Now showing items 1-10 of 11
A Security Architectural Pattern for Risk Management of Industry Control Systems within Critical National Infrastructure
SCADA and ICS security have been focusing on addressing issues such as vulnerability discovery and intrusion detection within critical national infrastructure. Less attention has been paid to architectural solutions to the ...
Exploiting SCADA vulnerabilities using a Human Interface Device
(The Science and InformationOrganization, 2015)
SCADA (Supervisory Control and Data Acquisition) systems are used to control and monitor critical national infrastructure functions like electricity, gas, water and railways. Field devices such as PLC’s (Programmable Logic ...
HEART-IS: A Novel Technique for Evaluating Human Error-Related Information Security Incidents
Organisations continue to suffer information security incidents and breaches as a result of human error even though humans are recognised as the weakest link with regard to information security. Despite this level of ...
The mimetic virus: A vector for cyber security
Like conventional terrorism, cyberterrorism has the same aims and goals but the act is done exclusively within cyberspace where the computer is both weapon and target. Unlike conventional terrorism, ...
Social internet of vehicles for smart cities
(Multidisciplinary Digital Publishing Institute, 2016-01)
Human Behaviour as an aspect of Cyber Security Assurance
There continue to be numerous breaches publicised pertaining to cyber security despite security practices being applied within industry for many years. This article is intended to be the first in a number of articles as ...
Electronic Medical Records and Risk Management in Hospitals of Saudi Arabia
(Taylor and Francis, 2018)
Electronic Medical Records (EMR) systems and the associated risks have been well studied in developed countries; the same cannot be said for systems in developing countries. Previous research in Saudi Arabia healthcare ...
Evaluating Information Security Core Human Error Causes (IS-CHEC) Technique in Public Sector and Comparison with the Private Sector
Background The number of reported public sector information security incidents has significantly increased recently including 22% related to the UK health sector. Over two thirds of these incidents pertain to human error, ...
Employee perspective on information security related human error in healthcare: Proactive use of IS-CHEC in questionnaire form
(IEEE Access, 2019-07-05)
The objective of the research was to establish data relating to underlying causes of human error which are the most common cause of information security incidents within a private sector healthcare organisation. A survey ...
Real-time information security incident management: a case study using the IS-CHEC technique
Information security recognised the human as the weakest link. Despite numerous international or sector-specific standards and frameworks, the information security community has not yet adopted formal mechanisms to manage ...