570 results on '"Operations security"'
Search Results
2. Strategic Social Media Management in Conflict Zones through the Analysis of the Intelligence Cycle: Lessons Learned from the Russo-Ukrainian Conflict.
- Author
-
Kyrgos, Zisis
- Subjects
SOCIAL media ,STRATEGIC planning ,RUSSIAN invasion of Ukraine, 2022- ,WORLD Wide Web ,NATIONAL security ,ARTIFICIAL intelligence - Abstract
Social media have become an important aspect of everyday life, especially in the western world. Through the analysis of the Intelligence Cycle and the social media communication process, it is possible to determine how social media are integrated into the intelligence process, namely during the data collection phase, and what types of intelligence vulnerability emerge, namely SIG.INT. and O.S.INT. type vulnerabilities. The recent events of the Russo-Ukrainian conflict have shown that the uneducated use of social media, by civilians and military personnel alike, poses a serious threat to national security in times of conflict. Educating the general public on matters of operations security could be vital to safeguarding national security, a process which could be aided by social media platforms' moderators and AI technology. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
3. Distribution System Operation With Renewables and Energy Storage: A Linear Programming Based Multistage Robust Feasibility Approach
- Author
-
Shengwei Mei, Laijun Chen, Mohammad Shahidehpour, Zhongjie Guo, and Wei Wei
- Subjects
Dynamic programming ,Mathematical optimization ,Linear programming ,Robustness (computer science) ,Computer science ,Feasible region ,Energy Engineering and Power Technology ,Robust optimization ,Electrical and Electronic Engineering ,Operations security ,Energy storage ,Dykstra's projection algorithm - Abstract
This paper proposes a multistage robust optimization model for distribution system operation with energy storage under uncertainty. Unlike the conventional robust optimization paradigm which minimizes the worst-case cost, the proposed formulation optimizes the cost in the nominal scenario. In analogy to dynamic programming, we define dynamic robust feasible regions in a recursive manner. In each period, the dynamic robust feasible region is shown to be polyhedral, and a linear programming based projection algorithm is developed to compute such regions offline. In the online stage, the method is executed following a rolling horizon manner: renewable output is observed at the beginning of each period, and the cost of remaining periods in the forecast scenario is to be minimized subject to operation constraints and dynamic robust feasible regions, giving rise to a linear program. In this way, the dispatch strategy ensures multistage operation security regardless of future realizations of renewable power. In numeric tests on a modified IEEE 33-bus distribution system, the dynamic robust feasible regions are visualized and analyzed, and the proposed method is compared with two prevailing robust optimization methods, verifying its advantages in terms of optimality and robustness
- Published
- 2022
4. Susceptibility of Large Wind Power Plants to Voltage Disturbances–Recommendations to Stakeholders
- Author
-
Math Bollen and Roger Alves de Oliveira
- Subjects
Wind power ,Renewable Energy, Sustainability and the Environment ,business.industry ,Computer science ,Energy Engineering and Power Technology ,Grid ,Reliability engineering ,Transmission (telecommunications) ,Work (electrical) ,Jump ,Power quality ,business ,Operations security ,Voltage - Abstract
Sufficient fault-ride-through (FRT) of large wind power plants (WPPs) is essential for ensuring transmission-grid operational security. The majority of FRT studies do not include all disturbances originated in the transmission grid or include disturbances not relevant for operational security. Using knowledge of power quality, this paper provides a guide to stakeholders in different aspects of FRT for wind turbines (WTs) and wind power plants. This work details the characteristics of the most common disturbances originated in the transmission grid, how they propagate to the wind turbines terminals, and how they impact the dynamic behavior of a large WPP. This work shows that the details of the voltage disturbances at the WT terminals should be considered and not just the voltage disturbance in the transmission grid. Moreover, detailed representation or characterization of voltage dips is important in FRT studies. The simplified models used in the literature are insufficient. This paper strongly recommends that distinct events and additional characteristics as the phase-angle jump and oscillations in the transition segments are considered in FRT analysis.
- Published
- 2022
5. The research on intelligent cooperative combat of UAV cluster with multi-agent reinforcement learning
- Author
-
Gang Chen and Dan Xu
- Subjects
Structure (mathematical logic) ,Computer science ,Mechanical Engineering ,Distributed computing ,Multi-agent system ,Aerospace Engineering ,ComputerApplications_COMPUTERSINOTHERSYSTEMS ,Cluster (spacecraft) ,ComputingMethodologies_ARTIFICIALINTELLIGENCE ,Hotspot (Wi-Fi) ,Mode (computer interface) ,Space and Planetary Science ,Control and Systems Engineering ,Learning network ,Reinforcement learning ,Computers in Earth Sciences ,Operations security ,Social Sciences (miscellaneous) - Abstract
With the rapid development of computer hardware and intelligent technology, the intelligent combat of unmanned aerial vehicle (UAV) cluster will become the main battle mode in the future battlefield. The UAV cluster as a multi-agent system (MAS), the traditional single-agent reinforcement learning (SARL) algorithm is no longer applicable. To truly achieve autonomous and cooperative combat of the UAV cluster, the multi-agent reinforcement learning (MARL) algorithm has become a research hotspot. Considering that the current UAV cluster combat is still in the program control stage, the fully autonomous and intelligent cooperative combat has not been realized. To realize the autonomous planning of the UAV cluster according to the changing environment and cooperate with each other to complete the combat goal, we propose a new MARL framework which adopts the policy of centralized training with decentralized execution, and uses actor-critic network to select the execution action and make the corresponding evaluation. By improving the structure of the learning network and refining the reward mechanism, the new algorithm can further optimize the training results and greatly improve the operation security. Compared with the original multi-agent deep deterministic policy gradient (MADDPG) algorithm, the ability of cluster cooperative operation gets effectively enhanced.
- Published
- 2021
6. DEVELOPMENT OF OPEN ABDOMEN DEVICE BASED ON BIODESIGN METHODOLOGY
- Author
-
Diego Velásquez, Carolina Londoño, Juan Felipe Isaza, Christian Diaz, Iván Darío Montoya, Manuela Sierra, and Salín Pereira
- Subjects
business.industry ,Computer science ,New product development ,Innovation process ,Usability ,Closure (psychology) ,USable ,Design methods ,business ,Software engineering ,Operations security ,Open abdomen - Abstract
Open Abdomen (OA) therapy, is purposely leaving the fascial edges of the abdomen un-approximated after a laparotomy. During the OA therapy, there must be a temporary abdominal closure (TAC) device installed in the patient to achieve abdominal closure gradually without affecting its safety. However, the actual TAC devices have some gaps in terms of functionality or usability, therefore a new device is proposed. Intending to design a usable and functional technique for patients all over the world, the BioDesign Innovation Process was used. This iterative methodology focuses on healthcare needs, invention, and concept development with three main phases: Identify, Invent and Implement. At the end of these phases, the team successfully developed two new abdominal closure techniques that fill in the gaps of functionality and usability, using a simulator that realistically mimicked the physical and mechanical properties of an open abdomen. In terms of functionality, the novel techniques showed safe installation, operational security, secure grip, low invasiveness and control of intra-abdominal pressure. In terms of usability, the devices showed better results in efficiency, effectiveness and easy re-exploration than the control group.
- Published
- 2021
7. RV-TEE: secure cryptographic protocol execution based on runtime verification
- Author
-
Mark Vella, Peter Špaček, Robert Abela, and Christian Colombo
- Subjects
021110 strategic, defence & security studies ,Hardware security module ,Computer science ,business.industry ,Runtime verification ,0211 other engineering and technologies ,Inference ,020207 software engineering ,02 engineering and technology ,Cryptographic protocol ,Software development process ,Computational Theory and Mathematics ,Hardware and Architecture ,Embedded system ,0202 electrical engineering, electronic engineering, information engineering ,Computer Science (miscellaneous) ,Code (cryptography) ,business ,Protocol (object-oriented programming) ,Operations security ,Software - Abstract
Analytical security of cryptographic protocols does not immediately translate to operational security due to incorrect implementation and attacks targeting the execution environment. Code verification and hardware-based trusted execution solutions exist, however these leave it up to the implementer to assemble the complete solution, imposing a complete re-think of the hardware platforms and software development process. We rather aim for a comprehensive solution for secure cryptographic protocol execution, which takes the form of a trusted execution environment based on runtime verification and stock hardware security modules. RV-TEE can be deployed on existing platforms and protocol implementations. Runtime verification lends itself well at several conceptual levels of the execution environment, ranging from high level protocol properties, to lower level checks such as taint inference. The proposed architectural setup involving two runtime verification modules is instantiated through a case study using a popular web browser. We successfully monitor high and low level properties with promising results with respect to practicality.
- Published
- 2021
8. Strategic Social Media Management in Conflict Zones through the Analysis of the Intelligence Cycle: Lessons Learned from the Russo-Ukrainian Conflict
- Author
-
Zisis Kyrgos
- Subjects
social media ,conflict ,General Earth and Planetary Sciences ,security ,Ukraine ,operations security ,intelligence operations ,General Environmental Science ,Russia - Abstract
Social media have become an important aspect of everyday life, especially in the western world. Through the analysis of the Intelligence Cycle and the social media communication process, it is possible to determine how social media are integrated into the intelligence process, namely during the data collection phase, and what types of intelligence vulnerability emerge, namely SIG.INT. and O.S.INT. type vulnerabilities. The recent events of the Russo-Ukrainian conflict have shown that the uneducated use of social media, by civilians and military personnel alike, poses a serious threat to national security in times of conflict. Educating the general public on matters of operations security could be vital to safeguarding national security, a process which could be aided by social media platforms’ moderators and AI technology.
- Published
- 2022
9. SAIBERSOC: A Methodology and Tool for Experimenting with Security Operation Centers
- Author
-
Michele Campobasso, Martin Rosso, Luca Allodi, Ganduulga Gankhuyag, and Security
- Subjects
Security monitoring ,evaluation ,Computer Networks and Communications ,Computer science ,Cyber security operations center ,Open source software ,Computer Science Applications ,Reliability engineering ,Hardware and Architecture ,Benchmark (computing) ,Metric (unit) ,SOC ,Safety Research ,Operations security ,Software ,performance ,Information Systems - Abstract
In this article, we introduce SAIBERSOC (Synthetic Attack Injection to Benchmark and Evaluate the Performance of Security Operation Centers), a tool and methodology enabling security researchers and operators to evaluate the performance of deployed and operational Security Operation Centers (SOC)—or any other security monitoring infrastructure. The methodology relies on the MITRE ATT&CK Framework to define a procedure to generate and automatically inject synthetic attacks in an operational SOC to evaluate any output metric of interest (e.g., detection accuracy, time-to-investigation). To evaluate the effectiveness of the proposed methodology, we devise an experiment with n=124 students playing the role of SOC analysts. The experiment relies on a real SOC infrastructure and assigns students to either a BADSOC or a GOODSOC experimental condition. Our results show that the proposed methodology is effective in identifying variations in SOC performance caused by (minimal) changes in SOC configuration. We release the SAIBERSOC tool implementation as free and open source software.
- Published
- 2022
10. The Improved Topology and Control Strategy for the HCLC in the Multiterminal Flexible DC Grid
- Author
-
Qiyang Mao, Weijie Wen, Jiawei He, Ye Li, Bin Li, and Qiang Sun
- Subjects
Computer science ,020209 energy ,020208 electrical & electronic engineering ,Energy Engineering and Power Technology ,Thyristor ,Topology (electrical circuits) ,02 engineering and technology ,Inductor ,Grid ,Power (physics) ,Reliability (semiconductor) ,Control theory ,Limit (music) ,0202 electrical engineering, electronic engineering, information engineering ,Electrical and Electronic Engineering ,Operations security - Abstract
The dc fault-current-limiting technique is extremely important for operation security and power supply reliability of the flexible dc grid. Generally, the dc reactor can effectively limit the dc fault current; however, it will result in negative influences on the system operation stability and dc circuit breaker (DCCB) isolating speed. The hybrid current-limiting circuit (HCLC) can effectively cooperate with the DCCB and avoid the negative influence of dc reactor on the fast fault current clearing, thus being considered as a promising technique in dc grid. In this article, the improved HCLC (I-HCLC) is proposed. It can effectively limit the dc fault current without time delay and eliminate the conduction losses of the used power electronic switches. Compared with the traditional HCLC, the investment of the I-HCLC is significantly reduced for multiport application in multiterminal dc grid. In addition, the improved control strategy, which can avoid the negative influence of dc reactor on the system operation stability, is also researched. Also, this problem has not yet been considered when the HCLC was initially proposed. The experiment tests and simulation cases are carried out to verify the feasibility and superiorities of the proposed I-HCLC and of the improved control strategy.
- Published
- 2021
11. Communication Vulnerabilities in Electric Mobility HCP Systems: A Semi-Quantitative Analysis
- Author
-
Robert Basmadjian
- Subjects
sustainable transport ,smart cities ,Computer science ,020209 energy ,vulnerability ,Cyber-physical system ,Vulnerability ,02 engineering and technology ,communication infrastructure ,Service provider ,Charging station ,Sustainable transport ,Risk analysis (engineering) ,lcsh:TA1-2040 ,Order (exchange) ,CVSS ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,lcsh:Engineering (General). Civil engineering (General) ,electric mobility ,Operations security ,electric vehicles - Abstract
An electric mobility ecosystem, which resembles a human-centred cyber physical (HCP) system, consists of several interacting sub-systems that constantly communicate with each other. Cyber-security of such systems is an important aspect as vulnerability of one sub-system propagates to the entire system, thus putting it into risk. Risk assessment requires modelling of threats and their impacts on the system. Due to lack of available information on all possible threats of a given system, it is generally more convenient to assess the level of vulnerabilities either qualitatively or semi-quantitatively. In this paper, we adopt the common vulnerability scoring system (CVSS) methodology in order to assess semi-quantitatively the vulnerabilities of the communication in electric mobility human-centred cyber physical systems. To this end, we present the most relevant sub-systems, their roles as well as exchanged information. Furthermore, we give the considered threats and corresponding security requirements. Using the CVSS methodology, we then conduct an analysis of vulnerabilities for every pair of communicating sub-systems. Among them, we show that the sub-systems between charging station operator (CSO) and electric vehicle supply equipment (charging box) as well as CSO and electric mobility service provider are the most vulnerable in the end-to-end chain of electric mobility. These results pave the way to system designers to assess the operational security risks, and hence to take the most adequate decisions, when implementing such electric mobility HCP systems.
- Published
- 2021
12. The Impact of Renewables on Operational Security: Operating Power Systems That Have Extremely High Penetrations of Nonsynchronous Renewable Sources
- Author
-
Ivan M. Dudurych
- Subjects
Electric power system ,Power transmission ,Electric power transmission ,business.industry ,Energy Engineering and Power Technology ,Portfolio ,Electricity ,Electrical and Electronic Engineering ,Environmental economics ,AC power ,business ,Operations security ,Renewable energy - Abstract
For decades, electricity transmission systems were planned to operate within the scope of active power transfers that, by their nature, were fairly well defined and limited in number, size, and direction. However, in recent years, this situation has been dramatically changing in front of our eyes as a result of two main developments. The first concerns new types of renewable power generation (i.e., wind, solar, tidal wave, and so on) and their increasing share of the generation portfolio. The second relates to the introduction and evolution of electricity markets. These factors contribute to fundamental changes in generation patterns and power transfers in ways that were not anticipated.
- Published
- 2021
13. Operational Security: The Case of Texas
- Author
-
Julia Matevosyan, Shun Hsien Huang, Rochie Guiyab, Nitika V. Mago, and Pengwei Du
- Subjects
Power transmission ,Reliability (semiconductor) ,Electrical load ,Computer science ,Energy Engineering and Power Technology ,Transmission system operator ,State (computer science) ,Electric power ,Electrical and Electronic Engineering ,Operations security ,Reliability engineering - Abstract
The electric reliability council of Texas (ERCOT) is the independent transmission system operator that manages the flow of electric power to serve 90% of the state's electric load. ERCOT's system-wide load peaked at 74,820 MW on 12 August 2019.
- Published
- 2021
14. The Importance of the Three P's in the Investigation
- Author
-
John William Walker
- Subjects
Process management ,business.industry ,Computer science ,Process (engineering) ,As is ,Preparedness ,Digital forensics ,State (computer science) ,Certification ,Encryption ,business ,Operations security - Abstract
This article introduces the importance of process during the investigation and the acquisition phases of logical/physical artifacts which may be required during the course of such professional engagement. The article then focuses on the necessity to have a robust supportive framework in a state of preparedness to facilitate the First Responders and CSIRT (Computer Security Incident Response Team) with the necessary underpin to support such investigative engagements – considering effective and pragmatic Policies, Case Management, operational Security Protocols (Run-Books) and all other necessary attributes to underpin a professional, prepared posture from which a team may effectively, and robustly engage an investigation/incident. To elaborate on the importance of such an approach, we outline a number of real-world cases where ineffective processes and controls were applied. Finally, we review the essential elements of securely managing case-related data, and the absolute need to apply security mechanisms such as Certified Standards of FIPS-140-2 encryption to secure sensitive case related assets to assure they are robustly protected at all stages of their life cycle when they are in physical transit, or when they are at rest, associated with a desk-bound PC. The end objective to the entire article is to stress an absolute need to apply process to, as far as is practicable, to achieve positive conclusions from any investigation or incident which has been engaged.
- Published
- 2021
15. Data-driven Probabilistic Static Security Assessment for Power System Operation Using High-order Moments
- Author
-
Feng Zhang, Changsen Feng, Zhiyi Li, Ping Ju, Hao Wu, and Guanzhong Wang
- Subjects
TK1001-1841 ,Mathematical optimization ,Renewable Energy, Sustainability and the Environment ,business.industry ,Computer science ,Probabilistic logic ,TJ807-830 ,Energy Engineering and Power Technology ,Lebesgue integration ,Renewable energy sources ,Renewable energy ,Data-driven ,Moment problem ,Set (abstract data type) ,power system operation ,Electric power system ,symbols.namesake ,Production of electric energy or power. Powerplants. Central stations ,symbols ,Data-driven analysis ,business ,Operations security ,distributionally robust approach ,probabilistic static security assessment - Abstract
In this letter, a new formulation of Lebesgue integration is used to evaluate the probabilistic static security of power system operation with uncertain renewable energy generation. The risk of power flow solutions violating any pre-defined operation security limits is obtained by integrating a semi-algebraic set composed of polynomials. With the high-order moments of historical data of renewable energy generation, the integration is reformulated as a generalized moment problem which is then relaxed to a semi-definite program (SDP). Finally, the effectiveness of the proposed method is verified by numerical examples.
- Published
- 2021
16. A Cloud-edge Cooperative Dispatching Method for Distribution Networks Considering Photovoltaic Generation Uncertainty
- Author
-
Ji Zhou, Lu Shen, Xiaobo Dou, Huan Long, Chen Li, and Kang Chen
- Subjects
TK1001-1841 ,transformer areas ,Renewable Energy, Sustainability and the Environment ,Computer science ,business.industry ,Distributed computing ,Photovoltaic system ,TJ807-830 ,Energy Engineering and Power Technology ,Robust optimization ,Cloud computing ,Process automation system ,Grid ,Renewable energy sources ,Cloud-edge cooperative dispatching method ,Consistency (database systems) ,Production of electric energy or power. Powerplants. Central stations ,Enhanced Data Rates for GSM Evolution ,uncertainty ,business ,alternating direction method of multipliers (ADMM) ,Operations security - Abstract
With the increasing penetration of renewable energy generation, uncertainty and randomness pose great challenges for optimal dispatching in distribution networks. We propose a cloud-edge cooperative dispatching (CECD) method to exploit the new opportunities offered by Internet of Things (IoT) technology. To alleviate the huge pressure on the modeling and computing of large-scale distribution system, the method deploys edge nodes in small-scale transformer areas in which robust optimization subproblem models are introduced to address the photovoltaic (PV) uncertainty. Considering the limited communication and computing capabilities of the edge nodes, the cloud center in the distribution automation system (DAS) establishes a utility grid master problem model that enforces the consistency between the solution at each edge node with the utility grid based on the alternating direction method of multipliers (AD-MM). Furthermore, the voltage constraint derived from the linear power flow equations is adopted for enhancing the operation security of the distribution network. We perform a cloud-edge system simulation of the proposed CECD method and demonstrate a dispatching application. The case study is carried out on a modified 33-node system to verify the remarkable performance of the proposed model and method.
- Published
- 2021
17. Security in IoT-Enabled Digital Twins of Maritime Transportation Systems
- Author
-
Jun Liu, Haibin Lv, Youlong Luo, Jingpan Bai, Zhihan Lv, and Chunlin Li
- Subjects
Security analysis ,business.industry ,Computer science ,Mechanical Engineering ,Node (networking) ,Computer Science Applications ,law.invention ,Transmission (telecommunications) ,Relay ,law ,Automotive Engineering ,Secrecy ,Fading ,business ,Operations security ,Computer network ,Data transmission - Abstract
The purposes are to explore the safety performance of the Maritime Transportation System (MTS) based on Digital Twins (DTs) Internet of Things (IoT) and develop maritime transportation towards intelligence and digitalization. Because the comprehensive operational security of modern MTS is not yet mature, historical transportation data of the Maritime Silk Road are acquired and preprocessed. Afterward, DTs are introduced, and relay nodes are added to data transmission paths to construct a maritime transportation DTs model based on relay cooperation IoT. Eventually, this model's security performance is validated through simulation experiments. Relay security analysis suggests that interference information is a vital guarantee to assist in information non-disclosure, from which the constructed model can harvest energy to increase the data transmission power, thereby improving communication performance and secrecy rate. Outage probability analysis reveals that the simulated and the theoretical results are almost the same; moreover, given the system's multi-hop paths in the same environment, the more the relays and the greater the fading index, the better the system performance and the lower the outage probability. Once the iterations reach a particular number, the node secrecy rate becomes optimal and cannot cause excessive burden to the system; besides, the power distribution can establish a new equilibrium when the nodes are in different locations, so that system security performance gets improved. The simulated value is closest to the actual result under 100% successful transmission probability and 0.01~0.05 λ value. To sum up, the constructed maritime transportation DTs model presents extraordinary transmission and security performance, providing an experimental basis for intelligent and secure maritime transportation in the future.
- Published
- 2021
18. Day-ahead Risk-constrained Stochastic Scheduling of Multi-energy System
- Author
-
Yue Yin, Tianqi Liu, Lei Wu, Yikui Liu, and Chuan He
- Subjects
Mathematical optimization ,TK1001-1841 ,Computer simulation ,Renewable Energy, Sustainability and the Environment ,Process (engineering) ,Computer science ,Scheduling (production processes) ,Energy Engineering and Power Technology ,TJ807-830 ,AC power ,renewable energy ,Renewable energy sources ,Electric power system ,Production of electric energy or power. Powerplants. Central stations ,Overvoltage ,Convergence (routing) ,multi-energy coordination ,AC power flow ,Operations security ,overvoltage risk constraint - Abstract
As an increasing penetration of renewable energy sources can potentially impact voltage profile and compromise system security, the security continues to be the most critical concern in power system operations. A risk-constrained stochastic scheduling model is proposed to leverage the latent scheduling capacity of a multi-energy system to seek an economic operation solution while maintaining system operation risk level against uncertain renewable generation. Overvoltage risk constraints, as compared to the straightforward voltage boundary limits, are incorporated into the stochastic scheduling model to guarantee the operation security and economics. Linearized AC power flow model is applied to enable overvoltage risk assessment within the coordinated scheduling model. The proposed stochastic scheduling model is tackled via the improved progressive hedging approach with an enhanced relax-round-polish process, which overcomes the convergence issues of the traditional progressive hedging in handling nonconvex stochastic scheduling model with binary variables on both stages. Numerical simulation results of IEEE 30-bus system and IEEE 118-bus system illustrate the efficacy of the proposed model in ensuring voltage security and improving economic operation of systems.
- Published
- 2021
19. Assessing the Operation Security of Trade Enterprises in the Modern Business Environment
- Author
-
Trade and M. M. Mukhina
- Subjects
financial security ,pest analysis ,matrix of financial stability ,swot analysis ,trade enterprise ,Business ,lcsh:Business ,lcsh:HF5001-6182 ,Operations security ,Industrial organization ,financial strategy ,Business environment - Abstract
The article explores the features of assessing the operation security of trade enterprises in the modern business environment. It is proved that the combination of different methods of situational analysis, e. g. SWOT and PEST methods, allows expanding the external and internal factors under research, which can be taken into account within a diverse range of possible management recommendations. Monitoring of key factors of SWOT analysis allows to develop efficient anti-crisis management strategies that ensure the constant readiness of enterprises to the onset of a crisis, and to adjust them in accordance with changes in the external and internal environment. An improved approach to monitoring the internal and external environment of enterprises based on the integrated use of both SWOT and PEST analysis techniques allows timely detection of crisis situations with adjustment of development strategies. It is proved that precisely the innovative factor is dominant in shaping the trajectory of economic development of trade enterprises. This determines the possibility of moving to a qualitatively new level of development, which, in turn, requires conscious and purposeful management of financial security at the enterprise. The matrix of financial stability of the trade enterprises’ activities is constructed. Four areas of the matrix are distinguished: stable operation area; active development area; sustainable development area; unstable operation area. It is recommended to take into account in the areas of the matrix the wear coefficient of fixed assets, due to the eventual situation when the wear coefficient of fixed assets should be reduced to increase stability. This is suggested to be displayed using a vector directed towards the beginning of the coordinates.
- Published
- 2020
20. Аналіз основних методологічних засад, закладених у проєкт доктрини зі скритого управління військами (силами)
- Subjects
Hierarchy ,media_common.quotation_subject ,Control (management) ,Doctrine ,ComputingMilieux_LEGALASPECTSOFCOMPUTING ,Adversary ,Computer security ,computer.software_genre ,Information protection policy ,Secrecy ,Command and control ,Business ,Operations security ,computer ,media_common - Abstract
The aim of the article is to analyse the main methodological principles laid down in the draft Doctrine for Operations Security, developed by a working group of officers of S. P. Korolov Zhytomyr Military Institute together with the Central Directorate for the Protection of State Secrets and Information Protection of the General Staff of the Armed Forces of Ukraine.This Doctrine is a system of views on the procedure of organization, provision and control of operations security during the employment of defence forces and their preparation for the employment. The document is based on the experience of command and control of military forces during exercises and mobilization activities and throughout the use of state secrets and information protection units in the Anti-Terrorist Operation (Joint Forces Operation) in eastern Ukraine, and takes into account international military experience in military conflicts as well as the experience of NATO member and partner countries.The Doctrine for Operations Security is the highest document in the hierarchy of doctrinal documents of the Armed Forces of Ukraine concerning operations security and is analogous to the relevant NATO doctrines of AJP series (planning, conducting and assessing joint operations).It is emphasized that operations security ensures that command and control of forces is organized in compliance with the requirements of covertness and aims to deny an adversary and other outsiders the information about the command and control of friendly forces and / or their activities, defines measures to implement and follow the requirements of secrecy, technical protection of information, security of special types and cryptographic protection of information, counteraction to technical intelligence, protection of other information with restricted access, using information protection and counter-technical intelligence systems.
- Published
- 2020
21. An overview of operational security considerations for husbanding service providers of the U.S. navy
- Author
-
James M. Steele, Simon Véronneau, Shannon E. Percival, Malcolm L. Elliott, and Geraldo Ferrer
- Subjects
Sociology and Political Science ,05 social sciences ,U s navy ,ComputerApplications_COMPUTERSINOTHERSYSTEMS ,Transportation ,Management Science and Operations Research ,Service provider ,Computer security ,computer.software_genre ,Information sensitivity ,Navy ,Work (electrical) ,Vetting ,0502 economics and business ,Political Science and International Relations ,050211 marketing ,Business ,Law ,Safety Research ,computer ,Operations security ,050212 sport, leisure & tourism - Abstract
The United States is continually facing threats from state and non-state actors. Operating in and around the areas where these entities have influence poses unique threats to the ability to carry out the mission of sustained forward presence. Husbanding service providers (HSP) are the primary source of logistics support for U.S. Navy ships calling to foreign ports. The nature of HSP work necessitates access to sensitive information, which can provide clues to the nature of naval operations. Properly vetting third-party and contracted logistics support providers is crucial in maintaining security of operations. The purpose of this paper is to provide a general overview of operational security implications of contracting HSPs to serve the U.S. Navy abroad.
- Published
- 2020
22. Розробка моделі динаміки станів рекомендаційної системи в умовах інформаційних атак ін’єкцією профілів
- Author
-
Yelyzaveta Meleshko, Oleksandr Drieiev, Mykola Yakymenko, and Dmytro Lysytsia
- Subjects
рекомендаційна система ,інформаційна безпека ,мережа ботів ,марківські процеси ,напівмарківські процеси ,information security ,Computer science ,Total cost ,Energy Engineering and Power Technology ,Markov process ,Recommender system ,Computer security ,computer.software_genre ,Industrial and Manufacturing Engineering ,symbols.namesake ,recommendation system ,Management of Technology and Innovation ,Injection attacks ,lcsh:Technology (General) ,lcsh:Industry ,markovian processes ,Electrical and Electronic Engineering ,Operations security ,business.industry ,Applied Mathematics ,Mechanical Engineering ,UDC 004.492.3 : 519.711 ,Information security ,bot-network ,Computer Science Applications ,Markovian processes ,semi-Markovian processes ,Control and Systems Engineering ,Dynamics (music) ,symbols ,lcsh:T1-995 ,lcsh:HD2321-4730.9 ,The Internet ,semi-markovian processes ,business ,computer ,рекомендательная система ,информационная безопасность ,сеть ботов ,марковские процессы ,полумарковских процессы - Abstract
Рекомендательные системы, применяемые для формирования ленты новостей в социальных сетях или для создания списков рекомендаций на контентных сайтах либо Интернет-магазинах, часто подвергаются информационным атакам инъекцией профилей. Такие атаки имеют целью изменение рейтингов, а, следовательно, и изменение частоты показов в рекомендациях, определенных объектов системы. Это может приводить к угрозам информационной безопасности пользователям и к убыткам владельцам системы. Существуют методы обнаружения атак в рекомендательных системах, но они требуют постоянных повторяющихся проверок всех профилей пользователей, что является достаточно ресурсоемкой операцией. В то же время в данных методах нет предложений по нахождению оптимальной частоты проверки наличия атаки. Однако правильно подобранная частота таких проверок не будет перегружать систему и одновременно обеспечит достаточный уровень безопасности.Разработана математическая модель динамики состояний рекомендательной системы в условиях информационной атаки с применением математического аппарата марковских и полумарковских процессов. Разработанная модель позволяет исследовать влияние атак инъекцией профилей на рекомендательные системы, в частности, эффективность их работы и объемы расходов для обеспечения их информационной безопасности. Практическое применение разработанной модели позволяет рассчитывать для рекомендательных систем оптимальную частоту проверки на наличие информационных атак с учетом ущерба от таких атак и затрат на постоянные проверки.На основе разработанной математической модели предложен способ определения полных затрат рекомендательной системы в результате мониторинга собственной информационной безопасности, нейтрализации деятельности ботов и в результате информационных атак.Разработан способ определения оптимальной частоты проверки рекомендательной системы на наличие информационных атак для оптимизации общих затрат системы. Применение данного способа позволит владельцам веб-сайтов с рекомендательными системами минимизировать свои финансовые расходы на обеспечение их информационной безопасности, The recommendation systems used to form a news feed in social networks or to create recommendation lists on content websites or Internet stores are often exposed to information profile injection attacks. These attacks are aimed at changing ratings, and thus at changing the frequency of appearing in recommendations, certain objects of a system. This can lead to threats to users’ information security and losses of the system owners. There are methods to detect attacks in recommendation systems, but they require permanent repetitive checks of all users’ profiles, which is a rather resource-intensive operation. At the same time, these methods do not contain any proposals as for determining the optimal frequency of attack checks. However, a properly chosen frequency of such checks will not overload a system too much and, at the same time, will provide an adequate level of its operational security.A mathematical model of the dynamics of states of a recommendation system under conditions of an information attack with the use of the mathematical apparatus of Markovian and semi-Markovian processes was developed. The developed model makes it possible to study the influence of profile injection attacks on recommendation systems, in particular, on their operation efficiency and amount of costs to ensure their information security. The practical application of the developed model enables calculating for recommendation systems the optimum frequency of information attack check, taking into consideration the damage from such attacks and costs of permanent inspections.Based on the developed mathematical model, the method for determining total costs of a recommendation system as a result of monitoring its own information security, neutralization of bot-networks activity and as a result of information attacks was proposed.A method for determining the optimal frequency of checking a recommendation system for information attacks to optimize the overall costs of a system was developed. The application of this method will enable the owners of websites with recommendation systems to minimize their financial costs to provide their information security, Рекомендаційні системи, що застосовуються для формування стрічки новин у соціальних мережах або для створення списків рекомендацій на контентних веб-сайтах чи Інтернет-магазинах, часто зазнають інформаційних атак ін’єкцією профілів. Такі атаки мають на меті зміну рейтингів, а отже, і зміну частоти показів у рекомендаціях, певних об’єктів системи. Це може призводити до загроз інформаційній безпеці користувачам та збитків власникам системи. Існують методи виявлення атак у рекомендаційних системах, але вони вимагають постійних повторюваних перевірок усіх профілів користувачів, що є досить ресурсномісткою операцією. В той же час у даних методах немає пропозицій по визначенню оптимальної частоти перевірки наявності атаки. Однак правильно підібрана частота таких перевірок не буде занадто перевантажувати систему і, одночасно, забезпечить достатній рівень безпеки її роботи.Розроблено математичну модель динаміки станів рекомендаційної системи в умовах інформаційної атаки з застосуванням математичного апарату марківських та напівмарківських процесів. Розроблена модель дозволяє досліджувати вплив атак ін’єкцією профілів на рекомендаційні системи, зокрема на ефективність їх роботи та обсяги витрат для забезпечення їх інформаційної безпеки. Практичне застосування розробленої моделі дає змогу розраховувати для рекомендаційних систем оптимальну частоту перевірки на наявність інформаційних атак з врахуванням шкоди від таких атак та витрат на постійні перевірки.На основі розробленої математичної моделі запропоновано спосіб визначення повних витрат рекомендаційної системи внаслідок моніторингу власної інформаційної безпеки, нейтралізації діяльності бот-мереж та внаслідок інформаційних атак.Розроблено спосіб визначення оптимальної частоти перевірки рекомендаційної системи на наявність інформаційних атак для оптимізації загальних витрат системи. Застосування даного способу дозволить власникам веб-сайтів з рекомендаційними системами мінімізувати свої фінансові витрати на забезпечення їх інформаційної безпеки
- Published
- 2020
23. Multi‐stage risk‐based dispatch considering short‐term reliability of transmission lines
- Author
-
Yi Ding, Wei Chen, Chuangxin Guo, and Xiansi Lou
- Subjects
021103 operations research ,Linear programming ,Iterative method ,Computer science ,020209 energy ,0211 other engineering and technologies ,Energy Engineering and Power Technology ,Bilinear interpolation ,02 engineering and technology ,Reliability engineering ,Term (time) ,Electric power system ,Electric power transmission ,Control and Systems Engineering ,0202 electrical engineering, electronic engineering, information engineering ,Electrical and Electronic Engineering ,Operations security ,Reliability (statistics) - Abstract
The reliability of transmission lines (TLs) has great influences on the safe operation of power systems. Random failures from TLs can be caused by multiple uncertainties such as the high load current. In this study, a multi-stage risk-based dispatch model is proposed to minimise the sum of generation cost and risk cost. Impacts of natural ageing, load current, health condition and disaster weather on the short-term reliability of TLs are studied. For ensuring the operation security of power systems in the post-contingency stage, the dynamic thermal rating (DTR) technology is implemented to improve capacities of TLs for coping with the potential overload. In order to solve this non-linear optimiation problem caused by load current-dependent failure probabilities and thermal rating constraints, a double-iteration solving strategy is proposed. In exterior iterations, the sequential linear programming is applied to decouple bilinear terms of the risk cost and locally linearise failure probabilities. Meanwhile, in interior iterations, the Benders decomposition is utilised to further divide the model into the main problem and the sub-problem for coordinating the preventive and corrective control and checking the feasibility of DTR, respectively. Proposed approaches are validated on a modified IEEE 24-bus test system.
- Published
- 2020
24. Power System Intra-Interval Operational Security Under False Data Injection Attacks
- Author
-
Zuyi Li, Xuan Liu, Liang Che, and Kunlun Gao
- Subjects
Security analysis ,Exploit ,Computer science ,Energy management ,020208 electrical & electronic engineering ,Economic dispatch ,02 engineering and technology ,Foreign direct investment ,Computer Science Applications ,Reliability engineering ,Electric power system ,Control and Systems Engineering ,0202 electrical engineering, electronic engineering, information engineering ,Electrical and Electronic Engineering ,Operations security ,Information Systems - Abstract
In false data injection (FDI) attacks, the attackers can impose security impacts by injecting false data into meter measurements to affect the security-constraint economic dispatch, which develops the dispatch for the end of a dispatch interval. Thus, the existing security analysis methods basically assess the attack impact based on a snapshot of system condition at the interval end, at which the dispatch target is achieved. Such analysis falls into a static analytical framework (SAF). However, with the increasing share of intermittent resources, the system is suffering short-term fluctuations, which may increase the variability and render security weak points inside of a dispatch interval. Smart attackers can judiciously exploit these weak points to impose large impacts on the Intra-Interval operational security. Such cyber risk may be underestimated under the SAF adopted by existing methods. To address such risk, a dynamic analytical framework is proposed in this article for analyzing the Intra-Interval operational security impacts of potential FDI attacks by considering the system variability in the dispatch interval. Simulations are performed based on the historical wind data on the IEEE 118-bus system, which verify the effectiveness of the proposed approach and highlight the risk of such issues in power systems with significant wind penetration.
- Published
- 2020
25. Analysis and Design of Information Security Management System Based on ISO 27001: 2013 Using ANNEX Control (Case Study: District of Government of Bandung City)
- Author
-
R. Wahjoe Witjaksono and Adrian Fathurohman
- Subjects
Government ,Process management ,business.industry ,Control (management) ,Information technology management ,Asset management ,General Medicine ,Information security ,business ,Communications security ,Operations security ,Information security management system - Abstract
The Department of Communication and Information (Diskominfo) of the Bandung City Government is an agency that has the responsibility of carrying out several parts of the Regional Government in the field of communication and informatics. Based on the composition of the regional service organization Bandung City Diskominfo has five fields and two UPTs which are part of the Bandung City Diskominfo. Bandung City Diskominfo in implementing work programs has IT as a supporter of business processes in government agencies. Based on the results of research conducted that IT management in Bandung City Government Diskominfo found several clauses that were still unfulfilled in this Diskominfo impact on the management of government information security institutions that can affect the performance of Bandung City Government. Therefore, there is a need for standardization that needs to be implemented as a guide that examines the direction in safeguarding information or assets that are considered sensitive to an organization. With the existence of these problems pushed to design information security recommendations based on ISO 27001: 2013 standards at Diskominfo. Also makes the design of IT information security systems that are focused on the control of Annex Information Security Policies, Human Resource Security, Operational Security, Communication Security and Asset Management so that business IT processes can run in accordance with the objectives of the organization. The results of this study are expected to help in securing IT information at the Bandung Diskominfo City and can also improve the goals of an organization.
- Published
- 2020
26. A Novel Fault Diagnosis Method based on Stacked LSTM
- Author
-
Jianxiao Zou, Qingqing Zhang, Jiyang Zhang, and Shicai Fan
- Subjects
0209 industrial biotechnology ,Exploit ,Artificial neural network ,Computer science ,business.industry ,Deep learning ,020208 electrical & electronic engineering ,Process (computing) ,Pattern recognition ,02 engineering and technology ,Temporal correlation ,Fault (power engineering) ,Fault detection and isolation ,020901 industrial engineering & automation ,Control and Systems Engineering ,0202 electrical engineering, electronic engineering, information engineering ,Artificial intelligence ,business ,Operations security - Abstract
Fault diagnosis is essential to ensure the operation security and economic efficiency of the chemical system. Many fault diagnosis methods have been designed for the chemical process, but most of them ignore the temporal correlation in the sequential observation signals of the chemical process. A novel deep learning method based on Stacked Long Short-Term Memory (LSTM) neural network is proposed, which can effectively model sequential data and detect the abnormal values. The proposed method is also able to fully exploit the long-term dependencies information in raw data and adaptively extract the representative features. The dataset of Tennessee Eastman (TE) process is utilized to verify the practicability and superiority of the proposed method. Extensive experimental results show that the fault detection and diagnosis model we proposed has an excellent performance when compared with several state-of-the-art baseline methods.
- Published
- 2020
27. STRATEGIC MANAGEMENT OF ECONOMIC SECURITY SYSTEM OF BUSINESS ENTITIES: THEORETICAL ASPECTS
- Author
-
Oleksii Koval
- Subjects
Process management ,Complementary and alternative medicine ,Point (typography) ,Process (engineering) ,Economic security ,Pharmaceutical Science ,Pharmacology (medical) ,Strategic management ,Business ,Operations security ,Categorical variable - Abstract
Fundamental concepts and existing paradigms for specifying the essence of the process of strategic management of economic security are investigated, both from the point of view of the systematic approach (in which the management of the system of economic security is promoted), and from the point of view of the process approach (in which attention is paid to the proper course of the process of economic security management as one of the parameters the status of the entity). The author's definition of strategic management of the economic security system of economic entities is proposed. The basic concepts of the categorical apparatus of strategic management of the economic security system are established. The peculiarities of strategic management of the economic security system of economic entities with respect to tactical and operational security oriented management are identified.
- Published
- 2020
28. PROSPECTIVE PROTECTION METHODS OF WINDOWS OPERATION SYSTEM
- Author
-
Anna Ilyenko, Sergii Ilyenko, and Tatiana Kulish
- Subjects
Embryology ,Public key certificate ,Computer science ,business.industry ,020101 civil engineering ,Cryptography ,02 engineering and technology ,Cell Biology ,Information security ,computer.software_genre ,Virtualization ,Certificate ,01 natural sciences ,0201 civil engineering ,010101 applied mathematics ,Vulnerability assessment ,Operating system ,Microsoft Windows ,0101 mathematics ,Anatomy ,business ,computer ,Operations security ,Developmental Biology - Abstract
The article deals with the problem of ensuring information security of the Windows operating system and identifying promising security methods. This article identifies that the basic approach to operating system security is the "hardening of the operating system" process. The study presents statistics on the distribution of popular operating systems, namely Windows, Mac, Linux, Chrome, BSD. The analysis and classification of modern vulnerabilities of the operating system is made and the consequences of their action are given in the examples. These deficiencies can cause a computer system to intentionally violate the confidentiality, integrity and accessibility of information and the system as a whole. Based on the vulnerability analysis, the basic approaches and methods for the organization of protection of the operating system are determined. Standard approaches are discussed, namely the use of built-in security software, Active Directory security, and virtualization to deter attacks. Today, much attention is paid to cryptography and the principles of network, system, organizational and operational security, including risk analysis and disaster recovery, to ensure the security of the operating system. These approaches are basic and are a component of security in today's operating systems, but nowadays, using integrated approaches is more effective. A quick response to the violation of the integrity and accessibility of the operating system in combination with quenching, here are the main directions of development and improvement of the operating system. A rather new approach proposed in the article to protect Windows products is to use the Blockchain direction. It is currently used to validate digital certificates and can be said to have potential in other areas of operating system security. This paper shows examples of Blockchain implementation for certificate validation, taking into account some of the variations of validation. The examples are implemented in Python 3.0. The research of prospective methods and remedies of the operating system conducted in the article suggests that the use of system hardening is one of the effective and comprehensive approaches to providing security information, which will allow timely detection of vulnerabilities and timely response to violations of the basic properties of the operating system.
- Published
- 2020
29. TRANSPARENT COGNITIVE TECHNOLOGIES TO ENSURE SUSTAINABLE SOCIETY DEVELOPMENT
- Author
-
Volodymyr Tkachenko, Aleksandra Kuzior, and Aleksy Kwilinski
- Subjects
Sustainable society ,Process management ,Development (topology) ,Renewable Energy, Sustainability and the Environment ,Geography, Planning and Development ,Social change ,Cognition ,Business ,Safety Research ,Operations security - Published
- 2019
30. Contemporary Physical Clone-Resistant Identity for IoTs and Emerging Technologies
- Author
-
Wael Adi, Mladen Berekovic, Saleh Mulhem, and Emad Hamadaqa
- Subjects
Technology ,Computer Networks and Communications ,Computer science ,Emerging technologies ,IoT security ,secret unknown cipher SUC ,USable ,Computer security ,computer.software_genre ,Public-key cryptography ,clone-resistant entities ,Operations security ,Authentication ,physical unclonable function PUF ,business.industry ,Applied Mathematics ,internet of things ,public key cryptography ,Computer Science Applications ,Identification (information) ,Computational Theory and Mathematics ,secret key identification ,Identity (object-oriented programming) ,authentication ,identification ,Clone (computing) ,business ,computer ,Software - Abstract
Internet of things (IoT) technologies have recently gained much interest from numerous industries, where devices, machines, sensors, or simply things are linked with each other over open communication networks. However, such an operation environment brings new security threats and technology challenges in securing and stabilizing such large systems in the IoT world. Device identity in such an environment is an essential security requirement as a secure anchor for most applications towards clone-resistant resilient operational security. This paper analyzes different contemporary authenticated identification techniques and discusses possible future technologies for physically clone-resistant IoT units. Two categories of identification techniques to counteract cloning IoT units are discussed. The first category is inherently cloneable and includes the classical identification mechanisms based on secret and public key cryptography. Such techniques deploy mainly secret keys stored permanently somewhere in the IoT devices as classical means to make units clone-resistant. However, such techniques are inherently cloneable as the manufacturer or device personalizers can clone them by re-using the same secret key (which must be known to somebody) or reveal keys to third parties to create cloned entities. In contrast, the second, more resilient category is inherently unclonable because it deploys unknown and hard to predict born analog modules such as physical unclonable functions (PUFs) or mutated digital modules and so-called secret unknown ciphers (SUCs). Both techniques are DNA-like identities and hard to predict and clone even by the manufacturer itself. Born PUFs were introduced two decades ago, however, PUFs as analog functions failed to serve as practically usable unclonable electronic identities due to being costly, unstable/inconsistent, and non-practical for mass application. To overcome the drawbacks of analog PUFs, SUCs techniques were introduced a decade ago. SUCs, as mutated modules, are highly consistent, being digital modules. However, as self-mutated digital modules, they offer only clone-resistant identities. Therefore, the SUC technique is proposed as a promising clone-resistant technology embedded in emerging IoT units in non-volatile self-reconfiguring devices. The main threats and expected security requirements in the emerging IoT applications are postulated. Finally, the presented techniques are analyzed, classified, and compared considering security, performance, and complexity given future expected IoT security features and requirements.
- Published
- 2021
- Full Text
- View/download PDF
31. Comprehensive Method for Determining Transformer Decommissioning Life Considering Economic Life and Physical Life
- Author
-
Fuyan Liu, Fushuan Wen, Min Yu, Xiaoyong Yang, Yifan Xu, and Xinyi Lai
- Subjects
Electric power system ,Reliability (semiconductor) ,law ,Computer science ,Service life ,Transformer ,Operations security ,Load factor ,Maintenance engineering ,Nuclear decommissioning ,Reliability engineering ,law.invention - Abstract
Accurately calculating the decommissioning life of power transformers is not only helpful for maintaining their operational security and reliability, but also can enhance the economic operation of the power system concerned. This paper proposes a comprehensive method to determine the decommissioning life of power transformers considering both the economic life and physical life. First, according to the Life Cycle Cost (LCC) model of power transformers, a mathematical model of initial cost, operating and maintenance cost, failure cost and disposal cost is established. Then the economic life of power transformers is obtained based on the annual average LCC curve. Secondly, the physical life of power transformers is calculated by first correcting the expected service life with the load factor, temperature factor and humidity factor, and then correcting it with the failure number during operation. Finally, the theoretical decommissioning life of power transformers is attained by comprehensively considering both the economic life and physical life.
- Published
- 2021
32. Steady-State and Dynamic Security Assessment for System Operation
- Author
-
Gert Mehlmann, Alexander Raab, Dirk Westermann, Matthias Luther, Steffen Schlegel, and Tom Sennewald
- Subjects
Measure (data warehouse) ,Electric power system ,Computer science ,Process (engineering) ,Stability (learning theory) ,Time domain ,Contingency ,Operations security ,Reliability engineering ,System dynamics - Abstract
This contribution provides the implementation of a holistic operational security assessment process for both steady-state security and dynamic stability. The merging of steady-state and dynamic security assessment as a sequential process is presented. A steady-state and dynamic modeling of a VSC-HVDC was performed including curative and stabilizing measures as remedial actions. The assessment process was validated by a case study on a modified version of the Nordic 32 system. Simulation results showed that measure selection based on purely steady-state contingency analysis can lead to loss of stability in time domain. A subsequent selection of measures on the basis of the dynamic security assessment was able to guarantee the operational security for the stationary N-1 scenario as well as the power system stability.
- Published
- 2021
33. Sanitizing the IoT Cyber Security Posture: An Operational CTI Feed Backed up by Internet Measurements
- Author
-
Morteza Safaei Pour, Elias Bou-Harb, and Dylan Watson
- Subjects
Computer science ,business.industry ,Vendor ,Computer security ,computer.software_genre ,Software deployment ,Dependability ,The Internet ,Cyber threat intelligence ,Cyberspace ,Internet of Things ,business ,computer ,Operations security - Abstract
The Internet-of-Things (IoT) paradigm at large continues to be compromised, hindering the privacy, dependability, security, and safety of our nations. While the operational security communities (i.e., CERTS, SOCs, CSIRT, etc.) continue to develop capabilities for monitoring cyberspace, tools which are IoT-centric remain at its infancy. To this end, we address this gap by innovating an actionable Cyber Threat Intelligence (CTI) feed related to Internet-scale infected IoT devices. The feed analyzes, in near real-time, 3.6TB of daily streaming passive measurements ($\approx$ 1M pps) by applying a custom-developed learning methodology to distinguish between compromised IoT devices and non-IoT nodes, in addition to labeling the type and vendor. The feed is augmented with third party information to provide contextual information. We report on the operation, analysis, and shortcomings of the feed executed during an initial deployment period. We make the CTI feed available for ingestion through a public, authenticated API and a front-end platform.
- Published
- 2021
34. Cybersecurity economics – balancing operational security spending
- Author
-
Stale Ekelund and Zilia Iskoujina
- Subjects
Operations research ,media_common.quotation_subject ,Control (management) ,Monte Carlo method ,020206 networking & telecommunications ,0102 computer and information sciences ,02 engineering and technology ,Library and Information Sciences ,Poisson distribution ,Investment (macroeconomics) ,01 natural sciences ,Computer Science Applications ,Normal distribution ,symbols.namesake ,010201 computation theory & mathematics ,0202 electrical engineering, electronic engineering, information engineering ,symbols ,Graph (abstract data type) ,Function (engineering) ,Operations security ,Information Systems ,media_common - Abstract
Purpose The purpose of this paper is to demonstrate how to find the optimal investment level in protecting an organisation’s assets. Design/methodology/approach This study integrates a case study of an international financial organisation with various methods and theories in security economics and mathematics, such as value-at-risk (VaR), Monte Carlo simulation, exponential and Poisson probability distributions. Thereby it combines theory and empirical findings to establish a new approach to determining optimal security investment levels. Findings The results indicate that optimal security investment levels can be found through computer simulation with historical incident data to find VaR. By combining various scenarios, the convex graph of the risk cost function has been plotted, where the minimum of the graph represents the optimal invest level for an asset. Research limitations/implications The limitations of the research include a modest number of loss observations from one case study, and the use of normal probability distribution. The approach has limitations where there are no historical data available or the data has zero losses. These areas should undergo further research including larger data set of losses and exploring other probability distributions. Practical implications The results can be used by leading business practitioners to assist them with decision making on investment to the increased protection of an asset. Originality/value The originality of this research is in its new way of combining theories with historical data to create methods to measure theoretical and empirical strength of a control (or set of controls) and translating it to loss probabilities and loss sizes.
- Published
- 2019
35. Improve connections of the last transport services in metro by a new space-time bicriteria optimization method
- Author
-
Chuanchen Ding, Zejing Ruan, Weixin Hua, Lukai Zhang, and Xuesong Feng
- Subjects
050210 logistics & transportation ,Operations research ,Computer science ,Space time ,05 social sciences ,Transportation ,Scheduling (computing) ,0502 economics and business ,Bicriteria optimization ,0501 psychology and cognitive sciences ,Urban transit ,Safety Research ,Operations security ,050107 human factors - Abstract
The smooth connections of the last transport services are significant for not only the efficient train scheduling but also the operation security of metro stations. A space-time bicriteria optimiza...
- Published
- 2019
36. The Impact of Ramp-Induced Data Attacks on Power System Operational Security
- Author
-
Junbo Zhao, Xuan Liu, Liang Che, and Zhikang Shuai
- Subjects
Computer science ,020208 electrical & electronic engineering ,02 engineering and technology ,Computer security ,computer.software_genre ,Computer Science Applications ,Attack model ,Electric power system ,Countermeasure ,Control and Systems Engineering ,0202 electrical engineering, electronic engineering, information engineering ,Electrical and Electronic Engineering ,Operations security ,computer ,Countermeasure (computer) ,Information Systems ,Generator (mathematics) - Abstract
This paper analyzes a malicious data attack in which the attacker targets at the generation side of the system and aims to compromise the system security by causing large power imbalance in the real-time operations. Such an attack is called the ramp-induced data (RID) attack in the literature which revealed that the attacker can manipulate the limits of generator ramp constraints in real-time dispatch (RTD) and, thus, impact the power market operations. In this paper, we propose an optimal attack model to analyze the impact of the RID attack on power system operational security and show that the attacker can introduce large power imbalance into real-time operations that can cause security issues or even catastrophic consequences. To address the risk of such an attack, a countermeasure is presented that reassesses the regulation reserve adequacy against a given risk level of the attack. Simulations on the IEEE 118-bus system verify the impact of the proposed RID attack and the effectiveness of the regulation assessment approach.
- Published
- 2019
37. Fast Screening of High-Risk Lines Under False Data Injection Attacks
- Author
-
Xuan Liu, Liang Che, and Zuyi Li
- Subjects
General Computer Science ,Energy management ,Computer science ,020209 energy ,020208 electrical & electronic engineering ,02 engineering and technology ,Benchmarking ,Reliability engineering ,Set (abstract data type) ,Electric power system ,Identification (information) ,Electric power transmission ,Line (geometry) ,0202 electrical engineering, electronic engineering, information engineering ,Operations security - Abstract
False data injection attacks can compromise power system operational security by causing severe branch overloads. A set of transmission lines can be more vulnerable to the attack. These lines can be quickly identified by a high-risk line fast screening (HLFS) approach proposed in this paper. The HLFS has a high computational efficiency which facilitates its applications in large-scale systems. In the meantime, for an in-depth security assessment, a critical-line identification tool is also presented to identify a subset of critical lines with simultaneous tripping risk under the attack. The effectiveness and efficiency of the proposed approach are verified by benchmarking its performance against a basic linear-programming checking method in the case study which includes simulations on multiple large-scale MATPOWER cases.
- Published
- 2019
38. A Data-Driven Stackelberg Market Strategy for Demand Response-Enabled Distribution Systems
- Author
-
Tianguang Lu, Zhaoyu Wang, Chong Wang, Jianhui Wang, and Qian Ai
- Subjects
Mathematical optimization ,General Computer Science ,Noise measurement ,Computer science ,020209 energy ,020208 electrical & electronic engineering ,02 engineering and technology ,Dual (category theory) ,Data-driven ,Demand response ,Load management ,Operator (computer programming) ,0202 electrical engineering, electronic engineering, information engineering ,Stackelberg competition ,Operations security - Abstract
A data-based Stackelberg market strategy for a distribution market operator (DMO) is proposed to coordinate power dispatch among different virtual power plants, i.e., demand response (DR) aggregators (DRAs). The proposed strategy has a two-stage framework. In the first stage, a data-driven method based on noisy inverse optimization estimates the complicated price-response characteristics of customer loads. The estimated load information of the DRAs is delivered to the second stage, where a one-leader multiple-follower stochastic Stackelberg game is formulated to represent the practical market interaction between the DMO and the DRAs that considers the uncertainty of renewables and the operational security. The proposed data-driven game model is solved by a new penalty algorithm and a customized distributed hybrid dual decomposition-gradient descent algorithm. Case studies on a practical DR project in China and a distribution test system demonstrate the effectiveness of the proposed methodology.
- Published
- 2019
39. Two-stage distributionally robust coordinated scheduling for gas-electricity integrated energy system considering wind power uncertainty and reserve capacity configuration
- Author
-
Kaipei Liu, Yi Zhang, Feng Zheng, Jian Le, and Yachao Zhang
- Subjects
Mathematical optimization ,Wind power ,060102 archaeology ,Renewable Energy, Sustainability and the Environment ,business.industry ,Computer science ,020209 energy ,Robust optimization ,06 humanities and the arts ,02 engineering and technology ,Stochastic programming ,Renewable energy ,Electric power system ,0202 electrical engineering, electronic engineering, information engineering ,0601 history and archaeology ,Electricity ,Volatility (finance) ,business ,Operations security - Abstract
As the interdependency between natural gas system and power system is significantly close and the integration of renewable energy with uncertainty and volatility greatly increased in the last decades, the operation security and economics of the gas-electricity integrated energy system has attracted growing concerns. A two-stage distributionally robust optimization (DRO) model is proposed to study the coordination optimization scheduling for this multi-energy coupled system considering wind power uncertainty. Integrating the advantages of stochastic programming and traditional adjustable robust optimization (ARO), DRO aims to minimize the expectation of the operation cost under the worst-case distribution over an ambiguity set. The operation constraints of the above two energy subsystems are fully considered, moreover, the feasibility check subproblem for the reserve capacity configuration by gas-fired units is built. As a result, the DRO model is solved in a master-subproblem framework. A case study is implemented on a 6-bus power system with a 7-node natural gas system to demonstrate the superiority of the proposed DRO model compared to the existing ARO and data-driven DRO models. Furthermore, the modified IEEE 24-bus system with a 10-node gas system is used to verify the effectiveness and practicability of the proposed model.
- Published
- 2019
40. The Soft Underbelly of Cloud Security
- Author
-
Ron Herardian
- Subjects
050101 languages & linguistics ,Cloud computing security ,Computer Networks and Communications ,business.industry ,Computer science ,media_common.quotation_subject ,05 social sciences ,ComputingMilieux_LEGALASPECTSOFCOMPUTING ,Cloud computing ,02 engineering and technology ,Computer security ,computer.software_genre ,Encryption ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,0501 psychology and cognitive sciences ,Electrical and Electronic Engineering ,business ,Function (engineering) ,Law ,Operations security ,computer ,media_common - Abstract
Cybersecurity, regulatory compliance, and cloud operations are interdependent. The operational security of the cloud-operations function is the weakest link in cloud security. This problem is not well recognized, and new technologies are needed in the face of current security and regulatory trends.
- Published
- 2019
41. A Prediction Algorithm to Enhance Grid Resilience Toward Cyber Attacks in WAMCS Applications
- Author
-
Haris M. Khalid, Ahmed Al-Durra, Ahmed S. Musleh, and S. M. Muyeen
- Subjects
Engineering ,021103 operations research ,Computer Networks and Communications ,business.industry ,Reliability (computer networking) ,0211 other engineering and technologies ,02 engineering and technology ,Grid ,Computer Science Applications ,Flexible AC transmission system ,Smart grid ,Control and Systems Engineering ,Control theory ,Embedded system ,Electric power ,Electrical and Electronic Engineering ,business ,Resilience (network) ,Algorithm ,Operations security ,Information Systems - Abstract
Monitoring and control of electrical power grids are highly reliant on the accuracy of the digital measurements. These digital measurements reflect the precision of the installed sensors, which are vulnerable to the injection of unknown parameters in the form of device malfunction and cyberattacks. This may question the operational security and reliability of many cyberphysical infrastructure such as smart grid. To resolve this issue, a multisensor temporal prediction based wide-area control scheme is proposed in this paper. The feasibility of the designed scheme is verified in an advanced synchrophasor measurements based wide-area monitoring and control system (WAMCS). This WAMCS adopts a flexible ac transmission system device (the primary controller) for controlling the smart grid's voltage profile. The algorithm is validated in a real-time environment with an innovative software-in-the-loop testing setup. The performance of the proposed technique in the presence of false-data-injection attacks shows promising results.
- Published
- 2019
42. Security Assessment for Cyber Physical Distribution Power System Under Intrusion Attacks
- Author
-
Xiaojuan Huang, Rong Fu, Yingjun Wu, Yi Tang, Yusheng Xue, and Dong Yue
- Subjects
General Computer Science ,Computer science ,information security indices ,020209 energy ,0211 other engineering and technologies ,02 engineering and technology ,Communications system ,Computer security ,computer.software_genre ,Robustness (computer science) ,0202 electrical engineering, electronic engineering, information engineering ,General Materials Science ,limited stochastic Petri net theory ,Operations security ,Network model ,Password ,021103 operations research ,General Engineering ,Cyber-physical system ,Cyber physical distribution system ,cyber intrusion attacks ,Information and Communications Technology ,Stochastic Petri net ,lcsh:Electrical engineering. Electronics. Nuclear engineering ,lcsh:TK1-9971 ,computer - Abstract
A cyber physical distribution power system (CPDS) is a large and complex infrastructure that coordinates the cyber communication system and the physical distribution power system. Because of the increasingly advanced information communication technology, the development of cyber physical distribution power system has caused key cyber security issues related to system operation. This paper is focused on realizing a unified system attack modeling and security assessment of an active distribution power system. In this paper, first we present an overview of the system operation from the fusion system perspective. The significant effects of network intrusion attacks on operational security are evaluated. A new unified cyber physical network model is established using a limited stochastic Petri net graph theory that considers refined firewalls and password components. Then, a security effectiveness evaluation method is proposed to analyze channel throughput variation and system robustness. Overall CPDS security risk values are determined based on physical influence coefficients. Finally, simulations of an improved IEEE-33 bus distribution power system and security assessment under intrusion attacks are described. The research work could raise awareness of the cyber intrusion threats and provide the basis for security defense.
- Published
- 2019
43. Turing Machine-Based Cross-Network Isolation and Data Exchange Theory Model
- Author
-
Xi Chang, Jin Tang, Sisi Wan, Dan Liu, and Cheng Yongxin
- Subjects
Cross-network isolation ,General Computer Science ,Computer science ,Data security ,Access control ,02 engineering and technology ,Data modeling ,Turing machine ,symbols.namesake ,proof system ,0202 electrical engineering, electronic engineering, information engineering ,General Materials Science ,Operations security ,business.industry ,General Engineering ,data exchange ,020206 networking & telecommunications ,turing machine ,Classified information ,Data access ,Data exchange ,symbols ,020201 artificial intelligence & image processing ,physical transmission channel ,lcsh:Electrical engineering. Electronics. Nuclear engineering ,business ,lcsh:TK1-9971 ,Computer network - Abstract
Due to the confidentiality of the classified information system, it is isolated from the external network, but it is necessary to exchange data with an external network. This makes data exchange security between classified networks an important problem. Previous research focused on using access control policies to limit data access at different security levels, using some security checks to detect the security of the data itself. The security threat of the access control policy itself will threaten the data exchange between the classified networks. Moreover, the data should be performed security check isolated from user during the physical transmission to prevent the attack behavior which bypass the data security check from the user side. At present, the cross-network isolation and data exchange models are designed based on fixed business scenarios and lack generality. Therefore, this paper proposes a Turing machine-based theoretical model for cross-network isolated data exchange. This model consists of two parts: the proof system module and the physical transmission channel module. The proof system module uses an interactive Turing machine to model the part of the operational security and data security check of the communicating party's authority to provide security and versatility. The physical transmission channel module isolates different networks and provides a detection mechanism independent of the communication parties to ensure the security and efficiency of the transmission. The proof given shows that the theoretical model can exchange data efficiently and safely. Finally, based on the given theoretical model, an intuitive cross-network isolation and data exchange function model is constructed in the form of a functional tree to illustrate the model versatility.
- Published
- 2019
44. A Comprehensive Tutorial on Science DMZ
- Author
-
Nasir Ghani, Elias Bou-Harb, and Jorge Crichigno
- Subjects
DMZ ,Computer science ,05 social sciences ,020206 networking & telecommunications ,02 engineering and technology ,Terabyte ,Security policy ,Data science ,Electronic mail ,Cyberinfrastructure ,0502 economics and business ,0202 electrical engineering, electronic engineering, information engineering ,Use case ,Web content ,Electrical and Electronic Engineering ,Operations security ,050203 business & management - Abstract
Science and engineering applications are now generating data at an unprecedented rate. From large facilities such as the Large Hadron Collider to portable DNA sequencing devices, these instruments can produce hundreds of terabytes in short periods of time. Researchers and other professionals rely on networks to transfer data between sensing locations, instruments, data storage devices, and computing systems. While general-purpose networks, also referred to as enterprise networks, are capable of transporting basic data, such as e-mails and Web content, they face numerous challenges when transferring terabyte- and petabyte-scale data. At best, transfers of science data on these networks may last days or even weeks. In response to this challenge, the Science Demilitarized Zone (Science DMZ) has been proposed. The Science DMZ is a network or a portion of a network designed to facilitate the transfer of big science data. The main elements of the Science DMZ include: 1) specialized end devices, referred to as data transfer nodes (DTNs), built for sending/receiving data at a high speed over wide area networks; 2) high-throughput, friction-free paths connecting DTNs, instruments, storage devices, and computing systems; 3) performance measurement devices to monitor end-to-end paths over multiple domains; and 4) security policies and enforcement mechanisms tailored for high-performance environments. Despite the increasingly important role of Science DMZs, the literature is still missing a guideline to provide researchers and other professionals with the knowledge to broaden the understanding and development of Science DMZs. This paper addresses this gap by presenting a comprehensive tutorial on Science DMZs. The tutorial reviews fundamental network concepts that have a large impact on Science DMZs, such as router architecture, TCP attributes, and operational security. Then, the tutorial delves into protocols and devices at different layers, from the physical cyberinfrastructure to application-layer tools and security appliances, that must be carefully considered for the optimal operation of Science DMZs. This paper also contrasts Science DMZs with general-purpose networks, and presents empirical results and use cases applicable to current and future Science DMZs.
- Published
- 2019
45. Analysis of Cloud Computing Security Based on SGX Enhanced National Secret Algorithm
- Author
-
Yarong Lv
- Subjects
Scheme (programming language) ,National security ,Cloud computing security ,business.industry ,Computer science ,Hash function ,Cloud computing ,Hash-based message authentication code ,Field (computer science) ,business ,Operations security ,Algorithm ,computer ,computer.programming_language - Abstract
The operation security of national secret algorithm is an important research issue in the field of cloud computing security. This paper studies and proposes a cloud computing security operation scheme for SGX enhanced national security algorithm. Based on the analysis of SGX technology and national security enhanced algorithm, the cloud computing environment for SGX enhanced national security algorithm is constructed. The accuracy rate of SM3 algorithm and HMAC algorithm for SM3 is 100%, both of which can calculate the hash value correctly. When the algorithm runs 800 times, the overall running time of the original SM3 algorithm, the running time of the enhanced SM3 algorithm itself, the running time of the enhanced SM3 initialize Enclave, and the overall running time of the enhanced SM3 algorithm are about 0.1s, 0.5s, 14s, 15s, respectively.
- Published
- 2021
46. The Analysis and Application of Decentralized Cyber Layer and Distributed Security Control for Interconnected Conurbation Grids under Catastrophic Cascading Failures
- Author
-
Liu Liyang, Shengyong Ye, Yunkai Lei, Liu Jieying, and Han Yuqi
- Subjects
Electric power system ,Distributed computing ,Layer (object-oriented design) ,Power-system protection ,Resilience (network) ,Decentralised system ,Operations security ,Cascading failure ,Security controls - Abstract
The cluster-featured conurbation cyber-physical power system (CPPS) interconnected with tie-lines facing the hazards from catastrophic cascading failures. To achieve better real-time performance, enhance the autonomous ability and improve resilience for the clustered conurbation CPPS, the decentralized cyber structure and the corresponding distributed security control strategy is proposed. Facing failures, the real-time security control is incorporated to mitigate cascading failures. The distributed security control problem is solved reliably based on alternating direction method of multipliers (ADMM). The system overall resilience degradation index(SORDI) adopted reflects the influence of cascading failures on both the topological integrity and operational security. The case study illustrates the decentralized cyber layer and distributed control will decrease the data congestion and enhance the autonomous ability for clusters, thus perform better effectiveness in mitigating the cascading failures, especially in topological perspective. With the proposed distributed security control strategy, curves of SORDI show more characteristics of second-order percolation transition and the cascading failure threshold increase, which is more efficient when the initial failure size is near the threshold values or step-type inflection point. Because of the feature of geological aggregation under cluster-based attack, the efficiency of the cluster-focused distributed security control strategy is more obvious than other nodes attack circumstances.
- Published
- 2021
47. Status Perception Method of the Renewable Energy and Thermal Power Coupled System Based on Operation Security Region
- Author
-
Hao Yang, Lei Zhang, Qianggang Wang, Ning Chen, Guiping Zhou, Yuanzhu Zhao, and Bingjie Tang
- Subjects
Electric power system ,business.industry ,Computer science ,Range (aeronautics) ,Thermal power station ,AC power ,business ,Dispatchable generation ,Operations security ,Realization (systems) ,Automotive engineering ,Renewable energy - Abstract
With the rapid development of renewable energy generation technology, in future power system, the scenario of a coupled system where renewable energy and thermal power generation are integrated and coupled at point of common coupling will be widespread. The realization of the coordinated control and the effective real-time operating status evaluation of the coupled system is of great significance for ensuring the effective consumption of renewable energy in future power system with high penetration of renewable energy integration, but currently there is little research on this issue. Therefore, a status perception method of the coupled system based on operation security region is proposed in this paper. By establishing the operation security region on the two-dimensional coordinate system of active power and reactive power of renewable energy separately, the allowable proportion evaluation of active power output and the dispatchable range evaluation of reactive power of renewable energy is realized. In the end, a case study of a practical coupled system in Northeast China is given to illustrate the specific application of the proposed method.
- Published
- 2021
48. Resilience Assessment in Electricity Critical Infrastructure from the Point of View of Converged Security
- Author
-
Ludek Lukas, David Rehak, and Martin Hromada
- Subjects
Control and Optimization ,Computer science ,020209 energy ,0211 other engineering and technologies ,Energy Engineering and Power Technology ,Sample (statistics) ,Context (language use) ,02 engineering and technology ,resilience assessment ,lcsh:Technology ,Critical infrastructure ,Unit (housing) ,0202 electrical engineering, electronic engineering, information engineering ,electricity ,Electrical and Electronic Engineering ,Resilience (network) ,Engineering (miscellaneous) ,Operations security ,021110 strategic, defence & security studies ,Renewable Energy, Sustainability and the Environment ,business.industry ,lcsh:T ,critical infrastructure ,converged security ,penalty factors ,Terms of service ,Risk analysis (engineering) ,Electricity ,business ,Energy (miscellaneous) - Abstract
In terms of service provision, the electricity sector is the most important critical infrastructure sector, on the supply of which the vast majority of society and its basic vital functions depend. Extensive disruption of these supplies would have negative effects not only on basic human needs, but also on the economy and security of the state. For this reason, it is necessary to ensure permanent and comprehensive monitoring of the infrastructure elements resilience level, especially against threats with a multispectral impact on several areas of security. For this reason, the authors of the article developed the Converged Resilience Assessment (CRA) method, which enables advanced assessment of the electricity critical infrastructure elements resilience from the converged security point of view. Converged security in this case combines (converges) physical, cyber and operational security into a complementary unit. This reflects the integral determinants of resilience across related areas of security/safety. The CRA method focuses mainly on information and situation management, which integrates and correlates information (signals) from systems and sensors in order to obtain an overview of the situation and the subsequent effective management of its solution. The practical use of the proposed method is demonstrated on a selected element of the Czech Republic transmission system. The CRA method is currently embodied in a functional sample that has been piloted on several TSO elements. Further development of this method is seen mainly in fulfilling the logic of network infrastructure and reflection between elementary and intersectoral links in the context of synergistic and cascading effects in a broader context., Ministry of the Interior of the Czech Republic [VI20192022151], Ministerstvo Vnitra České Republiky: VI20192022151
- Published
- 2021
49. Informationssäkerhetsrisker och organisatoriska sanktioner vid användandet av privata smarta enheter i Försvarsmakten : En studie om användning av privata smarta enheter
- Author
-
Persson, Tobias, Andersson, Emil, Persson, Tobias, and Andersson, Emil
- Abstract
Denna uppsats undersöker intentionen att använda smarta enheter i tjänst hos personal i Försvarsmakten, som är en organisation med högt behov av verksamhetssäkerhet. Verksamhetens säkerhet är direkt beroende av hur personal inom verksamheten agerar utifrån ett säkerhetsperspektiv. Syftet är att belysa hur Försvarsmakten förmedlar informationssäkerheten kring smarta enheter och hur personalen påverkas utifrån det. Det empiriska materialet har samlats in genom en kvalitativ fallstudie i form av semistrukturerade intervjuer med två olika grupper. Resultatet analyseras med hjälp av ett teoretiskt ramverk bestående av Protection Motivation Theory (PMT) och General Deterrence Theory (GDT) i syfte att belysa vad det är som avgör personalens beteende. Teorierna utgår från att beteendet påverkas av rädsla för sanktioner eller för hot mot verksamhet och individ. Resultatet visar att aspekter från de båda teorierna är närvarande hos personalen och att det som påverkar den enskildes agerande beror på vilken information organisationen delgett och individernas personliga uppfattningar. Personalen är medveten om de risker som följer av användningen av smarta enheter, men enheterna används ändå i stor utsträckning. Faktorer som spelar in i intentionen är kunskapsnivån, befattningen individen besitteroch arbetsområdet individen verkar inom., This paper examines the intention to use smart devices by staff in the Swedish Armed Forces,which is an organization with a high need for operational security. The security of the business isdependent on how staff within the business behave, in a security perspective. The purpose is toelucidate how the Swedish Armed Forces conveys information security regarding smart devicesand how their staff are affected. The empirical material has been collected through a qualitativecase study in the form of semi-structured interviews with two different groups. The results areanalyzed using a theoretical framework consisting of Protection Motivation Theory (PMT) andGeneral Deterrence Theory (GDT) in order to elucidate what determines the behavior of the staff.The theories are based on the fact that behavior is affected by fear of sanctions or threats to thebusiness and individuals. The result shows that aspects in both theories are present in the staffbehavior. What influences the individual's actions depends on what information the organizationhas shared and the personal perceptions of the individuals. Factors that play into the intention arethe level of knowledge, the position the individual possesses and the area of work the individualoperates within.
- Published
- 2020
50. On managing vulnerabilities in AI/ML systems
- Author
-
Jonathan M. Spring, April Galyardt, Allen D. Householder, and Nathan VanHoudnos
- Subjects
FOS: Computer and information sciences ,Thought experiment ,Prioritization ,Computer Science - Machine Learning ,Computer Science - Cryptography and Security ,Computer science ,Computer Science - Artificial Intelligence ,Common Vulnerabilities and Exposures ,05 social sciences ,020207 software engineering ,02 engineering and technology ,Vulnerability management ,Data science ,Machine Learning (cs.LG) ,Identifier ,Artificial Intelligence (cs.AI) ,Research community ,0202 electrical engineering, electronic engineering, information engineering ,0501 psychology and cognitive sciences ,Line of communication ,Cryptography and Security (cs.CR) ,Operations security ,050107 human factors - Abstract
This paper explores how the current paradigm of vulnerability management might adapt to include machine learning systems through a thought experiment: what if flaws in machine learning (ML) were assigned Common Vulnerabilities and Exposures (CVE) identifiers (CVE-IDs)? We consider both ML algorithms and model objects. The hypothetical scenario is structured around exploring the changes to the six areas of vulnerability management: discovery, report intake, analysis, coordination, disclosure, and response. While algorithm flaws are well-known in the academic research community, there is no apparent clear line of communication between this research community and the operational communities that deploy and manage systems that use ML. The thought experiments identify some ways in which CVE-IDs may establish some useful lines of communication between these two communities. In particular, it would start to introduce the research community to operational security concepts, which appears to be a gap left by existing efforts., 16 pages. New Security Paradigms Workshop
- Published
- 2021
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.