Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
2015
…
34 pages
1 file
collaborative visualization where very high-end video transfers are used in oil exploration, or designing automobiles, etc. Further details of ITU-T security guidelines, other related matters are in [6]. 3. The Context of Security and the Threat-Scape in Cyber Warfare The bulk of this segment of the chapter and what follows it to the end of the chapter is taken from an ongoing research work at the School of Engineering, Design and Technology, University of Bradford.[7] It will cover security concepts, security engineering in context, a brief overview of cryptology(cryptography, cryptanalysis), social engineering, Distributed Denial of Service (DDoS) attack, IP Trace-back mechanism and the threat-scape in cyber warfare. This segment will be closed with some deductions.
Individual chapters of this publication are distributed under the terms of the Creative Commons Attribution 3.0 Unported License which permits commercial use, distribution and reproduction of the individual chapters, provided the original author(s) and source publication are appropriately acknowledged. If so indicated, certain images may not be included under the Creative Commons license. In such cases users will need to obtain permission from the license holder to reproduce the material. More details and guidelines concerning content reuse and adaptation can be found at http://www.intechopen.com/copyright-policy.html. Notice Statements and opinions expressed in the chapters are these of the individual contributors and not necessarily those of the editors or publisher. No responsibility is accepted for the accuracy of information contained in the published chapters. The publisher assumes no responsibility for any damage or injury to persons or property arising out of the use of any materials, instructions, methods or ideas contained in the book.
2024
Technology's rapid growth and greater reliance on digital systems have made cybersecurity a global problem for organizations. ACME Industries, a worldwide financial security corporation, follows suit. We analyze ACME Industries' IT infrastructure and make security suggestions in this study. The paper begins with a cybersecurity risk analysis that covers risk analysis standards and frameworks, valuable assets and their impact values, and threats and vulnerabilities. This study enables secure security architecture design. A DMZ server farm would secure central server files. This includes directory, DHCP, file, proxy, management, email, DB, SIEM, and web servers. DMZs keep vital servers safe. We also secure OS and networked systems. To secure network traffic, VLANs are used. VLANs isolate and govern network resources for departments, guests, Wi-Fi users, PC users, and IP phones. We cover network assaults and vulnerabilities using SIEM. Real-time security analytics can detect and respond to attacks. ACME Industries can increase network security and threat detection using SIEM data. Planning and execution are needed to change the network architecture. We describe a smooth switching mechanism. We also present industry best practices and cybersecurity principles-based research and reasons for the recommended solutions. This cybersecurity analysis study is designed to help ACME Industries understand its IT infrastructure security landscape and improve company cybersecurity. ACME Industries can reduce risks, protect sensitive data, and maintain system and data integrity by following security recommendations and industry standards
2009
Threat analysis gives how potential adversaries exploit system weakness to achieve their goals. It identifies threats and defines a risk mitigation policy for a specific architecture, functionality and configuration. In a threat analysis security metrics are a challenging requirement in order to determine the status of network security performance and to further enhance it by minimizing exposure to considerable threats and vulnerabilities. In this paper the authors propose a generic methodology for threat analysis and security metrics in order to prioritize threats and vulnerabilities and proceed with security enhancement planning in Personal Networks (PNs).
The following chapter does not have an ambition to thoroughly explore all the cyber security-related topics. However, I chose a way to open the hottest topics from the national security perspective. All the parts do not have any deep conclusions, but should serve the reader as a guide for further reading. In each part I provide you with some further references that are the most discussed and cited papers in the academic debate. However, as cyber security is an explosive topic today, we can assume that considerable amount of articles are accidentally omitted. The current securitization wave of cyber threats as one of the most serious national security issue contributes to the production of a huge amount of literature, making the finding of a wisely compiled literature not an easy task. This is the reason why the articles mentioned in the following chapter are chosen from those that are the most debated ones.
Cyber threat became one of the most serious problem for both economics and national security in the 21st century. Therefore, we need a focused research on developing efficient techniques, technologies and tools to deal with this stimulating problem. The growing dimension and complexity of spatiotemporal data generated on daily basis and from variety of sources and its distribution over all types of networks makes it a challenge to protect it from theft or damage. Cyber security is the science that concerns on protecting these big data from disruption or misused. This special issue is provided to explore the complexity of this problem and to present possible number of solutions. L. Juleen and T. Kiong in their article presented a method to enhance the security of the transmitted data over the Wireless Local Area Network. They provided a data security dynamic design algorithm that has the ability to automatically change the configuration of both encoder and decoder based on a few bits of initial input data to the encoder. There new algorithm strengthens the overall security of the transmitted data over the wireless links. Vulnerability analysis of Extensible Authentication Protocol (EAP) DoS Attack over wireless networks is presented by Malekzadeh et. al. Authors presented an experimental framework to demonstrate and quantify possible flooding attacks using unprotected EAP frames against wireless communications. Results show that such attacks can easily launch, and cause serious service disruption to compromise network availability. A professional comparison of decision tress, artificial neural network and support vector machine for network intrusion detection is presented by A. Sheta and A. Alamleh. Intrusion Detection Systems (IDSs) is one of the main solutions for computer and network security. We need IDS to identify the un-authorized access that attempt to compromise confidentiality, integrity or availability of computer or computer network. In this research, author attempted to provide new models for intrusion detection (ID) problem using veracious data mining techniques. The proposed models were capable of reducing the complexity while keeping acceptable detection accuracy. The Denial Of Service (DOS) attacks are one of the very serious networks attach. M. Salem et. al. Presented a new security technique is proposed that aims to detect the DOS attacks in WLANs and further prevent the detected attackers, in the future, from accessing the network. They measure the Probability of Denied Service (PDS) with respect to the number of attacks and the maximum number of connections that access point allows. These results show the effectiveness of the proposed technique in securing the WLAN against the DOS attacks. An analytical view on possible techniques for the identification of information systems threats sources is presented by A. Al-Zubi. He proposed a new approach for identifying the source of threats and the proposed actions to be taken against. A framework called Intrusion Detection System Using Distributed Agents (IDSUDA) was built by A. Alim et. al. This framework is extendable in its capabilities and could be enhanced to meet future challenges. A comparison of Novel architectures of VHDL Implementation of the SAFER+ encryption algorithm and Pipelined AES algorithm is also presented in this special issue by D. Sharmila and R. Neelaveni. It was found that the proposed SAFER+ architecture has better data throughput and frequency than the pipelined AES algorithm.
Network security is a complicated subject , historically only tackled by trained and experienced experts. However as more and more people become wired an increasing number of people need to understand the basic of security in a network world [1]. Network security is a very important task today for access internet and for transformation of information. In this paper , we focused mainly on network security levels issues rather than implementation and we discus about security issues related to the security attack, services and a model of network security
Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.
Journal of Information Security and Applications, 2015
international journal of engineering trends and technology, 2014
CYBER-SECURITY AS AN ISSUE OF THE CONTEMPORARY SECURITY AGENDA, 2023
Cyber security - main directions, 2023