Cyber Attack
1,241 Followers
Recent papers in Cyber Attack
Cyber-attacks have become increasingly common in recent years. Capable of shutting down nuclear centrifuges, air defense systems, and electrical grids, cyber-attacks pose a serious threat to national security. As a result, some have... more
British Airways will face record-breaking GDPR fine for suffering financial data theft of hundreds of thousands of customers. Following an extensive investigation, the UK's data privacy authority announced that it intends to impose its... more
The requirement for a collaborative effort to achieve a common set of security standards for use by entities that process, store or transport voter data. -More than 350,000 voting machines are used in the Unites States today in over 42... more
In recent years, NATO and the EU have taken greater responsibility for countering hybrid threats. This group of threats covers a wide range of hostile methods used by states and non-state actors. It includes both military and non-military... more
This paper is an attempt to draw distinctive lines between the concepts of cybercrime, cyber-attack, and cyber warfare in the current information age, in which it has become difficult to separate the activities of transnational criminals... more
In this article, we will discuss keylogger attacks with xss.
The Russia-China deal on cyber-security could send a warning signal to the U.S., which might view the deal as a growing threat to its economic and security interests in cyberspace.
A significant number of breaches in the security of electronic banking (e-Banking) system is reported each year, drawing attention to the need to protect and inform customers about the risk of exposure to malicious actions initiated by... more
Cyber attack is an action that aims to harm someone’s computer and system, or to steal valuable information. Despite the complexity of systems and the security measures organizations deploy, satellites systems are vulnerable to malicious... more
With the growing internet services, cybersecurity becomes one of the major research problems of the modern digital era. Cybersecurity involves techniques to protect and control the systems, hardware, software, network, and electronic data... more
The act of cyber stealing your right of privacy as an individual is growing every day. Cyber Espionage is emerging along with the expansion of the World Wide Web, which origins a gigantic impact either on heavy solid economic, politic,... more
Applications of artificial intelligence in cyber warfare have been mainly postulated and studied in the context of defensive operations. This paper provides an introductory overview of the use of autonomous agents in offensive cyber... more
Cyber-attacks are often called non-violent or non-kinetic attacks, but the simple truth is that there is a credible capability to use cyber-attacks to achieve kinetic effects. Kinetic Cyber refers to a class of cyber-attacks that can... more
This paper gives the introduction of cyber-attacks, their types, motives and consequences. But the main aim of this paper is to provide the insight of some of the major cyber-attacks that took place all over the world and their effects.... more
Günümüzde enerji, doğalgaz, ulaşım, sağlık, bankacılık nükleer ve iletişim gibi birçok kritik altyapımızın yönetilmesinde önemli bir yeri olan Endüstriyel Kontrol Sistemleri (EKS) uzun yıllardır siber korsanlar tarafından hedef... more
In the present era of technology, cybercriminals are getting smarter day by day. From the past few years, the cybercrimes have increased to an extent that most of the big companies are finding it difficult to prevent cybercrimes. One such... more
Abstract Cybersecurity in the maritime realm made headlines in 2017 following the spread of ransomware, a type of computer and network virus, in the systems of major shipping companies and providers. Whilst there is extensive literature... more
Nations and their citizens rely on infrastructures. Their incapacitation or destruction could prevent nations from protecting themselves from threats, cause substantial economic harm, and even result in the loss of life. Therefore,... more
"L'accélération fulgurante des cyberattaques contre les infrastructures électriques est aujourd'hui une réalité préoccupante qui nécessite de prendre des mesures d'urgence pour se protéger. Et cela d'autant plus, lorsque leurs... more
A smart grid system supports intelligent metering and monitoring functions spanning the areas of power generation, transmission and distribution. It has enormous benefits for meeting the energy demands and billing requirements through... more
With the increased dependence of organizations on technological solutions, the cyber threats have become some of the major concerns for the very existence of the businesses. Thus, the security measures to be implemented need to go beyond... more
The emerging of new technology is making easier for people to access things in seconds just like the platform of the internet as it has become a crucial part of everyone's life. It enables people to share information worldwide very... more
Abstract — Over the past few years, we have witnessed an ever-increasing rampant battle between network managers & computer criminals which led to many developments in the tools used by both parties i.e. " legitimate computer... more
Abstract—Growing in cyber attacks has driven a growth in demand for network security. Cryptology is the science of secret communication systems including cryptography and cryptanalysis. Different heuristic and meta heuristic algorithms... more
Book review: VENTRE, Daniel (eds.); "Cyber Conflict: Competing National Perspectives"; ISTE Ltd. and John Wiley & Sons, Inc.; UK & USA; 2012. ISBN: 978-1-84821-350-0.
With the growing internet services, cybersecurity becomes one of the major research problems of the modern digital era. Cybersecurity involves techniques to protect and control the systems, hardware, software, network, and electronic data... more
Through the increasing amounts of data day by day, big data analytics has appeared as an important trend for many organizations. These collected data can have important information that possibly will be key to solving extensive problems,... more
Özet: Dijital dünya olarak adlandırılan günümüz dünyasında, artık insanoğlu teknolojiksiz bir hayatı düşünememektedir. İnsan, çoğunlukla geçmişine ya da alışkanlıklarına sıkı sıkıya bağlı olduğu için yeni fikirleri ve önemli icatları... more
In the present paper, we propose a novel cyber-attack detection model based on two multivariate-analysis methods to the audit data observed on a host machine. The statistical techniques used here are the well-known Hayashi's... more
Cyber attacks have become a grave threat to international peace and security. Northeast Asia is a critical point of many of these cyber operations. First, South Korea has been the target of cyber attacks from North Korea. Second, there... more
Rusya Federasyonu (RF), siber uzay olarak adlandırılan alanda etkinliğini her geçen gün artırmaktadır. RF’nin siber uzaydaki etkinliğini artırmasının temel sebebi ise uluslararası sistemdeki en önemli siber güçlerden biri konumuna... more
China cyberattack has become aggressive, disruptive, stealthy, and sophisticated. Apparently, China’s advantage is more on the cognitive domain than technical domain since information systems security is art and science—in some case, it... more
Artificial intelligence (AI) is one of the key technologies of the Fourth Industrial Revolution (or Industry 4.0), which can be used for the protection of Internet-connected systems from cyber threats, attacks, damage, or unauthorized... more
يعد العالم حالياً على أعتاب مرحلة جديدة من الهجمات الإلكترونية، أكثر تعقيداً وسرعة وخطورة، تعجز الدول منفردة عن مواجهتها، فهي تنتشر في ثوان معدودة، وتصيب كافة القطاعات والمستويات، وتسبب في ضرب الاقتصاديات والجيوش والأفراد، تدمر البنى... more
Working in Cyberspace Operations from multiple aspects has led me to question the multiple methods and frameworks used to defend enterprises. This has also led to an effort of integrating military operational frameworks where focuses... more
The Cyber risk landscape is developing rapidly in multitude areas. Report to cyber attacks dominates the headlines. It is seemingly becoming more frequent and more sophisticated than ever. Businesses across the wide spectrum of industries... more
"Lorsque l’on évoque l’affaire « Pegasus », beaucoup l’associent immédiatement à la surveillance globale par les États de nos faits et gestes, aux actions d’espionnage adverse, mais également au non-respect de la législation en vigueur... more
Cyber Attack adalah jenis manuver ofensif yang digunakan oleh negara, individu, kelompok, masyarakat atau organisasi yang menargetkan sistem informasi komputer, infrastruktur, jaringan komputer, atau perangkat komputer pribadi dengan... more