Search
Now showing items 1-10 of 65
Improved Security Performance for VANET Simulations
(4th IFAC Symposium on Telematics Applications, 2016-12-06)
Upcoming deployments of Vehicular Ad Hoc Networks (VANETs) in Europe are
expected to sign and verify packets secured by cryptographic signatures by default. Thus, when
VANET simulations are used for development and test ...
A Security Architectural Pattern for Risk Management of Industry Control Systems within Critical National Infrastructure
(Inderscience, 2017-11-22)
SCADA and ICS security have been focusing on addressing issues such as vulnerability discovery and intrusion detection within critical national infrastructure. Less attention has been paid to architectural solutions to the ...
Exploiting SCADA vulnerabilities using a Human Interface Device
(The Science and InformationOrganization, 2015)
SCADA (Supervisory Control and Data Acquisition) systems are used to control and monitor critical national infrastructure functions like electricity, gas, water and railways. Field devices such as PLC’s (Programmable Logic ...
A Security Evaluation Framework for U.K. E-Goverment Services Agile Software Development
(2016-03)
This study examines the traditional approach to software development within the United Kingdom Government and the accreditation process. Initially we look at the Waterfall methodology that has been ...
SSH Honeypot: Building, Deploying and Analysis
(SAI Organisation, 2016-05)
This article is set to discuss the various techniques that can be used while developing a honeypot, of any form, while considering the advantages and disadvantages of these very different methods. The foremost aims are to ...
HEART-IS: A Novel Technique for Evaluating Human Error-Related Information Security Incidents
(Elsevier, 2018-09-25)
Organisations continue to suffer information security incidents and breaches as a result of human error even though humans are recognised as the weakest link with regard to information security. Despite this level of ...
Can a Network Attack Be Simulated in an Emulated Environment for Network Security Training?
(MDPI, 2017-08-11)
This paper outlines a tool developed with the purpose of creating a simple configurable emulated network environment that can be used in cyber defence exercises. Research has been conducted into the various related subject ...
The Industrial Control System Cyber Defence Triage Process
(Elsevier, 2017-07-24)
The threat to Industrial Control Systems (ICS) from cyber attacks is widely acknowledged by governments and literature. Operators of ICS are looking to address these threats in an effective and cost-sensitive manner that ...
Prevention of crime in B2C E-Commerce: How E-Retailers/Banks protect themselves from Criminal Activities
(EAI Transactions on Secutiry and Safety, 2015-11-28)
Online shopping and banking institutes are a current trend in e-commerce, where online shopping and banking are frequently used over the Internet. With the fast growth of the technology and on-line practices, criminal ...
The mimetic virus: A vector for cyber security
(Inderscience, 2016)
Like conventional terrorism, cyberterrorism has the same aims and goals but the act is done exclusively within cyberspace where the computer is both weapon
and target. Unlike conventional terrorism, ...