Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
2015
…
4 pages
1 file
It may be beneficial to the community of scholars in general and the members of Association of Information Systems (AIS) – Special Interest Group on Security and Privacy (SIGSEC) to coordinate research activities to achieve accomplishments that are beyond the scope of individual scholars as well as having the possibility to solve problems that are of value to both academics and practitioners. The Bright Blue Cybersecurity (BBC) research project seeks to develop a set of research goals in the area of cybersecurity and then devise strategies to coordinate efforts of both current and future scholars who wish to participate.
Information Systems and e-Business Management, 2012
Today's cyberspace is a powerful, virtual environment enabled by a pervasive global digital infrastructure. Even though it offers an ideal landscape for the conduct of commerce, science, education, communication, and government, cyberspace remains vulnerable to attack and manipulation from ever-evolving malicious threats. Cyber security, like other research disciplines, must often draw upon disparate fields of study to advance and create applied security measures that ensure adequate levels of confidentiality, integrity, and availability. Researchers often face challenging problems in the engineering and science fields that are only uniquely addressed by applying theoretical and practical results from different scientific areas of study. The pervasiveness of the cyber domain in almost every aspect of modern life, from government to private sector, has brought the issue of security research squarely to the forefront of international attention. As such, the need for multidisciplinary approaches to help solve the hard problems of security has become paramount as well. The impact of malicious cyber attacks on various commercial enterprises and military systems can now reach catastrophic proportions in terms of financial loss and compromise of critical information. Lockheed Martin, RSA, Google, Citigroup, the International Monetary Fund, MasterCard, the Unites States (US) Chamber of Commerce, and the US Department of Defense have all reported breech and infiltration through hackers in the last two years
Traditional "network-centric" cyber defenses intend to prevent a thief from reaching data, while new "data-centric" cyber defenses assume the thief will reach it. The new defenses make information hard to find and impossible to read. The difference between the old and new approaches is profound. By changing the balance of power between predator and prey, it introduces a new priceperformance curve for cyber security.
European Journal of Information Technologies and Computer Science
Recently, the world witnessing rapidly growing in using computer systems based on networks, and no doubt that most of the systems are running over the internet which become a normal regular issue for governments, companies, organizations, institutions, and individuals. and the majority of these systems rely on using various cloud computing services that consequently at the same time have many advantages and disadvantages, and one of the disadvantages is that some security issues are arising, and these systems sometimes are increasingly affected by the number of security threats, and by default, the threats become troubles that gained the concerns of companies and governments. where researchers work hard to find solutions to those threats. Now the demand for finding tools techniques and skills for cybersecurity professionals has become an essential issue. This paper highlights the important aspects of cybersecurity such as Cybersecurity Institutions of cybersecurity, Attacks and Atta...
This paper provides an overview and analysis of 23 research projects funded by the Netherlands Organisation for Scientific Research (NWO) over the past two years in its cybersecurity research program, guided by two editions of the Dutch National Cybersecurity Research Agenda (NCSRA I and NCSRA II). NWO’s cybersecurity research program aims to strengthen the (scientific) cybersecurity knowledge base in the Netherlands. The importance of this research field is increasing and requires the continuous and intensifying generation of cybersecurity knowledge and the delivery of sufficient cybersecurity experts on a scientific level to the Dutch society. A multidisciplinary approach is important as cybersecurity threats often have multi-dimensional characteristics.
Cyber security (or cybersecurity) has become a fundamental issue which deeply affects citizen's lives (including their privacy), the public's economic prosperity, and national security. The high frequency of media reports on highprofile cyber attacks, which cause substantial and, at times, catastrophic damages, highlights that cyberspace is a very fragile and vulnerable ecosystem, and that our understanding of cybersecurity and our capability of defending cyberspace are far from adequate. This is true despite the numerous advancements and breakthroughs in some fields of cybersecurity. One outstanding example is cryptography, which has been built on a firm foundation in Computational Complexity Theory, starting with a number of breakthroughs, e.g. Diffie and Hellman (1976), Rivest et al. (1978), Goldwasser and Micali (1982), and Yao (1982). However, there are many cyber attacks that go beyond the standard cryptographic threats models, such as attacks which can compromise cryptographic private keys by directly stealing memory pages (e.g., Harrison and Xu (2007)), or indirectly exploiting side-channel attacks (e.g., Kocher (1996)). The state-of-the-art is that we are far from being capable of adequately dealing with such attacks in
The Cyber Strategy & Policy Brief aims at raising the reader’s awareness on these issues, by monthly analysing the main international events in order to highlight the trends of cyber threats and the lessons learned that might be useful to protect national security. Keywords: Cyber Intelligence, Cyber Warfare, Iran, Islamic State, Italy, North Korea, Saudi Arabia, Strategy, Terrorism, United States, White House.
The Cyber Strategy & Policy Brief aims at raising the reader’s awareness on these issues, by monthly analysing the main international events in order to highlight the trends of cyber threats and the lessons learned that might be useful to protect national security. Keywords: Active Cyber Defence, Cyber Intelligence, Cyber Warfare, G7, Iran, Japan, Strategy, Supreme Council of Cyberspace, United Nations, United States, U.S. Naval Academy.
Challenges in Cybersecurity and Privacy - the European Research Landscape, 2019
1617-security en.pdf 9.2 Research Challenges Addressed 183 tackle LEAs needs in terms of prevention and action regarding terrorist social media online activity. The novelty the project brings is combining these technologies for the first time in an integrated solution that will be validated in the context of five LEAs. The consortium was designed to gather together all required capabilities and expertise that sustain the development of RED-Alert solution:
Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.
Communications of the ACM, 2007
CYBER-SECURITY AS AN ISSUE OF THE CONTEMPORARY SECURITY AGENDA, 2023
Przegląd Strategiczny, 2022
Cybersecurity At The Heart Of Technological Apogee And Future Development, 2018
Computer Fraud & Security, 2006
Journal of intelligence, conflict and warfare, 2022