Hybrid nature of modern threats for cybersecurity and information security
The paper deals with phenomena arising from radical disruptions in numerous spheres of human activity that challenge the conventional understanding of security. Authors endeavour to contribute to understanding of these changes and the emerging paradigm.
Oleksandr TSARUK, Maria KORNIIETS
doaj +1 more source
Challenges and Threats of the Digital Economy to the Sustainability of the National Banking System
The goal of the study – development of specific methodical reasoned proposals on improvement of the mechanism for ensuring sustainable development of the national banking system and its security against external challenges and threats to cyberspace.
M. N. Dudin, S. V. Shkodinsky
doaj +1 more source
Modeling scenarios of extreme situations in the energy sector caused by cyber threats [PDF]
The paper considers the violation of cybersecurity as a possibility of a real impact (intentional or accidental) from cyberspace on the physical infrastructure of a digital energy facility.
Gaskova Daria A., Massel Aleksei G.
doaj +1 more source
Between Hype and Understatement: Reassessing Cyber Risks as a Security Strategy [PDF]
Most of the actions that fall under the trilogy of cyber crime, terrorism,and war exploit pre-existing weaknesses in the underlying technology.Because these vulnerabilities that exist in the network are not themselvesillegal, they tend to be overlooked ...
Guinchard, Audrey
core +3 more sources
European security strategy and cyber threats: Importance for Serbia [PDF]
Cyber threats are among the greatest threats in modern conflicts, because relatively small forces and so-called unknown attackers may inflict huge losses to the more powerful, especially in the field of the information technology use.
Nedeljković Slobodan, Forca Božidar
doaj +1 more source
Protecting Cyber Physical Systems Using a Learned MAPE-K Model
Industry 4.0 leverages on cyber-physical systems (CPSs) that enable different physical sensors, actuators, and controllers to be interconnected via switches and cloud computing servers, forming complex online systems.
Ibrahim Elgendi +3 more
doaj +1 more source
STOP-IT: strategic, tactical, operational protection of water infrastructure against cyberphysical threats [PDF]
Water supply and sanitation infrastructures are essential for our welfare, but vulnerable to several attack types facilitated by the ever-changing landscapes of the digital world.
Bonet Gil, Enrique +2 more
core +1 more source
The THREAT-ARREST Cyber-Security Training Platform [PDF]
Cyber security is always a main concern for critical infrastructures and nation-wide safety and sustainability. Thus, advanced cyber ranges and security training is becoming imperative for the involved organizations.
ASA-M Al-Ghamdi +10 more
core +1 more source
Personal HealthCare of Things: A novel paradigm and futuristic approach
Abstract This study provides an investigative approach and offers a complete review of research on Internet of Medical Things (IoMT), describing the progress in general and highlighting the research issues, trends, and future aspects of IoMT. Exploring a research strategy for IoMT systems is vital as the need for IoT in healthcare grows. By aggregating
Surbhi Gupta +5 more
wiley +1 more source
Various types of cyber threats [PDF]
Security of the Internet and online communication has become an essential challenge in contemporary world. Paper discusses different types of cyber threats: cyber-attack, cyber terrorism and cybercrime.
Luknar Ivana, Jovanović Filip
doaj +1 more source

