cyber-security research papers
The myths and facts behind cyber security risks for industrial control systems
free download
ABSTRACT Process control and SCADA systems, with their reliance on proprietary networks and hardware, have long been considered immune to the network attacks that have wreaked so much havoc on corporate information systems. Unfortunately, new research
Distributed intrusion detection and attack containment for organizational cyber security
free download
ABSTRACT The sheer number and sophistication of cyber attacks are making our nation's critical computer networks increasingly vulnerable. At the same time, these networks are being called upon to play a key role in processing, data storage, monitoring and control of
Course of Action Generation for Cyber Security Using Classical Planning.
free download
ABSTRACT We report on the results of applying classical planning techniques to the problem of analyzing computer network vulnerabilities. Specifically, we are concerned with the generation of Adversary Courses of Action, which are extended sequences of exploits
Cyber security management and e-government
free download
With the rapid growth of Information Technology, organisations are taking extra precautions when it comes to protecting information. In the complex interconnected business world, the common practice of deploying company-wide security solutions (eg, anti-virus software
Private sector cyber security investment strategies: An empirical analysis
free download
ABSTRACT Organizations typically use very robust analysis techniques to determine how best to spend resources in order to increase revenue and decrease costs or losses. However, few organizations attempt such analysis processes to determine the level and type of
Literature review on smart grid cyber security
free download
ABSTRACT The current US electrical power grid is an out-of-date infrastructure, and the Smart Grid is an upgrade that will add many new functionalities to meet customers' new power requirements. Updating a system as complex as the electrical power grid has the potential
Study of Security Attributes of Smart Grid Systems–Current Cyber Security Issues
free download
ABSTRACT This document provides information for a report to congress on Smart Grid security as required by Section 1309 of Title XIII of the Energy Independence and Security Act of 2007. The security of any future Smart Grid is dependent on successfully addressing
Smart grid cyber security strategy and requirements
free download
The Information Technology Laboratory (ITL) at the National Institute of Standards and Technology (NIST) promotes the US economy and public welfare by providing technical leadership for the Nation's measurement and standards infrastructure. ITL develops tests,
Lessons learned from cyber security assessments of SCADA and energy management systems
free download
ABSTRACT The results from ten cyber security vulnerability assessments of process control, SCADA and energy management systems, or components of those systems were reviewed to identify common problem areas. The common vulnerabilities ranged from conventional
Mixed-Initiative Cyber Security: Putting humans in the right loop
free download
ABSTRACT Organizations and their computer infrastructures have grown intertwined in complex relationships through mergers, acquisitions, reorganizations, and cooperative service delivery. Consequently, defensive actions and policy changes by one organization
Guide for designing cyber security exercises
free download
ABSTRACT Cyber security exercises are a very effective way of learning the practical aspects of information security. But designing such exercises is not an easy task and requires the work of several people. This paper presents a number of steps and guidelines that should
Control systems cyber security: Defense in depth strategies
free download
Information infrastructures across many public and private domains share several common attributes regarding IT deployments and data communications. This is particularly true in the control systems domain. A majority of the systems use robust architectures to enhance
Analysis of Operations and Cyber Security Policies for a System of Cooperating Flexible Alternating Current Transmission System (FACTS) Devices
free download
ABSTRACT Flexible Alternating Current Transmission Systems (FACTS) devices are installed on electric power transmission lines to stabilize and regulate power flow. Power lines protected by FACTS devices can increase power flow and better respond to contingencies
Cyber Security as an Emergent Infrastructure.
free download
When I began studying computer security in late 1972 as a Ph. D. student at Purdue University, the field was in its infancy. There were few academics working in the area, no research conferences or journals devoted to the field, and no professional societies to join
An approach to improving the physical and cyber security of a bulk power system with FACTS
free download
Sandia is a multi-program laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000. ? Means to modify the power flow through a
Cyber assessment methods for SCADA security
free download
Staff Computer Security Researcher InformationCommunications Systems Cyber Security Technologies Idaho National Laboratory Idaho National Laboratory KEYWORDS Supervisory Control and Data Acquisition, SCADA, Cyber Security, Testing, AssessmentABSTRACT
A Framework for Classifying and Comparing Models of Cyber Security Investment to Support Policy and Decision-Making.
free download
ABSTRACT The threat to cyber security is real and growing. Organizations of all kinds must take protective measures, but effective resource allocation is difficult. This situation is due in part to uncertainty about the nature and severity of threats and vulnerabilities, as well as about
Congress unknowingly undermines cyber-security
free download
Since 9/11, much public attention has focused on the tradeoff between security on the one hand and civil liberties and privacy on the other. We see this conflict every day when we read about the detainment of foreign nationals or the latest homeland security initiative
Cyber-physical Systems Security-Challenges and Research Ideas
free download
We argue that securing the emerging internetworked and information-rich CPSs is harder than securing typical distributed information systems because a number of cyber-security issues that have been addressed individually or in isolation within a subsystem come together in
Cyber security of water SCADA systems:(I) analysis and experimentation of stealthy deception attacks
free download
ABSTRACT In this article, our aim is to perform security threat assessment of networked control systems (NCS) systems with regulatory and supervisory control layers. We analyze the performance of a proportional-integral controller (regulatory layer), and a model-based
Introduction to the special issue on cyber security and management
free download
Today's cyberspace is a powerful, virtual environment enabled by a pervasive global digital infrastructure. Even though it offers an ideal landscape for the conduct of commerce, science, education, communication, and government, cyberspace remains vulnerable to
Experiences in Using Semantic Reasoners to Evaluate Security of Cyber Physical Systems
free download
Ontology, Semantic WebABSTRACT We decided to apply SADL technology to cyber security issues for a Smart Grid system. 5. SEPARATION OF KNOWLEDGE DOMAINS
CYBER SECURITY BEST POLICY PRACTICES FOR EDUCATIONAL LEADERS
free download
ABSTRACT The authors have researched many Educational Organizations across Maryland and Delaware and have developed and tested an instrument to measure cyber practices. The instrument allows district and building administrators to manage policies for cyber
A cyber security risk assessment for the design of I&C Systems in nuclear power plants
free download
The applications of computers and communication system and network technologies in nuclear power plants have expanded recently. This application of digital technologies to the instrumentation and control systems of nuclear power plants brings with it the cyber
Gender, Sustainability, Cyber Security, and Quality Improvement; EBusiness Management at a UAE Women's College
free download
ABSTRACT Multi-method ethnographic field research revealed women students' management efficacy as an important moderating factor. Study context was United Arab Emiratesbased, Fujairah Women's College, Higher Colleges of Technology; where female Emirati E-
Small Business Cyber Security Survey 2012
free download
Executive Summary Most people would agree that both the rate of adoption of digital technologies and the pace of change within the digital industries are ever increasing. Consumers and businesses alike are presented with an ever changing landscape where
Vulnerabilities and Countermeasures–A Survey on the Cyber Security Issues in the Transmission Subsystem of a Smart Grid
free download
ABSTRACT With the increased investment and deployment of embedded computing and communication technologies in the power system–the smart grid vision is shaping up into a reality. The future power grid is a large cyber physical system (CPS) which is vulnerable to
Federal Cyber Security R&D Program Thrusts
free download
Today's cyberspace is a powerful, virtual environment enabled by our global digital infrastructure that provides a bright landscape for commerce, science, education, communication, and government. The future of America's prosperity hinges on
Understanding Cyber Security Risk Preferences: A Case Study Analysis Inspired by Public Health Research
free download
Commercial, academic, and government individuals and groups from a variety of disciplines have tried, without full success, to address the problem of cyber security. A significant and growing part of the problem is the relative insecurity of individual Internet users-the threat
Cyber Security Challenges in Using Cloud Computing in the Electric Utility Industry
free download
AMI advanced metering infrastructure IP internet protocol IPSEC internet protocol security JSON JavaScript Object Notation NIST National Institute of StandardsTechnology PII personally identifiable information PKI public key infrastructure PMU phasor measurement
What really matters in a security architecture? A new meta-model for systems and cyber security.
free download
The discipline of designing a security architecture is relatively immature and is generally lacking in foundational principles. Although there is a large and growing field of expert practitioners, they vary in approach and there is a tendency to over focus on security
CYBER SECURITY AND THE GOVERNMENT
free download
ABSTRACT In this day of advanced technology and communication, more and more people are at risk of danger due to hackers and cyber security. Effort should be put forth by governments to protect their citizens from these dangers. Information is released regarding the United
Cyber Security and Global Interdependence: What is Critical?.
free download
These linkages and dependencies raise important questions. By now it is a familiar refrain that security of the cyber layer is of great importance. But with dense interconnections it can be extremely difficult to identify the vulnerabilities–and therefore the connections, nodes or
Cyber Security Provision and Knowledge Preservation from Theft and Mutilation of Govt. Divisional Public Library Kota by Using CCTV
free download
ABSTRACT Cyber Security Provision is mainly used by Govt. Divisional Public Library Kota to Monitor the Illegal User activity and to prevent the Theft and Mutilation or any damage by its Clientele. It provides us brief account of the Security measures available in Current
Cyber Security Threats to Safety-Critical, Space-Based Infrastructures
free download
ABSTRACT Space-based systems play an important role within national critical infrastructures. They are being integrated into advanced air-traffic management applications, rail signalling systems, energy distribution software etc. Unfortunately, the end users of
Data fusion in cyber security: first order entity extraction from common cyber data
free download
ABSTRACT The Joint Directors of Labs Data Fusion Process Model (JDL Model) provides a framework for how to handle sensor data to develop higher levels of inference in a complex environment. Beginning from a call to leverage data fusion techniques in intrusion
Cyber Security Testing and Training Programs for Industrial Control Systems
free download
ABSTRACT Service providers rely on industrial control systems (ICS) to manage the flow of water at dams, open breakers on power grids, control ventilation and cooling in nuclear power plants, and more. In today?s interconnected environment, this can present a
Cyber Security in Smart Grid Substations
free download
ABSTRACT This report describes the state of smart grid security in Europe, specifically the Netherlands, and the cyber security of substations in particular. The focus of this study is the perception of risks and threats in smart grid cyber security and the international standards
-SOFTWARE SALES SERVICE-https://www.engpaper.net--