Cyber Security and Resiliency Policy Framework最新文献

筛选
英文 中文
Cyber Security Issues of Telecommunication Infrastructure 电信基础设施的网络安全问题
Cyber Security and Resiliency Policy Framework Pub Date : 2014-10-01 DOI: 10.3233/978-1-61499-446-6-18
A. Risteski, M. Bogdanoski, Marjan Stoilkovski, M. Jovanovic
{"title":"Cyber Security Issues of Telecommunication Infrastructure","authors":"A. Risteski, M. Bogdanoski, Marjan Stoilkovski, M. Jovanovic","doi":"10.3233/978-1-61499-446-6-18","DOIUrl":"https://doi.org/10.3233/978-1-61499-446-6-18","url":null,"abstract":"We live in a well connected and technology dependent world. People, institutions, companies have increasing need for communication in everyday life. Global and seamless connectivity today is enabled by complex telecommunications infrastructure consisted of a large variety of different technologies which are in a continuous process of development and innovations. But, the global connectivity and easy access to modern technology also enables malicious users and their activities. These activities might be of different nature: starting from passive monitoring to destructive attacks disabling the normal operation of ICT (information and communication technology) infrastructure. Therefore, security issues of telecommunication infrastructure must be thoroughly addressed by all relevant stakeholders. Although each technology includes certain security mechanisms, it is necessary to create well designed security concept for the infrastructure as a whole, taking into consideration not only the technical issues, but also policy framework and legal aspects. The concept must be a subject of constant revision in order to be up to date to current threats. Therefore, the network infrastructure must be always monitored and analyzed, in order to create efficient measures against the security threats. The telecommunication infrastructure in the Republic of Macedonia is owned and operated by state institutions, telecom operators and providers, other companies and universities etc. All of them are faced with number of malicious activities and attacks exploiting vulnerabilities of the systems, which are well monitored and statistically analyzed. Also, all of them has defined more or less effective security concept including proactive and reactive measures. However, a common practice of cooperation and exchange of information and experience among the subjects is missing. A national strategy and policy framework are also missing. Their creation and devoted implementation would be beneficial for all stakeholders resulting in more effective and less expensive solutions as a response to cyber attacks","PeriodicalId":437935,"journal":{"name":"Cyber Security and Resiliency Policy Framework","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116107861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Development of Defense-Oriented Application Software under Fire: The Case of Israel 炮火下面向防御的应用软件开发:以以色列为例
Cyber Security and Resiliency Policy Framework Pub Date : 1900-01-01 DOI: 10.3233/978-1-61499-446-6-115
Galit M. Ben-Israel
{"title":"Development of Defense-Oriented Application Software under Fire: The Case of Israel","authors":"Galit M. Ben-Israel","doi":"10.3233/978-1-61499-446-6-115","DOIUrl":"https://doi.org/10.3233/978-1-61499-446-6-115","url":null,"abstract":"","PeriodicalId":437935,"journal":{"name":"Cyber Security and Resiliency Policy Framework","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121046449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Strengthening Cyber Security Policy by Means of End-Users Dedicated Training 通过终端用户专项培训加强网络安全政策
Cyber Security and Resiliency Policy Framework Pub Date : 1900-01-01 DOI: 10.3233/978-1-61499-446-6-49
G. Margarov
{"title":"Strengthening Cyber Security Policy by Means of End-Users Dedicated Training","authors":"G. Margarov","doi":"10.3233/978-1-61499-446-6-49","DOIUrl":"https://doi.org/10.3233/978-1-61499-446-6-49","url":null,"abstract":"","PeriodicalId":437935,"journal":{"name":"Cyber Security and Resiliency Policy Framework","volume":"67 19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126021616","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
E-Government 3 Web Security Issues: Who, What, When? 电子政务3网络安全问题:谁,什么,何时?
Cyber Security and Resiliency Policy Framework Pub Date : 1900-01-01 DOI: 10.3233/978-1-61499-446-6-11
Milan Maric
{"title":"E-Government 3 Web Security Issues: Who, What, When?","authors":"Milan Maric","doi":"10.3233/978-1-61499-446-6-11","DOIUrl":"https://doi.org/10.3233/978-1-61499-446-6-11","url":null,"abstract":"","PeriodicalId":437935,"journal":{"name":"Cyber Security and Resiliency Policy Framework","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131648671","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Protecting and Preserving Ground Water with Monitoring Systems and Vulnerability Maps 利用监测系统和脆弱性地图保护和保存地下水
Cyber Security and Resiliency Policy Framework Pub Date : 1900-01-01 DOI: 10.3233/978-1-61499-446-6-135
K. Papatheodorou, K. Evangelidis
{"title":"Protecting and Preserving Ground Water with Monitoring Systems and Vulnerability Maps","authors":"K. Papatheodorou, K. Evangelidis","doi":"10.3233/978-1-61499-446-6-135","DOIUrl":"https://doi.org/10.3233/978-1-61499-446-6-135","url":null,"abstract":"As Ground Water (GW) is a natural resource of vital importance, it’s protection against all types of threats can be considered as an absolute necessity. GW as a natural source can be effectively protected and managed using GW monitoring systems provided that, when developing such a system for a specific area of implementation, certain conditions are met and parameters are taken into account including GW recharge conditions, hydrogeological regime, land uses and GW vulnerability from surface pollution (as GW is often hydraulically connected to surface and surface water). To assess those parameters, reliable and accurate data are needed. The acquisition of such required data, regarding their economic cost and time needed, poses obstacles sometimes difficult to overcome. At this point, contemporary technologies as Geographic Information Systems (GIS) and Remote Sensing (RS) can provide solutions. In the present paper, a combination of case studies including the identification and delineation of GW recharge areas using RS, the GW vulnerability assessment using GIS and the development of a Web based GW monitoring system that can also be used as an early warning system for GW protection, is presented. The methodologies proposed have been tested in various areas of Northern Greece providing reliable results at minimal costs. Their combined application can provide the tools to constantly monitor GW quality, to detect GW pollution at a very early stage, to select and apply remediation measures and to continuously rate them, to detect pollution sources, to support decision making regarding land uses, to help raise public awareness and overall, to ensure GW protection and sustainability.","PeriodicalId":437935,"journal":{"name":"Cyber Security and Resiliency Policy Framework","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122636958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Overview of the Current Situation in Bosnia and Herzegovina with Focus on Cyber Security and Fighting Cyber-Crime by Establishment of BIH CERT Body 概述波斯尼亚和黑塞哥维那的现状,重点是网络安全和打击网络犯罪,建立了波黑CERT机构
Cyber Security and Resiliency Policy Framework Pub Date : 1900-01-01 DOI: 10.3233/978-1-61499-446-6-65
Sabina Baraković, Mladen Mrkaja, A. Husic, Adnan Kulovac, J. Barakovic
{"title":"Overview of the Current Situation in Bosnia and Herzegovina with Focus on Cyber Security and Fighting Cyber-Crime by Establishment of BIH CERT Body","authors":"Sabina Baraković, Mladen Mrkaja, A. Husic, Adnan Kulovac, J. Barakovic","doi":"10.3233/978-1-61499-446-6-65","DOIUrl":"https://doi.org/10.3233/978-1-61499-446-6-65","url":null,"abstract":"","PeriodicalId":437935,"journal":{"name":"Cyber Security and Resiliency Policy Framework","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124643886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Toward Effective National Cyber Security Strategy: The Path Forward For Macedonia 迈向有效的国家网络安全战略:马其顿的前进之路
Cyber Security and Resiliency Policy Framework Pub Date : 1900-01-01 DOI: 10.3233/978-1-61499-446-6-57
M. Hadji-Janev
{"title":"Toward Effective National Cyber Security Strategy: The Path Forward For Macedonia","authors":"M. Hadji-Janev","doi":"10.3233/978-1-61499-446-6-57","DOIUrl":"https://doi.org/10.3233/978-1-61499-446-6-57","url":null,"abstract":"","PeriodicalId":437935,"journal":{"name":"Cyber Security and Resiliency Policy Framework","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131376675","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Education as a Long-Term Strategy for Cyber Security 教育是网络安全的长期战略
Cyber Security and Resiliency Policy Framework Pub Date : 1900-01-01 DOI: 10.3233/978-1-61499-446-6-127
P. Pale
{"title":"Education as a Long-Term Strategy for Cyber Security","authors":"P. Pale","doi":"10.3233/978-1-61499-446-6-127","DOIUrl":"https://doi.org/10.3233/978-1-61499-446-6-127","url":null,"abstract":"Most of strategies and policies for cyber security are in essence reactive since they devise (counter) measures for known problems or quantitative forecasts of known problems. A long term strategy should predict new problems qualitatively. The problem with cyber security stems from the fact that cyberspace will invade physical space almost completely, including human bodies ; that the speed of changes in the way people live and work ; as well as emergence of new, related security problems, is accelerating while legislative and technical counter measures merely react on detected problems and that critical mass of humans which should recognize risks, dangers and attacks, does not and will not have required knowledge and skills. In addition everybody is potentially harmful for cyber security due to his/her ignorance or to mere statistical probability for a mistake given the fact of huge number of human-machine interactions in a unit of time and human nature being unsuitable for multiple, simultaneous routine tasks. While short term strategies have to rely on development and deployment of technical means for supervision and protection of systems, (re)defining the legal framework and creating and nurturing the (new) body of cyber law enforcement, a long term strategy is also needed. It has to focus on accelerated and prompt education and awareness rising in all age groups, literally from kindergarten to retirement. This education has to be mandatory in all school systems and within the working environment in the framework of occupational safety. It has to be a major component of everyone’s continuous, lifelong education. In order to support this strategy, national centers for awareness rising and broad education should be established, strongly linked with academia both because of academia’s deep insight in cyber security development and its involvement in development of educational methods and tools. The long term strategy has to evolve new culture of self preservation as well as community (self) care and preservation providing visible and omnipresent emergency response focal points. This long term strategy needs to be devised urgently and put in operation in parallel with short term strategies.","PeriodicalId":437935,"journal":{"name":"Cyber Security and Resiliency Policy Framework","volume":"254 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123035587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cyber Security - Threat Scenarios, Policy Framework and Cyber Wargames 网络安全-威胁情景,政策框架和网络战争游戏
Cyber Security and Resiliency Policy Framework Pub Date : 1900-01-01 DOI: 10.3233/978-1-61499-446-6-1
Ashok Vaseashta, P. Susmann, E. Braman
{"title":"Cyber Security - Threat Scenarios, Policy Framework and Cyber Wargames","authors":"Ashok Vaseashta, P. Susmann, E. Braman","doi":"10.3233/978-1-61499-446-6-1","DOIUrl":"https://doi.org/10.3233/978-1-61499-446-6-1","url":null,"abstract":"","PeriodicalId":437935,"journal":{"name":"Cyber Security and Resiliency Policy Framework","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133732126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Turkey's Approaches on Cyber Security Policy Framework 土耳其在网络安全政策框架上的做法
Cyber Security and Resiliency Policy Framework Pub Date : 1900-01-01 DOI: 10.3233/978-1-61499-446-6-82
N. Baykal
{"title":"Turkey's Approaches on Cyber Security Policy Framework","authors":"N. Baykal","doi":"10.3233/978-1-61499-446-6-82","DOIUrl":"https://doi.org/10.3233/978-1-61499-446-6-82","url":null,"abstract":"","PeriodicalId":437935,"journal":{"name":"Cyber Security and Resiliency Policy Framework","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125074650","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信