783 resultados para Cyber-rencontre


Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Terrorist groups are currently using information and communication technologies (ICTs) to orchestrate their conventional physical attacks. More recently, terrorists have been developing a new form of capability within the cyber-arena to coordinate cyber-based attacks. This paper identifies that cyber-terrorism capabilities are an integral, imperative, yet under-researched component in establishing, and enhancing cyber-terrorism risk assessment models for SCADA systems. This paper is an extension of work previously published by Beggs and
Warren 2008, it presents a high level overview of a cyber-terrorism SCADA risk framework that has been adopted and validated by SCADA industry practitioners. The paper proposes a managerial framework which is designed to measure and protect SCADA systems from the threat of cyber-terrorism within Australia. The findings and results of an industry focus group are presented in support of the developed framework for SCADA industry adoption and acceptance.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Cyber violence and the antidote of cyber safety are fast becoming a global concern for governments, educational authorities, teachers, parents and children alike. Despite substantial funding for information dissemination on preventative strategies and the development of electronic responses to hinder perpetrators, the phenomenon of cyber violence has received little attention in the educational research literature. This review paper outlines the status on existing research into cyber violence. Documenting and summarizing the facts on the nature and extend of the issue will inform future debate. It also highlights the need for pre-service and in-service teacher education programs to prepare educators to manage this phenomenon.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Cyberbullying is a concern for governments, educational authorities, teachers, parents and children alike. Using technology (i.e. mobile phones, emails, instant messaging, blogs, websites) to annoy, harass, intimidate, abuse or threaten others has become known as cyberbullying.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Cyber violence is growing; it is a global problem for governments, educational authorities, teachers, parents and children alike, the author argues. Given the insidious nature and rapid rise in cyber violence, the paucity of empirical research on cyber violence and cyber safety, it is clear that we need a concerted effort on both the policy and practical level. Most importantly, we need substantial funding to investigate what remains an under-researched area so as to inform good policy and practice. The article discusses why cyber violence is happening; what the main issues are; how to improve cyber safety; and existing safety initiatives. The author concludes that current initiatives to address cyber violence and cyber safety are well intended but we need to make a more concerted and systematic effort, based on further research, if we are to tackle the problem through policy and practice on the national and global level.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Terrorist groups are currently using information and communication technologies (ICTs) to orchestrate their conventional physical attacks. More recently, terrorists have been developing a new form of capability within the cyber-arena to  coordinate cyber-based attacks. This paper identifies that cyber-terrorism capabilities are an integral, imperative, yet under-researched component in establishing, and enhancing cyber-terrorism risk assessment models for SCADA systems.

This paper is an extension of work previously published by Beggs and Warren 2008, it presents a high level overview of a cyber-terrorism SCADA risk framework that has been adopted and validated by SCADA industry practitioners. The paper proposes a managerial framework which is designed to measure and protect SCADA systems from the threat of cyber-terrorism within Australia. The findings and results of an industry focus group is presented in support of the developed framework for SCADA industry adoption and acceptance.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In order to decrease information security threats caused by human-related vulnerabilities, an increased concentration on information security awareness and training is necessary. There are numerous information security awareness training delivery methods. The purpose of this study was to determine what delivery method is most successful in providing security awareness training. We conducted security awareness training using various delivery methods such as text based, game based and a short video presentation with the aim of determining user preference delivery methods. Our study suggests that a combined delvery methods are better than individual secrity awareness delivery method.

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Australia has developed sophisticated national security policies and physical security agencies to protect against current and future security threats associated with critical infrastructure protection and cyber warfare protection. In this paper, the authors examine some common security risks that face Australia and how government policies and strategies have been developed and changed over time, for example, the proposed Australian Homeland Security department. This paper discusses the different steps that Australia has undertaken in relation to developing national policies to deal with critical infrastructure protection.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Operating systems and programmes are more protected these days and attackers have shifted their attention to human elements to break into the organisation's information systems. As the number and frequency of cyber-attacks designed to take advantage of unsuspecting personnel are increasing, the significance of the human factor in information security management cannot be understated. In order to counter cyber-attacks designed to exploit human factors in information security chain, information security awareness with an objective to reduce information security risks that occur due to human related vulnerabilities is paramount. This paper discusses and evaluates the effects of various information security awareness delivery methods used in improving end-users’ information security awareness and behaviour. There are a wide range of information security awareness delivery methods such as web-based training materials, contextual training and embedded training. In spite of efforts to increase information security awareness, research is scant regarding effective information security awareness delivery methods. To this end, this study focuses on determining the security awareness delivery method that is most successful in providing information security awareness and which delivery method is preferred by users. We conducted information security awareness using text-based, game-based and video-based delivery methods with the aim of determining user preferences. Our study suggests that a combined delivery methods are better than individual security awareness delivery method.