Explore chapters and articles related to this topic
Cyber Security Techniques, Architectures, and Design
Published in Shashi Bhushan, Manoj Kumar, Pramod Kumar, Renjith V. Ravi, Anuj Kumar Singh, Holistic Approach to Quantum Cryptography in Cyber Security, 2023
Sita Rani, Aman Kataria, Meetali Chauhan
Three very important aspects of cyber security are confidentiality, integrity, and availability. The security of a system against cyberattacks is parameterized on the basis of this triad. These three parameters are described below:Confidentiality: The fundamental idea behind confidentiality is to prevent sensitive information from unauthorized access. Identity theft, phishing, credit card fraud, wire tapping, etc. are attacks on confidentiality. These cyberattacks can be avoided using strong passwords, access control lists, and encryption.Integrity: It assures flexibility, veracity, and reliability of data. The fundamental objective is to avoid unauthorized access and modification of data. It assures the authenticity of data. A number of attacks like session hijacking, man-in-the-middle attack, etc., can violate the integrity of the data. Various mechanisms to assure integrity are encryption techniques, hashing, data access control, and checksums.Availability: It confirms the availability of the resources when needed. Consequently, the required data should be available for access to authorized users. Flood attacks and denial-of-service attacks are examples of cyberattacks which threat the availability of resources.
Vulnerability Analysis for Cyber-Physical Systems
Published in Yassine Maleh, Mohammad Shojafar, Ashraf Darwish, Abdelkrim Haqiq, Cybersecurity and Privacy in Cyber-Physical Systems, 2019
D. Sumathi, M. Roopa Chandrika
Smart grid services exploit communication technologies that also ease intruders developing malicious software called malware, targeting the communication and controlling entities of the system, leading to threats to the critical infrastructure. There are possibilities for unknown threats or vulnerabilities erupting in the hardware, operating systems, and protocols, thus breaking down the working of the entire grid system (Eder-Neuhauser et al., 2017). The different types of cyberattacks are infiltration, distributed denial of service (DDOS) attacks, repurposing attacks and other malware like worms, Trojan horse, crypto-lockers etc. The attackers deploy highly persistent software utilizing only zero days, making it challenging for the defenders to trace them. To protect smart grids, it is significant to detect and analyze the operation of malware to develop and implement intelligent countermeasures in time.
Security Tools
Published in Rohit Tanwar, Tanupriya Choudhury, Mazdak Zamani, Sunil Gupta, Information Security and Optimization, 2020
Keshav Kaushik, Rohit Tanwar, A. K. Awasthi
Due to the vast boundaries of cyberspace, there are several possible methods of cyberattack. Therefore, cybersecurity experts should be able to secure and protect cyberspace from attackers and malicious persons. Cyberattackers perform cyberattacks to steal confidential information from users, governments and private organizations. Cyberattacks can cause huge financial loss and can affect the reputation of organizations. In this part, the two most significant cybersecurity and forensics tools—Wireshark and Autopsy—will be explained.
Skills Expectations in Cybersecurity: Semantic Network Analysis of Job Advertisements
Published in Journal of Computer Information Systems, 2023
Cyberattacks on information systems have rapidly grown over the last few decades. Between 2020 and 2021, there was a 15% increase in the number of cyberattacks affecting organizations worldwide1; mid-sized (10–50 Gbps) distributed denial-of-service (DDos) attacks have increased by a whopping 293% since 2018.2 Furthermore, according to Khader, Neo, and Chai,3 the global cost associated with cyberattacks/cybercrime is now $6 trillion annually. Recent cyberattacks in the United States have demonstrated to the country and to the world that they can exploit and shut down critical information systems necessary for running and maintaining the economy. Kamiya, Kang, Kim, Milidonis, and Stulz4 found that while larger firms were more likely to be affected by cyberattacks, cyberattacks threaten businesses in all industries including agriculture, construction, manufacturing, transportation, communication, finance, energy, government, and higher education.
Securing the cyber-physical system: a review
Published in Cyber-Physical Systems, 2023
M. Lydia, G. Edwin Prem Kumar, A. Immanuel Selvakumar
Dibaji et al. (2019) presented an exhaustive survey on the systems and control aspect of securing a CPS [2]. They analysed the defence strategies and network topology in terms of prevention, resilience, detection and isolation mechanisms. They also proposed a unified threat assessment metric for a CPS. Molina and Jacob (2018) reviewed the versatility of software-defined networks (SDN) in ensuring security and reliability in CPS especially in mission critical applications [3]. Unlike traditional networks, CPS networks are subjected to challenging requirements in term of heterogeneity, reliability and flexibility. SDNs, with their control and data plane decoupled, are poised to be a great enabling technology for CPS networks. SDN facilitates in reconfiguring QoS and other policies in order to cater to real-time requirements. Security in CPS is very challenging because of complicated deployment scenarios, physical systems prone to cyberattacks and physical attacks on cyber systems. Model-based security engineering or model-driven securing algorithms have been proven to perform excellently for complex systems like CPS. In this framework, the attacks or faults are modelled mathematically. Model-based security system uses a learnt model to identify the location and intensity of any fault. Attacks and faults in a CPS can be both in the cyber and in the physical realm. The most common cyberattacks are denial-of-service (DoS), replay and deception attacks. Fault detection and isolation can be carried out using several effective mathematical approaches.
Abnormal network packets identification using header information collected from Honeywall architecture
Published in Journal of Information and Telecommunication, 2023
Kha Van Nguyen, Hai Thanh Nguyen, Thang Quyet Le, Quang Nhat Minh Truong
Cyberattack is the intentional exploitation of cyberspace and the illegal exploitation of information and information systems. Thousands of websites and applications are being attacked daily because of software vulnerabilities, attachments, and improper configuration on servers. As stated by Sun (2016), when cyberattacks occur, attackers use malicious code to change a computer system's code, logic, or data of a computer system. It can lead to destructive consequences, from a warning to severe cybercriminals, such as identity and information theft, that can harm critical data. In order to fully appreciate these destructive consequences and take preventive action, it is necessary to obtain detailed information about attacks and identify attack points of origin. Cyberattacks taking place worldwide can be instantly tracked through several Special Purpose Websites. Some of these systems, belonging to several private companies, display the source of the attack, the type of attack, the target of the attack, the attacker's IP address, the service port, and the attacker's geographic location.