highly invasive into (almost) all safety-critical avionics. The adjacent fields of unmanned aerial systems and autonomous ground vehicles are viewed to find problems that RCO may face and related aviation accident scenarios are described. The paper explores possible data communication architectures to meet stringent performance and information security (INFOSEC) requirements of RCO. Subsequently, potential challenges for RCO data communication authentication, encryption and non-repudiation are identified. The approach includes a comprehensive safety-hazard analysis of the RCO system to determine top level INFOSEC requirements for RCO and proposes an option for effective RCO implementation. This paper concludes with questioning the economic viability of RCO in light of the expense of overcoming the operational safety and security hazards it would introduce.

  12. IEC 61850 and IEC 62351 Cyber Security Acceleration Workshop

    Energy Technology Data Exchange (ETDEWEB)

    Clements, Samuel L.; Edgar, Thomas W.; Manz, David O.

    2012-04-01

    The purpose of this workshop was to identify and discuss concerns with the use and adoption of IEC 62351 security standard for IEC 61850 compliant control system products. The industry participants discussed performance, interoperability, adoption, challenges, business cases, and future issues.

  13. Cyber Crimes

    Institute of Scientific and Technical Information of China (English)

    2012-01-01

    正With the popularization of Internet,cyber crimes have be-come a serious problem facing us.Nowadays cyber criminalsseem to be everywhere on the Internet.To illustrate,somecommit fraud or lift intellectual property,others snatch pass-words or disrupt e-commerce,and still others unleash virusesto crash computers.As a result,these crimes destroy net-work security greatly and make computer users suffer great losses.However,we shouldn't tolerate these cyber criminals any more.It's high timefor us to take effective measures to fight against cyber crimes.

  14. Cyber Security: Big Data Think II Working Group Meeting

    Science.gov (United States)

    Hinke, Thomas; Shaw, Derek

    2015-01-01

    This presentation focuses on approaches that could be used by a data computation center to identify attacks and ensure malicious code and backdoors are identified if planted in system. The goal is to identify actionable security information from the mountain of data that flows into and out of an organization. The approaches are applicable to big data computational center and some must also use big data techniques to extract the actionable security information from the mountain of data that flows into and out of a data computational center. The briefing covers the detection of malicious delivery sites and techniques for reducing the mountain of data so that intrusion detection information can be useful, and not hidden in a plethora of false alerts. It also looks at the identification of possible unauthorized data exfiltration.

  15. Institutional Foundations for Cyber Security: Current Responses and New Challenges

    Science.gov (United States)

    2010-09-01

    N/A WSIS: World Summit on the Information Society Global summit on information security; publishes resolutions and monitors implementation...extension of OECD’s core mission and provides a common approach for all member states. WSIS. The World Summit on the Information Society (WSIS...organization’ but are likely to retain a long standing institutional presence on the international arena (such as the World Summit on the Information

  16. Cyber-security in smart cities: The case of Dubai

    OpenAIRE

    Efthymiopoulos, Marios-Panagiotis

    2016-01-01

    The city of Dubai emerges as a leading partner in not only technology innovation but also designed infrastructure and strategic security. There is a strategy, which will globally add the city and leadership to the leading smart cities of the world. Considering current and future challenges, the strategic aim is to "smart" wire the city of Dubai by 2020. Dubai is a city of strategic technology, innovation and management. It is a global, vibrant and emerging economy among others, that can becom...

  17. Cyber Safety and Security for Reduced Crew Operations (RCO)

    Science.gov (United States)

    Driscoll, Kevin R.; Roy, Aloke; Ponchak, Denise S.; Downey, Alan N.

    2017-01-01

    NASA and the Aviation Industry is looking into reduced crew operations (RCO) that would cut today's required two-person flight crews down to a single pilot with support from ground-based crews. Shared responsibility across air and ground personnel will require highly reliable and secure data communication and supporting automation, which will be safety-critical for passenger and cargo aircraft. This paper looks at the different types and degrees of authority delegation given from the air to the ground and the ramifications of each, including the safety and security hazards introduced, the mitigation mechanisms for these hazards, and other demands on an RCO system architecture which would be highly invasive into (almost) all safety-critical avionics. The adjacent fields of unmanned aerial systems and autonomous ground vehicles are viewed to find problems that RCO may face and related aviation accident scenarios are described. The paper explores possible data communication architectures to meet stringent performance and information security (INFOSEC) requirements of RCO. Subsequently, potential challenges for RCO data communication authentication, encryption and non-repudiation are identified.

  18. Evaluation Report on "The Department's Unclassified Cyber Security Program"

    Energy Technology Data Exchange (ETDEWEB)

    None

    2009-10-01

    Industry experts report that security challenges and threats are continually evolving as malicious activity has become more web-based and attackers are able to rapidly adapt their attack methods. In addition, the number of data breaches continues to rise. In an effort to mitigate and address threats and protect valuable information, the Department of Energy anticipated spending about $275 million in Fiscal Year (FY) 2009 to implement cyber security measures necessary to protect its information technology resources. These systems and data are designed to support the Department's mission and business lines of energy security, nuclear security, scientific discovery and innovation, and environmental responsibility. The Federal Information Security Management Act of 2002 (FISMA) provides direction to agencies on the management and oversight of information security risks, including design and implementation of controls to protect Federal information and systems. As required by FISMA, the Office of Inspector General conducts an annual independent evaluation to determine whether the Department's unclassified cyber security program adequately protects its information systems and data. This memorandum and the attached report present the results of our evaluation for FY 2009. The Department continued to make incremental improvements in its unclassified cyber security program. Our evaluation disclosed that most sites had taken action to address weaknesses previously identified in our FY 2008 evaluation report. They improved certification and accreditation of systems; strengthened configuration management of networks and systems; performed independent assessments; and, developed and/or refined certain policies and procedures. In addition, the Department instituted a centralized incident response organization designed to eliminate duplicative efforts throughout the Department. As we have noted in previous reports, the Department continued to maintain strong network

  19. Cyber Workforce Retention

    Science.gov (United States)

    2016-10-01

    opportunities exclusive to cyber - security (1B4s), with a minimum two-to-one-ratio follow-on ADSC tied to such programs. This study recommends that these... cyber power, conflict, and cooperation. As a venue for dialogue and study about cyber power and its relationship to national security , military...thank you all. xiii Abstract Experienced cyber and information security professionals will be members of one of the fastest growing and in-demand

  20. Cyber Security for the Spaceport Command and Control System: Vulnerability Management and Compliance Analysis

    Science.gov (United States)

    Gunawan, Ryan A.

    2016-01-01

    With the rapid development of the Internet, the number of malicious threats to organizations is continually increasing. In June of 2015, the United States Office of Personnel Management (OPM) had a data breach resulting in the compromise of millions of government employee records. The National Aeronautics and Space Administration (NASA) is not exempt from these attacks. Cyber security is becoming a critical facet to the discussion of moving forward with projects. The Spaceport Command and Control System (SCCS) project at the Kennedy Space Center (KSC) aims to develop the launch control system for the next generation launch vehicle in the coming decades. There are many ways to increase the security of the network it uses, from vulnerability management to ensuring operating system images are compliant with securely configured baselines recommended by the United States Government.

  1. Stackelberg Interdependent Security Game in Distributed and Hierarchical Cyber-Physical Systems

    Directory of Open Access Journals (Sweden)

    Jiajun Shen

    2017-01-01

    Full Text Available With the integration of physical plant and network, cyber-physical systems (CPSs are increasingly vulnerable due to their distributed and hierarchical framework. Stackelberg interdependent security game (SISG is proposed for characterizing the interdependent security in CPSs, that is, the interactions between individual CPSs, which are selfish but nonmalicious with the payoff function being formulated from a cross-layer perspective. The pure-strategy equilibria for two-player symmetric SISG are firstly analyzed with the strategy gap between individual and social optimum being characterized, which is known as negative externalities. Then, the results are further extended to the asymmetric and m-player SISG. At last, a numerical case of practical experiment platform is analyzed for determining the comprehensively optimal security configuration for administrator.

  2. Cyber Security and Reliability in a Digital Cloud

    Science.gov (United States)

    2013-01-01

    Runs the Mission  Mr. Bret Hartman  RSA  The Intelligent Security  Operations Center and  Advanced Persistent Threats  Mr. Chris C. Kemp  OpenStack  Cloud...Software  OpenStack  Cloud Software  Mr. Pravin Kothari  CipherCloud  Cloud Data Protection  Dr. John C. Mitchell  Stanford University  Innovation in

  3. Improving Control System Cyber-State Awareness using Known Secure Sensor Measurements

    Energy Technology Data Exchange (ETDEWEB)

    Ondrej Linda; Milos Manic; Miles McQueen

    2012-09-01

    Abstract—This paper presents design and simulation of a low cost and low false alarm rate method for improved cyber-state awareness of critical control systems - the Known Secure Sensor Measurements (KSSM) method. The KSSM concept relies on physical measurements to detect malicious falsification of the control systems state. The KSSM method can be incrementally integrated with already installed control systems for enhanced resilience. This paper reviews the previously developed theoretical KSSM concept and then describes a simulation of the KSSM system. A simulated control system network is integrated with the KSSM components. The effectiveness of detection of various intrusion scenarios is demonstrated on several control system network topologies.

  4. Shopping For Danger: E-commerce techniques applied to collaboration in cyber security

    Energy Technology Data Exchange (ETDEWEB)

    Bruce, Joseph R.; Fink, Glenn A.

    2012-05-24

    Collaboration among cyber security analysts is essential to a successful protection strategy on the Internet today, but it is uncommonly practiced or encouraged in operating environments. Barriers to productive collaboration often include data sensitivity, time and effort to communicate, institutional policy, and protection of domain knowledge. We propose an ambient collaboration framework, Vulcan, designed to remove the barriers of time and effort and mitigate the others. Vulcan automated data collection, collaborative filtering, and asynchronous dissemination, eliminating the effort implied by explicit collaboration among peers. We instrumented two analytic applications and performed a mock analysis session to build a dataset and test the output of the system.

  5. On detection and visualization techniques for cyber security situation awareness

    Science.gov (United States)

    Yu, Wei; Wei, Shixiao; Shen, Dan; Blowers, Misty; Blasch, Erik P.; Pham, Khanh D.; Chen, Genshe; Zhang, Hanlin; Lu, Chao

    2013-05-01

    Networking technologies are exponentially increasing to meet worldwide communication requirements. The rapid growth of network technologies and perversity of communications pose serious security issues. In this paper, we aim to developing an integrated network defense system with situation awareness capabilities to present the useful information for human analysts. In particular, we implement a prototypical system that includes both the distributed passive and active network sensors and traffic visualization features, such as 1D, 2D and 3D based network traffic displays. To effectively detect attacks, we also implement algorithms to transform real-world data of IP addresses into images and study the pattern of attacks and use both the discrete wavelet transform (DWT) based scheme and the statistical based scheme to detect attacks. Through an extensive simulation study, our data validate the effectiveness of our implemented defense system.

  6. Cyber-Security Issues in Healthcare Information Technology.

    Science.gov (United States)

    Langer, Steve G

    2017-02-01

    In 1999-2003, SIIM (then SCAR) sponsored the creation of several special topic Primers, one of which was concerned with computer security. About the same time, a multi-society collaboration authored an ACR Guideline with a similar plot; the latter has recently been updated. The motivation for these efforts was the launch of Health Information Portability and Accountability Act (HIPAA). That legislation directed care providers to enable the portability of patient medical records across authorized medical centers, while simultaneously protecting patient confidentiality among unauthorized agents. These policy requirements resulted in the creation of numerous technical solutions which the above documents described. While the mathematical concepts and algorithms in those papers are as valid today as they were then, recent increases in the complexity of computer criminal applications (and defensive countermeasures) and the pervasiveness of Internet connected devices have raised the bar. This work examines how a medical center can adapt to these evolving threats.

  7. Cyber security: a critical examination of information sharing versus data sensitivity issues for organisations at risk of cyber attack.

    Science.gov (United States)

    Mallinder, Jason; Drabwell, Peter

    Cyber threats are growing and evolving at an unprecedented rate.Consequently, it is becoming vitally important that organisations share information internally and externally before, during and after incidents they encounter so that lessons can be learned, good practice identified and new cyber resilience capabilities developed. Many organisations are reluctant to share such information for fear of divulging sensitive information or because it may be vague or incomplete. This provides organisations with a complex dilemma: how to share information as openly as possibly about cyber incidents, while protecting their confidentiality and focusing on service recovery from such incidents. This paper explores the dilemma of information sharing versus sensitivity and provides a practical overview of considerations every business continuity plan should address to plan effectively for information sharing in the event of a cyber incident.

  8. Mixed-Initiative Cyber Security: Putting humans in the right loop

    Energy Technology Data Exchange (ETDEWEB)

    Haack, Jereme N.; Fink, Glenn A.; Maiden, Wendy M.; McKinnon, Archibald D.; Fulp, Errin W.

    2009-05-11

    In recent years, organizations and their computer infrastructures have grown intertwined in complex relationships through mergers, acquisitions, reorganizations, and cooperative service delivery. Defensive actions and policy changes by one organization may have far-reaching negative consequences on its partner organizations. Human-only or machine-only approaches are insufficient. The former are slow but highly adaptable, while the latter are fast but highly specialized. In either case, humans retain the ultimate responsibility for the actions of their automated systems. Deploying automated defenses does not absolve humans of their inherent responsibility. We believe the solution lies in mixed-initiative defense unifying the complementary qualities of both human- and machine-based approaches. We describe the Cooperative Infrastructure Defense (CID), a new cyber-defense paradigm employing complex-adaptive swarm intelligence, logical rational agents, and human insight to enable collaborative cyber defense among cooperating organizations in an infrastructure setting. CID takes a mixed-initiative approach to infrastructure defense where teams of humans and software agents defend cooperating organizations in tandem, sharing insights and solutions without violating proprietary boundaries. CID will help create security policy via dialogue between humans and agents, foster a collaborative problem-solving environment, and increase human situational awareness and influence through visualization and shared control. CID will provide a foundation for building trust between humans and agents within and between organizations.

  9. Secure estimation, control and optimization of uncertain cyber-physical systems with applications to power networks

    Science.gov (United States)

    Taha, Ahmad Fayez

    Transportation networks, wearable devices, energy systems, and the book you are reading now are all ubiquitous cyber-physical systems (CPS). These inherently uncertain systems combine physical phenomena with communication, data processing, control and optimization. Many CPSs are controlled and monitored by real-time control systems that use communication networks to transmit and receive data from systems modeled by physical processes. Existing studies have addressed a breadth of challenges related to the design of CPSs. However, there is a lack of studies on uncertain CPSs subject to dynamic unknown inputs and cyber-attacks---an artifact of the insertion of communication networks and the growing complexity of CPSs. The objective of this dissertation is to create secure, computational foundations for uncertain CPSs by establishing a framework to control, estimate and optimize the operation of these systems. With major emphasis on power networks, the dissertation deals with the design of secure computational methods for uncertain CPSs, focusing on three crucial issues---(1) cyber-security and risk-mitigation, (2) network-induced time-delays and perturbations and (3) the encompassed extreme time-scales. The dissertation consists of four parts. In the first part, we investigate dynamic state estimation (DSE) methods and rigorously examine the strengths and weaknesses of the proposed routines under dynamic attack-vectors and unknown inputs. In the second part, and utilizing high-frequency measurements in smart grids and the developed DSE methods in the first part, we present a risk mitigation strategy that minimizes the encountered threat levels, while ensuring the continual observability of the system through available, safe measurements. The developed methods in the first two parts rely on the assumption that the uncertain CPS is not experiencing time-delays, an assumption that might fail under certain conditions. To overcome this challenge, networked unknown input

  10. NERSC Cyber Security Challenges That Require DOE Development andSupport

    Energy Technology Data Exchange (ETDEWEB)

    Draney, Brent; Campbell, Scott; Walter, Howard

    2007-01-16

    Traditional security approaches do not adequately addressall the requirements of open, scientific computing facilities. Many ofthe methods used for more restricted environments, including almost allcorporate/commercial systems, do not meet the needs of today's science.Use of only the available "state of the practice" commercial methods willhave adverse impact on the ability of DOE to accomplish its sciencegoals, and impacts the productivity of the DOE Science community. Inparticular, NERSC and other high performance computing (HPC) centers havespecial security challenges that are unlikely to be met unless DOE fundsdevelopment and support of reliable and effective tools designed to meetthe cyber security needs of High Performance Science. The securitychallenges facing NERSC can be collected into three basic problem sets:network performance and dynamics, application complexity and diversity,and a complex user community that can have transient affiliations withactual institutions. To address these problems, NERSC proposes thefollowing four general solutions: auditing user and system activityacross sites; firewall port configuration in real time;cross-site/virtual organization identity management and access control;and detecting security issues in application middleware. Solutions arealsoproposed for three general long term issues: data volume,application complexity, and information integration.

  11. Secure Fusion Estimation for Bandwidth Constrained Cyber-Physical Systems Under Replay Attacks.

    Science.gov (United States)

    Chen, Bo; Ho, Daniel W C; Hu, Guoqiang; Yu, Li

    2017-07-03

    State estimation plays an essential role in the monitoring and supervision of cyber-physical systems (CPSs), and its importance has made the security and estimation performance a major concern. In this case, multisensor information fusion estimation (MIFE) provides an attractive alternative to study secure estimation problems because MIFE can potentially improve estimation accuracy and enhance reliability and robustness against attacks. From the perspective of the defender, the secure distributed Kalman fusion estimation problem is investigated in this paper for a class of CPSs under replay attacks, where each local estimate obtained by the sink node is transmitted to a remote fusion center through bandwidth constrained communication channels. A new mathematical model with compensation strategy is proposed to characterize the replay attacks and bandwidth constrains, and then a recursive distributed Kalman fusion estimator (DKFE) is designed in the linear minimum variance sense. According to different communication frameworks, two classes of data compression and compensation algorithms are developed such that the DKFEs can achieve the desired performance. Several attack-dependent and bandwidth-dependent conditions are derived such that the DKFEs are secure under replay attacks. An illustrative example is given to demonstrate the effectiveness of the proposed methods.

  12. A macro-economic framework for evaluation of cyber security risks related to protection of intellectual property.

    Science.gov (United States)

    Andrijcic, Eva; Horowitz, Barry

    2006-08-01

    The article is based on the premise that, from a macro-economic viewpoint, cyber attacks with long-lasting effects are the most economically significant, and as a result require more attention than attacks with short-lasting effects that have historically been more represented in literature. In particular, the article deals with evaluation of cyber security risks related to one type of attack with long-lasting effects, namely, theft of intellectual property (IP) by foreign perpetrators. An International Consequence Analysis Framework is presented to determine (1) the potential macro-economic consequences of cyber attacks that result in stolen IP from companies in the United States, and (2) the likely sources of such attacks. The framework presented focuses on IP theft that enables foreign companies to make economic gains that would have otherwise benefited the U.S. economy. Initial results are presented.

  13. Operations research, engineering, and cyber security trends in applied mathematics and technology

    CERN Document Server

    Rassias, Themistocles

    2017-01-01

    Mathematical methods and theories with interdisciplinary applications are presented in this book. The eighteen contributions presented in this Work have been written by eminent scientists; a few papers are based on talks which took place at the International Conference at the Hellenic Artillery School in May 2015. Each paper evaluates possible solutions to long-standing problems such as the solvability of the direct electromagnetic scattering problem, geometric approaches to cyber security, ellipsoid targeting with overlap, non-equilibrium solutions of dynamic networks, measuring ballistic dispersion, elliptic regularity theory for the numerical solution of variational problems, approximation theory for polynomials on the real line and the unit circle, complementarity and variational inequalities in electronics, new two-slope parameterized achievement scalarizing functions for nonlinear multiobjective optimization, and strong and weak convexity of closed sets in a Hilbert space. Graduate students, scientists,...

  14. Current and potential cyber attacks on medical journals; guidelines for improving security.

    Science.gov (United States)

    Dadkhah, Mehdi; Seno, Seyed Amin Hosseini; Borchardt, Glenn

    2017-03-01

    At the moment, scholarly publishing is faced with much academic misconduct and threats such as predatory journals, hijacked journals, phishing, and other scams. In response, we have been discussing this misconduct and trying to increase the awareness of researchers, but it seems that there is a lack of research that presents guidelines for editors to help them protect themselves against these threats. It seems that information security is missing in some parts of scholarly publishing that particularly involves medical journals. In this paper, we explain different types of cyber-attacks that especially threaten editors and academic journals. We then explain the details involved in each type of attack. Finally, we present general guidelines for detection and prevention of the attacks. In some cases, we use small experiments to show that our claim is true. Finally, we conclude the paper with a prioritization of these attacks.

  15. Combining Traditional Cyber Security Audit Data with Psychosocial Data: Towards Predictive Modeling for Insider Threat Mitigation

    Science.gov (United States)

    Greitzer, Frank L.; Frincke, Deborah A.

    The purpose of this chapter is to motivate the combination of traditional cyber security audit data with psychosocial data, to support a move from an insider threat detection stance to one that enables prediction of potential insider presence. Twodistinctiveaspects of the approach are the objectiveof predicting or anticipating potential risksandthe useoforganizational datain additiontocyber datato support the analysis. The chapter describes the challenges of this endeavor and reports on progressin definingausablesetof predictiveindicators,developingaframeworkfor integratingthe analysisoforganizationalandcyber securitydatatoyield predictions about possible insider exploits, and developing the knowledge base and reasoning capabilityof the system.We also outline the typesof errors that oneexpectsina predictive system versus a detection system and discuss how those errors can affect the usefulness of the results.

  16. Quantifying Availability in SCADA Environments Using the Cyber Security Metric MFC

    Energy Technology Data Exchange (ETDEWEB)

    Aissa, Anis Ben [Université de Tunis El Manar, Tunisia; Rabai, Latifa Ben Arfa [Université de Tunis, Tunisia; Abercrombie, Robert K [ORNL; Sheldon, Frederick T [ORNL; Mili, Ali [New Jersey Insitute of Technology

    2014-01-01

    Supervisory Control and Data Acquisition (SCADA) systems are distributed networks dispersed over large geographic areas that aim to monitor and control industrial processes from remote areas and/or a centralized location. They are used in the management of critical infrastructures such as electric power generation, transmission and distribution, water and sewage, manufacturing/industrial manufacturing as well as oil and gas production. The availability of SCADA systems is tantamount to assuring safety, security and profitability. SCADA systems are the backbone of the national cyber-physical critical infrastructure. Herein, we explore the definition and quantification of an econometric measure of availability, as it applies to SCADA systems; our metric is a specialization of the generic measure of mean failure cost.

  17. Quantifying and measuring cyber resiliency

    Science.gov (United States)

    Cybenko, George

    2016-05-01

    Cyber resliency has become an increasingly attractive research and operational concept in cyber security. While several metrics have been proposed for quantifying cyber resiliency, a considerable gap remains between those metrics and operationally measurable and meaningful concepts that can be empirically determined in a scientific manner. This paper describes a concrete notion of cyber resiliency that can be tailored to meet specific needs of organizations that seek to introduce resiliency into their assessment of their cyber security posture.

  18. Cyber laws encompassing the Security of E-Quran in Saudi Arabia

    Directory of Open Access Journals (Sweden)

    Naasir Kamaal Khan

    2013-10-01

    Full Text Available Past two decades in the world have seen tremendous growth in the use of Information Technology in almost every field of daily life. We have seen abrupt changes in the society and paper world is completely changed to electronic world. The use of electronic format of storing, processing and retrieval of data made ease for the human kind in a multidimensional way which influences the human being in all the aspects of life. The growth of using Holy Quran for reading and learning through electronic mode is increasing day by day. As there are always two faces of a coin, the other side shows the risks and vulnerabilities associated with the use of eQuran. With over 1.5 billion of Muslim population in the world, several calls were raised in the Islamic countries to establish a law suitable to handle computer crimes which matches the Islamic Shariah law. In this paper threats associated with the use of digital format of Quran and existing cyber laws associated with it, are discussed, both in the Kingdom and worldwide. The author conducted on extensive review of published literature on a number of computer crime laws developed by many countries, which includes Texas Computer Crime Law, Anticrime act 2007 of Saudi Arabia and cyber laws in other countries of Middle East. Lastly author proposes the amendments in the latest version of Cyberlaws for securing the Holy Quran, in the light of present Anticrime act of World especially in Middle East as computer crime is of a global nature and the present penalties associated with Modification and fabrication of electronic data is not enough when we talk about the holy book Quran

  19. Introducing cyber.

    Science.gov (United States)

    Hult, Fredrik; Sivanesan, Giri

    In January 2012, the World Economic Forum made cyber attacks its fourth top global risk. In the 2013 risk report, cyber attacks were noted to be an even higher risk in absolute terms. The reliance of critical infrastructure on cyber working has never been higher; the frequency, intensity, impact and sophistication of attacks is growing. This trend looks likely to continue. It can be argued that it is no longer a question whether an organisation will be successfully hacked, but how long it will take to detect. In the ever-changing cyber environment, traditional protection techniques and reliance on preventive controls are not enough. A more agile approach is required to give assurance of a sufficiently secure digital society. Are we faced with a paradigm shift or a storm in a digital teacup? This paper offers an introduction to why cyber is important, a wider taxonomy on the topic and some historical context on how the discipline of cyber security has evolved, and an interpretation on what this means in the new normal of today.

  20. Cyber Security Status and Technology Development%网络安全现状与技术发展

    Institute of Scientific and Technical Information of China (English)

    宁向延; 张顺颐

    2012-01-01

    The developments of open, free, international cyber technologies bring many revolutionary changes to all countries of the world, all government organizations, all enterprise organizations and all aspects of our lives. With the improved efficiency and the conveniences, many threats and challenges have appeared on open networks. Thus cyber security has become an indispensable part of information networks. Based on the developing security theories, application technologies , management standards, and so on, cyber security technology system has been gradually formed and mature. With the development of network technologies , new information security technologies ( such as IPv6 security, wireless security and embedded system security) will become the mainstream of network security. Many security technologies will be a-malgamated, at the same time the security technology will be syncretized with other technologies, and monitoring technology will become the mainstream of cyber security technologies.%开放、自由、国际化的信息网络技术的发展给世界各国、政府机构、企事业机构和个人生活带来了革命性的变革.伴随着提高效率和提供各种便利的同时,人们要面对开放网络带来的信息安全方面的威胁和挑战,网络的安全问题成为信息网络健康发展必不可少的重要一环.有关网络安全的研究,在安全理论、应用技术、规范管理等方面不断深入,安全技术体系逐步形成并成熟起来.随着网络技术的发展变化,新兴信息安全技术(如IPv6安全、无线安全和嵌入式系统安全等)将成为主流,网络安全技术也将逐渐发展和变化.许多安全技术将由独立走向融合,同时安全技术开始与其他技术进行融合,监控技术将成为信息网络安全技术的主流.

  1. IPACSO: Towards Developing an Innovation Framework for ICT Innovators in the Privacy and CyberSecurity Markets

    OpenAIRE

    Power, Jamie R; Dooly, Zeta

    2014-01-01

    A pressing challenge facing the cybersecurity and privacy research community is transitioning technical R&D into commercial and marketplace ready products and services. Responding to the need to develop a better understanding of how Privacy and CyberSecurity (PACS) market needs and overall technology innovation best-practice can be harmonized more effectively the contribution of this paper is centred upon the development of a set of innovation guiding principles to inform the overarching IPAC...

  2. Book Review: Cyber Security and Global Information Assurance: Threat Analysis and Response Solutions

    Directory of Open Access Journals (Sweden)

    Gary Kessler

    2009-09-01

    Full Text Available Knapp, K.J. (Ed. (2009. Cyber Security and Global Information Assurance: Threat Analysis and Response Solutions. Hershey, NY: Information Science Reference. 434 + xxii pages, ISBN: 978-1-60566-326-5, US$195.Reviewed by Gary C. Kessler (gck@garykessler.netI freely admit that this book was sent to me by the publisher for the expressed purpose of my writing a review and that I know several of the chapter authors. With that disclosure out of the way, let me say that the book is well worth the review (and I get to keep my review copy.The preface to the book cites the 2003 publication of The National Strategy to Secure Cyberspace by the White House, and the acknowledgement by the U.S. government that our economy and national security were fully dependent upon computers, networks, and the telecommunications infrastructure. This mayhave come as news to the general population but it was a long overdue public statement to those of us in the industry. The FBI's InfraGard program and the formation of the National Infrastructure Protection Center (NIPC pre-dated this report by at least a half-dozen years, so the report was hardly earthshattering. And the fact that the bulk of the telecom infrastructure is owned by the private sector is a less advertized fact. Nonetheless, reminding the community of these facts is always a Good Thing and provides the raison d’être of this book.(see PDF for full review

  3. Security Software Green Head for Mobile Devices Providing Comprehensive Protection from Malware and Illegal Activities of Cyber Criminals

    Directory of Open Access Journals (Sweden)

    Zhukov Igor

    2013-04-01

    Full Text Available This paper deals with the description of the threats to mobile devices and suggests the security software that provides comprehensive protection of personal data and mobile telephone from malware and illegal activity of cyber criminals. The developed security software Green Head protects personal smartphones of majority of brands from spam, viruses and unauthorized access. It is an innovative software product ensuring information security of mobile phones from all currently existing threats that today does not have any full analogs. Green Head security software warns the user about wiretapping, which keeps professional and personal confidential information intact. The developed security software is universal for people using mobile phones in professional and personal life because any stored information is protected from various attacks.

  4. Evaluation of Cyber Security and Modelling of Risk Propagation with Petri Nets

    Directory of Open Access Journals (Sweden)

    Marcin Szpyrka

    2017-02-01

    Full Text Available This article presents a new method of risk propagation among associated elements. On thebasis of coloured Petri nets, a new class called propagation nets is defined. This class providesa formal model of a risk propagation. The proposed method allows for model relations betweennodes forming the network structure. Additionally, it takes into account the bidirectional relationsbetween components as well as relations between isomorphic, symmetrical components in variousbranches of the network. This method is agnostic in terms of use in various systems and it canbe adapted to the propagation model of any systems’ characteristics; however, it is intentionallyproposed to assess the risk of critical infrastructures. In this paper, as a proof of concept example, weshow the formal model of risk propagation proposed within the project Cyberspace Security ThreatsEvaluation System of the Republic of Poland. In the article, the idea of the method is presented aswell as its use case for evaluation of risk for cyber threats. With the adaptation of Petri nets, it ispossible to evaluate the risk for the particular node and assess the impact of this risk for all relatednodes including hierarchic relations of components as well as isomorphism of elements.

  5. Improving Student Engagement in the Study of Professional Ethics: Concepts and an Example in Cyber Security.

    Science.gov (United States)

    Bustard, John D

    2017-04-11

    In spite of the acknowledged importance of professional ethics, technical students often show little enthusiasm for studying the subject. This paper considers how such engagement might be improved. Four guiding principles for promoting engagement are identified: (1) aligning teaching content with student interests; (2) taking a pragmatic rather than a philosophical approach to issue resolution; (3) addressing the full complexity of real-world case studies; and (4) covering content in a way that students find entertaining. The use of these principles is then discussed with respect to the specific experience of developing and presenting a master's module in Ethical and Legal Issues in Cyber Security at Queens University Belfast. One significant aspect of the resulting design is that it encourages students to see ethical issues in systemic terms rather than from an individual perspective, with issues emerging from a conflict between different groups with different vested interests. Case studies are used to examine how personal and business priorities create conflicts that can lead to negative press, fines and punitive legal action. The module explores the reasons why organisations may be unaware of the risks associated with their actions and how an inappropriate response to an ethical issue can significantly aggravate a situation. The module has been delivered in three successive years since 2014 and been well received on each occasion. The paper describes the design of the module and the experience of delivering it, concluding with a discussion of the effectiveness of the approach.

  6. Cyber Security and Habeas Data: The Latin American response to information security and data protection

    OpenAIRE

    Luisa Parraguez Kobek; Erick Caldera

    2016-01-01

    Habeas Data is not a commonly known concept, yet it is widely acknowledged in certain circles that deal with information security and data protection. Though it has been around for decades, it has recently gained momentum in Latin America. It is the legal notion that protects any and all information pertaining to the individual, from personal to financial, giving them the power to decide how and where such data can be used. At the same time, most Latin American countries have created laws tha...

  7. Enhancing the cyber-security of smart grids with applications to synchrophasor data

    Science.gov (United States)

    Pal, Seemita

    In the power grids, Supervisory Control and Data Acquisition (SCADA) systems are used as part of the Energy Management System (EMS) for enabling grid monitoring, control and protection. In recent times, with the ongoing installation of thousands of Phasor Measurement Units (PMUs), system operators are becoming increasingly reliant on PMU-generated synchrophasor measurements for executing wide-area monitoring and real-time control. The availability of PMU data facilitates dynamic state estimation of the system, thus improving the efficiency and resiliency of the grid. Since the SCADA and PMU data are used to make critical control decisions including actuation of physical systems, the timely availability and integrity of this networked data is of paramount importance. Absence or wrong control actions can potentially lead to disruption of operations, monetary loss, damage to equipments or surroundings or even blackout. This has posed new challenges to information security especially in this age of ever-increasing cyber-attacks. In this thesis, potential cyber-attacks on smart grids are presented and effective and implementable schemes are proposed for detecting them. The focus is mainly on three kinds of cyber-attacks and their detection: (i) gray-hole attacks on synchrophasor systems, (ii) PMU data manipulation attacks and (iii) data integrity attacks on SCADA systems. In the case of gray-hole attacks, also known as packet-drop attacks, the adversary may arbitrarily drop PMU data packets as they traverse the network, resulting in unavailability of time-sensitive data for the various critical power system applications. The fundamental challenge is to distinguish packets dropped by the adversary from those that occur naturally due to network congestion.The proposed gray-hole attack detection technique is based on exploiting the inherent timing information in the GPS time-stamped PMU data packets and using the temporal trends of the latencies to classify the cause of

  8. Cyber Security and Habeas Data: The Latin American response to information security and data protection

    Directory of Open Access Journals (Sweden)

    Luisa Parraguez Kobek

    2016-11-01

    Full Text Available Habeas Data is not a commonly known concept, yet it is widely acknowledged in certain circles that deal with information security and data protection. Though it has been around for decades, it has recently gained momentum in Latin America. It is the legal notion that protects any and all information pertaining to the individual, from personal to financial, giving them the power to decide how and where such data can be used. At the same time, most Latin American countries have created laws that protect individuals if their  information is misused. This article examines the concept of Habeas Data from its inception to its current applications, and explains the different approaches and legislations passed in Latin American countries on data protection due to the rise of global cybercrime.

  9. Infotech. Cyber security. Health care learns to share scares and solutions.

    Science.gov (United States)

    Colias, Mike

    2004-05-01

    Health care information technology leaders and others are coming together to share scary experiences and develop best practices to guard against crippling computer viruses, scheming hackers and other cyber threats.

  10. 自主信息网络安全的概念与模型%The Concepts and Models of the Autonomic Cyber Security

    Institute of Scientific and Technical Information of China (English)

    沈苏彬; 毛燕琴; 黄维

    2012-01-01

    信息网络安全一直是信息技术领域的热门课题,自主联网是移动自组织网络和物联网研究领域的一个感兴趣的课题,自主信息网络安全则是未来网络不可回避的一项研究课题.在分析和定义了网络域、安全网络域和自主网络域等自主信息网络安全相关概念的基础上,运用统一建模语言(UML)构建了自主信息网络安全用例模型和自主信息网络安全数据模型;通过对模型的分析,论述了自主信息网络安全体系可以较为全面地解决无人工干预的网络应用领域的安全问题.%Cyber security is always a hot topic in the field of information technology. The autonomic networking is an interesting topic in the areas of mobile ad hoc network and the Internet of Things. The autonomic cyber security is an unavoidable research topic in the future network. Based on the analyzing and defining the concepts related with autonomic cyber security, such as network domain, security network domain and autonomic network domain, the use case model and data model of the autonomic cyber security are established by using the Unified Modeling Language (UML). Through the analysis the models,it is asserted that the autonomic cyber security system can resolve completely the security issues in the cyber applications with no human intervention.

  11. Cyber-Informed Engineering

    Energy Technology Data Exchange (ETDEWEB)

    Anderson, Robert S. [Idaho National Lab. (INL), Idaho Falls, ID (United States); Benjamin, Jacob [Idaho National Lab. (INL), Idaho Falls, ID (United States); Wright, Virginia L. [Idaho National Lab. (INL), Idaho Falls, ID (United States); Quinones, Luis [Idaho National Lab. (INL), Idaho Falls, ID (United States); Paz, Jonathan [Idaho National Lab. (INL), Idaho Falls, ID (United States)

    2017-03-01

    A continuing challenge for engineers who utilize digital systems is to understand the impact of cyber-attacks across the entire product and program lifecycle. This is a challenge due to the evolving nature of cyber threats that may impact the design, development, deployment, and operational phases of all systems. Cyber Informed Engineering is the process by which engineers are made aware of both how to use their engineering knowledge to positively impact the cyber security in the processes by which they architect and design components and the services and security of the components themselves.

  12. Cross-Sector Problems of Collaboration in Psychiatry

    DEFF Research Database (Denmark)

    Mikkelsen, Elisabeth Naima; Petersen, Anne; Lyager Kaae, Anne Marie;

    2013-01-01

    Introduction: Some mental health service users need support from both hospital-based and community-based services. Treatment requires well-functioning collaboration practices between different mental health organizations and professions. However, serious cross-sector problems of collaboration have......- and community-based services. Results: Staff and management experiencing cross-sector problems of collaboration point to ineffective coordination of services between systems and lack of mutual understanding of how systems other than the staffs’ own systems work. Solutions include specific procedural changes...... during service users’ admission to and discharge from hospital and during hospitalization and measures to increase cross-sector know­ledge about each system’s practices and methods. Conclusion: Improvement of cross-sector collaboration in psychiatry should take the form of a multi-faceted approach...

  13. Cyber Physical System Security and Related Measures%信息物理系统安全及相关措施

    Institute of Scientific and Technical Information of China (English)

    邢静宇; 张立臣

    2014-01-01

    开放互联的网络和信息与物理组件的交互使得信息物理系统面临着巨大的安全挑战,通过研究信息物理系统的安全目标和攻击模型,给出了分层的信息物理系统安全体系。信息物理系统安全主要是解决在恶意攻击下的加密技术,访问控制策略,弹性机制等问题,在介绍了信息物理系统安全方面的相关研究后,对信息物理系统安全体系中的关键技术--访问控制策略和隐私数据保护进行了深入的研究。%Cyber physical system is facing enormous security challenges because of open and interconnected network and the interaction between cyber components and physical components. There is a description of layered cyber physical system security hierarchy by studying the security objectives and attack model of cyber physical system. Cyber physical system security is mainly to solve the encryption technology, access control strategy and resilience schema, etc. After the introduction of the related research of cyber physical system, gives a depth research about the key technologies of cyber physical system which including access control strategy and privacy data protection.

  14. International Cooperation of Cyber Security and Its Value to China%国际网络安全合作及对中国的启示

    Institute of Scientific and Technical Information of China (English)

    丛培影

    2012-01-01

    In the context of globalization and with the wide application and rapid development of cyber information tech- nology, cyber information security has become a new focus of attention for many countries. Non-traditional security issues, such as cyber warfare, cyber terrorism and cyber crime, demand global cooperation due to their transnational character, com- plexity, and destructiveness. Cooperation of international cyber security will inevitably prevail. It has become a realistic prob- lem all countries are facing to tackle the challenges and difficulties in the cooperation. For China, a great power in information industry, to better participate in the cooperation of international cyber security will contribute positively to the protection of state interests and the construction of international regime.%在全球化的背景下,随着网络信息技术的广泛应用与快速发展,各国将对安全的关注转向了网络信息领域。网络战、网络恐怖主义、网络犯罪等非传统安全问题,因其跨国性、复合性、破坏性等特点,需要各国开展合作共同应对。国际网络安全合作已经成为一种必然趋势,应对合作中的挑战与难题成为各国面临的现实问题。如何有效使用网络外交方式维护本国国家利益、努力参与国际网络安全合作以及国际机制建设,对于作为信息大国的中国来说,具有积极的意义。

  15. Study on CDA Identification and Lesson Learned from the Result for the Cyber Security Regulation for Nuclear Facilities

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Si Won [Korea Institute of Nuclear Nonproliferation and Control, Daejeon (Korea, Republic of)

    2016-10-15

    It is the United States that shows the most enthusiastic preparation for the protection of NPPs from cyber threats. The United States has been trying to improve cybersecurity of NPPs since the 911 terror in 2001. In this process, the Nuclear Regulatory Commission (NRC) of the U.S. demanded the protection of the digital systems in NPPs to the licensee through 10 CFR 73.54. Moreover, RG 5.71 defined the assets, which should be protected from cyber threats, as Critical Digital Asset (CDA). Nuclear Energy Institute (NEI) provided the CDA identification guide through NEI 10-04. Meanwhile, International Electrotechnical Commission (IEC) presented the security program requirements of I and C computer in NPP, as well as category about systems and functions through IEC 61226 which is under revision. In Korea, Korea Institute of Nuclear Nonproliferation and Control (KINAC) established KINAC/RS-019, which is based upon NEI 10-04 and adapted to Korean circumstances. As time goes by, the digital systems in NPPs increase and the possibilities of cyber threats becomes greater. To protect these systems from cyber attacks, it is important to identify CDA, which is the target to be protect. For that, the standards to identify CDA were established, and according to the standards, the licensees could perform identification works and draw many CDAs. During the inspection processes for this, KINAC could find several problems and has been tried to look for the solutions. It is desired that such solutions will be actively used when identifying CDAs in NPPs, and also they should be applied to the systems which are added or changed during the whole facility life cycle.

  16. Addressing Human Factors Gaps in Cyber Defense

    Science.gov (United States)

    2016-09-23

    network attack graphs. Paper presented at the IEEE Workshop on Visualization for Computer Security , Minneapolis, MN. Roberts, J.C. (2007). State of...Cyber security is a high-ranking national priority that is only likely to grow as we become more dependent on cyber systems. From a research perspective...Cyber security , cyber operations, human factors 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT: SAR 18. NUMBER OF PAGES 5 19a

  17. Terra Defender Cyber-Physical Wargame

    Science.gov (United States)

    2017-04-01

    system, CPS, cyber -physical system, cyber security , simulation, wargame 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT UU 18...services, such as persuading a BLUE team member to degrade or destroy Blue Corporation security The actual strategy used by the RED team was a cyber ...

  18. Analysis of the UK Cyber Security Strategy:Landscape and Review%《英国赛博安全战略:回顾与展望》评析

    Institute of Scientific and Technical Information of China (English)

    由鲜举; 田素梅; 宋文文

    2013-01-01

    This paper assesses the opportunities and threats to UK cyber space, analyses the funding which UK government allocated to cyber security, proclaims the evolution and plans of cyber security, identifes the challenges that the government faces in implementing its cyber security strategy, and describes the evolving approach to cyber security.%  文章评估了英国赛博空间面临的机遇和威胁,对英国政府在赛博安全领域的投资进行了分析,揭示英国政府在赛博安全领域的最新进展和未来计划,针对英国政府可能面临的挑战提出了应对措施。

  19. Cyber Vigilance: The Human Factor

    Science.gov (United States)

    2016-10-21

    Cyber , cyber defense, vigilance, event rate, signal probability 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT: SAR 18. NUMBER OF PAGES...domain, we asked participants to perform a simulated cyber - security task, searching for attack signatures in Internet traffi c information . Consistent...the opportunity to effect action at a distance. In many contemporary societies, predicated upon the foundation of safe, secure , and effective networks

  20. 电力系统中信息物理安全风险传播机制%Propagation Mechanism of Cyber Physical Security Risks in Power Systems

    Institute of Scientific and Technical Information of China (English)

    叶夏明; 福拴; 尚金成; 何洋

    2015-01-01

    In a cyber-physical power system, cyber space risks can result in the failure of a power system. Thus, it is necessary to study the propagation mechanism of cyber physical security risks. In this paper, the basic propagation path of cyber physical security risks in a cyber-physical power system is first analyzed. Then, a risk propagation model of the cyber physical security is proposed based on the cellular automata and the characteristics of a cyber-physical power system. Finally, numerical simulations are carried out based on a 9-bus system in MATPOWER. Through these simulations, some important impact factors on the propagation of cyber physical security risks are discussed, such as the transfer probability and recovery rate. The impacts of the simulation time interval on simulation results are discussed as well.%在电力信息物理融合系统(cyber physical system,CPS)中,信息空间中的风险有可能传递到电力空间中并导致电力设备故障。为此,有必要研究信息安全风险在电力 CPS 中的传播机制。首先,阐述了电力 CPS 中信息安全风险跨空间传播的基本形式,指出智能终端设备是安全风险跨空间传播的必经之路;之后,根据电力 CPS 的特点和细胞自动机理论的特征,建立了电力 CPS 中信息物理安全风险的传播模型。最后,以 MATPOWER 中自带的三机九节点系统为例,通过仿真计算分析了风险跨空间传递概率、故障细胞治愈概率等因素对风险传播的影响,也讨论了仿真时间间隔对仿真结果的影响。

  1. Definitions of Cyber Terrorism

    NARCIS (Netherlands)

    Luiijf, H.A.M.

    2014-01-01

    The phrase cyber terror appeared for the first time in the mid-eighties. According to several sources, Barry C. Collin, a senior person research fellow of the Institute for Security and Intelligence in California, defined cyber terror at that time as “the convergence of cybernetics and terrorism”—an

  2. Definitions of Cyber Terrorism

    NARCIS (Netherlands)

    Luiijf, H.A.M.

    2014-01-01

    The phrase cyber terror appeared for the first time in the mid-eighties. According to several sources, Barry C. Collin, a senior person research fellow of the Institute for Security and Intelligence in California, defined cyber terror at that time as “the convergence of cybernetics and terrorism”—an

  3. CYBER DETERRENCE

    Science.gov (United States)

    2016-02-11

    directed.36 Protected systems operating on secure networks will weigh into the adversaries calculus of risk and cost of their actions versus this... calculus deterring them from attack. Our extended defense with forts and lookouts searching outside the perimeter providing current intelligence of any...Last accessed 30 January 2016). 51 Phil Stewart , U.S. Defense Chief says pre-emptive action possible over cyber threat, Oct 11, 2012, http

  4. Good governance and virtue in South Africa's cyber security policy implementation

    CSIR Research Space (South Africa)

    Burmeister, O

    2015-01-01

    Full Text Available Good governance from an ethical perspective in cyberdefence policy has been seen in terms of duty and consequentialism. Yet the negotiated view of virtue ethics can also address how nation states mitigate the risks of a cyber attack...

  5. Cyber-Security Holism: A System of Solutions for a Distributed Problem

    Science.gov (United States)

    2013-04-25

    Company, 1890), The Project Guttenberg eBook , 28. 13 Mahan, The Influence of Sea Power Upon History, 27. 14 Michael N. Schmitt, “’Attack’ as a Term...The Project Guttenberg eBook . Maurer, Tim. “Breaking Bad: How America’s Biggest Corporation Became Cyber Vigilantes.” Foreign Policy Magazine, 10

  6. 信息安全与赛博时代的到来%Information Security and the Advent of Cyber Era

    Institute of Scientific and Technical Information of China (English)

    王兴起; 谢宗晓

    2015-01-01

    梳理了信息安全的概念,分析了信息安全与隐私和保密的联系与区别。介绍了赛博时代的由来和特征,通过赛博恶霸、家庭自动化、数字媒介、赛博恐怖主义4个典型场景,说明赛博安全不但包括对信息资源的保护,而且包括其他资产,例如人本身,以期为信息安全研究者和实践者提供借鉴。%The paper sorts the concept of information security, analyzes connection and differences between information security and privacy and confidentiality. It introduces the origin and characters of cyber era, and uses 4 typical scenarios of cyber bully, home automation, digital media and cyber terrorism to illustrate that cyber security includes not only protection of information resource, but also protection of other assets, such as human-self, to provide reference for information security researchers and practitioners.

  7. 全球国家网络安全战略的变革%Changes in the national cyber-security strategies in a global perspective

    Institute of Scientific and Technical Information of China (English)

    吴关龙; 冯潇洒

    2015-01-01

    Recently,the emergence of the national cyber-security strategy reflects the mentality of"soft law governance".Though there is no internationally concerted definition on cyber-security,all the countries of the world regard it as the foundation of their national stability and economic develop-ment.Around 2010,the emergence of the new-generation cyber-security strategy predicted the new trend of the global cyber-security strategy,whose concepts,principles and strategies have become more flexible and whose achievements and experience can shed much light on China’s current imple-mentation of its own cyber-security strategy.%国家网络安全战略的兴起体现了网络安全“软法治理”的思路。尽管各国对于网络安全的概念尚未达成统一,但无一例外将网络安全作为国家稳定和经济发展的基础。在2010年前后,新一代网络安全战略预示了全球网络安全战略的变革态势,其理念、原则和策略变得更为丰富和弹性。我国目前正在积极部署自己的网络安全战略,全球国家网络安全战略变革中的成果和经验值得我国进行深入研判。

  8. Securing a cyber physical system in nuclear power plants using least square approximation and computational geometric approach

    Energy Technology Data Exchange (ETDEWEB)

    Gawand, Hemangi Laxman [Homi Bhabha National Institute, Computer Section, BARC, Mumbai (India); Bhattacharjee, A. K. [Reactor Control Division, BARC, Mumbai (India); Roy, Kallol [BHAVINI, Kalpakkam (India)

    2017-04-15

    In industrial plants such as nuclear power plants, system operations are performed by embedded controllers orchestrated by Supervisory Control and Data Acquisition (SCADA) software. A targeted attack (also termed a control aware attack) on the controller/SCADA software can lead a control system to operate in an unsafe mode or sometimes to complete shutdown of the plant. Such malware attacks can result in tremendous cost to the organization for recovery, cleanup, and maintenance activity. SCADA systems in operational mode generate huge log files. These files are useful in analysis of the plant behavior and diagnostics during an ongoing attack. However, they are bulky and difficult for manual inspection. Data mining techniques such as least squares approximation and computational methods can be used in the analysis of logs and to take proactive actions when required. This paper explores methodologies and algorithms so as to develop an effective monitoring scheme against control aware cyber attacks. It also explains soft computation techniques such as the computational geometric method and least squares approximation that can be effective in monitor design. This paper provides insights into diagnostic monitoring of its effectiveness by attack simulations on a four-tank model and using computation techniques to diagnose it. Cyber security of instrumentation and control systems used in nuclear power plants is of paramount importance and hence could be a possible target of such applications.

  9. Cyber-physical securi

    Directory of Open Access Journals (Sweden)

    Aditya Ashok

    2014-07-01

    Full Text Available Smart grid initiatives will produce a grid that is increasingly dependent on its cyber infrastructure in order to support the numerous power applications necessary to provide improved grid monitoring and control capabilities. However, recent findings documented in government reports and other literature, indicate the growing threat of cyber-based attacks in numbers and sophistication targeting the nation’s electric grid and other critical infrastructures. Specifically, this paper discusses cyber-physical security of Wide-Area Monitoring, Protection and Control (WAMPAC from a coordinated cyber attack perspective and introduces a game-theoretic approach to address the issue. Finally, the paper briefly describes how cyber-physical testbeds can be used to evaluate the security research and perform realistic attack-defense studies for smart grid type environments.

  10. Trickle effects of cross-sector social partnerships

    NARCIS (Netherlands)

    Kolk, A.; van Dolen, W.; Vock, M.

    2010-01-01

    Cross-sector social partnerships are often studied from a macro and meso perspective, also in an attempt to assess effectiveness and societal impact. This article pays specific attention to the micro perspective, i.e. individual interactions between and within organizations related to partnerships

  11. Collective Identity in Cross Sector Partnerships: A Research Brief

    NARCIS (Netherlands)

    N. Payandeh (Nasim)

    2013-01-01

    markdownabstractCross sector partnerships (CSPs) face the challenge of aligning diverse partners towards the same goal of social value co-creation, and in fact might conduce to conflict and inefficient use of resources. Through a study of a Dutch-Colombian partnership for the development of coffee g

  12. Collective Identity in Cross Sector Partnerships: A Research Brief

    NARCIS (Netherlands)

    N. Payandeh (Nasim)

    2013-01-01

    markdownabstractCross sector partnerships (CSPs) face the challenge of aligning diverse partners towards the same goal of social value co-creation, and in fact might conduce to conflict and inefficient use of resources. Through a study of a Dutch-Colombian partnership for the development of coffee

  13. Cyber Security:A Global Public Product?%网络安全:一种全球公共产品?

    Institute of Scientific and Technical Information of China (English)

    任琳

    2014-01-01

    The theoretical presumption of global governance for cyber security is that cyber security functions as a kind of global public product. However, this presumption is in face of several crises of political legitimacy in the current structure of cyberspace, affecting the ability of the worldwide governance in cyber security. Nevertheless, from a practical and long-term perspective, the low-cost, virtual, transnational and other features of cyberspace fundamentally ask for a global effort in cyber governance.%网络安全作为全球公共产品的基本属性,是国际社会对网络安全进行全球治理的核心理论预设。然而,在当前的网络空间格局里,这一预设却面临着多种合法性危机,这影响了在全球范围内对网络安全进行治理的能力。不过从现实和长远来看,网络的低成本性、虚拟性、跨国性等特点在根本上决定了网络治理需要全球性的努力。

  14. Cross-sectoral cancer care: views from patients and health care professionals regarding a personal electronic health record.

    Science.gov (United States)

    Baudendistel, I; Winkler, E C; Kamradt, M; Brophy, S; Längst, G; Eckrich, F; Heinze, O; Bergh, B; Szecsenyi, J; Ose, D

    2017-03-01

    Cross-sectoral cancer care is complex and involves collaboration from health care professionals (HCPs) across multiple sectors. However, when health information exchange (HIE) is not adequate, it results in impeded coordination and continuity of care. A web-based personal electronic health record (PEPA) under patients' control, providing access to personal health data across sectors, is being developed. Aim of this study was to explore perceived benefits and concerns. Using a qualitative approach, 10 focus groups were performed collecting views of three prospective user groups: patients with colorectal cancer (n = 12), physicians (n = 17) and other HCPs (n = 16). Representatives from different health sectors across the Rhine-Neckar region (Germany) participated. Data were audio- and videotaped, transcribed verbatim and thematically analysed. Our study shows that patients and HCPs expected a PEPA to enhance cross-sectoral availability of information, cross-sectoral cooperation and facilitate data management. Quality of cancer care was expected to be improved. Concerns were expressed in terms of data protection and data security. Concepts like a PEPA offer the chance to support HIE and avoid gaps of information in cross-sectoral cancer care. This may lead to improvements in coordination and continuity of care. Issues concerning data security and protection have to be addressed.

  15. Special Operations And Cyber Warfare

    Science.gov (United States)

    2016-12-01

    23/ cyber -command-gets-closer-to- full-deployment.aspx. Reveron, Derek S. Cyberspace and National Security : Threats, Opportunities , and Power in a...and criminal cyber organizations to conduct operations in the Ukraine and Crimea. The combination of cyber and SOF allowed Moscow the opportunity to...Military Operations Department, 2012, 9. 32 Derek S. Reveron, Cyberspace and National Security : Threats, Opportunities , and Power in a Virtual World

  16. Cyber awareness initiatives in South Africa: a national perspective

    CSIR Research Space (South Africa)

    Grobler, M

    2011-05-01

    Full Text Available Cyber space, cyber awareness and cyber security play an important role in the online experience of individuals, and need to be addressed accordingly. The paper looks at some of the current cyber security awareness initiatives in South Africa...

  17. AN ANTIFRAGILE APPROACH TO PREPARING FOR CYBER CONFLICT

    Science.gov (United States)

    2017-04-05

    cyber - attack destroys the U.S., and that every shock to our cyber systems makes us stronger, more capable, more secure , and more prepared. 20...Gregory C. Wilshusen, Information security : cyber threats and data breaches illustrate need for stronger controls across federal agencies, 9, accessed...Accessed April 4, 2017. http://www.politico.com/agenda/story/2015/12/pearl-harbor- cyber - security -war-000335. Jabbour, Dr. Kamal T., “50 Cyber

  18. Cyber crime and cyber warfare with international cyber collaboration for RSA – preparing communities

    CSIR Research Space (South Africa)

    Grobler, M

    2012-03-01

    Full Text Available South Africa does not have a coordinated approach in dealing with cyber security, and the various structures that have been established to deal with cyber security issues are inadequate to deal with the issues holistically. It is further noted...

  19. How to Effect Change Through Cross-sector Collaboration

    Science.gov (United States)

    Ellis, R.; Elinich, K.; Johnson, R.; Allen, L. B.; Crowley, K. J.; Bachrach, E.

    2014-12-01

    Collaboration is important for effecting large-scale changes, but it is difficult, time-consuming, and requires sustained effort on the part of all collaborating parties. Collaboration among organizations within a single sector (education, policy, or advocacy, for example) is easier than collaboration across sectors, where differences in language, expertise, expectations, and goals can be barriers to shared outcomes. Improving our collective response to climate change is an outcome shared across sectors, providing an opportunity for cross-sector collaboration. The Climate and Urban System Partnership is a network of cross-sector organizations in four cities, with each city forming a local Community of Practice, a group of learners coming together to try new things and learn from each other. We present findings from the first two years of this CCEP-II project, including results from learning sciences, evaluation, and design studies in Pittsburgh, New York, Washington, DC, and Philadelphia.

  20. Cross-sector cooperation in health-enhancing physical activity policymaking

    DEFF Research Database (Denmark)

    Hämäläinen, Riitta-Maija; Aro, Arja R.; Juel Lau, Cathrine

    2016-01-01

    and private actors for HEPA policymaking. Successful cross-sector cooperation required joint planning and evaluation, financial frameworks, mandates based on laws or agreed methods of work, communication lines, and valued processes of cross-sector cooperation. CONCLUSIONS: Cross-sector cooperation required......BACKGROUND: The cooperation of actors across policy fields and the need for cross-sector cooperation as well as recommendations on how to implement cross-sector cooperation have been addressed in many national and international policies that seek to solve complex issues within societies....... For such a purpose, the relevant governance structure between policy sectors is cross-sector cooperation. Therefore, cross-sector cooperation and its structures need to be better understood for improved implementation. This article reports on the governance structures and processes of cross-sector cooperation...

  1. Software Assurance in Acquisition: Mitigating Risks to the Enterprise. A Reference Guide for Security-Enhanced Software Acquisition and Outsourcing

    Science.gov (United States)

    2009-02-01

    infrastructure protection, homeland security, cyber crime and terrorism, cyber law, biomet - rics, supervisory control and data acquisition (SCADA) security...software assurance, critical infrastructure protection, homeland security, cyber crime and terrorism, cyber law, biomet - rics, supervisory control

  2. Mean-Field-Game Model for Botnet Defense in Cyber-Security

    Energy Technology Data Exchange (ETDEWEB)

    Kolokoltsov, V. N., E-mail: v.kolokoltsov@warwick.ac.uk [University of Warwick, Department of Statistics (United Kingdom); Bensoussan, A. [The University of Texas at Dallas, School of Management (United States)

    2016-12-15

    We initiate the analysis of the response of computer owners to various offers of defence systems against a cyber-hacker (for instance, a botnet attack), as a stochastic game of a large number of interacting agents. We introduce a simple mean-field game that models their behavior. It takes into account both the random process of the propagation of the infection (controlled by the botner herder) and the decision making process of customers. Its stationary version turns out to be exactly solvable (but not at all trivial) under an additional natural assumption that the execution time of the decisions of the customers (say, switch on or out the defence system) is much faster that the infection rates.

  3. On Bounded Rationality in Cyber-Physical Systems Security: Game-Theoretic Analysis with Application to Smart Grid Protection

    OpenAIRE

    Sanjab, Anibal; Saad, Walid

    2016-01-01

    In this paper, a general model for cyber-physical systems (CPSs), that captures the diffusion of attacks from the cyber layer to the physical system, is studied. In particular, a game-theoretic approach is proposed to analyze the interactions between one defender and one attacker over a CPS. In this game, the attacker launches cyber attacks on a number of cyber components of the CPS to maximize the potential harm to the physical system while the system operator chooses to defend a number of c...

  4. Design of cyber security awareness game utilizing a social media framework

    CSIR Research Space (South Africa)

    Labuschagne, WA

    2011-08-01

    Full Text Available real scenarios of information risks. This also raises the issue that information richness of different forms of multimedia can affect the effectiveness of online security awareness programs. Furthermore, they discuss three media that are pertinent... awareness creation. The richness of the media, together with the aimed level of awareness are important decisions in the design of a game to create security awareness. These decisions were considered in the design of the proposed security awareness game...

  5. Changing the face of cyber warfare with international cyber defense collaboration

    CSIR Research Space (South Africa)

    Grobler, M

    2011-03-01

    Full Text Available of the Government, as well as cyber security and cyber warfare acts and the command and control aspects thereof. The research presented is largely theoretical in nature, focusing on recent events in the public international domain....

  6. Barriers to Cyber Information Sharing

    Science.gov (United States)

    2014-12-01

    initial areas; telecommunications, energy, banking and finance, transportation , water systems and emergency services, both government and private. PDD 63...protection/how-retailers-can- boost-security-through-information-sharing.html. 183 Lech Janczewski and Andrew M. Colarik, Cyber Warfare and Cyber...iSight Partners. 2014. What Is Cyber Threat Intelligence and Why Do I Need It? Dallas: iSIGHT Partners, 2014. Janczewski, Lech and Andrew M

  7. 电力系统信息安全研究综述%Survey of cyber security research in power system

    Institute of Scientific and Technical Information of China (English)

    李文武; 游文霞; 王先培

    2011-01-01

    Cyber security research in power system is reviewed to prevent attacking and guarantee power information systems' safe operation.The characteristics and security threats of production control systems, management information systems, market operation systems and open interconnected power information system are analyzed, and research status at home and abroad related to cyber security in power system is surveyed from technology and management views.Based on the characteristics and security demands of power information systems, it suggests that the study on the cyber security and security management in production consol system and interconnected power information system should be focused in the future, and the concrete research direction is pointed out.%为提高电力信息系统防范攻击能力,实现安全运行,对电力系统信息安全研究进行综述.分析了生产控制系统、行政管理系统和市场营销系统三类电力信息系统以及开放互联电力信息系统的特点及面临的安全威胁,总结并评述了国内外对电力信息系统安全技术和安全管理的研究现状.根据电力信息系统的特点及安全要求,指出未来应重点对生产控制系统信息安全、互联电力信息系统信息安全和安全管理开展研究,并指出了具体研究方向.

  8. Analysing the Efficacy of Security Policies in Cyber-Physical Socio-Technical Systems

    NARCIS (Netherlands)

    Lenzini, Gabriele; Mauw, Sjouke; Ouchani, Samir; Barthe, Gilles; Markatos, Evangelos; Samarati, Pierangela

    2016-01-01

    A crucial question for an ICT organization wishing to improve its security is whether a security policy together with physical access controls protects from socio-technical threats. We study this question formally. We model the information flow defined by what the organization’s employees do (copy,

  9. A threat-vulnerability based risk analysis model for cyber physical system security

    CSIR Research Space (South Africa)

    Ledwaba, Lehlogonolo

    2017-01-01

    Full Text Available processes leaves CPSs vulnerable to security attacks. A threat-vulnerability based risk model is developed through a detailed analysis of CPS security attack structures and threats. The Stuxnet malware attack is used to test the viability of the proposed...

  10. Cyber Security Vulnerabilities During Long Term Evolution Power-Saving Discontinuous Reception Protocol

    Science.gov (United States)

    2014-06-01

    packet-switched architecture used in third generation ( 3G ) cellular technologies instead of the circuit-switched architecture used in second generation...EVOLUTION NETWORK ARCHITECTURE .....................................................................5 1. Radio Protocol Architecture ...31 1. Security Architecture .........................................................................31 2. Access Stratum Security

  11. Analysing the Efficacy of Security Policies in Cyber-Physical Socio-Technical Systems

    NARCIS (Netherlands)

    Lenzini, Gabriele; Mauw, Sjouke; Ouchani, Samir; Barthe, Gilles; Markatos, Evangelos; Samarati, Pierangela

    2016-01-01

    A crucial question for an ICT organization wishing to improve its security is whether a security policy together with physical access controls protects from socio-technical threats. We study this question formally. We model the information flow defined by what the organization’s employees do (copy,

  12. Coalition Game-Based Secure and Effective Clustering Communication in Vehicular Cyber-Physical System (VCPS)

    Science.gov (United States)

    Huo, Yan; Dong, Wei; Qian, Jin; Jing, Tao

    2017-01-01

    In this paper, we address the low efficiency of cluster-based communication for the crossroad scenario in the Vehicular Cyber-Physical System (VCPS), which is due to the overload of the cluster head resulting from a large number of transmission bandwidth requirements. After formulating the issue as a coalition formation game, a coalition-based clustering strategy is proposed, which could converge into a Nash-stable partition to accomplish the clustering formation process. In the proposed strategy, the coalition utility is formulated by the relative velocity, relative position and the bandwidth availability ratio of vehicles among the cluster. Employing the coalition utility, the vehicles are denoted as the nodes that make the decision whether to switch to a new coalition or stay in the current coalition. Based on this, we can make full use of the bandwidth provided by cluster head under the requirement of clustering stability. Nevertheless, there exist selfish nodes during the clustering formation, so as to intend to benefit from networks. This behavior may degrade the communication quality and even destroy the cluster. Thus, we also present a reputation-based incentive and penalty mechanism to stop the selfish nodes from entering clusters. Numerical simulation results show that our strategy, CG-SECC, takes on a better performance for the tradeoff between the stability and efficiency of clustering communication. Besides, a case study demonstrates that the proposed incentive and penalty mechanism can play an important role in discovering and removing malicious nodes. PMID:28264469

  13. Coalition Game-Based Secure and Effective Clustering Communication in Vehicular Cyber-Physical System (VCPS

    Directory of Open Access Journals (Sweden)

    Yan Huo

    2017-02-01

    Full Text Available In this paper, we address the low efficiency of cluster-based communication for the crossroad scenario in the Vehicular Cyber-Physical System (VCPS, which is due to the overload of the cluster head resulting from a large number of transmission bandwidth requirements. After formulating the issue as a coalition formation game, a coalition-based clustering strategy is proposed, which could converge into a Nash-stable partition to accomplish the clustering formation process. In the proposed strategy, the coalition utility is formulated by the relative velocity, relative position and the bandwidth availability ratio of vehicles among the cluster. Employing the coalition utility, the vehicles are denoted as the nodes that make the decision whether to switch to a new coalition or stay in the current coalition. Based on this, we can make full use of the bandwidth provided by cluster head under the requirement of clustering stability. Nevertheless, there exist selfish nodes duringtheclusteringformation,soastointendtobenefitfromnetworks. Thisbehaviormaydegrade the communication quality and even destroy the cluster. Thus, we also present a reputation-based incentive and penalty mechanism to stop the selfish nodes from entering clusters. Numerical simulation results show that our strategy, CG-SECC, takes on a better performance for the tradeoff between the stability and efficiency of clustering communication. Besides, a case study demonstrates that the proposed incentive and penalty mechanism can play an important role in discovering and removing malicious nodes.

  14. 网上银行欺诈风险和安全防范措施%The Fraud Risk and Security Countermeasures about cyber-banking

    Institute of Scientific and Technical Information of China (English)

    綦宁

    2013-01-01

    With the development of electronic banking business, the related fraud is more and more serious. This paper analyses the current situations of cyber-banking, introduces the fraud risk types which cyber-banking encounters, and gives the security countermeasures from the perspective of both the customers and banks.%随着网上银行业务的不断发展,欺诈情况越来越严重,一些违法者频繁的进行网上银行欺诈行为。文章分析了网上银行的发展现状,介绍了网上银行的欺诈风险种类,并且从银行和用户两个角度提出了安全防范措施。

  15. Depleted Trust in the Cyber Commons

    Science.gov (United States)

    2012-01-01

    Convention on Cyber­ crime —gained little traction. Nevertheless, the search for agreement has a long way to go. Homeland Security secretary Janet...computational systems for cyber events data and ontologies , and modeling the complexities of high-profile cyber incidents. Dr. Hurwitz’s work is funded by the...benefits which public trust enables. In concrete terms, individuals and organizations fear­ ing cyber crime , invasions of privacy, and so forth would

  16. Physical security and IT convergence: Managing the cyber-related risks.

    Science.gov (United States)

    McCreight, Tim; Leece, Doug

    The convergence of physical security devices into the corporate network is increasing, due to the perceived economic benefits and efficiencies gained from using one enterprise network. Bringing these two networks together is not without risk. Physical devices like closed circuit television cameras (CCTV), card access readers, and heating, ventilation and air conditioning controllers (HVAC) are typically not secured to the standards we expect for corporate computer networks. These devices can pose significant risks to the corporate network by creating new avenues to exploit vulnerabilities in less-than-secure implementations of physical systems. The ASIS Information Technology Security Council (ITSC) developed a white paper describing steps organisations can take to reduce the risks this convergence can pose, and presented these concepts at the 2015 ASIS/ISC2 Congress in Anaheim, California.(1) This paper expands upon the six characteristics described by ITSC, and provides business continuity planners with information on how to apply these recommendations to physical security devices that use the corporate network.

  17. 信息物理系统安全威胁与措施%Security threats and measures for the cyber-physical systems

    Institute of Scientific and Technical Information of China (English)

    李钊; 彭勇; 谢丰; 高洋; 陈冬青; 徐国爱

    2012-01-01

    Governments,companies and research institutes are pushing the research and development of cyber-physical systems(CPS).However,the development of cyber-physical systems is constrained by security and privacy threats.This paper summarizes security threats to cyber-physical systems as a theoretical reference for the study of cyber-physical systems and to provide useful security measures.The architecture of the cyber-physical systems is used to classify threats for the perception-execution layer,transport layer and application-control layer.The perception-execution layer threats include security threats for nodes such as sensors and actuators.Transport layer threats include data leakage or damage and security issues during massive data integration.Application-control layer threats include the loss of user privacy,incorrect access control policies and inadequate security standards.Finally,this paper gives security measures and recommendations for all types of security threats.%随着信息物理系统(cyber-physical systems,CPS)理念的提出,各国政府、企业和科研机构纷纷加入信息物理系统的研究和建设工作。信息物理系统的建设与发展必然受到信息物理系统安全和隐私问题的制约,为理清信息物理系统目前存在的安全威胁、为信息物理系统安全与隐私保护提供理论参考,本文总结了信息物理系统面临的安全威胁,提出了相应的安全措施。根据信息物理系统目前主流体系架构,分别从感知执行层、数据传输层和应用控制层对安全威胁进行研究。感知执行层安全威胁研究主要针对传感器、执行器等节点的安全问题。数据传输层安全威胁研究主要针对数据泄露或破坏以及海量数据融合等安全问题。应用控制层安全威胁研究主要针对用户隐私泄露、访问控制措施设置不当与安全标准不完善等问题。最后,针对各类安全威胁给出了相应的安全措施及建议。

  18. Moving Target Techniques: Cyber Resilience throught Randomization, Diversity, and Dynamism

    Science.gov (United States)

    2017-03-03

    cyber resilience that attempts to rebalance the cyber landscape is known as cyber moving target (MT) (or just moving target) techniques. Moving target...needed in the area of evaluation and assessment of MT techniques. For cyber security to transition from a craft to a science, it is important to have...security and can be used to evaluate the absolute security offered by an MT technique and a comparative assessment of it against other techniques

  19. 美俄网络安全基础概念界定的解读%Interpreting the Definition of Basic Concepts of Russia-US Cyber Security

    Institute of Scientific and Technical Information of China (English)

    2013-01-01

      当前,网络安全的重要性日益凸显。作为国际舞台上的关键角色,美国认为需要展开国际合作,特别是大国之间的合作,以建构网络安全的国际规范来确保网络的安全及效能。美国和俄罗斯的相关机构以“第二轨道外交”的方式对有关网络安全的20个基础性概念进行了界定及阐释,并将其视作两国间此类合作的有效开端。然而,由于美、俄在对网络安全的本质理解上存在分歧,因此在对基础概念的界定上也存在差异。对其中若干概念进行语义和内容的对比、分析与解读,有助于对网络安全国际规范的建构做出有益的推测。%Cyber security has become growingly important nowadays. Being the critical player in the international arena, the United States holds that it is necessary to have international cooperation, especially between big powers of the world, on formulating internationally accepted norms to ensure the security and efficiency of cyberspace. Through the "Track Two" diplomacy, the research institutes from both the U.S and Russia have defined as well as paraphrased a total of 20 critical terminologies relevant to cyber security. This endeavor has been regarded as a "good start" of such cooperation. Due to the differences in two sides' distinct interpretation about cyber security, however, the definitions in America and Russia have demonstrated their disagreement to a certain extent. Analyses of some of the definitions from the translation and comparative linguistic perspective will be helpful to make predictions about where the cultivation of international cyber security norms will head in the future.

  20. Mediating Cyber and Physical Threat Propagation in Security Smart Grid Architectures

    Energy Technology Data Exchange (ETDEWEB)

    Neuman, Clifford; Tan, Kymie

    2011-10-01

    The power grid is a federated system. Regions of the system are controlled by different organizations and security of the grid is imposed from above through regulation of the security techniques used by the federants. This approach will be less effective as we move to a smart grid, where control of some elements of the grid rests in the customer’s home through technologies that enable remote access to appliances. These regions of the smart grid are less trusted, yet they interact in various ways with other parts of the grid. This paper demonstrates threat propagation in the smart grid from such regions, and discusses architectural approaches to mediating the impact of such flows.

  1. Summary of the Control System Cyber-Security (CS)2/HEP Workshop

    CERN Document Server

    Lüders, S

    2007-01-01

    Over the last few years modern accelerator and experiment control systems have increasingly been based on commercial-off-the-shelf products (VME crates, PLCs, SCADA systems, etc.), on Windows or Linux PCs, and on communication infrastructures using Ethernet and TCP/IP. Despite the benefits coming with this (r)evolution, new vulnerabilities are inherited, too: Worms and viruses spread within seconds via the Ethernet cable, and attackers are becoming interested in control systems. Unfortunately, control PCs cannot be patched as fast as office PCs. Even worse, vulnerability scans at CERN using standard IT tools have shown that commercial automation systems lack fundamental security precautions: Some systems crashed during the scan, others could easily be stopped or their process data be altered. The (CS)2/HEP workshop held the weekend before ICALEPCS2007 was intended to present, share, and discuss countermeasures deployed in HEP laboratories in order to secure control systems. This presentation will give a summa...

  2. Leveraging Data Provenance to Enhance Cyber Resilience

    Science.gov (United States)

    2016-11-01

    1 Leveraging Data Provenance to Enhance Cyber Resilience Thomas Moyer∗, Patrick Cable∗, Karishma Chadha∗, Robert Cunningham∗, Nabil Schear∗, Warren...emphasize this. It is untenable to assume that a system even with designed-in security can successfully repel all attacks. The next generation of secure ...systems must also be able to withstand successful attacks using cyber resilience. Cyber re- silience broadly encompasses many areas including traditional

  3. Effects-Based Operations in the Cyber Domain

    Science.gov (United States)

    2017-05-03

    prominent cyber security firm, is responsible for over 262 compromises (2016). When looking at Russia’s naval capabilities, they also currently have...only one aircraft carrier (GloblSecurity.org, n.d.). However, F- Secure , a cyber security firm, accredited at least seventeen compromises to Russia...use of the Stuxnet worm, which Kim Zetter, a prominent cyber security researcher for Wired Magazine, attributed to the United States as a part of a

  4. Summary of The 3rd Control System Cyber-Security (CS)2/HEP Workshop

    CERN Document Server

    Lüders, S

    2011-01-01

    Over the last decade modern accelerator and experiment control systems have increasingly been based on commercial-off-the-shelf products (VME crates, programmable logic controllers (PLCs), supervisory control and data acquisition (SCADA) systems, etc.), on Windows or Linux PCs, and on communication infrastructures using Ethernet and TCP/IP. Despite the benefits coming with this (r)evolution, new vulnerabilities are inherited, too: Worms and viruses spread within seconds via the Ethernet cable, and attackers are becoming interested in control systems. The Stuxnet worm of 2010 against a particular Siemens PLC is a unique example for a sophisticated attack against control systems [1]. Unfortunately, control PCs cannot be patched as fast as office PCs. Even worse, vulnerability scans at CERN using standard IT tools have shown that commercial automation systems lack fundamental security precautions: Some systems crashed during the scan, others could easily be stopped or their process data being ...

  5. Cyber warfare building the scientific foundation

    CERN Document Server

    Jajodia, Sushil; Subrahmanian, VS; Swarup, Vipin; Wang, Cliff

    2015-01-01

    This book features a wide spectrum of the latest computer science research relating to cyber warfare, including military and policy dimensions. It is the first book to explore the scientific foundation of cyber warfare and features research from the areas of artificial intelligence, game theory, programming languages, graph theory and more. The high-level approach and emphasis on scientific rigor provides insights on ways to improve cyber warfare defense worldwide. Cyber Warfare: Building the Scientific Foundation targets researchers and practitioners working in cyber security, especially gove

  6. Sailing the Cyber Sea

    Science.gov (United States)

    2012-04-01

    years, the Internet 4 years, and the iPod 3 years, while Facebook added 200 million users in less than 1 year. And finally, if Facebook were a... Apple ] gets an iPhone. It’s not an acceptable trade.” New Thinking In the context of security, unleashing the power of the Cyber Sea has changed

  7. Security and Network Operations [video

    OpenAIRE

    2012-01-01

    Senior Security Engineer, Matthew Myrick discusses the current cyber threats that we are all facing, the five W's (who, what, when, where, and how) of cyber security, past and present cyber-attack trends, and ways you can help protect yourself and your enterprise from cyber-attack.

  8. Security and Network Operations [video

    OpenAIRE

    Myrick, Matthew

    2012-01-01

    Senior Security Engineer, Matthew Myrick discusses the current cyber threats that we are all facing, the five W's (who, what, when, where, and how) of cyber security, past and present cyber-attack trends, and ways you can help protect yourself and your enterprise from cyber-attack.

  9. An Analysis of U.S.Cyber Security Organization Structure%美国网络安全组织架构探析

    Institute of Scientific and Technical Information of China (English)

    张莉; 黄日涵

    2014-01-01

    美国高度重视网络安全组织架构建设,自克林顿政府开始便开始了相关探索。经过多年发展,目前美国网络安全组织架构已相对完善,主要由总统、政策执行机构和私营企业三个层面组成。在这个组织架构中,政策执行机构又包括协调部门、政府部门、情报部门、军事部门这四大机构体系。通过这种组织架构,美国既统筹了国内国土安全和国际军事安全,又协调了各相关部门在维护网络安全过程中的角色定位,较易集中资源、形成合力,对于推动本国网络安全力量建设大有裨益,值得我国借鉴。%The United States attaches great importance to the construction of cyber security organization structure. It began to explore it since the Clinton administration.After years of development,the current U.S.cyber security organization structure is composed of three levels which are the president,policy enforcement agencies and the private sector.Among them,policy enforcement agencies include coordination agencies,government departments,intelligence agencies,and the military system.Through this organization structure,the United States can not only co-ordinate domestic homeland security and international military security,but also definite the role of every relevant department,which makes it easier to focus resources on the construction of a highly active cyber security organization structure.

  10. Enhancing the Impact of Cross-Sector Partnerships: Four Impact Loops for Channeling Partnership Studies

    NARCIS (Netherlands)

    R.J.M. van Tulder (Rob); M.M. Seitanidi (M. May); A. Crane (Andrew); S. Brammer (Stephen)

    2016-01-01

    textabstractThis paper addresses the topic of this special symposium issue: how to enhance the impact of cross-sector partnerships. The paper takes stock of two related discussions: the discourse in cross-sector partnership research on how to assess impact and the discourse in impact assessment rese

  11. The Cyber-Physical Attacker

    DEFF Research Database (Denmark)

    Vigo, Roberto

    2012-01-01

    The world of Cyber-Physical Systems ranges from industrial to national interest applications. Even though these systems are pervading our everyday life, we are still far from fully understanding their security properties. Devising a suitable attacker model is a crucial element when studying...... the security properties of CPSs, as a system cannot be secured without defining the threats it is subject to. In this work an attacker scenario is presented which addresses the peculiarities of a cyber-physical adversary, and we discuss how this scenario relates to other attacker models popular in the security...

  12. Cyber policy in China

    CERN Document Server

    Austin, Greg

    2014-01-01

    Few doubt that China wants to be a major economic and military power on the world stage. To achieve this ambitious goal, however, the PRC leadership knows that China must first become an advanced information-based society. But does China have what it takes to get there? Are its leaders prepared to make the tough choices required to secure China's cyber future? Or is there a fundamental mismatch between China's cyber ambitions and the policies pursued by the CCP until now? This book offers the first comprehensive analysis of China's information society. It explores the key practic

  13. Cross-sector cooperation in health-enhancing physical activity policymaking

    DEFF Research Database (Denmark)

    Hämäläinen, Riitta-Maija; Aro, Arja R; Lau, Cathrine Juel;

    2016-01-01

    BACKGROUND: The cooperation of actors across policy fields and the need for cross-sector cooperation as well as recommendations on how to implement cross-sector cooperation have been addressed in many national and international policies that seek to solve complex issues within societies. For such......BACKGROUND: The cooperation of actors across policy fields and the need for cross-sector cooperation as well as recommendations on how to implement cross-sector cooperation have been addressed in many national and international policies that seek to solve complex issues within societies...... in health-enhancing physical activity (HEPA) policies in six European Union (EU) member states. METHODS: Qualitative content analysis of HEPA policies and semi-structured interviews with key policymakers in six European countries. RESULTS: Cross-sector cooperation varied between EU member states within HEPA...

  14. Design of a cyber security awareness campaign for internet Cafés users in rural areas

    CSIR Research Space (South Africa)

    Labuschagne, WA

    2011-05-01

    Full Text Available Africa may have the lowest number of Internet users in the world, but it also has the highest growth rate and the number of users is steadily growing. A majority of the African population is still excluded from global cyber networks and thus have...

  15. 当前美国网络空间战略变化对我国家安全的影响及思考%The Influence of America's Cyber Space Strategy Change on China' s Security

    Institute of Scientific and Technical Information of China (English)

    马振超

    2012-01-01

    当今美国网络空间战略在全方位维护国家网络安全的基础上,更注重积极抢占国际网络空间控制权。以新媒体为代表的"网络外交"成为美国实现政治目标的新手段。美国企图以"互联网自由"为旗帜,为其主导网络空间鸣锣开道。由于美国在相当程度上掌握着网络技术的制高点,控制着网络的连接权、话语权,因此在网络空间具有先天优势。当前,在对华网络战略方面,美国也已经由单纯的"网络渗透"转向利用网络空间的主导权和垄断网络资源的优势,对中国进行全方位的网络"侵略"、颠覆和破坏,给中国维护国家安全带来前所未有的冲击和挑战,中国应高度重视美国网络空间战略的动向和变化,妥谋对策。%America's cyber space strategy is to maintain its national cyber security and gain control over international cyber space. " Cyber diplomacy" in the form of new media has become a fresh tool for political purposes, and America has an advantage over others in cyber space because of its unmatched cyber technology, cyber access control and discourse power. Its China strategy has shifted from "cyber saturation" to all-round cyber "intrusion and sabotage", thus posing a tremendous threat to China' s security. China, therefore, should be alert on America's cyber strategy and prepare countermeasures.

  16. Cyber Defense Exercises and their Role in Cyber Warfare

    Directory of Open Access Journals (Sweden)

    Bogdan Alexandru Bratosin

    2014-06-01

    Full Text Available The threat of cyber-attacks is increasing with the access to PC’s and Internet of a larger number of people around the world. Although the Internet provides a large number of advantages, it can also be used as a cyber-weapon in order to serve the interests of counties, political and economic groups or individual. The cyber-attacks of today are capable to disable the manufacturing of nuclear bombs of a country. Thus, there is an increasing demand for IT security specialists. Cyber-defense exercises (CDX are by far the most complex and up to date methods of training the next generation of IT security specialists.

  17. Conflict in Cyber Space

    DEFF Research Database (Denmark)

    Friis, Karsten; Ringsmose, Jens

    hostility from theoretical, political, strategic and legal perspectives. In doing so, and in contrast to current literature, cyber-security is analysed through a multidimensional lens, as opposed to being treated solely as a military or criminal issues, for example. The individual chapters map out...... the different scholarly and political positions associated with various key aspects of cyber conflict and seek to answer the following questions: do existing theories provide sufficient answers to the current challenges posed by conflict in cyberspace, and, if not, could alternative approaches be developed......?; how do states and non-state actors make use of cyber-weapons when pursuing strategic and political aims?; and, how does the advent of conflict in cyberspace challenge our established legal framework? By asking important strategic questions on the theoretical, strategic, ethical and legal implications...

  18. Cyber security risk management: public policy implications of correlated risk, imperfect ability to prove loss, and observability of self-protection.

    Science.gov (United States)

    Oğüt, Hulisi; Raghunathan, Srinivasan; Menon, Nirup

    2011-03-01

    The correlated nature of security breach risks, the imperfect ability to prove loss from a breach to an insurer, and the inability of insurers and external agents to observe firms' self-protection efforts have posed significant challenges to cyber security risk management. Our analysis finds that a firm invests less than the social optimal levels in self-protection and in insurance when risks are correlated and the ability to prove loss is imperfect. We find that the appropriate social intervention policy to induce a firm to invest at socially optimal levels depends on whether insurers can verify a firm's self-protection levels. If self-protection of a firm is observable to an insurer so that it can design a contract that is contingent on the self-protection level, then self-protection and insurance behave as complements. In this case, a social planner can induce a firm to choose the socially optimal self-protection and insurance levels by offering a subsidy on self-protection. We also find that providing a subsidy on insurance does not provide a similar inducement to a firm. If self-protection of a firm is not observable to an insurer, then self-protection and insurance behave as substitutes. In this case, a social planner should tax the insurance premium to achieve socially optimal results. The results of our analysis hold regardless of whether the insurance market is perfectly competitive or not, implying that solely reforming the currently imperfect insurance market is insufficient to achieve the efficient outcome in cyber security risk management.

  19. Cyber essentials a pocket guide

    CERN Document Server

    Calder, Alan

    2014-01-01

    Every year, thousands of computer systems in the UK are compromised. The majority fall victim to easily preventable cyber attacks, carried out with tools which are freely available on the Internet.   Cyber Essentials is the UK Government's reaction to the proliferation of these attacks. It requires that organisations put basic security measures in place, enabling them to reliably counter the most common tactics employed by cyber criminals. From 1 October 2014, all suppliers bidding for a range of government ICT contracts - in particu

  20. 潜艇信息系统信息安全与纵深防护策略研究%Research of Cyber Security and Defense in Depth Strategy for Information System in Submarine

    Institute of Scientific and Technical Information of China (English)

    殷虎

    2016-01-01

    With the development of the network centric warfare, the importance of cyber security study for modern submarine system becomes increasingly prominent. Firstly, the background and study of cyber security issue are analyzed and summarized. Secondly, requirement and property definitions of security for submarine system are studied. Finally, the cyber security framework of submarine is explored, and a general cyber security and protection architecture for submarine system is proposed based on defense⁃in⁃depth concept, which is hoped to provide the basis to solve security defects, establish security and protection architecture, assist⁃system maintenance and ensure the security of the system.%随着网络中心战的发展,信息安全问题在现代潜艇系统中的重要性日益凸显。首先分析潜艇信息安全问题的背景、总结其研究现状,然后研究了潜艇信息安全需求及属性定义,探讨了潜艇信息系统信息安全防护整体框架,在此基础上提出了一种综合静态安全防护和动态运行安全防护的潜艇信息系统信息安全纵深防护体系结构。以期为解决潜艇系统设计中的安全缺陷、建立潜艇信息安全防护体系,辅助系统维护、保障系统安全提供基础。

  1. Active Cyber Defense Dynamics Exhibiting Rich Phenomena

    CERN Document Server

    Zheng, Ren; Xu, Shouhuai

    2016-01-01

    The Internet is a man-made complex system under constant attacks (e.g., Advanced Persistent Threats and malwares). It is therefore important to understand the phenomena that can be induced by the interaction between cyber attacks and cyber defenses. In this paper, we explore the rich phenomena that can be exhibited when the defender employs active defense to combat cyber attacks. To the best of our knowledge, this is the first study that shows that {\\em active cyber defense dynamics} (or more generally, {\\em cybersecurity dynamics}) can exhibit the bifurcation and chaos phenomena. This has profound implications for cyber security measurement and prediction: (i) it is infeasible (or even impossible) to accurately measure and predict cyber security under certain circumstances; (ii) the defender must manipulate the dynamics to avoid such {\\em unmanageable situations} in real-life defense operations.

  2. Securing Cyber Acquisitions

    Science.gov (United States)

    2015-02-01

    SCADA ) systems as well as other types of in- dustrial control systems. Inherent vulnerabilities, and therefore risks, are associated with SCADA ...systems that have saturated the infrastructure management industry throughout the world. Although SCADA systems are prevalent, industry profession- als...knowledge of those tasked with managing the systems. The predominant point of view for many years appears to have been that SCADA systems can be ignored

  3. Cyber security policy guidebook

    CERN Document Server

    Bayuk, nifer L; Rohmeyer, l; Sachs, cus; Schmidt, frey; Weiss, eph

    2012-01-01

    This book is a taxonomy and thesaurus of current cybersecurity policy issues, including a thorough description of each issue and a corresponding list of pros and cons with respect to identified stances on each issue. It documents policy alternatives for the sake of clarity with respect to policy alone, and dives into organizational implementation issues. Without using technical jargon, the book emphasizes the importance of critical and analytical thinking when making policy decisions.  It also equips the reader with descriptions of the impact of specific policy ch

  4. Cyber War: The Next Frontier for NATO

    Science.gov (United States)

    2015-03-01

    cyber-attacks as a way to advance their agenda. Common examples of cyber- attacks include computer viruses, worms , malware, and distributed denial of...take advantage of security holes and cause damage to computer systems, steal financial data, or acquire sensitive secrets. As technology becomes

  5. The Legal Framework of Cyber Operations

    NARCIS (Netherlands)

    P. Ducheine

    2013-01-01

    The presentation focusses on the legal, strategic and operational framework for (military) cyber operations. Themes addressed cover: the scope of cyber security and the role of government (in general) and the armed forces (in particular); legitimacy as a principle of the rule of law and its relevanc

  6. Deception used for Cyber Defense of Control Systems

    Energy Technology Data Exchange (ETDEWEB)

    Wayne F. Boyer; Miles A. McQueen

    2009-05-01

    Control system cyber security defense mechanisms may employ deception to make it more difficult for attackers to plan and execute successful attacks. These deceptive defense mechanisms are organized and initially explored according to a specific deception taxonomy and the seven abstract dimensions of security previously proposed as a framework for the cyber security of control systems.

  7. Cyber Exercise Playbook

    Science.gov (United States)

    2014-11-01

    all parties benefit from the exercise experience. Exercises are not performed to make an organization look bad; instead, they help to train and...techniques it utilized to attack a security posture. All parties benefit from an exercise that underscores the RT motto: ”we win, we lose. 23 Appendix...Jason Kick November 2014 Cyber Exercise Playbook The views, opinions and/or findings contained in this report are those of The

  8. Cyber Friendly Fire

    Energy Technology Data Exchange (ETDEWEB)

    Greitzer, Frank L.; Carroll, Thomas E.; Roberts, Adam D.

    2011-09-01

    Cyber friendly fire (FF) is a new concept that has been brought to the attention of Department of Defense (DoD) stakeholders through two workshops that were planned and conducted by the Air Force Research Laboratory (AFRL) and research conducted for AFRL by the Pacific Northwest National Laboratory. With this previous work in mind, we offer a definition of cyber FF as intentional offensive or defensive cyber/electronic actions intended to protect cyber systems against enemy forces or to attack enemy cyber systems, which unintentionally harms the mission effectiveness of friendly or neutral forces. Just as with combat friendly fire, a fundamental need in avoiding cyber FF is to maintain situation awareness (SA). We suggest that cyber SA concerns knowledge of a system's topology (connectedness and relationships of the nodes in a system), and critical knowledge elements such as the characteristics and vulnerabilities of the components that comprise the system (and that populate the nodes), the nature of the activities or work performed, and the available defensive (and offensive) countermeasures that may be applied to thwart network attacks. A training implication is to raise awareness and understanding of these critical knowledge units; an approach to decision aids and/or visualizations is to focus on supporting these critical knowledge units. To study cyber FF, we developed an unclassified security test range comprising a combination of virtual and physical devices that present a closed network for testing, simulation, and evaluation. This network offers services found on a production network without the associated costs of a real production network. Containing enough detail to appear realistic, this virtual and physical environment can be customized to represent different configurations. For our purposes, the test range was configured to appear as an Internet-connected Managed Service Provider (MSP) offering specialized web applications to the general public

  9. A Review of Cyber Security Research in Social Science Field of Mainland China%国内社会科学领域的网络安全研究综述

    Institute of Scientific and Technical Information of China (English)

    安静

    2016-01-01

    [目的/意义]网络安全并不是一个新词汇,早在互联网产生之初就有相关的技术研究,但运用社会科学方法对其研究则是一个重要的学术转向,有必要回顾这一历程,并梳理、总结研究现状。[方法/过程]通过对中国期刊全文数据库CNKI的文献检索,统计、对比了历年来全文、篇名、摘要、关键词中含有“网络安全”“网络空间安全”的文献数量。[结果/结论]分析了国内网络安全研究成果快速增长的趋势及背后的推动原因。就社会科学领域的网络安全研究而言,目前网络政治、网络治理、网络战略是研究的中心,但网络安全是一个常论常新的问题,相关研究亦需要审时度势、及时跟进。通过对文献的梳理有利于把握学术研究方向,也为将来社会科学领域的网络安全学科建设提供参考。%Purpose/Significance] Cyber security is not a new concept. As early as the beginning of the Internet, computer science field has already witnessed related research. But research of cyber security from the social science perspective is a new turn, and it is necessary to take a review and make a summary. [ Method/Process] In order to reveal the development of this study, we check and analyze the rel-evant literatures from the CNKI database. [ Result/Conclusion] It's very clear to notice the significant growth trend of literature statistics since 2000. There are three main topics of cyber security in social science study: cyber politics, cyber governance and cyber strategies. With the increasingly close connections of cyber security and national security, and cyber security and international politics, related re-search will gradually increase. The review is good for grasping the direction of academic research, and is also significant for the future de-velopment of cyber security discipline in the field of social science.

  10. Cyber Forensics Ontology for Cyber Criminal Investigation

    Science.gov (United States)

    Park, Heum; Cho, Sunho; Kwon, Hyuk-Chul

    We developed Cyber Forensics Ontology for the criminal investigation in cyber space. Cyber crime is classified into cyber terror and general cyber crime, and those two classes are connected with each other. The investigation of cyber terror requires high technology, system environment and experts, and general cyber crime is connected with general crime by evidence from digital data and cyber space. Accordingly, it is difficult to determine relational crime types and collect evidence. Therefore, we considered the classifications of cyber crime, the collection of evidence in cyber space and the application of laws to cyber crime. In order to efficiently investigate cyber crime, it is necessary to integrate those concepts for each cyber crime-case. Thus, we constructed a cyber forensics domain ontology for criminal investigation in cyber space, according to the categories of cyber crime, laws, evidence and information of criminals. This ontology can be used in the process of investigating of cyber crime-cases, and for data mining of cyber crime; classification, clustering, association and detection of crime types, crime cases, evidences and criminals.

  11. Using agility to combat cyber attacks.

    Science.gov (United States)

    Anderson, Kerry

    2017-06-01

    Some incident response practitioners feel that they have been locked in a battle with cyber criminals since the popular adoption of the internet. Initially, organisations made great inroads in preventing and containing cyber attacks. In the last few years, however, cyber criminals have become adept at eluding defence security technologies and rapidly modifying their exploit strategies for financial or political gains. Similar to changes in military combat tactics, cyber criminals utilise distributed attack cells, real-time communications, and rapidly mutating exploits to minimise the potential for detection. Cyber criminals have changed their attack paradigm. This paper describes a new incident response paradigm aimed at combating the new model of cyber attacks with an emphasis on agility to increase the organisation's ability to respond rapidly to these new challenges.

  12. Suggestion of a Framework to Analyze Failure Modes and Effect of Cyber Attacks in NPP

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Chan Young; Seong, Poong Hyun [KAIST, Daejeon (Korea, Republic of)

    2016-05-15

    The cyber security issue on NPP is inevitable issue. Unlike general cyber security, cyber-physical system like NPP can induce serious consequences such as core damage by cyber-attack. So in this paper, to find how hacker can attack the NPP, (1) PSA results were utilized to find the relationship between physical system and cyber-attack and (2) vulnerabilities on digital control systems were investigated to find how hacker can implement the possible attack. It is expected that these steps are utilized when establishing penetration test plans or cyber security drill plans.

  13. Secure Threat Information Exchange across the Internet of Things for Cyber Defense in a Fog Computing Environment

    OpenAIRE

    Mihai-Gabriel IONITA; Victor-Valeriu PATRICIU

    2016-01-01

    Threat information exchange is a critical part of any security system. Decisions regarding security are taken with more confidence and with more results when the whole security context is known. The fog computing paradigm enhances the use cases of the already used cloud computing systems by bringing all the needed resources to the end-users towards the edge of the network. While fog decentralizes the cloud, it is very important to correlate security events which happen in branch offices aroun...

  14. Cross-sector Service Provision in Health and Social Care: An Umbrella Review

    Directory of Open Access Journals (Sweden)

    Shannon Winters

    2016-04-01

    Full Text Available Introduction: Meeting the complex health needs of people often requires interaction among numerous different sectors. No one service can adequately respond to the diverse care needs of consumers. Providers working more effectively together is frequently touted as the solution. Cross-sector service provision is defined as independent, yet interconnected sectors working together to better meet the needs of consumers and improve the quality and effectiveness of service provision. Cross-sector service provision is expected, yet much remains unknown about how it is conceptualised or its impact on health status. This umbrella review aims to clarify the critical attributes that shape cross-sector service provision by presenting the current state of the literature and building on the findings of the 2004 review by Sloper. Methods: Literature related to cross-sector service provision is immense, which poses a challenge for decision makers wishing to make evidence-informed decisions. An umbrella review was conducted to articulate the overall state of cross-sector service provision literature and examine the evidence to allow for the discovery of consistencies and discrepancies across the published knowledge base. Findings: Sixteen reviews met the inclusion criteria. Seven themes emerged: Focusing on the consumer, developing a shared vision of care, leadership involvement, service provision across the boundaries, adequately resourcing the arrangement, developing novel arrangements or aligning with existing relationships, and strengthening connections between sectors. Future research from a cross-organisational, rather than individual provider, perspective is needed to better understand what shapes cross-sector service provision at the boundaries. Conclusion: Findings aligned closely with the work done by Sloper and raise red flags related to reinventing what is already known. Future researchers should look to explore novel areas rather than looking into

  15. 信息物理融合系统安全问题研究综述%Research Survey on Security Issues in Cyber-Physical Systems

    Institute of Scientific and Technical Information of China (English)

    彭昆仑; 彭伟; 王东霞; 邢倩倩

    2016-01-01

    A cyber-physical system (CPS) is a complex system which integrates information systems with physical systems. It realizes the function of real-time sensing and dynamical control of the physical world by environment perception and the integration of computing, communication and control process. CPS is viewed as the next information revolution after the Internet and security problem is one of the key issues affecting the wide application of CPS. This paper introduces the requirements and goals of CPS security, as well as security challenges that a CPS faces. Attacks on a CPS from physical layer, transport layer and application layer are also discussed in detail. By analyzing current research on techniques of anti-attack, identity authentication, privacy preservation and risk assessment in CPS, the paper discusses the future research trends in this area.%信息物理融合系统(Cyber-PhysicalSystem,CPS)是信息系统与物理系统紧密融合一体化的复杂系统,通过环境检测并将计算、通信、控制过程高效结合,实现对物理世界实时感知和动态控制的功能。CPS是继互联网之后的又一场信息革命,而安全问题是决定CPS能否被广泛使用的关键因素之一。文章首先阐述了CPS的安全要求、安全目标和面临的安全挑战,接着具体讨论了在物理层、传输层、应用层这三个层次所面临的攻击方式,然后重点分析了CPS在抗攻击技术、身份认证技术、隐私保护技术和风险评估技术等方面的研究现状,最后对CPS的安全研究进行了展望。

  16. SECURE MATHEMATICALLY- ASSURED COMPOSITION OF CONTROL MODELS

    Science.gov (United States)

    2017-09-27

    that is provably secure against many classes of cyber -attack. The goal of the project is to provide verifiable security ; that is, system designs which...architecture of the secure SMACCMcopter, illustrating the attack . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80 46 Failed cyber -attack...approach for building secure software. DARPA initiated the High Assurance Cyber Military Systems (HACMS) program to develop the technologies needed to

  17. 网络恐怖主义防范视角下的城市安全系统去脆弱性%De-vulnerability of Urban Security System under the View of Guarding against Cyber-terrorism

    Institute of Scientific and Technical Information of China (English)

    程聪慧; 郭俊华

    2016-01-01

    Purpose/Significance] Cyber-terrorism is becoming the new threat to urban security. As the vulnerability of urban security system creates conditions for propagating cyber-terrorism, it is necessary to implement du-vulnerability to urban security system for a bet-ter prevention on cyber-terrorism. [ Method/Process] Applying vulnerability theory, this paper demonstrates related connotations, decon-structs the manifested urban security system vulnerability implemented and diffused by cyber-terrorism, then constructs the procedure of urban security system de-vulnerability in order to effectively control and guard against it. [ Result/Conclusion] To establish the urban se-curity system de-vulnerability mechanism is an inevitable way of effectively guarding against cyber-terrorism. Hence, efforts should be done to minify exposure, reduce sensitivity and enhance resistance of urban security system.%[目的/意义]网络恐怖主义日渐成为城市公共安全的新威胁,城市安全系统的脆弱性为网络恐怖主义的滋生创造了条件,为了有效防范网络恐怖主义,势必要对城市安全系统实施去脆弱性。[方法/过程]在阐释网络恐怖主义及其防范等相关概念的基础上,应用脆弱性理论,解构城市安全系统脆弱性的表现,阐释网络恐怖主义活动通过显化城市安全系统脆弱性而得以实施和扩散的机理,提出构建城市安全系统去脆弱性机制的基本思路和具体路径。[结果/结论]构建城市安全系统去脆弱性机制是有效防范网络恐怖主义的必然举措,为此,需要着力削减城市安全系统的暴露性、降低城市安全系统的敏感性和增强城市安全系统的抵抗性。

  18. Cyber Threats to Nuclear Infrastructures

    Energy Technology Data Exchange (ETDEWEB)

    Robert S. Anderson; Paul Moskowitz; Mark Schanfein; Trond Bjornard; Curtis St. Michel

    2010-07-01

    Nuclear facility personnel expend considerable efforts to ensure that their facilities can maintain continuity of operations against both natural and man-made threats. Historically, most attention has been placed on physical security. Recently however, the threat of cyber-related attacks has become a recognized and growing world-wide concern. Much attention has focused on the vulnerability of the electric grid and chemical industries to cyber attacks, in part, because of their use of Supervisory Control and Data Acquisition (SCADA) systems. Lessons learned from work in these sectors indicate that the cyber threat may extend to other critical infrastructures including sites where nuclear and radiological materials are now stored. In this context, this white paper presents a hypothetical scenario by which a determined adversary launches a cyber attack that compromises the physical protection system and results in a reduced security posture at such a site. The compromised security posture might then be malevolently exploited in a variety of ways. The authors conclude that the cyber threat should be carefully considered for all nuclear infrastructures.

  19. The Roadmap for Cyber Crime Investigation

    Directory of Open Access Journals (Sweden)

    Natasha Singh

    2013-04-01

    Full Text Available As threats against digital assets have risen and there is necessitate exposing and eliminating hidden risks and threats. The ability of exposing is called “cyber forensics.” Cyber Penetrators have adopted more sophistical tools and tactics that endanger the operations of the global phenomena. These attackers are also using anti-forensic techniques to hide evidence of a cyber crime. This paper is intended to raise awareness of the different types of computer forensics systems and to identify crucial questions for corporate planning in support of cyber forensics. Various kinds of forensic systems like Internet security system, Intrusion detection systems, Firewall security systems, Storage area network security systems, Network disaster recovery systems, Public key infrastructure security systems are explained in this paper.

  20. International co-operation in cyber resilience

    NARCIS (Netherlands)

    Zielstra, A.; Luiijf, H.A.M.; Duijnhoven, H.L.

    2015-01-01

    All stakeholders in cyber security and resilience have obligations; it is time to end the period of loose, non-binding collaborations, say Annemarie Zielstra, Eric Luiijf and Hanneke Duijnhoven, in this call for nations to work more closely together

  1. International co-operation in cyber resilience

    NARCIS (Netherlands)

    Zielstra, A.; Luiijf, H.A.M.; Duijnhoven, H.L.

    2015-01-01

    All stakeholders in cyber security and resilience have obligations; it is time to end the period of loose, non-binding collaborations, say Annemarie Zielstra, Eric Luiijf and Hanneke Duijnhoven, in this call for nations to work more closely together

  2. Cyber Security Risks and Requirements for Customer Interaction of Smart Grid%互动用电方式下的信息安全风险与安全需求分析

    Institute of Scientific and Technical Information of China (English)

    刘念; 张建华

    2011-01-01

    互动用电是智能电网的基本特征之一,针对因互动用电方式而引入的信息安全风险和安全需求展开研究.首先,从风险分析的角度,将互动用电方式下的信息安全与广域环境下的电力信息安全进行定性比较,重点论述了二者在威胁产生的客观条件、主观动机和事故后果等方面的差异.在此基础上,结合互动用电的业务流程和高级量测体系的特点,从保密性、完整性和可用性等信息安全需求出发,提炼出可用性评估、密钥管理和异常行为检测等3个方面的难点问题.%Customer interaction is one of the basic features of the smart grid. The study is focused on the risk and demand of cyber security stemming from customer interaction. First, in the perspective of risk analysis, the cyber security of customer interaction is qualitatively compared with that of wide area power cyber security with emphasis on the difference between the two in terms of the objective condition, subjective motivation, and consequence of threat. Furthermore, by referring to the business process of customer interaction and features of advanced metering infrastructure (AMI), the related difficulties including availability assessment, key management and abnormal action detection, are extracted from the cyber security requirements such as confidentiality, integrity and availability.

  3. Cyber Incidents Involving Control Systems

    Energy Technology Data Exchange (ETDEWEB)

    Robert J. Turk

    2005-10-01

    The Analysis Function of the US-CERT Control Systems Security Center (CSSC) at the Idaho National Laboratory (INL) has prepared this report to document cyber security incidents for use by the CSSC. The description and analysis of incidents reported herein support three CSSC tasks: establishing a business case; increasing security awareness and private and corporate participation related to enhanced cyber security of control systems; and providing informational material to support model development and prioritize activities for CSSC. The stated mission of CSSC is to reduce vulnerability of critical infrastructure to cyber attack on control systems. As stated in the Incident Management Tool Requirements (August 2005) ''Vulnerability reduction is promoted by risk analysis that tracks actual risk, emphasizes high risk, determines risk reduction as a function of countermeasures, tracks increase of risk due to external influence, and measures success of the vulnerability reduction program''. Process control and Supervisory Control and Data Acquisition (SCADA) systems, with their reliance on proprietary networks and hardware, have long been considered immune to the network attacks that have wreaked so much havoc on corporate information systems. New research indicates this confidence is misplaced--the move to open standards such as Ethernet, Transmission Control Protocol/Internet Protocol, and Web technologies is allowing hackers to take advantage of the control industry's unawareness. Much of the available information about cyber incidents represents a characterization as opposed to an analysis of events. The lack of good analyses reflects an overall weakness in reporting requirements as well as the fact that to date there have been very few serious cyber attacks on control systems. Most companies prefer not to share cyber attack incident data because of potential financial repercussions. Uniform reporting requirements will do much to make this

  4. Cyber Attacks and Terrorism: A Twenty-First Century Conundrum.

    Science.gov (United States)

    Albahar, Marwan

    2017-01-05

    In the recent years, an alarming rise in the incidence of cyber attacks has made cyber security a major concern for nations across the globe. Given the current volatile socio-political environment and the massive increase in the incidence of terrorism, it is imperative that government agencies rapidly realize the possibility of cyber space exploitation by terrorist organizations and state players to disrupt the normal way of life. The threat level of cyber terrorism has never been as high as it is today, and this has created a lot of insecurity and fear. This study has focused on different aspects of cyber attacks and explored the reasons behind their increasing popularity among the terrorist organizations and state players. This study proposes an empirical model that can be used to estimate the risk levels associated with different types of cyber attacks and thereby provide a road map to conceptualize and formulate highly effective counter measures and cyber security policies.

  5. Cyber Analogies

    Science.gov (United States)

    2014-02-28

    commanded to “stop.” The malware reactivated following a reboot, but each time it contacted a C2 server, it was instructed to stop. The effect was to...warfare, manifested concretely in the pre- delegation of authority. Even with all these advantages, Britain’s strategy of economic warfare still...War and Cyber Warfare,” in Lord and Sharp, America’s Cyber Future, pp. 57–63, at p. 62. 35 See Dan Reiter, “Exploding the Powder Keg Myth: Preemptive

  6. Application of Cyber Security in Industrial Control Systems Based on Security Protection Technology for Electrical Secondary System%电力二次安全防护技术在工业控制系统中的应用

    Institute of Scientific and Technical Information of China (English)

    邹春明; 郑志千; 刘智勇; 陈良汉; 陈敏超

    2013-01-01

    我国电力二次系统安全防护技术已广泛应用并取得了良好的安全防护效果,通用工业控制系统与电力二次系统既有相似性,又存在行业不同的需求差异。文章根据电力二次安全防护技术成果,通过加强工控网络边界的防护强度、对工控通信协议进行深度分析、挖掘工控协议攻击特征模型、建立统一安全管理平台等技术手段,构筑具备纵深防御能力的通用工控信息安全防护系统。通过模拟工控环境和网络攻击等方法对关键部件工控防火墙进行了研究测试,结果表明在保证工控系统授权通信正常运行的前提下,成功拦截了非授权控制命令,具备深度保护工控系统信息安全的能力。因此,该系统可增强工控系统抵御黑客病毒攻击的安全防护能力,并降低由信息安全攻击带来工业设备故障损坏的风险。%Cyber security scheme is used for the secondary electrical systems of power grids in China widely and successfully and favorable security protection effects have been achieved. There is not only the similarity between general industrial control system and the secondary electrical systems in power grids and but also the difference in demand due to the differences among industrial sectors. Based on the achievements in security protection technologies for the secondary electrical systems and by means of such technological means as enhancing the protection for the border of industrial control network, analyzing communication protocols for industrial control in depth, mining attack signature models of industrial control protocol and establishing a unified security management platform and so on, a general security protection system for industrial control information, which possesses the ability of defense in depth, is constructed. Through simulating both industrial control environment and network attack, the industrial control firewall for key components is

  7. CHDS Speaker: Hackers Critical to Defeating Cyber Threats

    OpenAIRE

    2014-01-01

    Center for Homeland Defense and Security News and Stories, PRESS RELEASES Hackers are potential resources that can aid in the fight against cyber-terror far better than government bureaucrats, says internationally known security researcher Robi Sen. Sure, sophisticated cyber-criminal hackers and organizations...

  8. Cyber fires?

    NARCIS (Netherlands)

    Gouweleeuw, R.G.W.

    2015-01-01

    De Nederlandse krijgsmacht heeft in 2012 een Cyber Strategie1 opgesteld. In deze strategie wordt de ambitie uitgesproken om de komende jaren de digitale weerbaarheid te versterken en het vermogen te ontwikkelen om offensieve cyberoperaties uit te voeren met als doel de inzetbaarheid van de krijgsmac

  9. CROSS-SECTORAL YOUTH POLICY: CONCEPT AND MODERN TECHNOLOGIES OF SOCIAL PARTNERSHIP

    Directory of Open Access Journals (Sweden)

    Angelina Vladimirovna Borodina

    2016-01-01

    As a result, prospects of social dialogue concerning youth lie in expansion of number of partners and expansion of area of the solved problems in comparison with traditional tripartite social-labor interaction; reformation of youth policy management from the subject-object form; the training of the culture of cross-sectoral partnership for partners.

  10. Cross-Sector Leadership for the Green Economy Integrating Research and Practice on Sustainable Enterprise

    CERN Document Server

    Marcus, Alfred; Sharma, Sanjay; Pogutz, Stefano

    2011-01-01

    Technology breakthroughs in sustainable renewable energy and energy conservation technologies require that there be a strong institutional ecosystem in place which supports innovation, but the nature of this foundation and how it works is not well-known. Becoming a leader necessitates new forms of cross-sector cooperation.

  11. Cross-Sector Partnerships and the Co-creation of Dynamic Capabilities for Stakeholder Orientation

    NARCIS (Netherlands)

    Dentoni, D.; Bitzer, V.C.; Pascucci, S.

    2016-01-01

    This paper explores the relationship between business experience in cross-sector partnerships (CSPs) and the co-creation of what we refer to as ‘dynamic capabilities for stakeholder orientation,’ consisting of the four dimensions of (1) sensing, (2) interacting with, (3) learning from and (4) changi

  12. Cross-Sector Partnerships and the Co-creation of Dynamic Capabilities for Stakeholder Orientation

    NARCIS (Netherlands)

    Dentoni, D.; Bitzer, V.C.; Pascucci, S.

    2016-01-01

    This paper explores the relationship between business experience in cross-sector partnerships (CSPs) and the co-creation of what we refer to as ‘dynamic capabilities for stakeholder orientation,’ consisting of the four dimensions of (1) sensing, (2) interacting with, (3) learning from and (4)

  13. Why Universities Join Cross-Sector Social Partnerships: Theory and Evidence

    Science.gov (United States)

    Siegel, David J.

    2010-01-01

    Cross-sector partnerships are an increasingly popular mode of organizing to address intractable social problems, yet theory and research have virtually ignored university involvement in such activity. This article attempts to ascertain the reasons universities join networks of other social actors to support a common cause. Theories on the…

  14. Triple-Loop Learning in a Cross-Sector Partnership: The DC Central Kitchen Partnership

    Science.gov (United States)

    Ameli, Patrizia; Kayes, D. Christopher

    2011-01-01

    Purpose: This paper aims to build on notions of a higher level of organizational learning to suggest another dimension: interorganizational learning that emerges in a cross-sector partnership. Design/methodology/approach: A case study was conducted with the DC Central Kitchen (DCCK) partnership with for-profit and governmental entities. Research…

  15. Preparing South Africa for Cyber Crime and Cyber Defense

    Directory of Open Access Journals (Sweden)

    Marthie Grobler

    2013-10-01

    Full Text Available The international scope of the Internet, the fast technological advances, the wide reach of technological usage and the increase in cyber-attacks require the South African administrative and legislative system to both intersect largely with the application and implementation of international legislation, take timeous precautionary measures and stay updated on trends and developments. One of the problems associated with the technological revolution is that the cyberspace is full of complex and dynamic technological innovations that are not well suited to any lagging administrative and legal system. A further complication is the lack of comprehensive and enforceable treaties facilitating international cooperation with regard to cyber defense. The result is that many developing countries in particular, are either not properly aware, not well prepared, or adequately protected by both knowledge and legislation, in the event of a cyber-attack on a national level. Even if these countries realize the threats, the time to react is of such a long nature due to consultation and legislative processes, that the legal systems provide little support to ensure timeous and necessary counter-measures. This article will address this problem by looking at the impact of technological revolution on cybercrime and cyber defense in a developing country and will evaluate the relevant South African legislation. It will also look at the influence of cyber defense on the international position of the South African Government. South Africa at present does not have a coordinated approach in dealing with Cybercrime and does not have a comprehensive Cyber defense strategy in place. The structures that have been established to deal with Cyber security issues are inadequate to holistically deal with these issues. The development of interventions to address cybercrime requires a partnership between business, government and civil society. This article will provide an approach to

  16. Secure Threat Information Exchange across the Internet of Things for Cyber Defense in a Fog Computing Environment

    Directory of Open Access Journals (Sweden)

    Mihai-Gabriel IONITA

    2016-01-01

    Full Text Available Threat information exchange is a critical part of any security system. Decisions regarding security are taken with more confidence and with more results when the whole security context is known. The fog computing paradigm enhances the use cases of the already used cloud computing systems by bringing all the needed resources to the end-users towards the edge of the network. While fog decentralizes the cloud, it is very important to correlate security events which happen in branch offices around the globe for correct and timely decisions. In this article, we propose an infrastructure based on custom locally installed OSSEC agents which communicate with a central AlienVault deployment for event correlation. The agents are based on a neural network which takes actions based on risk assessment inspired by the human immune system. All of the threat information is defined by STIX expressions and a TAXII server can share this information with foreign organizations. The proposed implementation can successfully be implemented in an IoT scenario, with added security for the “brownfiled” devices.

  17. CyberWar, CyberTerror, CyberCrime

    CERN Document Server

    Mehan, Julie E

    2008-01-01

    CyberWar, CyberTerror, CyberCrime provides a stark and timely analysis of the increasingly hostile online landscape that today’s corporate systems inhabit, and gives a practical introduction to the defensive strategies that can be employed in response.

  18. 智能电网物联网技术架构及信息安全防护体系研究%Research on technical framework and cyber security protection system of IOT in smart grid

    Institute of Scientific and Technical Information of China (English)

    赵婷; 高昆仑; 郑晓崑; 徐兴坤

    2012-01-01

    物联网作为能够全面实现信息感知、可靠传输及高效信息处理的先进技术,在智能电网发电、输电、变电、配电、调度、用电等环节应用广泛且前景广阔.解决物联网的信息安全问题,实现物联网在智能电网中的安全应用既必要又迫切.探讨了智能电网中典型的物联网系统,分析了通用的技术架构及系统面临的信息安全风险,最后提出了智能电网中物联网系统信息安全防范的技术体系和关键的安全防护措施.%As an advanced technology for information sensing and transmission, Internet of things (IOT) has been applied extensively in power generation, transmission, transformation, distribution, utilization and other processes, and will develop with broad prospect in smart grid. Therefore, it is necessary to resolve security problems and decrease cyber security risks, which aims to guarantee steady IOT operating in smart grid. The typical IOT system structure applied in smart grid is identified and modeled. The existing cyber security risks are assessed. Furthermore, a cyber security protection system and key protection measures for IOT in smart grid are presented, which provided an available guidance for IOT applied in smart grid.

  19. An Analysis of Cyber-Attack on NPP Considering Physical Impact

    Energy Technology Data Exchange (ETDEWEB)

    Lee, In Hyo; Kang, Hyun Gook [KAIST, Daejeon (Korea, Republic of); Son, Han Seong [Joonbu University, Geumsan (Korea, Republic of)

    2016-05-15

    Some research teams performed related works on cyber-physical system which is a system that cyber-attack can lead to serious consequences including product loss, damage, injury and death when it is attacked. They investigated the physical impact on cyber-physical system due to the cyber-attack. But it is hard to find the research about NPP cyber security considering the physical impact or safety. In this paper, to investigate the relationship between physical impact and cyber-attack, level 1 PSA results are utilized in chapter 2 and cyber-attack analysis is performed in chapter 3. The cyber security issue on NPP is inevitable issue. Unlike general cyber security, cyber-physical system like NPP can induce serious consequences such as core damage by cyber-attack. So in this paper, to find how hacker can attack the NPP, (1) PSA results were utilized to find the relationship between physical system and cyber-attack and (2) vulnerabilities on digital control systems were investigated to find how hacker can implement the possible attack. It is expected that these steps are utilized when establishing penetration test plans or cyber security drill plans.

  20. Cyber Resilience:New Ideas of Cyber Security Development%网络抗压能力是网络空间安全发展的新理念

    Institute of Scientific and Technical Information of China (English)

    李战宝; 张文贵

    2014-01-01

    近年来,网络的抗压能力问题得到美国、欧盟等西方发达国家高度重视,出台了一系列相关政策文件,研究逐步深入,已形成了不少研究成果。文章介绍了网络抗压能力的定义、内涵,探讨了规划和解决网络抗压能力的原则、范围、主要途径和着眼点,以及衡量网络抗压能力的多种指标项目。%Recently, United States, European Union and other western developed countries pay their close attentions to the cyber resilience. A series of related documents have been published. As the research deepened gradually, there already have many research results come out. This paper introduces deifnitions and insights of cyber resilience, discusses principles, scope, main approaches, objectives as well as all kinds of project indicators for measuring cyber resilience, which are used to plan and solve cyber resilience.

  1. Cyber threats within civil aviation

    Science.gov (United States)

    Heitner, Kerri A.

    Existing security policies in civil aviation do not adequately protect against evolving cyber threats. Cybersecurity has been recognized as a top priority among some aviation industry leaders. Heightened concerns regarding cyber threats and vulnerabilities surround components utilized in compliance with the Federal Aviation Administration's (FAA) Next Generation Air Transportation (NextGen) implementation. Automated Dependent Surveillance-B (ADS-B) and Electronic Flight Bags (EFB) have both been exploited through the research of experienced computer security professionals. Civil aviation is essential to international infrastructure and if its critical assets were compromised, it could pose a great risk to public safety and financial infrastructure. The purpose of this research was to raise awareness of aircraft system vulnerabilities in order to provoke change among current national and international cybersecurity policies, procedures and standards. Although the education of cyber threats is increasing in the aviation industry, there is not enough urgency when creating cybersecurity policies. This project intended to answer the following questions: What are the cyber threats to ADS-B of an aircraft in-flight? What are the cyber threats to EFB? What is the aviation industry's response to the issue of cybersecurity and in-flight safety? ADS-B remains unencrypted while the FAA's mandate to implement this system is rapidly approaching. The cyber threat of both portable and non-portable EFB's have received increased publicity, however, airlines are not responding quick enough (if at all) to create policies for the use of these devices. Collectively, the aviation industry is not being proactive enough to protect its aircraft or airport network systems. That is not to say there are not leaders in cybersecurity advancement. These proactive organizations must set the standard for the future to better protect society and it's most reliable form of transportation.

  2. Cyber Power

    Science.gov (United States)

    2010-05-01

    attributed to “patriotic hackers” in Russia who were offended by Estonia’s movement of a World War II monument to Soviet soldiers. In 2008, shortly...internet to mobilize Chinese students to demonstrate against Japan when its officials took positions that offended Chinese views of the 1930s...reduction of power differentials among them. Anyone from a teen age hacker to a major modern government can do damage in cyber space, and as the famous New

  3. Discrimination of Information Security, Network Security, Cyber Security and So On%信息安全管理系列之十一信息安全、网络安全及赛博安全相关词汇辨析

    Institute of Scientific and Technical Information of China (English)

    谢宗晓

    2015-01-01

    按照关注点的不同,本文对"通信安全" "计算机安全" "网络安全" "信息安全"和"知识安全"进行了辨析.同时,按照定义范畴的差异,对"信息系统安全""信息安全"和"赛博安全"词汇进行了辨析.此外,本文对由于翻译原因导致混淆的两种网络安全(network security和cyber security)进行了重点解析.

  4. CyberStorm III

    NARCIS (Netherlands)

    Luiijf, H.A.M.; et al

    2010-01-01

    Projectteam Cyber Storm III - De Verenigde Staten organiseerden de afgelopen jaren een reeks grootschalige ICT-crisisoefeningen met de naam Cyber Storm. Cyber Storm III is de derde oefening in de reeks. Het scenario van Cyber Storm III staat in het teken van grootschalige ICT-verstoringen, waarbij n

  5. Toward improved software security training using a cyber warfare opposing force (CW OPFOR): the knowledge base design

    Science.gov (United States)

    Stytz, Martin R.; Banks, Sheila B.

    2005-03-01

    "Train the way you will fight" has been a guiding principle for military training and has served the warfighter well as evidenced by numerous successful operations over the last decade. This need for realistic training for all combatants has been recognized and proven by the warfighter and continues to guide military training. However, to date, this key training principle has not been applied fully in the arena of cyberwarfare due to the lack of realistic, cost effective, reasonable, and formidable cyberwarfare opponents. Recent technological advances, improvements in the capability of computer-generated forces (CGFs) to emulate human behavior, and current results in research in information assurance and software protection, coupled with increasing dependence upon information superiority, indicate that the cyberbattlespace will be a key aspect of future conflict and that it is time to address the cyberwarfare training shortfall. To address the need for a cyberwarfare training and defensive testing capability, we propose research and development to yield a prototype computerized, semi-autonomous (SAF) red team capability. We term this capability the Cyber Warfare Opposing Force (CW OPFOR). There are several technologies that are now mature enough to enable, for the first time, the development of this powerful, effective, high fidelity CW OPFOR. These include improved knowledge about cyberwarfare attack and defense, improved techniques for assembling CGFs, improved techniques for capturing and expressing knowledge, software technologies that permit effective rapid prototyping to be effectively used on large projects, and the capability for effective hybrid reasoning systems. Our development approach for the CW OPFOR lays out several phases in order to address these requirements in an orderly manner and to enable us to test the capabilities of the CW OPFOR and exploit them as they are developed. We have completed the first phase of the research project, which

  6. Russia’s Approach to Cyber Warfare (1Rev)

    Science.gov (United States)

    2017-03-01

    threat and an opportunity in this regard.  Russian military theorists generally do not use the terms cyber or cyberwarfare. Instead, they...Ukraine, Russia appeared to employ cyber as a conventional force enabler.  The Georgia and Ukraine conflicts also provided opportunities for Russia...Ministerstvo Vnutrennikh Del: MVD) focuses on cyber crime.14 For a brief period in the 1990s, Russia had a separate information security agency, the Federal

  7. Cross-border versus cross-sector interconnectivity in renewable energy systems

    DEFF Research Database (Denmark)

    Thellufsen, Jakob Zinck; Lund, Henrik

    2017-01-01

    In the transition to renewable energy systems, fluctuating renewable energy, such as wind and solar power, plays a large and important role. This creates a challenge in terms of meeting demands, as the energy production fluctuates based on weather patterns. To utilise high amounts of fluctuating...... renewable energy, the energy system has to be more flexible in terms of decoupling demand and production. This paper investigates two potential ways to increase flexibility. The first is the interconnection between energy systems, for instance between two countries, labelled as cross-border interconnection....... The results show that while both measures increase the system utilisation of renewable energy and the system efficiency, the cross-sector interconnection gives the best system performance. To analyse the possible interaction between cross-sector and cross-border interconnectivity, two main aspects have...

  8. Study Protocol: Nutritional Support in a Cross-sector Model for the Rehabilitation of Geriatric Patients

    DEFF Research Database (Denmark)

    Beck, Anne Marie; Rask, Kø; Leedo, Eva

    2014-01-01

    with the Follow-home Team, while the remaining visits will take place approximately three and eight weeks after discharge and will be performed by the RD alone. The information gathered by the Follow-home Team i.e. regarding the medical treatment, the patient’s functional abilities and ability to cope...... Living, quality of life, use of social services, re-admissions and mortality. Discussion: This project is the first to combine individualized nutritional intervention with intervention from an established Follow-home Team. The results will hopefully help to ensure the cross-sector quality of nutritional......Background: Hospital stays are generally getting shorter which leaves limited time to improve a poor nutritional status for geriatric patients. Therefore, it seems necessary to integrate nutritional support also in the period after discharge. Furthermore, improving cross-sector cooperation...

  9. Major Cyber threat on Nuclear Facility and Key Entry Points of Malicious Codes

    Energy Technology Data Exchange (ETDEWEB)

    Shin, Ickhyun; Kwon, Kookheui [Korea Institute of Nuclear Nonproliferation and Control, Daejeon (Korea, Republic of)

    2013-05-15

    Cyber security incident explicitly shows that the domestic intra net system which is not connected to the Internet can be compromised by the USB based mal ware which was developed by the state-sponsored group. It also tells that the actor for cyber-attack has been changed from script kiddies to state's governments and the target has been changed to nation's main infrastructures such as electricity, transportation and etc. Since the cyber sabotage on nuclear facility has been proven to be possible and can be replicated again with same method, the cyber security on nuclear facility must be strengthened. In this paper, it is explained why the malicious code is the one of the biggest cyber threat in nuclear facility's digital I and C(Instrumentation and Controls) system by analyzing recent cyber attacks and well-known malicious codes. And a feasible cyber attack scenario on nuclear facility's digital I and C system is suggested along with some security measures for prevention of malicious code. As experienced from the cyber sabotage on Iranian nuclear facility in 2010, cyber attack on nuclear facility can be replicated by infecting the computer network with malicious codes. One of the cyber attack scenario on nuclear digital I and C computer network with using malicious code was suggested to help security manager establishing cyber security plan for prevention of malicious code. And some security measures on prevention of malicious code are also provided for reference.

  10. Cross-sectoral conflicts for water under climate change: the need to include water quality impacts

    OpenAIRE

    Vliet, van, A.J.H.; Ludwig, F.; P. Kabat

    2013-01-01

    Climate change is expected to increase pressures on water use between different sectors (e.g. agriculture, energy, industry, domestic uses) and ecosystems. While climate change impacts on water availability have been studied widely, less work has been done to assess impacts on water quality. This study proposes a modelling framework to incorporate water quality in analyses of cross-sectoral conflicts for water between human uses and ecosystems under climate change and socio-economic changes. ...

  11. Cyber attack analysis on cyber-physical systems: Detectability, severity, and attenuation strategy

    Science.gov (United States)

    Kwon, Cheolhyeon

    Security of Cyber-Physical Systems (CPS) against malicious cyber attacks is an important yet challenging problem. Since most cyber attacks happen in erratic ways, it is usually intractable to describe and diagnose them systematically. Motivated by such difficulties, this thesis presents a set of theories and algorithms for a cyber-secure architecture of the CPS within the control theoretic perspective. Here, instead of identifying a specific cyber attack model, we are focused on analyzing the system's response during cyber attacks. Firstly, we investigate the detectability of the cyber attacks from the system's behavior under cyber attacks. Specifically, we conduct a study on the vulnerabilities in the CPS's monitoring system against the stealthy cyber attack that is carefully designed to avoid being detected by its detection scheme. After classifying three kinds of cyber attacks according to the attacker's ability to compromise the system, we derive the necessary and sufficient conditions under which such stealthy cyber attacks can be designed to cause the unbounded estimation error while not being detected. Then, the analytical design method of the optimal stealthy cyber attack that maximizes the estimation error is developed. The proposed stealthy cyber attack analysis is demonstrated with illustrative examples on Air Traffic Control (ATC) system and Unmanned Aerial Vehicle (UAV) navigation system applications. Secondly, in an attempt to study the CPSs' vulnerabilities in more detail, we further discuss a methodology to identify potential cyber threats inherent in the given CPSs and quantify the attack severity accordingly. We then develop an analytical algorithm to test the behavior of the CPS under various cyber attack combinations. Compared to a numerical approach, the analytical algorithm enables the prediction of the most effective cyber attack combinations without computing the severity of all possible attack combinations, thereby greatly reducing the

  12. Analysis of operations and cyber security policies for a system of cooperating Flexible Alternating Current Transmission System (FACTS) devices.

    Energy Technology Data Exchange (ETDEWEB)

    Phillips, Laurence R.; Tejani, Bankim; Margulies, Jonathan; Hills, Jason L.; Richardson, Bryan T.; Baca, Micheal J.; Weiland, Laura

    2005-12-01

    Flexible Alternating Current Transmission Systems (FACTS) devices are installed on electric power transmission lines to stabilize and regulate power flow. Power lines protected by FACTS devices can increase power flow and better respond to contingencies. The University of Missouri Rolla (UMR) is currently working on a multi-year project to examine the potential use of multiple FACTS devices distributed over a large power system region in a cooperative arrangement in which the FACTS devices work together to optimize and stabilize the regional power system. The report describes operational and security challenges that need to be addressed to employ FACTS devices in this way and recommends references, processes, technologies, and policies to address these challenges.

  13. Security Engineering

    Science.gov (United States)

    2012-01-31

    attacks cannot be completely addressed by traditional perimeter security solutions [ Wulf and Jones, 2009], as they have been in the past. A new...the mainstay of the current cyber security solution space [ Wulf and Jones, 2009]. This has enabled the system engineering and security communities...Number: H98230-08-D-0171 DO 002 TO 002 RT 028 Report No. SERC-2012-TR-028 January 31, 2012 UNCLASSIFIED 37 W. A. Wulf and A. K. Jones, Reflections on cyber security, Science Magazine, vol. 326, 2009, pp. 943-944.

  14. 76 FR 4123 - Homeland Security Advisory Council

    Science.gov (United States)

    2011-01-24

    ... homeland security, results of a cyber security exercise, sharing information with others, and Southwest... would be a road map to those who wish to attack our cyber security, and hence, would certainly frustrate... SECURITY Homeland Security Advisory Council AGENCY: The Office of Policy, DHS. ACTION: Notice of partially...

  15. Physical security and cyber security issues and human error prevention for 3D printed objects: detecting the use of an incorrect printing material

    Science.gov (United States)

    Straub, Jeremy

    2017-06-01

    A wide variety of characteristics of 3D printed objects have been linked to impaired structural integrity and use-efficacy. The printing material can also have a significant impact on the quality, utility and safety characteristics of a 3D printed object. Material issues can be created by vendor issues, physical security issues and human error. This paper presents and evaluates a system that can be used to detect incorrect material use in a 3D printer, using visible light imaging. Specifically, it assesses the ability to ascertain the difference between materials of different color and different types of material with similar coloration.

  16. Building Automation System Cyber Networks: An Unmitigated Risk to Federal Facilities

    Science.gov (United States)

    2015-12-01

    75 “The Importance of Cyber Hygiene in Cyberspace,” INFOSEC Institute, April 30, 2015, http...resources.infosecinstitute.com/the-importance-of-cyber- hygiene -in-cyberspace/. 15 networks, it is impossible to provide evidence proving or disproving whether they...ICS security policies and procedures based on the Homeland Security Advisory System Threat Level, deploying increasingly heightened security postures

  17. Research on Financial Cyber Crime and Its Preventive Security Measures%金融业网络犯罪及安全防范措施研究

    Institute of Scientific and Technical Information of China (English)

    蓝凯晖

    2011-01-01

    金融业网络犯罪日益猖獗,阻止并打击网络金融犯罪实为一项艰难的工作。网络金融犯罪快速发展的根源,除网络金融犯罪自身的特点以外,科技滞后,特别是司法人员的网络、金融知识技能的缺失是很重要的原因。对金融业网络安全防范进行了论述。%Financial cyber crime is increasingly rampant,stopping and fighting financial cyber crime is hard work.The root causes of the widespread of financial cyber crime is the problem of backward technology,especially the lack of knowledge of network technology

  18. Emerging patterns in cross-sector partnerships national lab partnerships: what works and what doesn`t

    Energy Technology Data Exchange (ETDEWEB)

    Tarter, C.B.

    1997-06-16

    All elements of the research triad in this country - universities, federal laboratories, and industrial labs - have spent a good part of the last decade in a very changeable and changing environment. In the area of partnerships with industry there have been a lot of experiments, such as the Advanced Technology Program (ATP), the Technology Reinvestment Program (TRP), and the Department of Energy`s (DOE) analog, the Technology Transfer Initiative (TM). We now have, at least in principle, gained enough experience with cross-sector partnerships to make some observations on what works and what doesn`t. My judgments are preliminary and driven by the idiosyncrasies of my own lab. I think the general themes at Livermore are reflected in other DOE national security labs and, at least to some extent, in other federal labs. Although we share some features in common with universities and industrial labs, I think the nature of our funding sources, and the way in which we are affected by global political factors such as the Cold War, pose a somewhat special set of circumstances for our institutions.

  19. Seeking Balance in Cyber Education

    Science.gov (United States)

    2015-02-01

    which necessarily reaches beyond the traditional computing fields. There are of course many legal, social, and ethical aspects of cyber security not...social, ethical , and legal aspects of insider leaks like the Man- ning and Snowden incidents, as well as the societal perception of government...would be remiss to omit topics like social engineering and activist hacking [15], or “hacktivism.” CrossTalk—January/February 2015 17 SOFTWARE EDUCATION

  20. Building An Adaptive Cyber Strategy

    Science.gov (United States)

    2016-06-01

    on creating a secure cyberspace. The foundations of the current cybersecurity strategy are sound as a necessary baseline, but cybersecurity will...the community to provide a common sight picture of the adversary, but it does not implement cyber strategy or direct/coordinate operational action...primarily oriented around gathering information to support targeting for action based AU/ACSC/SMITH, FI/AY16 authorities or crafting policy responses

  1. What good cyber resilience looks like.

    Science.gov (United States)

    Hult, Fredrik; Sivanesan, Giri

    In January 2012, the World Economic Forum made cyber attacks its fourth top global risk. In the 2013 risk report, cyber attacks were noted to be an even higher risk in absolute terms. The reliance of critical infrastructure on cyber working has never been higher; the frequency, intensity, impact and sophistication of attacks is growing. This trend looks likely to continue. It can be argued that it is no longer a question whether an organisation will be successfully hacked, but how long it will take to detect. In the ever-changing cyber environment, traditional protection techniques and reliance on preventive controls are not enough. A more agile approach is required to give assurance of a sufficiently secure digital society. Are we faced with a paradigm shift or a storm in a digital teacup? This paper offers an introduction to why cyber is important, a wider taxonomy on the topic and some historical context on how the discipline of cyber security has evolved, and an interpretation on what this means in the new normal of today.

  2. Plethora of Cyber Forensics

    Directory of Open Access Journals (Sweden)

    N.Sridhar

    2011-11-01

    Full Text Available As threats against digital assets have risen and there is necessitate exposing and eliminating hidden risks and threats. The ability of exposing is called “cyber forensics.” Cyber Penetrators have adopted more sophistical tools and tactics that endanger the operations of the global phenomena. These attackers are also using anti-forensic techniques to hide evidence of a cyber crime. Cyber forensics tools must increase its toughness and counteract these advanced persistent threats. This paper focuses on briefing of Cyber forensics, various phases of cyber forensics, handy tools and new research trends and issues in this fascinated area.

  3. 高校如何应对微博时代的网络舆情%Cyber Opinion And Campus Security In The Times Of Microblog

    Institute of Scientific and Technical Information of China (English)

    陈正群

    2012-01-01

    近年来,微博作为一种新媒体形式,正从一个微平台迅速变成大众传媒平台。由于微博具有短、平、快的特点,基于微博传播的网络舆情也呈现出新的特点,公众从信息获得转向互动参与,网络舆情对公共事务和社会稳定的影响El渐深入。大学生是微博的主体,微博一方面为大学生提供了平等交流和彰显个性的平台,另一方面也成为不良情绪和非理性表达的放大器。因此,高校要积极应对,做好微博时代的稳定工作:要理性面对,建立高校官方微博;认真维护,用好高校官方微博;积极引导,培养高校“意见领袖”。%As a new media form, microblog has been rapidly growing from a micro media platform to a mass media platform. Due to its wide range of application, people recgonize it as "a change of the right of speech either by the government or the public". Short, direct and rapid, microblog caused extensive pubic interactivity. Thus cyber opinion is playing a deeper influence on pub- lic affairs and social stabihy. Being the most active group of users, university students are taking microblog as their platform of exchanging equal opinions and displaying their individuality, as well as the amplifier of bad mood and unrational expressions. Therefore, university administration should be prepared for the work of maintaining security and stability in the microblod - age. They should set up rational offical microblog, make careful maintainance, actively guide and train campus opinion leaders.

  4. 8th International Symposium on Intelligent Distributed Computing & Workshop on Cyber Security and Resilience of Large-Scale Systems & 6th International Workshop on Multi-Agent Systems Technology and Semantics

    CERN Document Server

    Braubach, Lars; Venticinque, Salvatore; Badica, Costin

    2015-01-01

    This book represents the combined peer-reviewed proceedings of the Eight International Symposium on Intelligent Distributed Computing - IDC'2014, of the Workshop on Cyber Security and Resilience of Large-Scale Systems - WSRL-2014, and of the Sixth International Workshop on Multi-Agent Systems Technology and Semantics- MASTS-2014. All the events were held in Madrid, Spain, during September 3-5, 2014. The 47 contributions published in this book address several topics related to theory and applications of the intelligent distributed computing and multi-agent systems, including: agent-based data processing, ambient intelligence, collaborative systems, cryptography and security, distributed algorithms, grid and cloud computing, information extraction, knowledge management, big data and ontologies, social networks, swarm intelligence or videogames amongst others.

  5. ADDRESSING THE SPECTRE OF CYBER TERRORISM: A COMPARATIVE PERSPECTIVE

    Directory of Open Access Journals (Sweden)

    Fawzia Cassim

    2012-08-01

    Full Text Available This article looks at the definition of cyber terrorism and terrorist use of the Internet. The article evaluates cyber terrorist threats facing countries such as the United States of America, the United Kingdom, India and South Africa. The article also examines measures introduced by the respective governments in these countries to counteract cyber terrorist threats. Finally, the article will propose a way forward to counteract such possible threats in the future.The face of terrorism is changing. The convergence of the physical and virtual worlds has resulted in the creation of a “new threat” called cyber terrorism. Cyber terrorism is one of the recognised cyber crimes. The absence of suitable legal frameworks to address cyber terrorism at national and regional levels, the lack of adequate safeguards, the lack of cyber security strategies and the pre-occupation of countries with internal factors have all contributed to the creation of an environment that can be easily infiltrated by cyber terrorists. The horrific events of 9/11 provided the impetus for many countries to introduce anti-terrorist legislation. The United States of America, United Kingdom, India and South Africa have introduced legislation to address the threat of cyber terrorism.

  6. A Game Theoretic Approach to Cyber Attack Prediction

    Energy Technology Data Exchange (ETDEWEB)

    Peng Liu

    2005-11-28

    The area investigated by this project is cyber attack prediction. With a focus on correlation-based prediction, current attack prediction methodologies overlook the strategic nature of cyber attack-defense scenarios. As a result, current cyber attack prediction methodologies are very limited in predicting strategic behaviors of attackers in enforcing nontrivial cyber attacks such as DDoS attacks, and may result in low accuracy in correlation-based predictions. This project develops a game theoretic framework for cyber attack prediction, where an automatic game-theory-based attack prediction method is proposed. Being able to quantitatively predict the likelihood of (sequences of) attack actions, our attack prediction methodology can predict fine-grained strategic behaviors of attackers and may greatly improve the accuracy of correlation-based prediction. To our best knowledge, this project develops the first comprehensive framework for incentive-based modeling and inference of attack intent, objectives, and strategies; and this project develops the first method that can predict fine-grained strategic behaviors of attackers. The significance of this research and the benefit to the public can be demonstrated to certain extent by (a) the severe threat of cyber attacks to the critical infrastructures of the nation, including many infrastructures overseen by the Department of Energy, (b) the importance of cyber security to critical infrastructure protection, and (c) the importance of cyber attack prediction to achieving cyber security.

  7. Let Slip the Dogs of (CYBER) War: Progressing Towards a Warfighting U.S. Cyber Command

    Science.gov (United States)

    2013-04-01

    requirements, nor a headquarters building (it is currently housed within NSA facilities on Fort George G. Meade , MD).22 In addition, the DOD cyber...Information Conflict: National Security Law in Cyberspace (Falls Church, VA: Aegis Research Corporation, 2000); Herbert Lin, “Offensive Cyber Operations...this legislation was pocket-vetoed by then President George H.W. Bush due to a lack of consistency between the stated intent of the oversight

  8. Deploying ICT with Entrepreneurship Culture can Fight Cyber-Crime ...

    African Journals Online (AJOL)

    2016-12-01

    Dec 1, 2016 ... with entrepreneurship ventures in contest with cyber-crimes in a developing economy such as Nigeria. .... security/), in this era of information superhighway age. ... pose asa threat one needs to develop technical solutions,.

  9. Cyber-physical system design with sensor networking technologies

    CERN Document Server

    Zeadally, Sherali

    2016-01-01

    This book describes how wireless sensor networking technologies can help in establishing and maintaining seamless communications between the physical and cyber systems to enable efficient, secure, reliable acquisition, management, and routing of data.

  10. 77 FR 55218 - Homeland Security Advisory Council

    Science.gov (United States)

    2012-09-07

    ... violent extremism domestically; the current threat environment; evolving threats in cyber security... receive a briefing on evolving threats in cyber security. This will include lessons learned and potential... SECURITY Homeland Security Advisory Council AGENCY: The Office of Policy, DHS. ACTION: Notice of...

  11. 76 FR 81516 - Homeland Security Advisory Council

    Science.gov (United States)

    2011-12-28

    ...) Frequent Traveler Program; examine evolving threats in cyber security; and provide information on the... (EMP) Threat--Lessons Learned and Areas of Vulnerability, and Evolving Threats in Cyber Security. Basis... SECURITY Homeland Security Advisory Council AGENCY: The Office of Policy, DHS. ACTION: Closed...

  12. 76 FR 17158 - Assumption Buster Workshop: Distributed Data Schemes Provide Security

    Science.gov (United States)

    2011-03-28

    ... group that coordinates cyber security research activities in support of national security systems, is...: There is a strong and often repeated call for research to provide novel cyber security solutions. The... capable, and that re-examining cyber security solutions in the context of these assumptions will result in...

  13. WHEN NORMS FAIL: NORTH KOREA AND CYBER AS AN ELEMENT OF STATECRAFT

    Science.gov (United States)

    2017-04-06

    aspects of cyber into the national makeup, South Korea is one of the most vulnerable countries to cyber threats . The U.S. is not far behind at...more closely related to general defense and security , which guards against a broad spectrum of possible threats that include criminal, accidental...in conjunction with the National Security Council, should develop a U.S. policy on the use of offensive cyber capabilities. This policy should

  14. Hardware Acceleration for Cyber Security

    Science.gov (United States)

    2010-11-01

    perform different approaches. It includes behavioral analysis , by means of NetFlow monitoring, as well as packet content analysis, so called Deep...analysis [30] are used to identify malicious traffic. Using network behavioral analysis in comparison with signature based approach allows us to

  15. Conceptual Architecture for Obtaining Cyber Situational Awareness

    Science.gov (United States)

    2014-06-01

    Rio de Janeiro. Nov. 2011. [13] LEEUWEN , V. et al. Cyber Security Analysis Testbed: combining real, emulation, and simulation. In: INTERNATIONAL...networks.com>. Accessed: 16 jun. 2012. • [12] DECATRON. Executive project. Cyberwar operation simulator. Rio de Janeiro. Nov. 2011. • [13] LEEUWEN

  16. Cyber Insurance - Managing Cyber Risk

    Science.gov (United States)

    2015-04-01

    customers or business partners or results in the loss of private information, companies are being held liable for these losses. The costs can run into the... security , and privacy. Errors and omissions covers claims related to performance of services such as software development or consulting services...Technology 1 companies that maintain online content include a media liability component in their cov- erage. Network security covers a failure in network

  17. Research on Framework Design of Industrial Control System for Cyber-Security Defenses%工业控制系统网络安全防护体系研究

    Institute of Scientific and Technical Information of China (English)

    陈亚亮; 杨海军; 姚钦锋; 戴沁芸

    2013-01-01

    文章在阐述工业控制系统(ICS)网络概念与特点的基础上,深入分析其安全威胁及脆弱性,提出运用“深度防御”思想,以ICS资产功能及重要性为安全域划分依据,从技术与管理两个维度设计适用于ICS的网络安全防护体系。%Security threats and vulnerabilities are analyzed in depth in this paper, which is based on the network concept and the characteristic of the industrial control system (ICS). Subsequently, Framework design of industrial control system for cyber-security defenses is proposed by the use of“defense-in-depth”thought, combining with technology and management measures, separating the function and the importance of ICS asset into several security zones.

  18. APPLYING INTERNATIONAL HUMANITARIAN LAW TO CYBER-ATTACKS

    Directory of Open Access Journals (Sweden)

    Dan-Iulian VOITAŞEC

    2015-07-01

    Full Text Available Technology plays an important role in everyday life. Technological advancement can be found in every field of government including the military. Because of this, new means and methods of conducting hostilities have emerged. Cyber warfare starts to represent the latest challenge at an international level. States and non-state actors have started to implement new security policies and new defences against cyber-attacks but also have embraced using cyber-attacks as a method of conducting hostilities. The question that has to be answered regarding the use of cyber-attacks is what is the legal regime that governs such attacks and if IHL can apply to cyber warfare?

  19. Research on Legal Governance of Cyber Security Based on the Concept of Process Control:"Prevention and Control of Risk" as the Core%基于过程控制理念的网络安全法律治理研究*--以“风险预防与控制”为核心

    Institute of Scientific and Technical Information of China (English)

    赵丽莉

    2015-01-01

    In Web2. 0 era of the Internet, cyber security is closely related to social stability and national security. Thus, the importance of cyber security control in the system engineering of comprehensive control of society has become more prominent. Law governing is an im-portant tool for network safety management, but the currently prevailing law governing ideas and mechanisms depended on "results con-trol" cannot adapt to the needs of risk management of dynamic cyber security. So, facing with the demands of perfecting control of cyber law, it is required that the idea of legal governance of cyber safety be innovated. Establishing the"prevention and control" as the core of normative model based on the process control mechanism will solve the problems form the legal need trend of law governing of cyber secur-ity and form a new paradigm for it.%在互联网全面进入Web2.0的时代之际,网络安全已与社会稳定和国家安全息息相关。网络安全治理在社会综合治理这一系统工程中的重要性也日益突出。法律治理是网络安全治理的重要手段,但现有依赖于“结果控制型”法律治理理念和机制无法适应动态的网络安全风险治理需求。因此,面对完善网络法治的诉求,需要创新网络安全法律治理理念,确立以“风险预防和控制”为核心的过程控制的法律治理模式,形成网络安全法律治理的新范式。

  20. Total Solution of Cyber Security in Symphony System%Symphony系统数字安全整体解决方案

    Institute of Scientific and Technical Information of China (English)

    宋相儒

    2015-01-01

    介绍了工业控制系统的数字风险、发电行业典型认知误区以及相关国际、国内规范。详细阐述了Symphony系统的整体解决方案和工程实施。%The paper introduces the cyber risk of industrial control system, typical misunderstandings in power generation field, as well as the related international and domestic regulations. The total solution of Symphony system and engineering execution are also described in details.

  1. Defining cyber warfare

    Directory of Open Access Journals (Sweden)

    Dragan D. Mladenović

    2012-04-01

    Full Text Available Cyber conflicts represent a new kind of warfare that is technologically developing very rapidly. Such development results in more frequent and more intensive cyber attacks undertaken by states against adversary targets, with a wide range of diverse operations, from information operations to physical destruction of targets. Nevertheless, cyber warfare is waged through the application of the same means, techniques and methods as those used in cyber criminal, terrorism and intelligence activities. Moreover, it has a very specific nature that enables states to covertly initiate attacks against their adversaries. The starting point in defining doctrines, procedures and standards in the area of cyber warfare is determining its true nature. In this paper, a contribution to this effort was made through the analysis of the existing state doctrines and international practice in the area of cyber warfare towards the determination of its nationally acceptable definition.

  2. Cyber space bullying

    Directory of Open Access Journals (Sweden)

    Popović-Ćitić Branislava

    2009-01-01

    Full Text Available Cyber space bullying is a relatively new phenomenon that has received increased attention by scientists, researchers and practitioners in recent years. It is usually defined as an intentionally and repeatedly expression of aggression towards other people through information and communication technologies. Cyber space bullying is characterized by all the primary characteristics of traditional bullying and some specifics ones that clearly differ it from other forms of bullying. In addition to the analysis of characteristics and specifics of cyber space bullying, the paper describes the basic forms of cyber space bullying (flaming, harassment, denigration, impersonation, outing, trickery, exclusion, stalking and happy slapping, as well as, the types of cyber space bullies (vengeful angel, power-hungry, revenge of the nerd, mean girls and inadvertent. The main goal of this paper is to provide initial theoretical guidelines for designing future empirical research on the complex phenomenon of cyber space bullying.

  3. Global Mapping of Cyber Attacks

    Science.gov (United States)

    2014-01-01

    permutations of rows and columns. 3 Related Work Most prior empirical cyber security work is interested in characterizing the mode of operation of attack...The attribute networks (ICT att, bandwidth att, bribes att, ICT vie and ICT % diff) have all 1 component, and density and clustering coefficient...attnlrutes or attackers and victims ICT att x ICT vie 0.19*** 0.23*** 0.51*** 0.47*** Bribes att x ICT vie 0.21• 0.21* -0.26* -0.27 Bandwidth att

  4. Securing the U.S. Transportation Command

    Science.gov (United States)

    2016-03-11

    are addressing fundamental operational and cyber security issues to improve the overall USTRANSCOM defensive posture and cyber visibility across...practice good authentica- tion and authorization, perform regular “cyber hygiene ” to ensure their systems are patched and up to date, leverage virus...defenders to improve their situational awareness and defensive posture . Improving cyber defensive capabilities for thwarting Tier V-VI adversaries

  5. A Study on Cyber Crimes and protection

    Directory of Open Access Journals (Sweden)

    Loganathan M

    2011-09-01

    Full Text Available Information technology has widened itself over the last two decades and has become the axis of todays global development. The world of internet provides every user all the required information and latest information making it the most valuable source of information. With the advancement of internet, the crime has also widened its roots in all possible directions which claim to be the biggest threat in the near future. The cyber crimes pose a threat to the under developed, developing and the developed nations as a whole. One such major cyber crime is Phishing. It targets not just big organization but also individual users. In this paper we explore the Cyber crimes, the online security vulnerabilities and the available strategies and techniques for protection

  6. An analytic approach to cyber adversarial dynamics

    Science.gov (United States)

    Sweeney, Patrick; Cybenko, George

    2012-06-01

    To date, cyber security investment by both the government and commercial sectors has been largely driven by the myopic best response of players to the actions of their adversaries and their perception of the adversarial environment. However, current work in applying traditional game theory to cyber operations typically assumes that games exist with prescribed moves, strategies, and payos. This paper presents an analytic approach to characterizing the more realistic cyber adversarial metagame that we believe is being played. Examples show that understanding the dynamic metagame provides opportunities to exploit an adversary's anticipated attack strategy. A dynamic version of a graph-based attack-defend game is introduced, and a simulation shows how an optimal strategy can be selected for success in the dynamic environment.

  7. Autonomous Micro-Modular Mobile Data Center Cloud Computing Study for Modeling, Simulation, Information Processing and Cyber-Security Viability Project

    Data.gov (United States)

    National Aeronautics and Space Administration — Cloud computing security penetration testing and anomaly detection defense studies were conducted to assess the adequacy of cloud computing security.  Since...

  8. Impact modeling and prediction of attacks on cyber targets

    Science.gov (United States)

    Khalili, Aram; Michalk, Brian; Alford, Lee; Henney, Chris; Gilbert, Logan

    2010-04-01

    In most organizations, IT (information technology) infrastructure exists to support the organization's mission. The threat of cyber attacks poses risks to this mission. Current network security research focuses on the threat of cyber attacks to the organization's IT infrastructure; however, the risks to the overall mission are rarely analyzed or formalized. This connection of IT infrastructure to the organization's mission is often neglected or carried out ad-hoc. Our work bridges this gap and introduces analyses and formalisms to help organizations understand the mission risks they face from cyber attacks. Modeling an organization's mission vulnerability to cyber attacks requires a description of the IT infrastructure (network model), the organization mission (business model), and how the mission relies on IT resources (correlation model). With this information, proper analysis can show which cyber resources are of tactical importance in a cyber attack, i.e., controlling them enables a large range of cyber attacks. Such analysis also reveals which IT resources contribute most to the organization's mission, i.e., lack of control over them gravely affects the mission. These results can then be used to formulate IT security strategies and explore their trade-offs, which leads to better incident response. This paper presents our methodology for encoding IT infrastructure, organization mission and correlations, our analysis framework, as well as initial experimental results and conclusions.

  9. A cognitive and economic decision theory for examining cyber defense strategies.

    Energy Technology Data Exchange (ETDEWEB)

    Bier, Asmeret Brooke

    2014-01-01

    Cyber attacks pose a major threat to modern organizations. Little is known about the social aspects of decision making among organizations that face cyber threats, nor do we have empirically-grounded models of the dynamics of cooperative behavior among vulnerable organizations. The effectiveness of cyber defense can likely be enhanced if information and resources are shared among organizations that face similar threats. Three models were created to begin to understand the cognitive and social aspects of cyber cooperation. The first simulated a cooperative cyber security program between two organizations. The second focused on a cyber security training program in which participants interact (and potentially cooperate) to solve problems. The third built upon the first two models and simulates cooperation between organizations in an information-sharing program.

  10. Factors influencing the adoption of a healthy eating campaign by federal cross-sector partners: a qualitative study.

    Science.gov (United States)

    Fernandez, Melissa Anne; Desroches, Sophie; Turcotte, Mylène; Marquis, Marie; Dufour, Joëlle; Provencher, Véronique

    2016-08-30

    The Eat Well Campaign (EWC) was a social marketing campaign developed by Health Canada and disseminated to the public with the help of cross-sector partners. The purpose of this study was to describe factors that influenced cross-sector partners' decision to adopt the EWC. Thematic content analysis, based primarily on an a priori codebook of constructs from Roger's diffusion of innovations decision process model, was conducted on hour-long semi-structured telephone interviews with Health Canada's cross-sector partners (n = 18). Dominant themes influencing cross-sector partners' decision to adopt the EWC were: high compatibility with the organization's values; being associated with Health Canada; and low perceived complexity of activities. Several adopters indicated that social norms (e.g., knowing that other organizations in their network were involved in the collaboration) played a strong role in their decision to participate, particularly for food retailers and small organizations. The opportunity itself to work in partnership with Health Canada and other organizations was seen as a prominent relative advantage by many organizations. Adopters were characterized as having high social participation and positive attitudes towards health, new ideas and Health Canada. The lack of exposure to the mass media channels used to diffuse the campaign and reserved attitudes towards Health Canada were prominent obstacles identified by a minority of health organizations, which challenged the decision to adopt the EWC. Most other barriers were considered as minor challenges and did not appear to impede the adoption process. Understanding factors that influence cross-sector adoption of nutrition initiatives can help decision makers target the most appropriate partners to advance public health objectives. Government health agencies are likely to find strong partners in organizations that share the same values as the initiative, have positive attitudes towards health, are

  11. Cyber Operations and Cyber Terrorism

    Science.gov (United States)

    2005-08-15

    terrorists are able to communicate in a secure environment. Using steganography , they hide instructions, plans and pictures for their attacks in...local prayer leaders, audio -video cassettes and CDs promoting their cause; terrorist groups also use their own websites to recruit new members. This...spyware as well because it invariably includes components for tracking and reporting user information. steganography : The process of hiding

  12. Cyber risks for business professionals a management guide

    CERN Document Server

    Kendrick, Rupert

    2010-01-01

    Cyber Risks for Business Professionals: A Management Guide is a general guide to the origins of cyber risks and to developing suitable strategies for their management. It provides a breakdown of the main risks involved and shows you how to manage them. Covering the relevant legislation on information security and data protection, the author combines his legal expertise with a solid, practical grasp of the latest developments in IT to offer a comprehensive overview of a highly complex subject.

  13. Evaluation of a cross-sector community initiative partnership: delivering a local sport program.

    Science.gov (United States)

    Kihl, Lisa A; Tainsky, Scott; Babiak, Kathy; Bang, Hyejin

    2014-06-01

    Corporate community initiatives (CCI) are often established via cross-sector partnerships with nonprofit agencies to address critical social problems. While there is a growing body of literature exploring the effectiveness and social impact of these partnerships, there is a limited evaluative research on the implementation and execution processes of CCIs. In this paper, we examined the implementation and operational processes in the delivery of a professional sport organization's CCI initiative using program theory evaluation. The findings showed discrepancies between the associate organization and the implementers regarding understanding and fulfilling responsibilities with performing certain aspects (maintaining accurate records and program marketing) of the service delivery protocol. Despite program stakeholders being satisfied overall with the program delivery, contradictions between program stakeholders' satisfaction in the quality of program delivery was found in critical components (marketing and communications) of the service delivery. We conclude that ongoing evaluations are necessary to pinpoint the catalyst of the discrepancies along with all partners valuing process evaluation in addition to outcome evaluation. Copyright © 2014 Elsevier Ltd. All rights reserved.

  14. SASTRA CYBER DI INDONESIA

    Directory of Open Access Journals (Sweden)

    Laily Fitriani

    2011-10-01

    Full Text Available The digital era started when the internet technology spread to the developing countries including Indonesia. The flourish of cyber literature leads to the debate on the quality of the work of literature. Above all, the existence of literature sites (cyber literature becomes an important alternative for writers and literary activist in Indonesia.

  15. 电力系统信息物理融合建模与综合安全评估:驱动力与研究构想%Power System Cyber-physical Modelling and Security Assessment:Motivation and Ideas

    Institute of Scientific and Technical Information of China (English)

    郭庆来; 辛蜀骏; 孙宏斌; 王剑辉

    2016-01-01

    智能电网与能源互联网都是典型的信息物理融合系统(cyber-physical system,CPS),信息环节的可靠性问题可能导致物理系统的运行风险。为了对其系统及信息故障进行分析评估,文中在分析了对电力系统进行信息物理融合建模与评估的必要性去驱动力后,提出了一种CPS融合建模构想。该方法将 CPS 系统抽象为一个有向拓扑图,模型将物理系统和信息系统中的状态量统一抽象为“数据节点”,将信息处理、信息传输等环节抽象为“信息支路”。在此基础上,系统的信息-能量流可通过矩阵运算的方式快速简单地进行量化计算,与一般的迭代计算和仿真方法相比,该方法可有效提升计算速率。最后,对信息物理系统的综合安全评估技术体系进行了展望。%Smart grid is a typical cyber-physical system (CPS), in which the disturbance on cyber part may result in the operation risks on physical systems. In order to perform system assessment and contingency analysis for the cyber-physical power grid, we first reviewed the significance and necessity of the CPS assessment for the power system, and proposed an analytic cyber-physical modeling architecture to describe the couple relationship of cyber and physical systems adopting graph theory, set theory and matrix theory afterwards.In this model, the HCS cyber network can be abstracted to a directed graph consisting of data nodes and directed branches. This model supports hybrid computing of the system information-energy flow with matrix transformation and operations, which has a higher computational efficacy while ensure some accuracy compared with simulation-based approaches. At last, we also explored the outlook of the future cyber-physical security assessment for the power system.

  16. How to define and build an effective cyber threat intelligence capability how to understand, justify and implement a new approach to security

    CERN Document Server

    Dalziel, Henry; Carnall, James

    2014-01-01

    Intelligence-Led Security: How to Understand, Justify and Implement a New Approach to Security is a concise review of the concept of Intelligence-Led Security. Protecting a business, including its information and intellectual property, physical infrastructure, employees, and reputation, has become increasingly difficult. Online threats come from all sides: internal leaks and external adversaries; domestic hacktivists and overseas cybercrime syndicates; targeted threats and mass attacks. And these threats run the gamut from targeted to indiscriminate to entirely accidental. Amo

  17. Cyber Science, Biometrics and Digital Forensics: Workshop on Emerging Cyber Techniques and Technologies

    Science.gov (United States)

    2016-09-07

    Trojan detection and prevention, security of the electronics supply chain , and anti-reverse engineering. A secondary interest of his lies with...Circuits- Detection and Avoidance”. He is a Guest Editor of IEEE Computer 2016 Special Issue on `` Supply Chain Security for Cyber-Infrastructure.” He was...has a higher signal-to-noise ratio, and enables targeted measurements of specific brain regions, we show that fNIRS has significant promise as a

  18. 77 FR 1942 - Homeland Security Science and Technology Advisory Committee (HSSTAC)

    Science.gov (United States)

    2012-01-12

    ... as new developments in systems engineering, cyber- security, knowledge management and how best to... SECURITY Homeland Security Science and Technology Advisory Committee (HSSTAC) AGENCY: Department of Homeland Security Science and Technology Directorate (DHS S&T), Department of Homeland Security....

  19. Implementation of collaborative governance in cross-sector innovation and education networks: evidence from the National Health Service in England.

    Science.gov (United States)

    Ovseiko, Pavel V; O'Sullivan, Catherine; Powell, Susan C; Davies, Stephen M; Buchan, Alastair M

    2014-11-08

    Increasingly, health policy-makers and managers all over the world look for alternative forms of organisation and governance in order to add more value and quality to their health systems. In recent years, the central government in England mandated several cross-sector health initiatives based on collaborative governance arrangements. However, there is little empirical evidence that examines local implementation responses to such centrally-mandated collaborations. Data from the national study of Health Innovation and Education Clusters (HIECs) are used to provide comprehensive empirical evidence about the implementation of collaborative governance arrangements in cross-sector health networks in England. The study employed a mixed-methods approach, integrating both quantitative and qualitative data from a national survey of the entire population of HIEC directors (N = 17; response rate = 100%), a group discussion with 7 HIEC directors, and 15 in-depth interviews with HIEC directors and chairs. The study provides a description and analysis of local implementation responses to the central government mandate to establish HIECs. The latter represent cross-sector health networks characterised by a vague mandate with the provision of a small amount of new resources. Our findings indicate that in the case of HIECs such a mandate resulted in the creation of rather fluid and informal partnerships, which over the period of three years made partial-to-full progress on governance activities and, in most cases, did not become self-sustaining without government funding. This study has produced valuable insights into the implementation responses in HIECs and possibly other cross-sector collaborations characterised by a vague mandate with the provision of a small amount of new resources. There is little evidence that local dominant coalitions appropriated the central HIEC mandate to their own ends. On the other hand, there is evidence of interpretation and implementation of the

  20. Basic Issues on the Global Cyber Security and Cyber Crime Convention%全球网络安全与犯罪公约制定的基本问题

    Institute of Scientific and Technical Information of China (English)

    崔聪聪; 巩姗姗

    2015-01-01

    网络的开放性、跨国性决定了网络安全是全球性的难题。制定网络安全与犯罪公约,在全球范围内采取统一行动打击网络犯罪,不仅可以阻止网络威胁和网络攻击事件的发生,而且还能为国家及国际解决方案的形成提供必要的体系结构。全球网络安全与犯罪公约的内容应包括打击网络犯罪的实体法和程序法、网络安全文化建设、提高执法人员执法能力以及打击网络犯罪的合作机制等具体制度。各国应建立终身的、系统化的网络安全教育机制。公约应涵盖网络钓鱼、垃圾邮件、身份盗窃以及对关键信息基础设施进行的大规模、有组织的网络攻击等危害网络安全的行为。执法机关在收集往来数据时,要履行严格的保密义务。在强化各国合作、追查网络犯罪的过程中,应尊重各国的主权。%Internet is open and can be accessed trans-nationally,which makes Internet security a global issue.A conven-tion concerned about e-security and e-criminal,together with the unified sanctions to e-criminal all over the world is an effective way to prevent e-threat and attack.What’s more,such conventions can provide a mode for state resolution or e-ven International resolution.Substantive law and procedure law aimed at tackling e-criminal,measures to built e-security culture,the improvement of law enforcement ,a cooperation mechanism of striking e-criminal and other specific systems must be contained in that convention.Every state shall build a lifelong and systematic e-security education mechanism. It’s necessary for the convention to take e-fishing,junk mail,id-theft,e-attack aimed at key information infrastructures and other activities that can impact e-security as part of it.Enforcement authority shall keep the data they collected strict-ly confidential.Sovereignty shall be respected in e-criminal investigation and international-cooperation.

  1. Proposals from the ERNCIP Thematic Group, “Case Studies for the Cyber-security of Industrial Automation and Control Systems”, for a European IACS Components Cyber-security Compliance and Certification Scheme. Thematic Area Industrial Control Systems and Smart Grids

    OpenAIRE

    Théron, Paul; SANDRO Bologna

    2014-01-01

    All studies recently published agree. Industrial Automation and Control Systems (IACS) increasingly constitutes a target for cyber-attacks aiming at disturbing Member States’ economies, at disabling our critical infrastructures or at taking advantage from our people. Such hostile acts take place in a context of geostrategic tensions, for the satisfaction of organised crime’s purposes, or else in support of possible activist causes. In this context, the ERNCIP Thematic Group (TG) “Case studie...

  2. Design of Hack-Resistant Diabetes Devices and Disclosure of Their Cyber Safety.

    Science.gov (United States)

    Sackner-Bernstein, Jonathan

    2017-03-01

    The focus of the medical device industry and regulatory bodies on cyber security parallels that in other industries, primarily on risk assessment and user education as well as the recognition and response to infiltration. However, transparency of the safety of marketed devices is lacking and developers are not embracing optimal design practices with new devices. Achieving cyber safe diabetes devices: To improve understanding of cyber safety by clinicians and patients, and inform decision making on use practices of medical devices requires disclosure by device manufacturers of the results of their cyber security testing. Furthermore, developers should immediately shift their design processes to deliver better cyber safety, exemplified by use of state of the art encryption, secure operating systems, and memory protections from malware.

  3. Visions, beliefs, and transformation: exploring cross-sector and transboundary dynamics in the wider Mekong region

    Directory of Open Access Journals (Sweden)

    Alex Smajgl

    2015-06-01

    Full Text Available Policy and investment decisions in highly connected, developing regions can have implications that extend beyond their initial objectives of national development and poverty reduction. Local level decisions that aim to promote trajectories toward desirable futures are often transformative, unexpectedly altering factors that are determined at higher regional levels. The converse also applies. The ability to realize desirable local futures diminishes if decision-making processes are not coordinated with other influential governance and decision levels. Providing effective support across multiple levels of decision making in a connected, transformative environment requires (a identification and articulation of desired outcomes at the relevant levels of decision making, (b improved understanding of complex cross-scale interactions that link to potentially transforming decisions, and (c learning among decision makers and decision influencers. Research implemented through multiple participatory modalities can facilitate such relevant system learning to contribute to sustainable adaptation pathways. We test application of a systematic policy engagement framework, the Challenge and Reconstruct Learning or ChaRL framework, on a set of interdependent development decisions in the Mekong region. The analysis presented here is focused on the implementations of the ChaRL process in the Nam Ngum River Basin, Lao People's Democratic Republic and the Tonle Sap Lake and environs, Cambodia to exemplify what cross-scale and cross-sectoral insights were generated to inform decision-making processes in the wider Mekong region. The participatory process described aligns the facilitated development of scenarios articulating shared future visions at local and regional levels with agent-based simulations and facilitates learning by contrasting desired outcomes with likely, potentially maladaptive outcomes.

  4. Building an intelligence-led security program

    CERN Document Server

    Liska, Allan

    2014-01-01

    As recently as five years ago, securing a network meant putting in a firewall, intrusion detection system, and installing antivirus software on the desktop. Unfortunately, attackers have grown more nimble and effective, meaning that traditional security programs are no longer effective. Today's effective cyber security programs take these best practices and overlay them with intelligence. Adding cyber threat intelligence can help security teams uncover events not detected by traditional security platforms and correlate seemingly disparate events across the network. Properly-implemented inte

  5. Timing of cyber conflict.

    Science.gov (United States)

    Axelrod, Robert; Iliev, Rumen

    2014-01-28

    Nations are accumulating cyber resources in the form of stockpiles of zero-day exploits as well as other novel methods of engaging in future cyber conflict against selected targets. This paper analyzes the optimal timing for the use of such cyber resources. A simple mathematical model is offered to clarify how the timing of such a choice can depend on the stakes involved in the present situation, as well as the characteristics of the resource for exploitation. The model deals with the question of when the resource should be used given that its use today may well prevent it from being available for use later. The analysis provides concepts, theory, applications, and distinctions to promote the understanding strategy aspects of cyber conflict. Case studies include the Stuxnet attack on Iran's nuclear program, the Iranian cyber attack on the energy firm Saudi Aramco, the persistent cyber espionage carried out by the Chinese military, and an analogous case of economic coercion by China in a dispute with Japan. The effects of the rapidly expanding market for zero-day exploits are also analyzed. The goal of the paper is to promote the understanding of this domain of cyber conflict to mitigate the harm it can do, and harness the capabilities it can provide.

  6. Towards a Research Agenda for Cyber Friendly Fire

    Energy Technology Data Exchange (ETDEWEB)

    Greitzer, Frank L.; Clements, Samuel L.; Carroll, Thomas E.; Fluckiger, Jerry D.

    2009-11-18

    Historical assessments of combat fratricide reveal principal contributing factors in the effects of stress, degradation of skills due to continuous operations or sleep deprivation, poor situation awareness, and lack of training and discipline in offensive/defense response selection. While these problems are typically addressed in R&D focusing on traditional ground-based combat, there is also an emerging need for improving situation awareness and decision making on defensive/offensive response options in the cyber defense arena, where a mistaken response to an actual or perceived cyber attack could lead to destruction or compromise of friendly cyber assets. The purpose of this report is to examine cognitive factors that may affect cyber situation awareness and describe possible research needs to reduce the likelihood and effects of "friendly cyber fire" on cyber defenses, information infrastructures, and data. The approach is to examine concepts and methods that have been described in research applied to the more traditional problem of mitigating the occurrence of combat identification and fratricide. Application domains of interest include cyber security defense against external or internal (insider) threats.

  7. Cyber Threat Assessment of Uplink and Commanding System for Mission Operation

    Science.gov (United States)

    Ko, Adans Y.; Tan, Kymie M. C.; Cilloniz-Bicchi, Ferner; Faris, Grant

    2014-01-01

    Most of today's Mission Operations Systems (MOS) rely on Ground Data System (GDS) segment to mitigate cyber security risks. Unfortunately, IT security design is done separately from the design of GDS' mission operational capabilities. This incoherent practice leaves many security vulnerabilities in the system without any notice. This paper describes a new way to system engineering MOS, to include cyber threat risk assessments throughout the MOS development cycle, without this, it is impossible to design a dependable and reliable MOS to meet today's rapid changing cyber threat environment.

  8. Quantifying Mixed Uncertainties in Cyber Attacker Payoffs

    Energy Technology Data Exchange (ETDEWEB)

    Chatterjee, Samrat; Halappanavar, Mahantesh; Tipireddy, Ramakrishna; Oster, Matthew R.; Saha, Sudip

    2015-04-15

    Representation and propagation of uncertainty in cyber attacker payoffs is a key aspect of security games. Past research has primarily focused on representing the defender’s beliefs about attacker payoffs as point utility estimates. More recently, within the physical security domain, attacker payoff uncertainties have been represented as Uniform and Gaussian probability distributions, and intervals. Within cyber-settings, continuous probability distributions may still be appropriate for addressing statistical (aleatory) uncertainties where the defender may assume that the attacker’s payoffs differ over time. However, systematic (epistemic) uncertainties may exist, where the defender may not have sufficient knowledge or there is insufficient information about the attacker’s payoff generation mechanism. Such epistemic uncertainties are more suitably represented as probability boxes with intervals. In this study, we explore the mathematical treatment of such mixed payoff uncertainties.

  9. A Systematic Comprehensive Computational Model for Stake Estimation in Mission Assurance: Applying Cyber Security Econometrics System (CSES) to Mission Assurance Analysis Protocol (MAAP)

    Energy Technology Data Exchange (ETDEWEB)

    Abercrombie, Robert K [ORNL; Sheldon, Frederick T [ORNL; Grimaila, Michael R [ORNL

    2010-01-01

    In earlier works, we presented a computational infrastructure that allows an analyst to estimate the security of a system in terms of the loss that each stakeholder stands to sustain as a result of security breakdowns. In this paper, we discuss how this infrastructure can be used in the subject domain of mission assurance as defined as the full life-cycle engineering process to identify and mitigate design, production, test, and field support deficiencies of mission success. We address the opportunity to apply the Cyberspace Security Econometrics System (CSES) to Carnegie Mellon University and Software Engineering Institute s Mission Assurance Analysis Protocol (MAAP) in this context.

  10. Application of life cycle thinking in multidisciplinary multistakeholder contexts for cross-sectoral planning and implementation of sustainable development projects.

    Science.gov (United States)

    Thabrew, Lanka; Ries, Robert

    2009-07-01

    Development planning and implementation is a multifaceted and multiscale task mainly because of the involvement of multiple stakeholders across sectors and disciplines. Even though top-down sectoral planning is commonly practiced, bottom-up cross-sectoral planning involving all relevant stakeholders in a transdisciplinary learning environment has been recognized as a better option, especially if the goal is to drive development projects toward sustainable implementation (Rowe and Fudge 2003; Müller et al. 2005; Global Development Research Center 2008). Even though many planning approaches have this goal, there are limited decision frameworks that are suitable for achieving consensus among stakeholders from multiple disciplines with sectoral objectives and priorities. In most instances, the upstream and downstream effects of development decisions are not thoroughly investigated or communicated with the relevant stakeholders, strongly affecting cross-sectoral integration in the real world (Wiek, Brundiers, et al. 2006). This article presents methodological aspects of developing a stakeholder based life cycle assessment framework (SBLCA) for upstream-downstream decision analysis in a multistakeholder development planning context. The applicability of the framework is demonstrated using simple examples extracted from a pilot case study conducted in Sri Lanka for sustainable posttsunami reconstruction at a village scale. The applicability of SBLCA in specific planning stages, how it promotes transdisciplinary learning and cross-sectoral stakeholder integration in phases of project cycles, and how local stakeholders can practice life cycle thinking in their village development planning and implementation are discussed.

  11. CyberPetri at CDX 2016: Real-time Network Situation Awareness

    Energy Technology Data Exchange (ETDEWEB)

    Arendt, Dustin L.; Best, Daniel M.; Burtner, Edwin R.; Paul, Celeste

    2016-10-24

    CyberPetri is a novel visualization technique that provides a flexible map of the network based on available characteristics, such as IP address, operating system, or service. Previous work introduced CyberPetri as a visualization feature in Ocelot, a network defense tool that helped security analysts understand and respond to an active defense scenario. In this paper we present a case study in which we use the CyberPetri visualization technique to support real-time situation awareness during the 2016 Cyber Defense Exercise.

  12. 信息安全进入“控”时代,亟待培育国家网络空间安全与发展战略文化%Developing and Flourishing Cyber Security Strategic Culture in an Era of Controllability

    Institute of Scientific and Technical Information of China (English)

    吴世忠; 秦安

    2013-01-01

    进入“控”时代,信息成为国家的核心资产,信息的控制与反控制成为国家安全的核心内容,培育“信息强国、自主可控、网络国防”为核心的国家网络空间安全与发展战略文化,发挥“主导文化、引导产业、建设国防”的作用,催生中国信息产业“十八罗汉”,建设网络国防力量,成为实现“中国梦”的必然选择。%Entering an era charactering control ability pursuit and information’s importance as a national asset, control ing and anti-control ing of information has been seen as an integral part of national security. It is time to develop our own cyber security strategic culture, with core principle of building a big cyber power, achieving independence and control ability as wel as strengthening cyber defense, thus to help guiding dominant culture, industry development and strengthening national defense, expecting the emergence of the“eighteen arhats”of China IT industry. It is also a must to do on the path to realize the Chinese Dream.

  13. Measuring Human Performance within Computer Security Incident Response Teams

    Energy Technology Data Exchange (ETDEWEB)

    McClain, Jonathan T. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Silva, Austin Ray [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Avina, Glory Emmanuel [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Forsythe, James C. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2015-09-01

    Human performance has become a pertinen t issue within cyber security. However, this research has been stymied by the limited availability of expert cyber security professionals. This is partly attributable to the ongoing workload faced by cyber security professionals, which is compound ed by the limited number of qualified personnel and turnover of p ersonnel across organizations. Additionally, it is difficult to conduct research, and particularly, openly published research, due to the sensitivity inherent to cyber ope rations at most orga nizations. As an alternative, the current research has focused on data collection during cyb er security training exercises. These events draw individuals with a range of knowledge and experience extending from seasoned professionals to recent college gradu ates to college students. The current paper describes research involving data collection at two separate cyber security exercises. This data collection involved multiple measures which included behavioral performance based on human - machine transactions and questionnaire - based assessments of cyber security experience.

  14. E-Canada and the Emerging Cyber Attack Exigency

    Directory of Open Access Journals (Sweden)

    Craig MacEachern

    2011-10-01

    Full Text Available

    This paper examines the growing concern surrounding cyber-attacks, and warns about the possible impacts of a cyber-attack upon Canadian e-government, economy, and infrastructure. This paper covers historical examples of cyber-attacks on a global scale, then focuses on Canadian e-government vulnerabilities, and suggests some ways in which Canadian government must adapt its domestic security and internet policies to confront the future inevitability of cyber-attacks.  

  15. Detection and Modeling of Cyber Attacks with Petri Nets

    Directory of Open Access Journals (Sweden)

    Bartosz Jasiul

    2014-12-01

    Full Text Available The aim of this article is to present an approach to develop and verify a method of formal modeling of cyber threats directed at computer systems. Moreover, the goal is to prove that the method enables one to create models resembling the behavior of malware that support the detection process of selected cyber attacks and facilitate the application of countermeasures. The most common cyber threats targeting end users and terminals are caused by malicious software, called malware. The malware detection process can be performed either by matching their digital signatures or analyzing their behavioral models. As the obfuscation techniques make the malware almost undetectable, the classic signature-based anti-virus tools must be supported with behavioral analysis. The proposed approach to modeling of malware behavior is based on colored Petri nets. This article is addressed to cyber defense researchers, security architects and developers solving up-to-date problems regarding the detection and prevention of advanced persistent threats.

  16. Non Security – Premise of Cybercrime

    Directory of Open Access Journals (Sweden)

    Ion IVAN

    2012-04-01

    Full Text Available It is presented the concept of cyber crime. There are detailed the vulnerabilities of IT applications. There are listed the types of Internet fraud. There are analyzed the predisposing factors of cyber crime. There are identified the deficiencies of the security systems. It is build a model for information security management.

  17. 78 FR 14101 - Homeland Security Science and Technology Advisory Committee (HSSTAC)

    Science.gov (United States)

    2013-03-04

    ... systems engineering, cyber-security, knowledge management and how best to leverage related technologies... Security and the evolution of the Cyber Security Division of DHS S&T. The committee will review the... SECURITY Homeland Security Science and Technology Advisory Committee (HSSTAC) AGENCY: Science...

  18. Cyber-Victimized Students

    Directory of Open Access Journals (Sweden)

    Kaitlyn N. Ryan

    2013-12-01

    Full Text Available Bullying is a common topic in the media and academic settings. Teachers are regularly expected to provide curriculum and intervene regarding all forms of bullying, including cyber-bullying. Altering the behaviors of those who bully is often the focus of interventions, with less attention being placed on victim impact. The purpose of this article was to provide educators with a review of evidence regarding the occurrence, impact, and interventions for victims of cyber-bullying. Evidence reveals that cyber-bullying can have emotional, social, and academic impacts but that there are very few documented, and even fewer evidence-based, programs for victims of cyber-bullying. We conclude by proposing that school-wide programs and support be developed and provided to victims.

  19. 从复杂网络视角评述智能电网信息安全研究现状及若干展望%Overviews and Prospects of the Cyber Security of Smart Grid from the View of Complex Network Theory

    Institute of Scientific and Technical Information of China (English)

    梅生伟; 王莹莹; 陈来军

    2011-01-01

    The future smart grid can be regarded as a dual compound network composed of the power network and cyber network, called CPPG. The study on the security of CPPG, especially the influence of the cyber security on the viability of the whole system, is of importance from both theory and engineering. This paper gives an overall o verview of studies on cyber security in power grid, and then proposes a new idea to study CPPG through developing the complex network theory. This study includes the modeling, topology characteristics extraction, cascading failure mechanism analysis and vulnerability assessment. The proposed research direction is hoped to establish the complex ity theory based on the CPPG, and the study results are expected to provide theoretic guidelines for the construction and operation of the future power grid, especially for the catastrophe prevention from the view of cyber security.%未来智能电网可视为信息/物理网相互依存的超大规模二元复合网络(cyber-physical power grid,CPPG).研究其安全理论特别是信息安全对全系统存活性的影响在理论和工程两方面均具有重要意义.全面论述了电网信息安全的国内外研究现状,提出将复杂网络理论加以发展并应用于CPPG的网络建模、拓扑结构特征提取、连锁故障机理分析和脆弱度评估的新思路.所提研究课题有望建立基于CPPG的二元网络复杂性理论,为未来智能电网的建设提供技术支撑,特别是对从信息安全角度防止系统灾变具有重要意义.

  20. Taxonomies of Cyber Adversaries and Attacks: A Survey of Incidents and Approaches

    Energy Technology Data Exchange (ETDEWEB)

    Meyers, C A; Powers, S S; Faissol, D M

    2009-10-08

    In this paper we construct taxonomies of cyber adversaries and methods of attack, drawing from a survey of the literature in the area of cyber crime. We begin by addressing the scope of cyber crime, noting its prevalence and effects on the US economy. We then survey the literature on cyber adversaries, presenting a taxonomy of the different types of adversaries and their corresponding methods, motivations, maliciousness, and skill levels. Subsequently we survey the literature on cyber attacks, giving a taxonomy of the different classes of attacks, subtypes, and threat descriptions. The goal of this paper is to inform future studies of cyber security on the shape and characteristics of the risk space and its associated adversaries.

  1. ARMY CYBER STRUCTURE ALIGNMENT

    Science.gov (United States)

    2016-02-16

    USCYBERCOM and insertion of supporting services into the cyber organizational architecture introduced the problem of overlapping command and...the cyber force organizational structure and roles and responsibilities to meet the strategic goals defined by Department of Defense (DoD) and U.S...significantly constrained by internal bureaucratic priorities and organizational cultures that limited the holistic approach required to achieve unity of effort

  2. Internet Governance amp Cyber Crimes In UAE

    Directory of Open Access Journals (Sweden)

    Ayesha Al Neyadi

    2015-08-01

    Full Text Available Abstract Most people in UAE dont feel safe while they are use the Internet because most internet users have been a victim for cyber crime. Cyber crime threat rate has increased which has targeted on citizen privacy property and governments also the reputation problems. There are many criminal activities such as indecent acts Copyright issues Terrorist Acts State security and Contempt of religion. Cyber crimes due to several reasons such as they have lack of social intelligence they are being greedy and not being content also some of them have financial troubles these reasons usually exploited by criminals. Thus the decree will be a punishment or criminalizes formally on any person who using any kind of information technology and any others private life to blackmail or to threaten others online. In addition at the present time with the most detailed new cybercrime law that can be used to prove found guilty. As well the author discusses that the new cyber-crime law provides protection of personal information including banking information credit cards and electronic payment information.

  3. 互联网金融的网络安全与信息安全要素分析%An Analysis of the Factors of Cyber and Information Security of the Internet Finance

    Institute of Scientific and Technical Information of China (English)

    谢尔曼; 黄旭; 周杨

    2015-01-01

    Based on the analysis of the concept of the Internet finance,the paper first of all proposes that the Internet financial industry should not ignore risks of cyber and information security incurred by the factor of“Internet”.Then it delves comprehensively into the four information security threats confronted by the internet financial industry in terms of the Internet system framework,user privacy,network platform usability,enter-prise internal risk,combining with the Internet risk cases that are closely related to the Internet Financial busi-nesses.Finally,the paper puts forward network and information security factors of China′s Internet Financial development from five aspects,namely,enterprise strategy,cooperation strategy,law and discipline,the bal-ance between the ease of use and safety,and the enhancement of user information security education.%基于对互联网金融的概念剖析,提出互联网金融行业不可忽视由“互联网”这一要素所引入的网络安全和信息安全风险。进而从互联网体系本身、用户隐私、网络平台可用性、企业内部风险四个方面,结合与互联网金融业务密切相关的互联网风险事件案例,全面梳理互联网金融行业所面临的四大信息安全威胁。在此基础上,从企业战略、合作策略、法律与自律、权衡易用性与安全性、加强用户信息安全教育等五个方面,提出我国互联网金融发展的网络安全要素。

  4. Exploring communication of resistance in cross-sector collaboration: Meaning-negations & counter-narratives in a case from the Danish education area

    DEFF Research Database (Denmark)

    Plotnikof, Mie

    2017-01-01

    , politicians, parents and children. The findings elucidate how communication of resistance both complicates and constructs the organizing of cross-sector collaboration: by constructing various stakeholders as resisters that become a barrier; by negotiating resistance as stakeholders’ diverging meanings......his study addresses the role of resistance in cross-sector collaboration. It explores how resistance is communicated during collaboration to better understand not just its destructive, but also constructive effects on organizing cross-sector collaboration. In so doing, the paper conceptualizes...... communication of resistance by meaning negotiations and counter-narratives. It examines these in a case-study from the education area concerning a cross-sector collaborative initiative in a local government that includes stakeholders from the education department, preschool centers, union representatives...

  5. Cybersecurity protecting critical infrastructures from cyber attack and cyber warfare

    CERN Document Server

    Johnson, Thomas A

    2015-01-01

    The World Economic Forum regards the threat of cyber attack as one of the top five global risks confronting nations of the world today. Cyber attacks are increasingly targeting the core functions of the economies in nations throughout the world. The threat to attack critical infrastructures, disrupt critical services, and induce a wide range of damage is becoming more difficult to defend against. Cybersecurity: Protecting Critical Infrastructures from Cyber Attack and Cyber Warfare examines the current cyber threat landscape and discusses the strategies being used by governments and corporatio

  6. 77 FR 56662 - Homeland Security Science and Technology Advisory Committee (HSSTAC)

    Science.gov (United States)

    2012-09-13

    ... Secretary for Science and Technology, such as new developments in systems engineering, cyber-security... SECURITY Homeland Security Science and Technology Advisory Committee (HSSTAC) AGENCY: Science and.... SUMMARY: The Homeland Security Science and Technology Advisory Committee (HSSTAC) will meet on...

  7. The Most Frequent Energy Theft Techniques and Hazards in Present Power Energy Consumption: Cyber Security in Smart Metering Low Voltage Network

    DEFF Research Database (Denmark)

    Czechowski, Robert; Kosek, Anna Magdalena

    2016-01-01

    One of the challenging problems when it comes to electric energy distribution is electricity theft. Regardless of whether the deed is done on a large scale or only by a single consumer, it is a problem that generates losses and its detection is not always easy. One of the crucial factors making t...... measures aimed at detecting such actions. The discussed technical issues can prove useful in designing increasingly refined security measures and ways to detect electricity theft....

  8. Proactive approach to Corporate Security

    CSIR Research Space (South Africa)

    Grobler, MM

    2010-05-01

    Full Text Available The best Information Security infrastructure cannot guarantee that intrusions or other malicious acts will not happen. It is necessary to know the facts and prepare beforehand knowing cyber threats and trends; knowing the broadband impact...

  9. What is the current state of the science of Cyber defense?

    Energy Technology Data Exchange (ETDEWEB)

    Hurd, Alan J. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2015-10-09

    My overall sense of the cyber defense field is one of an adolescent discipline currently bogged down in a cloud of issues, the most iconic of which is the great diversity of approaches that are being aggregated to form a coherent field. Because my own expertise is complex systems and materials physics research, I have limited direct experience in cyber security sciences except as a user of secure networks and computing resources. However, in producing this report, I have found with certainty that there exists no calculus for cyber risk assessment, mitigation, and response, although some hopeful precepts toward this end are emerging.

  10. Cross-sector diversification in financial conglomerates: simulations with a fair-value assets and liabilities model

    Directory of Open Access Journals (Sweden)

    Jacob A. Bikker

    2002-12-01

    Full Text Available Risk diversification is one of the many reasons for cross-sector mergers of financialinstitutes. This paper presents a fair-value type asset and liability model in order to identify diversification effects for financial conglomerates (PCs under various shocks. My analysis for the Netherlands reveals that diversification effects on PCs of especially interest rate shocks are very strong. In principle, substantial diversificationeffects argue for lower capital requirements for PCs. However, there are other non-negligible risks run by PCs to consider, namely contagion risk, regulatory arbitrage andcross-sector and TBTF moral hazard risks, which have not yet been quantified.

  11. Personal Cyber Security Provision Scale development studyKişisel Siber Güvenliği Sağlama Ölçeği geliştirme çalışması

    Directory of Open Access Journals (Sweden)

    Osman Erol

    2015-07-01

    Full Text Available The aim of this study is to develop a scale to determine internet users behavior related to cyber security. In this context created an item pool in accordance with expert opinion. This item pool was administered to 810 people for exploratory factor analysis. In exploratory factor analysis; principal component analysis method which is commonly used and Varimax vertical rotation method to determine the factor structure was used. Scale was administered to 292 people and structural equation modeling approach was applied to confirmation study.As a result of factor analysis,“Personal Cyber Security Provision Scale" which consists of 5 factors and 25 items and has a good compatibility was occurred.   Özet Bu araştırmanın amacı internet kullanıcılarının siber güvenlik ile ilgili davranışlarını belirlemeye yönelik bir ölçek geliştirmektir. Bu bağlamda öncelikle uzman görüşü doğrultusunda 26 maddelik bir madde havuzu oluşturulmuştur. Bu madde havuzu yapı geçerliliğinin test edilmesi için Facebook sosyal paylaşımda bir uygulamayı kullanan 810 kişiye uygulanarak açımlayıcı faktör analizi yapılmıştır. Açımlayıcı faktör analizinde en sık kullanılan yöntem olan temel bileşenler analizi yöntemi kullanılmış, ölçekteki faktör yapısını belirlemek için ise Varimax - dikey döndürme yöntemi kullanılmıştır. Ölçeğin doğrulama çalışması için ise aynı sosyal ağ uygulamasını kullanan ve daha önce ölçeğin uygulandığı kişilerin elendiği292 kişinin verisi kullanılarak yapısal eşitlik modeli yaklaşımı uygulanmıştır. Açımlayıcı faktör analizi sonucunda 5 faktörlü ve 25 maddeden oluşan; doğrulayıcı faktör analizi sonucunda ise elde edilen uyum indekslerine göre iyi bir uyuma sahip "Kişisel Siber Güvenliği Sağlama Ölçeği" ortaya çıkmıştır.

  12. ON THE OFFENSE: USING CYBER WEAPONS TO INFLUENCE COGNITIVE BEHAVIOR

    Directory of Open Access Journals (Sweden)

    Mary Fendley

    2012-12-01

    Full Text Available There is an increasing recognition that cyber warfare is an important area of development for targeting and weaponeering, with far-reaching effects in national defense and economic security. The ability to conduct effective operations in cyberspace relies on a robust situational awareness of events occurring in both the physical and information domains, with an understanding of how they affect the cognitive domain of friendly, neutral, and adversary population sets. The dynamic nature of the battlefield complicates efforts to understand shifting adversary motivations and intentions. There are very few approaches, to date, that systematically evaluate the effects of the repertoire of cyber weapons on the cognitive, perceptual, and behavioral characteristics of the adversary. In this paper, we describe a software environment called Cognitive Cyber Weapon Selection Tool (CCWST that simulates a scenario involving cyber weaponry.This tool provides the capabilities to test weapons which may induce behavioral state changes in the adversaries. CCWST provides the required situational awareness to the Cyber Information Operations (IO planner to conduct intelligent weapon selection during weapon activation in order to induce the desired behavioral change in the perception of the adversary. Weapons designed to induce the cognitive state changes of deception, distraction, distrust and confusion were then tested empirically to evaluate the capabilities and expected cognitive state changes induced by these weapons. The results demonstrated that CCWST is a powerful environment within which to test and evaluate the impact of cyber weapons on influencing cognitive behavioral states during information processing.

  13. Cyber security strategies based on HMAC in electric power remote monitoring and control system%基于HMAC算法的远程电力监控通信安全策略

    Institute of Scientific and Technical Information of China (English)

    黄梦婕; 胥布工

    2011-01-01

    In order to solve cyber security problems in electric power remote monitoring and control system, a scheme based on Hash message authentication code algorithm (HMAC) is introduced. Important functions such as message authentication, message integrity, message replay resistance, user authentication, role-based authorization limit and user-based audit log collecting are designed and realized in the scheme, which fully considers the limitation of embedded electric power terminal unit. Finally, experiments prove the feasibility and safety of the scheme. It can resist external threats like message modification, masquerade, message replay and internal threats like unauthorized access and exceeding authority.%针对我国远程电力监控通信系统的安全问题,提出了基于哈希认证码算法(HMAC)的安全方案.充分考虑了实时嵌入式电网终端设备的局限性,设计和实现了数据来源真实性和数据完整性验证、用户身份认证、基于角色的操作权限限制和基于用户ID的审计等重要的安全功能.通过实验验证了该方案的可行性和安全性,它可以抵御电网通信中存在的数据篡改、伪造攻击、重放攻击等外部威胁和非法用户操作、用户越权操作等内部威胁.

  14. Auditing Organizational Security

    Science.gov (United States)

    2017-01-01

    large and diverse cyber threats that range from unsophisticated hackers to technically com- petent intruders using state-of-the-art intrusion...targets, and programs • Consistent with the organization’s overall security threat and risk management strategy and the nature and scale of its...the security manage- ment system • Establishing meaningful security met- rics and measures of effectiveness • Ensuring security -related threats , criti

  15. Cyber threat metrics.

    Energy Technology Data Exchange (ETDEWEB)

    Frye, Jason Neal; Veitch, Cynthia K.; Mateski, Mark Elliot; Michalski, John T.; Harris, James Mark; Trevino, Cassandra M.; Maruoka, Scott

    2012-03-01

    Threats are generally much easier to list than to describe, and much easier to describe than to measure. As a result, many organizations list threats. Fewer describe them in useful terms, and still fewer measure them in meaningful ways. This is particularly true in the dynamic and nebulous domain of cyber threats - a domain that tends to resist easy measurement and, in some cases, appears to defy any measurement. We believe the problem is tractable. In this report we describe threat metrics and models for characterizing threats consistently and unambiguously. The purpose of this report is to support the Operational Threat Assessment (OTA) phase of risk and vulnerability assessment. To this end, we focus on the task of characterizing cyber threats using consistent threat metrics and models. In particular, we address threat metrics and models for describing malicious cyber threats to US FCEB agencies and systems.

  16. Lemnos Interoperable Security Program

    Energy Technology Data Exchange (ETDEWEB)

    Stewart, John [Tennessee Valley Authority, Knoxville, TN (United States); Halbgewachs, Ron [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Chavez, Adrian [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Smith, Rhett [Schweitzer Engineering Laboratories, Chattanooga, TN (United States); Teumim, David [Teumim Technical, Allentown, PA (United States)

    2012-01-31

    The manner in which the control systems are being designed and operated in the energy sector is undergoing some of the most significant changes in history due to the evolution of technology and the increasing number of interconnections to other system. With these changes however come two significant challenges that the energy sector must face; 1) Cyber security is more important than ever before, and 2) Cyber security is more complicated than ever before. A key requirement in helping utilities and vendors alike in meeting these challenges is interoperability. While interoperability has been present in much of the discussions relating to technology utilized within the energy sector and especially the Smart Grid, it has been absent in the context of cyber security. The Lemnos project addresses these challenges by focusing on the interoperability of devices utilized within utility control systems which support critical cyber security functions. In theory, interoperability is possible with many of the cyber security solutions available to utilities today. The reality is that the effort required to achieve cyber security interoperability is often a barrier for utilities. For example, consider IPSec, a widely-used Internet Protocol to define Virtual Private Networks, or tunnels , to communicate securely through untrusted public and private networks. The IPSec protocol suite has a significant number of configuration options and encryption parameters to choose from, which must be agreed upon and adopted by both parties establishing the tunnel. The exercise in getting software or devices from different vendors to interoperate is labor intensive and requires a significant amount of security expertise by the end user. Scale this effort to a significant number of devices operating over a large geographical area and the challenge becomes so overwhelming that it often leads utilities to pursue solutions from a single vendor. These single vendor solutions may inadvertently lock

  17. An Integrated Approach for Physical and Cyber Security Risk Assessment: The U.S. Army Corps of Engineers Common Risk Model for Dams

    Science.gov (United States)

    2016-07-01

    Headquarters, Office of Homeland Security, Critical Infrastructure Protection and Resilience Program. We would like to express our sincere gratitude to our... benefits of implementing a particular risk-mitigation strategy and, consequently, enable return-on- investment analyses for multiple physical and...known as the vulnerability or P(S|A)), can be determined using the following expression :6 P(S|A) = P(S|A)L1 x P(S|A)L2 x P(S|A)L3 (4) A team

  18. Security and the networked society

    CERN Document Server

    Gregory, Mark

    2013-01-01

    This book examines technological and social events during 2011 and 2012, a period that saw the rise of the hacktivist, the move to mobile platforms, and the ubiquity of social networks. It covers key technological issues such as hacking, cyber-crime, cyber-security and cyber-warfare, the internet, smart phones, electronic security, and information privacy. This book traces the rise into prominence of these issues while also exploring the resulting cultural reaction. The authors' analysis forms the basis of a discussion on future technological directions and their potential impact on society. T

  19. Process Security in Chemical Engineering Education

    Science.gov (United States)

    Piluso, Cristina; Uygun, Korkut; Huang, Yinlun; Lou, Helen H.

    2005-01-01

    The threats of terrorism have greatly alerted the chemical process industries to assure plant security at all levels: infrastructure-improvement-focused physical security, information-protection-focused cyber security, and design-and-operation-improvement-focused process security. While developing effective plant security methods and technologies…

  20. Food, Fracking, and Freshwater: The Potential for Markets and Cross-Sectoral Investments to Enable Water Conservation

    Directory of Open Access Journals (Sweden)

    Margaret Cook

    2016-01-01

    Full Text Available Hydraulic fracturing—the injection of pressurized fluid, often water, to increase recovery of oil or gas—has become increasingly popular in combination with horizontal drilling. Hydraulic fracturing improves production from a well, but requires a significant amount of water to do so and could put pressure on existing water resources, especially in water-stressed areas. To supply water needs, some water rights holders sell or lease their water resources to oil and gas producers in an informal water market. These transactions enable the opportunity for cross-sectoral investments, by which the energy sector either directly or indirectly provides the capital for water efficiency improvements in the agricultural sector as a mechanism to increase water availability for other purposes, including oil and gas production. In this analysis, we employ an original water and cost model to evaluate the water market in Texas and the potential for cross-sectoral collaboration on water efficiency improvements through a case study of the Lower Rio Grande Valley in Texas. We find that, if irrigation efficiency management practices were fully implemented, between 420 and 800 million m3 of water could be spared per year over a ten year period, potentially enabling freshwater use in oil and gas production for up to 26,000 wells, while maintaining agricultural productivity and possibly improving water flows to the ecosystem.