Monday, December 9, 2019

Chain Cyber Security

Question: Write an essay on supply chain cyber security. Answer: No. Title Summary 1. Sokolovn, A., Mesropyan, V., Chulok, A. (2014). Supply chain cyber security: A Russian outlook.Technovation,34, 389-391. Retrieved from https://www.elsevier.com/locate/technovation This article is about supply chain cyber security of Russian perspective of ICT infrastructure and internet access. The recent trend of the cyber security is seen mostly in ICT sector where the Russian organizations use the concept of the cyber security for attaining universal values and importancefornational competitiveness and integration into the global value chains by making their existing system more secure. In the public and the corporatesector, also the cyber security is applicable into in the work of public administration, education, health and safety for maintaining all the details and information in electronic formats. Supervisory Control and Data Acquisition (SCADA) systems are being accomplished with an efficient secured cyber services. Cyber security is also used in the formulation of Electronic andRadioelectronic Industriesthat endeavor for a sustainable instrument in Russia for the electronic component base industry to bridge the gap between the Russia and developed co untries. 2. Keegan, C. (2014). Cyber security in the supply chain: A perspective from the insurance industry,34(380-381). Retrieved from https://www.elsevier.com/locate/technovation The supply chain for an organization when supported by new information technology it needs some cyber security. The Russian government has adopted a certià ¯Ã‚ ¬Ã‚ cation in technology requirements and initiated the National Software Platform effort based on Russian proprietary software. This encourages the technological independence and to become a technology services exporter. In India for formulating a robust and globally competitive national presence, innovation policies for the cyber security system is developed for giving preference to the local IT suppliers. In the US, the governing bodies formulate forums for sharing information on the cyber security by communicating with the technological group. Furthermore, re-evaluating, developing and maintaining cyber security strategy is crucial for the development of the concerned countries. The United States also published National Strategy to Secure Cyberspace in the year 2003 for developing a national strategy for Homeland Securit y for protecting the state from terrorist attacks. The insurance company also encompasses some cyber security technologies like DHS and security vendors. 3. Solms, R. Niekerk, J. (2013). From information security to cyber security, (38), 97-102. Every nation adopts some technology for cyber security for mitigating the cyber crime. In this article, the circumstance of US is taken into consideration that outlines the USAs collaboration with other countries for diminishingthe cyber issues. The primary aim for considering this technology is to maintain the availability of the data with proper security, the integrity of the data for evaluating the authenticity of the stored information in the computer system and most importantly the confidentiality of the data. The international standards of ISO 27002 ensure the information security by providing security to maintain the security, confidentiality and integrity in the context of the cyber security. Cyberbullying, home automation, digital media and cyber terrorism are the cyber-related issue that is discussed in this article. Cyberbullying occurs when an intruder targeted a person and harassed them in social media psychologically. These intruders may access the home appliances like geysers, stoves and refrigeration through illegal access to these web based home appliances for harming the communal. In digital media also some hackers posts some illegal video excerpt in the social media by stealing the identity of the authenticated person and creates damage and lastly the cyber terrorism occurs when terrorists attack public infrastructuresthrough cyberspace. 4. Ben-Asher, N. Gonzalez, C. (2015). Effects of cyber security knowledge on attack detection,48, 51-61. Retrieved from https://www.elsevier.com/locate/comphumbeh In this article, the enlightened topic is the cyber attacksthat disrupt of the operational functionalities and the hacking of the sensitive information by an intruder. The information technology governancecan rectify this by the supervision of cyber experts and the analysts. The experts take the initiative to mitigate the problem of the cyber crime use intrusion detection system (IDS). The specialty of this tool is to match the pattern of the ongoing network activity with the known attacks of cyber-crime for detecting the network intrusion. This system also detects the abnormal activities in the internet network and evaluates the complexity of the cyber-attacks. The intellect of the cyber analyst ensures the detection of the cyber-attack by analyzing the standard trick for accomplishing the criminal activities in the cyber world. Another consequence of interpreting is measuring the gap between the modern technology and the known knowledge of the experts that the hackers can take adva ntage to harm others. 5. Caldwell, T. (2013). Plugging the cybersecurity skills gap. This article focuses on the gaps incyber security skills to overcome the situation of the cyber-crime. The report shed light on the fact that every employee of the organization must have the ability to handle the cyber-crime activities otherwise intruders will attack and will do serious harm to them. This needs efficient and skilled employees that most of the institute has a crisis. The qualified person in handling the cyber-crime activities relies on the age range of the 30-39yers old while the percentage of these professional decreases with increase in age. The rapid development of the information technology is the primary reason why there is a shortage of the skilled cyber experts in the organization. Furthermore, people in the institute especially women do not fill the cyber security roles to lack of interest in them. In order to overcome these issues the employee provides practical training so that they can handle the adversity in the cyber issues. 6. Wang, W. Lu, Z. (2013).Cyber Security In The Smart Grid: Survey And Challenges, (57), 1344-1371. Retrieved from https://www.elsevier.com/locate/comnet This article is on the cyber security issues in the smart grid project. People uses supply network for electricity to fulfill their requirement and organization usesthe digital technology to analyses the changes occur in the society. This makes it crucial for them to maintain a secure cyber technology so that no intruder can leak customer information and create massive blackout and destruction of infrastructure. These hackers attained the information from network resources from the stored information. The denial-of-service (DoS) attackis a common cyber-crime in this field that depicts the block or corruption of the communication accomplished by the electricity service provider including made attempt to delay in service.The industry detects this kind of the cyber-criminalactivities by adopting many procedures like signal-based detection that measure the signal strength information to detect whether there is an occurrence of the attack by some intruder or not. Packet-based detection is used to detect the attack by measuring the transmitted result of each packet and analyze the event of potential attacks by any transmission failures. Proactive and hybrid methods are used to identify the DoS attack by sending the probing packets to test or measuring the status of the attacker and formulation of a suitable method by mixing the above mentioned procedures for cyber security. 7. Manuputtyb, A., Noor c, S., Sumardid, J. (2013). CYBER SECURITY: RULE OF USE INTERNET SAFELY?, (103), 255-261. The primary reason for the adaptation of the cyber security is to measure the protection of the information technology, the level of the protection approach and the endeavor of the cyber expert to implement such approaches to implementing the cybersecurity. Cybercrime is mostly done by the high school and university students and they mainly steal the personal data like credit card details, ATM pins, and personal data from their computers. In this journal, the measurement to protect strengths and weaknesses of the software and hardware used in the organization to detect the ability of the intruder is discussed that defines the complexity of the cyber security. Three kinds of attack are usually noticed on the internet the loss of service and destruction of information through DoS, misuse of critical information to do significant impact and control of cyberspace and using them as a weapon. 8. Ashok, A., Hahn, A., Govindarasu, M. (2013). Cyber-Physical Security Of Wide-Area Monitoring, Protection And Control In A Smart Grid Environment, 5, 481-489. The cyber security approach that is analyzed in this journal article is the cyber advancements to monitor functions in the field of the power grid to supply electricity to the local communal.Advanced Metering Infrastructure (AMI), Wide-Area Monitoring,Protection and Control Systems (WAMPAC) and Demand Response (DR) are the information technology that is used in the power grid. WAMPAC determines corrective actions for each contingency through high-speed communication links to mitigate the issues involved in the cyber security. There are three kinds of attack that is discussed in the journal - timing attack, which should be executed on the order of 100150 msafter the disturbance and is detected by the analyzing delay in the communication and have intended to deluge the communication network with packets. Data integrity attack is the corruption of the data in the opposite direction of the control flow by directly attack the sensor data or actuator data. In replay attacks, the intruder manipulates the control messages by hijacking the transmitted packetsin transportation. This can be reduced by implementing efficient data encryption for the communication of the cyber details. 9. Saadawi, T. El-Desouki, A. (2014). Special Issue On Cyber Security, (5), 413-414. This article mainly emphasizes on the network security, software and application safety and the Cyber Infrastructure Protection. The cyber security professional determine the hidden nodes by using protocols like IEEE 802.11 DCF protocol. The intruder exchanges the IEEE 802.11 standard with the malicious nodes in the Internet process to illegally capture the communication channel. However, the experts also use the same technology to increase the probability of successful packet transmission. In the context of the software and application security, analyze the software developing failures for a secure programming practice. The expert uses a prototype interactive static analysis tool for supporting the other software tools like Java in Eclipse for detectingthe multiple zero-day vulnerabilities in the large open project. Lastly, for cyber infrastructure protection, the experts use a game-theoretic approach which identifies the physical disruptions in service availability that cause illeg al access to the secured system by hacking all the credentials of authenticated users and harm their identity. 10. (2013). REGULATING CYBER-SECURITY, 107(4), 1504-1567. Retrieved from https://www.copyright.com/ccc/basicSearch.do? operation=gosearchType=0 lastSearch=simpleall=ontitleOrStdNo=0029-3571 In this article, the key points for cyber security are the detection of the malicious code, take proper initiatives for making the system more reliable for cyber security. Furthermore, formulation of an efficient system that can withstand the severe attacks by an intruder and have the capability to recover from the adverse circumstance and respond according to the outcome of the cyber-attack. Numerous organization once noticed some malicious data transmission with a system is temporarily isolated to avoid the transmission of the infected data in the network system. The private firm mainly uses these cyber security facilities and invests an enormous amount in these field like $5billion. Cyber-security mainly comprises of vulnerabilities, threats, and consequences of the stack made by an intruder. In order to measure the result, a graph is depicted in this article that signifies the combinations of victims and attackers that are likely to occur.Here the x-axis resembles the significanc e of the market that is mainly targeted by the invader, and the y-axis resembles the attackers to commit a cyber-attack. Law EnforcementandArmed Conflict is the conventional method that is used for the protection of the communal from unjustified acts against their property. It also emphasizes on jurisdictional questions, punishment and deterrence based on which the organization detect attacker and make them punishable for their criminal activity. 11. Barnett, D., Sell, T., Lord, R., Jenkins, C., Terbush, J., Burke, T. (2013). Cyber Security Threats To Public Health, 5(1). This journal article emphasizes on cyber-related public health challenges. Health Information Technology for Economic and Clinical Health (HITECH) Act enlightens on the requirement of increase in the fund for health information technology for protecting health information and public health infrastructure. The pubic heath sectors impose the cyber security system for the betterment of the health care delivery system, homeland security, and the public safety. Moreover, they also focus on the stakeholder framework of the communities, academia, media and the employee and the business. These stakeholders often have to face the cyber threats like physical destruction in systems, loss of integrity, availability and confidentiality. The health care delivery system also faces subtle threats like theft of patient information that signifies secrecy, disturbance in attention because of software outages that are known as unavailability and the loss of confidence in health care providers that resem bles the situation of the integrity.These public health sectors face problem in disruption of emergency telephone lines and EMS system along with the reputational damage, financial gain and fraud, commercial advantage and economic damage by the intruder. These sectors mitigate this situation these health care take initiative for IT budget constraints and formulate an effective security strategy. Trusted identities and controlling access to information system in the computer are taken into consideration that is protected by antivirus, firewalls and other data encryption tools for cyber security. 12. Harata, J. (2013). CYBER SECURITY IN YOUNG DEMOCRACIES, 20(4), 14571472. This paper mainly focuses on This article is enlightens on the comparison of Czech Republic andLithuania in the practices of the cybernetic security. Digitization and the information society changed the business procedures while increasing the risks for the duplicity and disreputability. Cybernetic security is required in every country and society for to establishing and protecting the distributive information within the organization. It preserves all the crucial information of their communal that must have to be handled with proper care so that no intruder can hamper the confidentiality of those people. Legislative Framework is often used by major countries like Germany and USA for supporting the cyber security in developing various field like conducting safe e-commerce facilities to the consumers and protecting those communal as well as the organization themselves in the cyber space. The administration, including the Presidential office, takes initiatives to encourage the necessity of the cyber security by establishing principle regarding shared responsibility of the entire society in the context of cyber security along with the motivating innovations within cyber experts and the evolving generation for formulating a better cyber security network.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.