Building cyber-resilience to tackle threats

نویسنده

  • Michael de Crespigny
چکیده

Cyberspace is critical to organisations today – from the supply chain to customer engagement – and slowing adoption or disconnecting from cyberspace is simply not an option. However, the commercial, reputational and financial risks that go with cyberspace presence are real and growing, driven by two key factors. First, cyber-criminals are now better organised and more professional in their approach. They innovate just as business does, and the financial rewards for them grow as business use of cyberspace grows. They also have access to powerful online tools and expertise for identifying, targeting and attacking their victims, and online markets to launder their booty. Second, cyberspace is constantly evolving and presenting new opportunities. The desire of businesses to quickly adopt new technologies – using the Internet to open new customer channels and adopting cloud and other online services – provides enormous opportunity, but also brings with it unforeseen risks and unintended consequences that can have a negative impact on a business.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Resilience Evaluation of Demand Response as Spinning Reserve under Cyber-Physical Threats

In the future, automated demand response mechanisms will be used as spinning reserve. Demand response in the smart grid must be resilient to cyber-physical threats. In this paper, we evaluate the resilience of demand response when used as spinning reserve in the presence of cyber-physical threats. We quantify this evaluation by correlating the stability of the system in the presence of attacks ...

متن کامل

Resilient Sociotechnical, Cyber-Physical, Software-Intensive Systems of Systems

Our society’s critical infrastructures (CI) — energy, water, transportation, communication, critical information infrastructure — lacks of resilience, typically losing essential functionality following adverse events. In the future, the number of climatic extremes may intensify or become more frequent, and building resilience becomes the optimal course of action for large complex systems. CI ar...

متن کامل

Reasoning about Attack Goals for Cyber Resilience

This paper describes our approach to anticipating and recognizing potential cyber threats in order to provide timely responses to those threats. Our approach anticipates attacks on distributed systems by generating a diverse set of attack plans on key system components and then determining the probabilities that these attacks may threaten those components or others that are stepping stones to t...

متن کامل

Cyber Threats Foresight Against Iran Based on Attack Vector

Cyber ​​threats have been extraordinary increased in recent years. Cyber ​​attackers, including government agencies or hackers, have made significant advances in the use of various tools for attacking target systems in some countries particularly on Islamic republic of Iran. The complexity of cyber threats and the devastating effects of them on critical systems highlights necessity of cyber thr...

متن کامل

Modalities for Cyber Security and Privacy Resilience: The NIST Approach

Cybersecurity was a major topic of discussion at the 2015 World Economic Forum in Davos the Sony attack; huge data breaches at Target and Adobe; a 91% increase in targeted cyber-attacks; annual losses of over $400 billion; the exposure of 904 million personal data records; cyber-attacks on a Finnish bank, a South Korean credit bureau, a German factory’s industrial controls, and the Ukrainian go...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Network Security

دوره 2012  شماره 

صفحات  -

تاریخ انتشار 2012