4,203 Hits in 4.4 sec

A combined cyber and physical attack resilience scheme for Health Services Critical Infrastructure

Andreas Papalambrou, John Gialelis, Dimitrios Serpanos, S. Pantelakis, S. Koubias
2018 MATEC Web of Conferences  
on combined protection against cyber and physical attacks.  ...  This work focuses on proposing the basic components of a resilience scheme that can be used for the protection of Health Services Critical Infrastructure (HSCI) and the protection of its key assets based  ...  HSCI threats, Model and System Targets A systematic approach for defending against to any physical or cyber-attack or a combination on HSCI is still missing.  ... 
doi:10.1051/matecconf/201818805003 fatcat:gqchnulgh5d3tgdzcacaip3rou

Medical Cyber Physical Systems and Its Issues

Meghna Manoj Nair, Amit Kumar Tyagi, Richa Goyal
2019 Procedia Computer Science  
In e-healthcare, these devices built the structure of Medical Cyber Physical System (MCPS).  ...  In e-healthcare, these devices built the structure of Medical Cyber Physical System (MCPS).  ...  Fig 1 : 1 Structure of Cyber Physical System Tools and Mechanisms for Detecting These (Mitigated or Listed in Section V) Attacks  Hyper Network Model of Statistical Analysis System (SAS): It has a simple  ... 
doi:10.1016/j.procs.2020.01.059 fatcat:ldougyplanh6znw5hk3bslc4ze

Automated Cyber and Privacy Risk Management Toolkit

Gustavo Gonzalez-Granadillo, Sofia Anna Menesidou, Dimitrios Papamartzivanos, Ramon Romeu, Diana Navarro-Llobet, Caxton Okoh, Sokratis Nifakos, Christos Xenakis, Emmanouil Panaousis
2021 Sensors  
, real-time threats and Personally Identifiable Information (PII) that may occur during the dynamic life-cycle of systems.  ...  In addition, cyber risk assessment primarily investigates cyber risks as the consequence of vulnerabilities and threats that threaten assets of the investigated infrastructure.  ...  making around the privacy risks of Cyber Physical Systems (CPS).  ... 
doi:10.3390/s21165493 pmid:34450935 pmcid:PMC8399421 fatcat:q4wqfoyvivdsxekltpfaqdwl4y

Cyber security threats in the microbial genomics era: implications for public health

Iliya Fayans, Yair Motro, Lior Rokach, Yossi Oren, Jacob Moran-Gilad
2020 Eurosurveillance  
We discuss the motivations and objectives for such attack, its feasibility and implications, and highlight policy considerations aimed at threat mitigation.  ...  Owing to the rapid evolution of microbial NGS and its applications, and in light of the dynamics of the cyber security domain, frequent risk assessments should be carried out in order to identify new threats  ...  Acknowledgements This work was carried out with funding support from the Israeli Ministry of Science and Technology.  ... 
doi:10.2807/ pmid:32070468 pmcid:PMC7029451 fatcat:hcccf43durff3khw2jtppz3r2e

Cyberbiosecurity for Biopharmaceutical Products

Jennifer L. Mantle, Jayan Rammohan, Eugenia F. Romantseva, Joel T. Welch, Leah R. Kauffman, Jim McCarthy, John Schiel, Jeffrey C. Baker, Elizabeth A. Strychalski, Kelley C. Rogers, Kelvin H. Lee
2019 Frontiers in Bioengineering and Biotechnology  
Threats may be associated with the biopharmaceutical product itself or with the digital thread of manufacturing of biopharmaceuticals, including those that relate to supply chain and cyberphysical systems  ...  Cyberbiosecurity is an emerging discipline that addresses the unique vulnerabilities and threats that occur at the intersection of cyberspace and biotechnology.  ...  of comingled life and medical sciences, cyber, cyber-physical, supply chain and infrastructure systems, and developing and instituting measures to prevent, protect against, mitigate, investigate, and  ... 
doi:10.3389/fbioe.2019.00116 pmid:31214582 pmcid:PMC6554447 fatcat:wh2pw7h3pjfelmh65s6wnohf6i

CPS Attacks Mitigation Approaches on Power Electronic Systems With Security Challenges for Smart Grid Applications: A Review

Mahmoud Amin, Fayez F. M. El-Sousy, Ghada A. Abdel Aziz, Khaled Gaber, Osama A. Mohammed
2021 IEEE Access  
This paper presents an inclusive review of the cyber-physical (CP) attacks, vulnerabilities, mitigation approaches on the power electronics and the security challenges for the smart grid applications.  ...  Furthermore, appraisal of the CPS threats attacks mitigation approaches, and encounters along the smart grid applications are discussed.  ...  To detect cyber-attacks on the Internet-of-Things (IoT) applications, the sensors available in the system is utilized along with monitoring the physical system possible models.  ... 
doi:10.1109/access.2021.3063229 fatcat:fz35iccypncdfpvr6j7ixs7zyu

Towards a Framework for Assuring Cyber Physical System Security

Tianbo Lu, Jinyang Zhao, Lingling Zhao, Yang Li, Xiaoyan Zhang
2015 International Journal of Security and Its Applications  
For the past few years, researchers are focusing their researches on different aspects of security of cyber physical systems.  ...  As cyber physical systems are used more and more extensively and thoroughly, security of cyber physical systems has become the utmost important concern in system design, implementation and research.  ...  ACKNOWLEDGEMENTS International Journal of Security and Its Applications Vol. 9, No. 3 (2015)  ... 
doi:10.14257/ijsia.2015.9.3.04 fatcat:asagegebibe43pnssbe6q7d42q

IoT cyber risk: a holistic analysis of cyber risk assessment frameworks, risk vectors, and risk ranking process

Kamalanathan Kandasamy, Sethuraman Srinivas, Krishnashree Achuthan, Venkat P. Rangan
2020 EURASIP Journal on Information Security  
This study has included a review of existing popular cyber risk assessment methodologies and their suitability to IoT systems.  ...  A unique computational approach to calculate the cyber risk for IoT systems with IoT-specific impact factors has been designed and explained in the context of IoMT systems.  ...  Competing interests The authors declare that they have no competing interests and that there is no conflict of interest regarding the publication of this manuscript.  ... 
doi:10.1186/s13635-020-00111-0 fatcat:hy4xqbimbfbxlb5cnrasxdm5w4

Randomized Cyber Attack Simulation Model: A Cybersecurity Mitigation Proposal for Post COVID-19 Digital Era

KENNETH OKEREAFOR, Oluwasegun Adelaiye
2020 Figshare  
Cyber attackers are taking advantage of COVID-19 anxiety to launch email scams, misinform and mislead unsuspecting targets, and propagate harmful software using various threats.  ...  This paper proposes a Randomized Cyberattack Simulation Model (RCSM), an enhanced cyber attack readiness checklist for tackling computer crimes in advance.  ...  About the Authors Kenneth Okereafor is a United Nations trained cybersecurity and biometric expert, a former United States DoS employee with two and half decades of global experience in threat mitigation  ... 
doi:10.6084/m9.figshare.12739163 fatcat:rdesw6noi5cm3keutqlwsietda

Analyzing Cyber-Physical Threats on Robotic Platforms

Khalil Ahmad Yousef, Anas AlMajali, Salah Ghalyon, Waleed Dweik, Bassam Mohd
2018 Sensors  
To mitigate security threats, we provide possible mitigation techniques and suggestions to raise awareness of threats on the robotic platforms, especially when the robots are involved in critical missions  ...  In this paper, we examine several cyber-physical security threats that are unique to the robotic platforms; specifically the communication link and the applications.  ...  Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/s18051643 pmid:29883403 pmcid:PMC5982649 fatcat:vyy7pbmwqfdbzifzzgja7rbqsa

The Future of Cybercrime Prevention Strategies: Human Factors and A Holistic Approach to Cyber Intelligence

Sinchul Back, Jennifer LaPrade
2019 International journal of cybersecurity intelligence and cybercrime  
New technology is rapidly emerging to fight increasing cybercrime threats, however, there is one important component of a cybercrime that technology cannot always impact and that is human behavior.  ...  In this issue of the International Journal of Cybersecurity Intelligence and Cybercrime, three studies contribute to our knowledge of human factors and emerging cybercrime technology so that more effective  ...  Even though a large body of work has highlighted the significance of human and social factors on crime victimization or fear of crime in the physical world, there has been a lack of research on this relationship  ... 
doi:10.52306/02020119kdhz8339 fatcat:ipf4udxghbdudgynan33d526ni

Internet of Things Meet Internet of Threats: New Concern Cyber Security Issues of Critical Cyber Infrastructure

Amir Djenna, Saad Harous, Djamel Eddine Saidouni
2021 Applied Sciences  
We then discuss potential cyber threats and cyber vulnerabilities and the main exploitation strategies adopted by cybercriminals.  ...  In addition, with the rapid development of adversarial techniques, current cyber threats have become more sophisticated, complicated, advanced and persistent.  ...  In [48] , the authors discussed the potential threats for cyber-physical systems and proposed a matrix classification of threats based on four elements (attack type, attack impact, attack intent and attack  ... 
doi:10.3390/app11104580 fatcat:6qkkahey2rd6jazfucx55zep4e

Cyber-Biosecurity Risk Perceptions in the Biotech Sector

Kathryn Millett, Eduardo dos Santos, Piers D. Millett
2019 Frontiers in Bioengineering and Biotechnology  
Cyber-biosecurity is emerging multidisciplinary field that combines cybersecurity, biosecurity, and cyber-physical security as relates to biological systems (Murch et al., 2018).  ...  notable variation between the level of sophistication or maturity of mitigation and response measures.  ...  Assessing Current Threat Mitigation and Response Capacities While noting the lack of sufficient information on the type and level of biorisks to the biotech sector by cyber intrusions, over seventy-five  ... 
doi:10.3389/fbioe.2019.00136 pmid:31275929 pmcid:PMC6593240 fatcat:4bfs5i4exrdvvb5bfv2kqjh6ka

Electric Power Grid Resilience to Cyber Adversaries: State of the Art

Tien Nguyen, Shiyuan Wang, Mohannad Alhazmi, Mostafa Nazemi, Abouzar Estebsari, Payman Dehghanian
2020 IEEE Access  
monitoring and control systems, and a myriad of emerging modern physical hardware technologies.  ...  Rapid development and deployment of advanced network monitoring and communication systems on one hand, and the growing interdependence of the electric power grids to a multitude of lifeline critical infrastructures  ...  Investigating system models and security requirements of AMIs to present an attack tree based threat model for AMI has shown an improvement in the detection accuracy and detection speed of intrusions in  ... 
doi:10.1109/access.2020.2993233 fatcat:bm6pdoj7j5g3xn4pea6egoqm2a

A Perfect Match: Converging and Automating Privacy and Security Impact Assessment On-the-Fly

Dimitrios Papamartzivanos, Sofia Anna Menesidou, Panagiotis Gouvas, Thanassis Giannetsos
2021 Future Internet  
APSIA is powered by the use of interdependency graph models and data processing flows used to create a digital reflection of the cyber-physical environment of an organisation.  ...  Along with this model, we present a novel and extensible privacy risk scoring system for quantifying the privacy impact triggered by the identified vulnerabilities of the ICT infrastructure of an organisation  ...  In addition, there is a wide spectrum of works that focus on the analysis of cyber-physical systems, but they revolve around the cyber threats of those systems [56, 57] .  ... 
doi:10.3390/fi13020030 fatcat:uri4jg73xnazfli6fnsxxj6mhi
« Previous Showing results 1 — 15 out of 4,203 results