A. Risteski, M. Bogdanoski, Marjan Stoilkovski, M. Jovanovic
{"title":"Cyber Security Issues of Telecommunication Infrastructure","authors":"A. Risteski, M. Bogdanoski, Marjan Stoilkovski, M. Jovanovic","doi":"10.3233/978-1-61499-446-6-18","DOIUrl":"https://doi.org/10.3233/978-1-61499-446-6-18","url":null,"abstract":"We live in a well connected and technology dependent world. People, institutions, companies have increasing need for communication in everyday life. Global and seamless connectivity today is enabled by complex telecommunications infrastructure consisted of a large variety of different technologies which are in a continuous process of development and innovations. But, the global connectivity and easy access to modern technology also enables malicious users and their activities. These activities might be of different nature: starting from passive monitoring to destructive attacks disabling the normal operation of ICT (information and communication technology) infrastructure. Therefore, security issues of telecommunication infrastructure must be thoroughly addressed by all relevant stakeholders. Although each technology includes certain security mechanisms, it is necessary to create well designed security concept for the infrastructure as a whole, taking into consideration not only the technical issues, but also policy framework and legal aspects. The concept must be a subject of constant revision in order to be up to date to current threats. Therefore, the network infrastructure must be always monitored and analyzed, in order to create efficient measures against the security threats. The telecommunication infrastructure in the Republic of Macedonia is owned and operated by state institutions, telecom operators and providers, other companies and universities etc. All of them are faced with number of malicious activities and attacks exploiting vulnerabilities of the systems, which are well monitored and statistically analyzed. Also, all of them has defined more or less effective security concept including proactive and reactive measures. However, a common practice of cooperation and exchange of information and experience among the subjects is missing. A national strategy and policy framework are also missing. Their creation and devoted implementation would be beneficial for all stakeholders resulting in more effective and less expensive solutions as a response to cyber attacks","PeriodicalId":437935,"journal":{"name":"Cyber Security and Resiliency Policy Framework","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116107861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Development of Defense-Oriented Application Software under Fire: The Case of Israel","authors":"Galit M. Ben-Israel","doi":"10.3233/978-1-61499-446-6-115","DOIUrl":"https://doi.org/10.3233/978-1-61499-446-6-115","url":null,"abstract":"","PeriodicalId":437935,"journal":{"name":"Cyber Security and Resiliency Policy Framework","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121046449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Strengthening Cyber Security Policy by Means of End-Users Dedicated Training","authors":"G. Margarov","doi":"10.3233/978-1-61499-446-6-49","DOIUrl":"https://doi.org/10.3233/978-1-61499-446-6-49","url":null,"abstract":"","PeriodicalId":437935,"journal":{"name":"Cyber Security and Resiliency Policy Framework","volume":"67 19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126021616","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Protecting and Preserving Ground Water with Monitoring Systems and Vulnerability Maps","authors":"K. Papatheodorou, K. Evangelidis","doi":"10.3233/978-1-61499-446-6-135","DOIUrl":"https://doi.org/10.3233/978-1-61499-446-6-135","url":null,"abstract":"As Ground Water (GW) is a natural resource of vital importance, it’s protection against all types of threats can be considered as an absolute necessity. GW as a natural source can be effectively protected and managed using GW monitoring systems provided that, when developing such a system for a specific area of implementation, certain conditions are met and parameters are taken into account including GW recharge conditions, hydrogeological regime, land uses and GW vulnerability from surface pollution (as GW is often hydraulically connected to surface and surface water). To assess those parameters, reliable and accurate data are needed. The acquisition of such required data, regarding their economic cost and time needed, poses obstacles sometimes difficult to overcome. At this point, contemporary technologies as Geographic Information Systems (GIS) and Remote Sensing (RS) can provide solutions. In the present paper, a combination of case studies including the identification and delineation of GW recharge areas using RS, the GW vulnerability assessment using GIS and the development of a Web based GW monitoring system that can also be used as an early warning system for GW protection, is presented. The methodologies proposed have been tested in various areas of Northern Greece providing reliable results at minimal costs. Their combined application can provide the tools to constantly monitor GW quality, to detect GW pollution at a very early stage, to select and apply remediation measures and to continuously rate them, to detect pollution sources, to support decision making regarding land uses, to help raise public awareness and overall, to ensure GW protection and sustainability.","PeriodicalId":437935,"journal":{"name":"Cyber Security and Resiliency Policy Framework","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122636958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sabina Baraković, Mladen Mrkaja, A. Husic, Adnan Kulovac, J. Barakovic
{"title":"Overview of the Current Situation in Bosnia and Herzegovina with Focus on Cyber Security and Fighting Cyber-Crime by Establishment of BIH CERT Body","authors":"Sabina Baraković, Mladen Mrkaja, A. Husic, Adnan Kulovac, J. Barakovic","doi":"10.3233/978-1-61499-446-6-65","DOIUrl":"https://doi.org/10.3233/978-1-61499-446-6-65","url":null,"abstract":"","PeriodicalId":437935,"journal":{"name":"Cyber Security and Resiliency Policy Framework","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124643886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Toward Effective National Cyber Security Strategy: The Path Forward For Macedonia","authors":"M. Hadji-Janev","doi":"10.3233/978-1-61499-446-6-57","DOIUrl":"https://doi.org/10.3233/978-1-61499-446-6-57","url":null,"abstract":"","PeriodicalId":437935,"journal":{"name":"Cyber Security and Resiliency Policy Framework","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131376675","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Education as a Long-Term Strategy for Cyber Security","authors":"P. Pale","doi":"10.3233/978-1-61499-446-6-127","DOIUrl":"https://doi.org/10.3233/978-1-61499-446-6-127","url":null,"abstract":"Most of strategies and policies for cyber security are in essence reactive since they devise (counter) measures for known problems or quantitative forecasts of known problems. A long term strategy should predict new problems qualitatively. The problem with cyber security stems from the fact that cyberspace will invade physical space almost completely, including human bodies ; that the speed of changes in the way people live and work ; as well as emergence of new, related security problems, is accelerating while legislative and technical counter measures merely react on detected problems and that critical mass of humans which should recognize risks, dangers and attacks, does not and will not have required knowledge and skills. In addition everybody is potentially harmful for cyber security due to his/her ignorance or to mere statistical probability for a mistake given the fact of huge number of human-machine interactions in a unit of time and human nature being unsuitable for multiple, simultaneous routine tasks. While short term strategies have to rely on development and deployment of technical means for supervision and protection of systems, (re)defining the legal framework and creating and nurturing the (new) body of cyber law enforcement, a long term strategy is also needed. It has to focus on accelerated and prompt education and awareness rising in all age groups, literally from kindergarten to retirement. This education has to be mandatory in all school systems and within the working environment in the framework of occupational safety. It has to be a major component of everyone’s continuous, lifelong education. In order to support this strategy, national centers for awareness rising and broad education should be established, strongly linked with academia both because of academia’s deep insight in cyber security development and its involvement in development of educational methods and tools. The long term strategy has to evolve new culture of self preservation as well as community (self) care and preservation providing visible and omnipresent emergency response focal points. This long term strategy needs to be devised urgently and put in operation in parallel with short term strategies.","PeriodicalId":437935,"journal":{"name":"Cyber Security and Resiliency Policy Framework","volume":"254 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123035587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}