{"title":"Problems of Safety in the Evolving Industrial Environment and the Development of Information Technology: The Human Factor","authors":"Valeriy Mygal, G. Mygal, Stanislav Mygal","doi":"10.11610/isij.5316","DOIUrl":"https://doi.org/10.11610/isij.5316","url":null,"abstract":"","PeriodicalId":414780,"journal":{"name":"Information & Security: An International Journal","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122338714","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A System-of-Systems Approach to Cyber Security and Resilience","authors":"George Sharkov","doi":"10.11610/isij.3706","DOIUrl":"https://doi.org/10.11610/isij.3706","url":null,"abstract":": To address the cybersecurity, safety, and reliability aspects of the entire dig-italized ecosystems, we need first to understand and possibly model how the respective computer systems of different participating entities interoperate and collaborate. Modern computer systems and emerging applications are not just large-scale and complex in the digitally connected world. We categorize them also as decentralized, distributed, networked, interoperable compositions of heterogeneous and (semi)autonomous systems and/or elements. These new types of composite systems with emergent behavior have been defined as “Systems of Systems” (SoS). This paper explores different types of SoS and analyzes the interdependencies to manage cybersecurity threats and risks and achieve cyber resilience. We review various definitions and types of SoS and the application of SoS approach to situational awareness, threat intelligence, and composite risk assessment. An SoS view on managing the supply/value chain cyber risks is also outlined.","PeriodicalId":414780,"journal":{"name":"Information & Security: An International Journal","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129772188","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ventsislav Polimenov, Katya Dimitrova, I. Mladenova, Kamen Iliev
{"title":"The Hackathons as a First Step to Build Digital Competences","authors":"Ventsislav Polimenov, Katya Dimitrova, I. Mladenova, Kamen Iliev","doi":"10.11610/isij.5313","DOIUrl":"https://doi.org/10.11610/isij.5313","url":null,"abstract":"","PeriodicalId":414780,"journal":{"name":"Information & Security: An International Journal","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124718296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Transformation of UML Design Models of Information Security System into Agent-based Simulation Models","authors":"Ivan Gaidarski, P. Kutinchev","doi":"10.11610/isij.5305","DOIUrl":"https://doi.org/10.11610/isij.5305","url":null,"abstract":"","PeriodicalId":414780,"journal":{"name":"Information & Security: An International Journal","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129881087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The C-factor in the Cybersecurity Equation: The Importance of Student Cybersecurity Competitions","authors":"Lora Pitman, B. Payne","doi":"10.11610/isij.5403","DOIUrl":"https://doi.org/10.11610/isij.5403","url":null,"abstract":"","PeriodicalId":414780,"journal":{"name":"Information & Security: An International Journal","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125464303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cyber Red Teaming: Overview of Sly, an Orchestration Tool","authors":"Paloma de la Vallée","doi":"10.11610/isij.5318","DOIUrl":"https://doi.org/10.11610/isij.5318","url":null,"abstract":"","PeriodicalId":414780,"journal":{"name":"Information & Security: An International Journal","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132433108","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Tremori, S. B. Godfrey, L. Berretta, Arnau Carrera Viñas, Pavlina Nikolova, I. Hutov
{"title":"Simulation-Based Training with Gamified Components for Augmented Border Protection","authors":"A. Tremori, S. B. Godfrey, L. Berretta, Arnau Carrera Viñas, Pavlina Nikolova, I. Hutov","doi":"10.11610/isij.5317","DOIUrl":"https://doi.org/10.11610/isij.5317","url":null,"abstract":"","PeriodicalId":414780,"journal":{"name":"Information & Security: An International Journal","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127748929","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Vlad Posea, George Sharkov, Adrian Baumann, Georgios Chatzichristos
{"title":"Towards Unified European Cyber Incident and Crisis Management Ontology","authors":"Vlad Posea, George Sharkov, Adrian Baumann, Georgios Chatzichristos","doi":"10.11610/isij.5303","DOIUrl":"https://doi.org/10.11610/isij.5303","url":null,"abstract":"","PeriodicalId":414780,"journal":{"name":"Information & Security: An International Journal","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125372708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ECHO Early Warning System as a Preventive Tool against Cybercrime in the Energy Sector","authors":"Casper Almén, Nicholas Hagström, J. Rajamäki","doi":"10.11610/isij.5301","DOIUrl":"https://doi.org/10.11610/isij.5301","url":null,"abstract":"","PeriodicalId":414780,"journal":{"name":"Information & Security: An International Journal","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126382961","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Human Factor, Resilience, and Cyber/Hybrid Influence","authors":"A. Ronchi","doi":"10.11610/isij.5315","DOIUrl":"https://doi.org/10.11610/isij.5315","url":null,"abstract":"","PeriodicalId":414780,"journal":{"name":"Information & Security: An International Journal","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130475939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}