The Western Cyber Exchange
ثبت نشده
چکیده
Background: The Cyber Preparedness Continuum CNA’s Safety and Security Division conducted a Cyber Preparedness Workshop on April 25, 2013, at CNA’s headquarters in Alexandria, Virginia. The workshop brought together emergency management and cybersecurity stakeholders, drawn from both the public and private sectors, to discuss cyber preparedness. Discussions during the workshop centered around the definition of cyber preparedness, the role of emergency management in cyber preparedness, and the four components of the Cyber Preparedness Continuum—a tool that CNA developed to assist emergency managers in planning and implementing cyber-related preparedness activities. The Continuum’s components—Coordination; Information Sharing; Planning and Readiness; and Continuous Improvement—reflect the ongoing and evolving nature of cyber preparedness. The continuum contains benchmarks and key activities that characterize different levels of increased cyber preparedness in each component.
منابع مشابه
Characteristics of an Islamic View of Cyber-Ethics
The current Cyber-ethics in Western societies (and its followers in other societies) have been compiled based on secularist presupposition. This presupposition has different principles in comparison with the Islamic attitude which can lead one to take a different approach toward ethical problems. This paper is an attempt to propose principles of Islamic cyber-ethics upon which we can prepare an...
متن کاملResilient Configuration of Distribution System versus False Data Injection Attacks Against State Estimation
State estimation is used in power systems to estimate grid variables based on meter measurements. Unfortunately, power grids are vulnerable to cyber-attacks. Reducing cyber-attacks against state estimation is necessary to ensure power system safe and reliable operation. False data injection (FDI) is a type of cyber-attack that tampers with measurements. This paper proposes network reconfigurati...
متن کاملEvaluation of State of the Art IDS Message Exchange Protocols
During the last couple of years, the degree of dependence on IT systems has reached a dimension nobody imagined to be possible 10 years ago. The increased usage of mobile devices (e.g., smart phones), wireless sensor networks and embedded devices (Internet of Things) are only some examples of the dependency of modern societies on cyber space. At the same time, the complexity of IT applications,...
متن کاملCyber Risk Exposure and Prospects for Cyber Insurance
This study draws attention to the ubiquitous and borderless nature of cybercrime. It examines the prospect of introducing customized cyber insurance policy in the Nigerian market. As secondary data was not available, the study conducted a survey by administering three sets of questionnaire to purposively selected top executives in four Trade Groups that rely heavily on Internet transactions for...
متن کاملThe Model of Structural Relationships of Cyber-Aggression Based on Family Communication Pattern with the Mediating Role of Addiction to Internet
Introduction: Family relationships play an incredibly important role in the lives of individuals and these relationships represent the most enduring social institution This study aimed the model of structural relations of cyber-aggression based on family communication pattern with the mediating role of addiction to Internet. Methods: This study was descriptive-correlational and the statistical...
متن کامل