CYBER SECURITY AND PRIVACY INTERNAL ATTACKS MEASUREMENTS THROUGH BLOCK CHAIN
نویسندگان
چکیده
منابع مشابه
SCADA Cyber Attacks and Security Vulnerabilities: Review
SCADA plays a vital role in critical infrastructures. As the modern IT technology become very advanced, the threat on industrial control system (ICS) and SCADA security become a big concern of every critical infrastructures operator. With the recent cyber-attacks, the urge to secure the critical infrastructure is a big issue especially for those countries that uses critical infrastructures. In ...
متن کاملCyber-Physical Systems Security and Privacy
4 Digital Object Identifier 10.1109/MDAT.2017.2713356 Date of current version: 30 June 2017. The focus of this issue of IEEE Design&Test is on cyber–physical systems security and privacy. Research in cyber–physical systems (CPS) has enjoyed a large increase over the past years. The same holds for security and privacy. Hence, combining both in a special issue is very appealing. And indeed this...
متن کاملCyber security through visualization
Networked computers are subject to attack, misuse, and abuse. Organizations and individuals are making every effort to build and maintain trustworthy computing systems. The main strategy is to closely monitor and inspect network activities by collecting and analyzing data about the network traffic and the trails of system usage. The analysis usually requires large amounts of finely detailed, hi...
متن کاملCyber security challenges in Smart Cities: Safety, security and privacy
The world is experiencing an evolution of Smart Cities. These emerge from innovations in information technology that, while they create new economic and social opportunities, pose challenges to our security and expectations of privacy. Humans are already interconnected via smart phones and gadgets. Smart energy meters, security devices and smart appliances are being used in many cities. Homes, ...
متن کاملImproving Network Security through Cyber
In recent years, security researchers have well established the fact that technical security solutions alone will not result in a robust cyberspace due to several issues jointly related to the economics and technology of computer security. In this regard some of them proposed cyber-insurance as a suitable risk management technique that has the potential to jointly align with the various incenti...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: INFORMATION TECHNOLOGY IN INDUSTRY
سال: 2021
ISSN: 2203-1731
DOI: 10.17762/itii.v9i1.236