Explore chapters and articles related to this topic
Detecting Dos Attacks by considering Energy Consumption Based on Traditional Monitoring Charts and Proposed Parameters
Published in B. K. Mishra, Samarjeet Borah, Hemant Kasturiwale, Computing and Communications Engineering in Real-Time Application Development, 2023
Sona D. Solanki, Jaymin Bhalan
The ginormous application of the internet and its economic disposition expand susceptibility to increase cybercrime. Prevention of cyber-bullying plays a vital role in the protection of computer networking. DOS attacks are one of the well-known website attacks and the most targeted threat to the security of the entire network. Simultaneously cybersecurity threats raise the cost of energy bills and greenhouse gas emissions (GHG). Thus due to the relationship between cybersecurity and energy efficiency, these cyber-attacks have an impact on energy consumption by electronic devices. This article is a great treatment on both cybersecurity as well as energy consumption.
Introduction
Published in Ravindra Das, Adopting Biometric Technology, 2017
Spillover of technology: As the use of specific biometric modalities becomes the de facto standard in the e-passport infrastructure, there is fear that the technology of one bio-metric modality could very easily spill into another, legacy security technology infrastructure. For example, if there is a specific and targeted threat to just the biometric technology infrastructure, there is a strong fear that this could create a "ripple security risk" to the structural integrity of the other security technologies that are present (and which are also non-biometric in nature).
Design Features to Address Security Challenges in Additive Manufacturing
Published in T. S. Srivatsan, T. S. Sudarshan, K. Manigandan, Manufacturing Techniques for Materials, 2018
Nikhil Gupta, Fei Chen, Khaled Shahin
For cyber–physical systems, a threat model needs to be developed based on factors such as cybersecurity tools in place, product line, external threats, and threats from within the organization (Burmester et al. 2012; Genge et al. 2012). A specific or a targeted threat can have a better success in defense at low cost whereas a generalized threat model requires a more expensive defense mechanism against all possibilities.
Robustness of Ontario power network under systemic risks
Published in Sustainable and Resilient Infrastructure, 2021
Mohamed Ezzeldin, Wael E. El-Dakhakhni
Power networks might be subjected to exogenous or endogenous disturbances that can widely vary in degree. Exogenous disturbances are mainly attributed to external conditions imposed on the network such including both natural (e.g., floods, tornados, etc.) and anthropogenic (e.g., cyber-attacks, explosions, etc.) hazards. Conversely, endogenous disturbances refer to those that are generated internally within the network due to equipment failures, supply shortages, operator errors, etc. A cascade failure under exogenous or endogenous disturbances can be simulated by stress testing the underlying power network components under random failures or targeted threats. In this respect, a random failure analysis triggers nodes/links randomly to initiate failure, while a targeted threat analysis selects failure at the nodes with the highest number of links (i.e., degree centrality) or those with the highest load demands (i.e., betweenness centrality). As such, the current study evaluates the robustness of the Ontario Power Network (OPN) under random failures and targeted threats to facilitate a comprehensive understanding and robustness evaluation of the OPN under both hazard types in an effort to formulate a provincial power systemic risk mitigation strategy.