scholarly journals Earthquake Prediction: Analogy with Forecasting Models for Cyber Attacks in Internet and Computer Systems

Author(s):  
Elvis Pontes ◽  
Anderson A. A. Silva ◽  
Adilson E. ◽  
Srgio T.
Author(s):  
Usman Javed Butt ◽  
Maysam F. Abbod ◽  
Arvind Kumar

Marketing is a process of creating, capturing, and exchanging ‘value' for the mutual benefits of marketers, customers, intermediaries, and other stakeholders. Such a transaction requires trust as it might be facing a range of online cyber risks. Modern cybercrimes have exponentially grown over the last decade. Ransomware is one of the types of malware which is the result of a sophisticated attempt to compromise the modern computer systems. The businesses, governments, and large corporations are investing heavily to combat this cyber threat against their critical infrastructure. New technological shifts help to improve marketing and business productivity and keep the company's global competitiveness in an overflowing competitive market. However, the businesses and the systems involved need security measures to protect integrity and availability which will help avoid any malfunctioning to their operations due to the cyber-attacks. There have been several cyber-attack incidents on several businesses such as healthcare, pharmaceutical, water cleaning, and energy sector.


Significance The US indictment accuses the St Petersburg-based Internet Research Agency, its backers and staff of interfering in the election by running false social media accounts. This account of Russian trolling comes soon after US and UK accusations of Kremlin responsibility for a June 2017 cyberattack that disrupted computer systems in Ukraine and elsewhere. Impacts Private sector firms will play a growing role in attributing state-sponsored cyber attacks. Governments will become increasingly reliant on private sector capabilities, whose distance can save them diplomatic embarrassment. 'Exploits' made public could be used in hostile cyber operations.


Author(s):  
Danish Javeed ◽  
Umar MohammedBadamasi

Computer systems and applications are improving day by day and with the advancement in such area it give birth to new cyber-attacks. Man in the Middle attacks (MITM) are one of those attacks. An attack where an outsider or third party enters in between two online users, where both of the users are unaware of it. The malware in such scenario mainly monitors and have the ability to change the information which is classified onsly to these two users. Mainly it is knows as a protocol to an unauthorized user within the system who can access as well as change the information of the system without leaving any trace to the existing users. This issue is critical. This paper aims to the understanding of the MITM and to understand its different categories. Finally this paper aims to present some of mechanism for the prevention of such attacks and to identify some of the future research directions in such area


2021 ◽  
Vol 33 (4) ◽  
pp. 185-208
Author(s):  
Barbara Hewitt ◽  
Garry White

Organizations expect their employees to connect securely to the organization's computer systems. Often these employees use their personal computers to access the organization's networks. This research explores whether these same employees apply protective security measures to their personal computers. Perhaps these employees behave riskily based on their optimistic bias. Results indicate that while cyber optimistic bias and perceived vulnerability influence individuals to apply more protective security measures, the users still experienced security incidents. Thus, organization are vulnerable to cyber-attacks if they are allowing employees to use personal computers to access these databases.


Author(s):  
I. A. Lukicheva ◽  
A. L. Kulikov

THE PURPOSE. Smart electrical grids involve extensive use of information infrastructure. Such an aggregate cyber-physical system can be subject to cyber attacks. One of the ways to counter cyberattacks is state estimation. State Estimation is used to identify the present power system operating state and eliminating metering errors and corrupted data. In particular, when a real measurement is replaced by a false one by a malefactor or a failure in the functioning of communication channels occurs, it is possible to detect false data and restore them. However, there is a class of cyberattacks, so-called False Data Injection Attack, aimed at distorting the results of the state estimation. The aim of the research was to develop a state estimation algorithm, which is able to work in the presence of cyber-attack with high accuracy.METHODS. The authors propose a Multi-Model Forecasting-Aided State Estimation method based on multi-model discrete tracking parameter estimation by the Kalman filter. The multimodal state estimator consisted of three single state estimators, which produced single estimates using different forecasting models. In this paper only linear forecasting models were considered, such as autoregression model, vector autoregression model and Holt’s exponen tial smoothing. When we obtained the multi-model estimate as the weighted sum of the single-model estimates. Cyberattack detection was implemented through innovative and residual analysis. The analysis of the proposed algorithm performance was carried out by simulation modeling using the example of a IEEE 30-bus system in Matlab.RESULTS. The paper describes an false data injection cyber attack and its specific impact on power system state estimation. A Multi - Model Forecasting-Aided State Estimation algorithm has been developed, which allows detecting cyber attacks and recovering corrupted data. Simulation of the algorithm has been carried out and its efficiency has been proved.CONCLUSION. The results showed the cyber attack detection rate of 100%. The Multi-Model Forecasting-Aided State Estimation is an protective measure against the impact of cyber attacks on power system.


2011 ◽  
pp. 283-290
Author(s):  
Neil C. Rowe

Information systems (computers and networks) are increasingly the targets of attacks ranging from vandalism to serious crimes (Richardson, 2003). Since government systems are valuable resources for a society, it is important to protect them from such attacks. Unfortunately, however, government systems can be especially vulnerable (Lucasik, Goodman, & Longhurst, 2003). This is in part because government is distributed over many locations, and therefore, it is hard to protect all of its information systems well. Second, many government systems must be accessible to a wide range of people (even if through a government intermediary), unlike the specialized systems used in other settings, and users will include a few fools and criminals. Third, governments often use popular business software, and the more popular that software is, the more attacks are known against it. Finally, there are many people with antipathy or grudges against governments for one reason or another, and they may seek revenge by attacking a government’s information system and data. With the global Internet, attackers need not be in the same country as the government they attack. Therefore, it is important to become familiar with the kinds of possible attackers, attacks, and countermeasures that governments could encounter on their computer systems and computer networks (Boswoth & Kabay, 2002; Schwartau, 2001).


Author(s):  
N. C. Rowe

Information systems (computers and networks) are increasingly the targets of attacks ranging from vandalism to serious crimes (Richardson, 2003). Since government systems are valuable resources for a society, it is important to protect them from such attacks. Unfortunately, however, government systems can be especially vulnerable (Lucasik, Goodman, & Longhurst, 2003). This is in part because government is distributed over many locations, and therefore, it is hard to protect all of its information systems well. Second, many government systems must be accessible to a wide range of people (even if through a government intermediary), unlike the specialized systems used in other settings, and users will include a few fools and criminals. Third, governments often use popular business software, and the more popular that software is, the more attacks are known against it. Finally, there are many people with antipathy or grudges against governments for one reason or another, and they may seek revenge by attacking a government’s information system and data. With the global Internet, attackers need not be in the same country as the government they attack. Therefore, it is important to become familiar with the kinds of possible attackers, attacks, and countermeasures that governments could encounter on their computer systems and computer networks (Boswoth & Kabay, 2002; Schwartau, 2001).


Author(s):  
Shruti Sunil Ajankar ◽  
Aditi Rajesh Nimodiya

Cyber Security is the protection of computer systems and networks from information disclosure, theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide. So basically it is the application of technologies, processes and controls to protect systems, networks, programs, devices and data from cyber attacks. It aims to reduce the risks of cyber attacks and protect against the unauthorized exploitation of systems, networks and technologies. Whenever we think about the cyber security the first thing that comes to our mind is ‘cyber crimes’ which are increasing immensely day by day. Various Governments and companies are taking many measures in order to prevent these cyber crimes. Besides various measures cyber security is still a very big concern to many. This paper mainly focuses on some of the techniques and perspectives on transforming the cyber security. Here we have discussed a new posture for cyber security in a networked world which explains how companies can use organizational structure and governance to enhance cyber security protections.


2016 ◽  
Vol 9 (4) ◽  
pp. 110
Author(s):  
Helen Wilson ◽  
Patrick van Esch

<p>Cyberspace has emerged as the 5th domain combat zone from which large scale cyber-attacks are launched at an adversary anonymously in milliseconds, by a single stroke on a computer keyboard or mobile device. Such cyber-warfare operations deliberately seek to deceive, degrade, destroy or disrupt computer systems and networks in a battle-space that transcends borders, under the shroud of secrecy to the attacker’s identity or source (Herbert, 2012). Unlike past armed conflicts between nations, conventional weaponry, warring combatants and military objectives were readily identifiable features of the conflict. Cyber-warfare, is asymmetric and can be deceptively and expeditiously instigated by States, Non-State actors, organised groups or sole operators targeting computer networks (e.g. Estonian attack in 2007, Stuxnet attack in 2010).</p>


Sign in / Sign up

Export Citation Format

Share Document