cyber security IEEE PAPERS AND PROJECTS-2020
the protection of computer systems and networks from the theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide.
Social Cybersecurity
free download
Social cybersecurity is an emerging subdomain of national security that will affect all levels of future warfare, both conventional and unconventional, with strategic consequences. Social cybersecurity is an emerging scientific area focused on the science to characterizeThe recent rise in cybersecurity breaches in healthcare organizations has put patients privacy at a higher risk of being exposed. Despite this threat and the additional danger posed by such incidents to patients safety, as well as operational and financial threats toPolicy-makers involved in cybersecurity governance should pay close attention to the generative metaphors they use to describe and understand new technologies. Generative metaphors structure our understanding of policy problems by imposing mental models ofWireless sensor networks are deployed without predefined infrastructure and are generally left unattended. Indeed, the vulnerability of the wireless sensor networks to attacks comes principally from their inherent characteristics. As the data are transmitted over the air, it is
Cybersecurity and cardiac implantable electronic devices
free download
Conclusions Together, these cases illustrate the increasing concerns in the public domain about the cybersecurity of CIEDs. What was previously mostly of academic interest relevant to CIED companies and programmers has gained widespread public attention. As a result
IT Risk and Resilience Cybersecurity Response to COVID-19
free download
THE RAPID AND worldwide spread of the coronavirus and its illness known as COVID-19 has made huge impact on almost everything has taken us all by surprise. We all are now experiencing a major unprecedented and unexpected global public health crisis. This
Pressurizer Model and PLCs for Investigation of Cybersecurity of PWR Plants
free download
Nuclear power plants, like other critical infrastructure, need to be protected against potential cyber-attacks. The use of digital Instrumentation and Control (IC) systems in nuclear power plants raises concerns about cybersecurity vulnerabilities. A nuclear power plant employs a
IoT Device Cybersecurity Capability Core Baseline
free download
Device cybersecurity capabilities are cybersecurity features or functions that computing devices provide through their own technical means (ie, device hardware and software). This publication defines an Internet of Things (IoT) device cybersecurity capability core baseline
Core Values and Value Conflicts in Cybersecurity : Beyond Privacy Versus Security
free download
This chapter analyses some of the main values, and values conflicts, in relation to cybersecurity by distinguishing four important value clusters that should be considered when deciding on cybersecurity measures. These clusters are security, privacy, fairness and
Cyberspace and Geopolitics: Assessing Global Cybersecurity Norm Processes at a Crossroads
free download
As cyber insecurity has become a growing prob lem worldwide, states and other stakeholders have sought to increase stability for cyberspace. As a result, a new ecosystem of cyber norm pro cesses has emerged in diverse fora and formats. Today, United Nations
An Integrative Review and Analysis of Cybersecurity Research: Current State and Future Directions
free download
Advances in information technology have greatly changed communications and business transactions between firms and their customers and suppliers. As a result, cybersecurity risk attracts ever increasing attention from firms, regulators, customers, shareholders, andAbstract Cyber-attacks can be more dangerous than guns and tanks . This statement was made by Junker in his speech in the EU State of the Union in and reflects the extreme importance of this phenomenon. The increasing variety of devices that can access to Internet Obtaining accurate information about online activities in near-real time is becoming increasingly difficult, particularly because of the constantly increasing data volume, complexity, variety, and veracity, as well as the unscalability of traditional data processing
Overcoming the Challenges of Teaching Cybersecurity in UK Computer Science Degree Programmes
free download
This Innovative Practice Full Paper explores the diversity of challenges relating to the teaching of cybersecurity in UK higher education degree programmes, through the lens of national policy, to the impact on pedagogy and practice. There is a serious demand for
Ethical Frameworks for Cybersecurity
free download
This chapter presents several ethical frameworks that are useful for analysing ethical questions of cybersecurity . It begins with two frameworks that are important in practice: the principlist framework employed in the Menlo Report on cybersecurity research and the rightsThe world is currently ravaged by the novel coronavirus which has so far affected 8 410 persons in 50 countries with a death toll of 808 as at 27 th February 20 and code- named COVID-19 by the World Health Organization (WHO) on 11 th February
Cybersecurity for smart farming: socio-cultural context matters
free download
Food security is a societal issue of increasing importance requiring careful consideration of the way we produce, process, and distribute food , . Digital technologies are increasingly used to optimize processes to support these activities, and therefore, bear
Cybersecurity for the Smart Grid.
free download
The security and well-being of societies and economies are tied to the reliable operation of power systems. Due to the advancements of information and communication technologies (ICT), the traditional electric grid is evolving towards an intelligent smart grid. Smart grid is Use of technology has become a part of our everyday life. New innovative technologies are getting developed and everyone is getting dependent on it. Governments, businesses, and individuals use systems, networks, and the Internet to access, process, and store and share
Evaluating Case Study and Action Research Reports: Real-world Research in Cybersecurity
free download
There is a growing number of scientific papers reporting on case studies and action research published each year. Consequently, evaluating the quality of pilling up research reports is becoming increasingly challenging. Several approaches for evaluation of quality
Cybersecurity as an Industry: A Cyber Threat Intelligence Perspective
free download
The rapid integration of information technology has been met with an alarming rate of cyber- attacks conducted by malicious hackers using sophisticated exploits. Many organizations have aimed to develop timely, relevant, and actionable cyber threat intelligence (CTI) about The purpose of the Advances in Information Security book series is to establish the state of the art and set the course for future research in information security. The scope of this series includes not only all aspects of computer, network security, and cryptography, but related
Cybersecurity in Automotive
free download
The four ACES disruptions autonomous driving, connected cars, electric vehicles, and shared mobility have dominated the agenda of automotive industry leaders in recent years. These innovations, built on the digitization of in-car systems, the extension of car IT systems
Cybersecurity capability maturity models review and application domain
free download
Cybersecurity is a way of protecting organization critical assets, through the identification of cyber threats that can compromise the information stored, it involves the protection, identification, and responding to threats. The main aim of this article is to conduct an ample
Measuring Cybersecurity and Cyber Resiliency
free download
This report presents the results of research sponsored by the Commander of the Air Force Life Cycle Management Center to develop measures of effectiveness for cybersecurity and cyber resiliency in US Air Force missions and weapon systems. These metrics are
Exploring Cybersecurity Threats in Digital Marketing
free download
Cybersecurity is crucial to digital marketing hence dealing with security threats in cyberspace is essential for success in digital marketing which is an online business. The cornerstone of any online business is security. The primary objective of any form of online The identification and assessment of risks are a fundamental part of cybersecurity . Determining the elements that participate in this field is difficult because there is no exclusive approach to cybersecurity . This document aims to provide a framework to identify
Conceptualization of a CyberSecurity Awareness Quiz
free download
Recent approaches to raise security awareness have improved a lot in terms of user- friendliness and user engagement. However, since social engineering attacks on employees are evolving fast, new variants arise very rapidly. To deal with recent changes
Cybersecurity in Health Care
free download
Ethical questions have always been crucial in health care; the rapid dissemination of ICT makes some of those questions even more pressing and also raises new ones. One of these new questions is cybersecurity in relation to ethics in health care. In order to more closely
The Coronavirus Cybersecurity Survival Guide
free download
33. Filters are Your Friends 34. Get Familiar with Jargon 35. Identity Theft will Always be Real 36. Implement Two-Factor Authentication 37. Invest in a Privacy Screen 38. Jailbreaking Can Leave Your Phone Less Safe 39. Juice Jacking is a Thing 40. Learn About
Artificial Intelligence for Cybersecurity
free download
Artificial intelligence (AI) promises to change cybersecurity in the coming years. It will likely enhance both cyber offense and defense, and contribute to shaping the cyber threat landscape. Governing these changes is challenging, particularly for state-related actors. It
Foundational Cybersecurity Activities for IoT Device Manufacturers
free download
Abstract Internet of Things (IoT) devices often lack device cybersecurity capabilities their customers organizations and individuals can use to help mitigate their cybersecurity risks. Manufacturers can help their customers by improving how securable the IoT devices
Cybersecurity of critical infrastructure
free download
This chapter provides a political and philosophical analysis of the values at stake in ensuring cybersecurity for critical infrastructures. It presents a review of the boundaries of cybersecurity in national security, with a focus on the ethics of surveillance for protecting Cybersecurity has become a real issue in the development of smart services in the smart home domain, which is formed by a System of Systems where several smart objects are connected to each other and to the Internet. However, these connections expose the devices
An Explanatory Review on Cybersecurity Capability Maturity Models
free download
Cybersecurity is growing exponentially day by day in both the public and private sectors. This growth also comes with a new and dynamic cyber-threats risk that causes both sectors performance to halt. These sectors must update their cybersecurity measures and must
Chinas Cybersecurity Legislation
free download
The Cybersecurity Law enacted by the Chinese government in 2016-and put into force on June 0 2017-partly sought to address the existing deficiencies in data protection and online vulnerabilities. Nevertheless, the stringent measures implemented as part of this
CHAPTER II. CYBERSECURITY
free download
The issues of self-organization of the team of agents in cybersecurity systems are discussed in this section. The approaches to the definition of self-organization, functions and structures of self-organizing systems are presented. Formed a set of mathematical models included in
An Initial Industrial Cybersecurity Workforce Development Framework
free download
This document discusses the research methodology and outcomes of an effort to create a simple, flexible framework for developing an industrial (ICS) cybersecurity workforce. The effort used a variation of the nominal group technique relying on subject matter experts from
CYBERSECURITY AND SMART CITIES
free download
This paper outlines some challenges and suggestion to manage and minimize cybersecurity breach within smart cities. It also reviews various research and recommendations proposed to minimize, manage, and mitigate cyber breaches within the smart cities. According to
Analysis of definition set formed by given definitions of term cybersecurity
free download
This work exposes logical semantics analyses of definitions set of given definitions of the term cybersecurity and its impact on evolution of strategies in the field. With the given formalization of the definitions author suggests an approach of building structured
Kirti: Decentralized Reputation and SLA Enforcement for Cybersecurity
free download
The cybersecurity industry is growing at a rapid pace, with innumerable protection services available through a multitude of online marketplaces. To secure customers trust in the offered protection services, platform operators offer reputation systems through which
Adoption of i-Voting Platform in Nigeria: Dealing with Network-level Cybersecurity concerns
free download
Aminu Saleh College of Education, Azare, Bauchi State2. Abstract In 201 elections in Nigeria gulped a whopping 234.5 billion Naira as against the 108.5 billion Naira approved for the nations electoral body in 2015. Growth in population of registrable voters and
Tracking the Students Learning Behavior for Cybersecurity Scenarios⋆
free download
The ability to prevent dangerous cyber-threats in critical infrastructures depends on the availability of a security trained workforce and, therefore, an education system that can achieve this capacity. This work presents the key elements of a framework for hosting This paper discusses how governance on cyberspace used cyberculture elements and is increasingly using data to homogenize behaviors and social groups. It is intended to discuss historical and philosophical issues through transdisciplinary study, gathering political
Sandboxing the Cyberspace for Cybersecurity Education and Learning
free download
Deploying the appropriate digital environment for conducting cybersecurity exercises can be challenging and typically requires a lot of effort and system resources. Usually, for deploying vulnerable webservices and setting up labs for hands-on cybersecurity exercises to take This book deals with role of the human factors in cybersecurity . It is in fact the human element what makes the cyberspace the complex and adaptive system it is. According to international cybersecurity reports, people are both an essential part of the cybersecurity
Cybersecurity : Five Keepers in the Cyberspace Solarium Commission Report
free download
Chartered by the National Defense Authorization Act (NDAA), the Cybersecurity Solarium Commission took a broad look at US cybersecurity the current state of cyber policy in the United States, and what policies are needed to enhance cybersecurity . Sadly, the
Using Research to Ensure Equity in a Cybersecurity Education Pathway
free download
This poster describes how we are using research to inform the development of a cybersecurity education pathway to attract and retain students from groups that are underrepresented in computing fields. The partners include a non-profit research
Inter-Curricular Cybersecurity ABET Assessment Perspectives
free download
The field of cybersecurity has been rapidly developing over the past few years primarily from the quickly changing legal requirements for maintaining privacy and security of assets and their internal sensitive data. To address the changes within the computing field, the
Basic Concepts and Models of Cybersecurity
free download
This introductory chapter reviews the fundamental concepts of cybersecurity . It begins with common threats to information and systems to illustrate how matters of security can be addressed with methods from risk management. In the following, typical attack strategies
The Importance of Cybersecurity Education in School
free download
Despite the fact that the Internet has positively impacted peoples lives, there are negative issues emerged related to the use of Internet. Cases like cyber-bully, online fraud, racial abuse, pornography and gambling had increased tremendously due to the lack of
Digital Badges and E-Portfolios in Cybersecurity Education
free download
The aim of this report is to highlight efforts to develop a digital badging and e-portfolio environment that will illuminate and validate curricular, co-curricular, and extracurricular learning in cybersecurity . This effort includes Cal Poly Pomona and Coastline College
A game-based learning experience for improving cybersecurity awareness.
free download
The use of videogames is an established tool to train a systematic way of thinking that allows users to learn by gaming. In this paper, to address the increasing need of awareness in cybersecurity related issues, we present the realization of a Virtual Reality (VR) videogame
Return on Cybersecurity Investment in Operational Technology Systems: Quantifying the Value That Cybersecurity Technologies Provide after Integration.
free download
Difficult to upgrade legacy systems System downtime for upgrades is undesirable Difficult to find an appropriate cyber solution Cyber solutions for industrial systems are relatively new O ten IT solutions repackaged with OT protocols Physical systems respond to cyber
Cybersecurity Breaches and Information Technology Governance Roles in Audit Committee Charters
free download
Cybersecurity is a serious and growing risk for organizations. Firms with board of director involvement in information technology governance (ITG) be better equipped to deal with this risk. Yet little is known about the audit committees role in ITG. This study uses Companies are increasingly exposed to cybersecurity threats. Among them, SMEs are especially vulnerable due to their lack of maturity and resilience. They are also increasingly targeted by cyberattacks. In order to help SMEs to secure their business against such
Games for Cybersecurity Decision-making
free download
Decision-makers are often confronted with cybersecurity challenges, which they not fully comprehend but nonetheless need to critically address. Efficient preparation through cybersecurity games has become an invaluable tool to better prepare strategy and response
Cybersecurity Awareness Platform with Virtual Coach and Automated Challenge Assessment
free download
Over the last years, the number of cyber-attacks on industrial control systems has been steadily increasing. Among several factors, proper software development plays a vital role in keeping these systems secure. To achieve secure software, developers need to be aware ofThe research results for the main stages of designing competency models (CMs) for cybersecurity (CS) professionals are presented. A strategy for designing such models was formulated. The CS-related terminology and conceptual framework were clarified. Areas
Cybersecurity and the State
free download
This chapter provides an overview on state actors opinions and strategies relating to cybersecurity matters. These are addressed on the EU level as well as on the level of the individual European Member States while the focus is on legislation, policy and political
CSE PROJECTS