Write an essay on supply chain cyber security.
No. |
Title |
Summary |
1. |
Sokolovn, A., Mesropyan, V., &Chulok, A. (2014). Supply chain cyber security: A Russian outlook. Technovation, 34, 389-391. Retrieved from https://www.elsevier.com/locate/technovation |
This article is about supply chain cyber security of Russian perspective of ICT infrastructure and internet access. The recent trend of the cyber security is seen mostly in ICT sector where the Russian organizations use the concept of the cyber security for attaining universal values and importancefornational competitiveness and integration into the global value chains by making their existing system more secure. In the public and the corporatesector, also the cyber security is applicable into in the work of public administration, education, health and safety for maintaining all the details and information in electronic formats. Supervisory Control and Data Acquisition (SCADA) systems are being accomplished with an efficient secured cyber services. Cyber security is also used in the formulation of Electronic andRadioelectronic Industriesthat endeavor for a sustainable instrument in Russia for the electronic component base industry to bridge the gap between the Russia and developed countries. |
2. |
Keegan, C. (2014). Cyber security in the supply chain: A perspective from the insurance industry, 34(380-381). Retrieved from https://www.elsevier.com/locate/technovation |
The supply chain for an organization when supported by new information technology it needs some cyber security. The Russian government has adopted a certiï¬Âcation in technology requirements and initiated the National Software Platform effort based on Russian proprietary software. This encourages the technological independence and to become a technology services exporter. In India for formulating a robust and globally competitive national presence, innovation policies for the cyber security system is developed for giving preference to the local IT suppliers. In the US, the governing bodies formulate forums for sharing information on the cyber security by communicating with the technological group. Furthermore, re-evaluating, developing and maintaining cyber security strategy is crucial for the development of the concerned countries. The United States also published National Strategy to Secure Cyberspace in the year 2003 for developing a national strategy for Homeland Security for protecting the state from terrorist attacks. The insurance company also encompasses some cyber security technologies like DHS and security vendors. |
3. |
Solms, R. &Niekerk, J. (2013). From information security to cyber security, (38), 97-102. |
Every nation adopts some technology for cyber security for mitigating the cyber crime. In this article, the circumstance of US is taken into consideration that outlines the USA’s collaboration with other countries for diminishingthe cyber issues. The primary aim for considering this technology is to maintain the availability of the data with proper security, the integrity of the data for evaluating the authenticity of the stored information in the computer system and most importantly the confidentiality of the data. The international standards of ISO 27002 ensure the information security by providing security to maintain the security, confidentiality and integrity in the context of the cyber security. Cyberbullying, home automation, digital media and cyber terrorism are the cyber-related issue that is discussed in this article. Cyberbullying occurs when an intruder targeted a person and harassed them in social media psychologically. These intruders may access the home appliances like geysers, stoves and refrigeration through illegal access to these web based home appliances for harming the communal. In digital media also some hackers posts some illegal video excerpt in the social media by stealing the identity of the authenticated person and creates damage and lastly the cyber terrorism occurs when terrorists attack public infrastructuresthrough cyberspace. |
4. |
Ben-Asher, N. & Gonzalez, C. (2015). Effects of cyber security knowledge on attack detection, 48, 51-61. Retrieved from https://www.elsevier.com/locate/comphumbeh |
In this article, the enlightened topic is the cyber attacksthat disrupt of the operational functionalities and the hacking of the sensitive information by an intruder. The information technology governancecan rectify this by the supervision of cyber experts and the analysts. The experts take the initiative to mitigate the problem of the cyber crime use intrusion detection system (IDS). The specialty of this tool is to match the pattern of the ongoing network activity with the known attacks of cyber-crime for detecting the network intrusion. This system also detects the abnormal activities in the internet network and evaluates the complexity of the cyber-attacks. The intellect of the cyber analyst ensures the detection of the cyber-attack by analyzing the standard trick for accomplishing the criminal activities in the cyber world. Another consequence of interpreting is measuring the gap between the modern technology and the known knowledge of the experts that the hackers can take advantage to harm others. |
5. |
Caldwell, T. (2013). Plugging the cybersecurity skills gap. |
This article focuses on the gaps incyber security skills to overcome the situation of the cyber-crime. The report shed light on the fact that every employee of the organization must have the ability to handle the cyber-crime activities otherwise intruders will attack and will do serious harm to them. This needs efficient and skilled employees that most of the institute has a crisis. The qualified person in handling the cyber-crime activities relies on the age range of the 30-39yers old while the percentage of these professional decreases with increase in age. The rapid development of the information technology is the primary reason why there is a shortage of the skilled cyber experts in the organization. Furthermore, people in the institute especially women do not fill the cyber security roles to lack of interest in them. In order to overcome these issues the employee provides practical training so that they can handle the adversity in the cyber issues. |
6. |
Wang, W. & Lu, Z. (2013). Cyber Security In The Smart Grid: Survey And Challenges, (57), 1344-1371. Retrieved from https://www.elsevier.com/locate/comnet |
This article is on the cyber security issues in the smart grid project. People uses supply network for electricity to fulfill their requirement and organization usesthe digital technology to analyses the changes occur in the society. This makes it crucial for them to maintain a secure cyber technology so that no intruder can leak customer information and create massive blackout and destruction of infrastructure. These hackers attained the information from network resources from the stored information. The denial-of-service (DoS) attackis a common cyber-crime in this field that depicts the block or corruption of the communication accomplished by the electricity service provider including made attempt to delay in service.The industry detects this kind of the cyber-criminalactivities by adopting many procedures like signal-based detection that measure the signal strength information to detect whether there is an occurrence of the attack by some intruder or not. Packet-based detection is used to detect the attack by measuring the transmitted result of each packet and analyze the event of potential attacks by any transmission failures. Proactive and hybrid methods are used to identify the DoS attack by sending the probing packets to test or measuring the status of the attacker and formulation of a suitable method by mixing the above mentioned procedures for cyber security. |
7. |
Manuputtyb, A., Noor c, S., &Sumardid, J. (2013). CYBER SECURITY: RULE OF USE INTERNET SAFELY?, (103), 255-261. |
The primary reason for the adaptation of the cyber security is to measure the protection of the information technology, the level of the protection approach and the endeavor of the cyber expert to implement such approaches to implementing the cybersecurity. Cybercrime is mostly done by the high school and university students and they mainly steal the personal data like credit card details, ATM pins, and personal data from their computers. In this journal, the measurement to protect strengths and weaknesses of the |
8. |
Ashok, A., Hahn, A., &Govindarasu, M. (2013). Cyber-Physical Security Of Wide-Area Monitoring, Protection And Control In A Smart Grid Environment, 5, 481-489. |
The cyber security approach that is analyzed in this journal article is the cyber advancements to monitor functions in the field of the power grid to supply electricity to the local communal.Advanced Metering Infrastructure |
9. |
Saadawi, T. & El-Desouki, A. (2014). Special Issue On ‘‘Cyber Security’’, (5), 413-414. |
This article mainly emphasizes on the network security, software and application safety and the Cyber Infrastructure Protection. The cyber security professional determine the hidden nodes by using protocols like IEEE 802.11 DCF protocol. The intruder exchanges the IEEE 802.11 standard with the malicious nodes in the Internet process to illegally capture the communication channel. However, the experts also use the same technology to increase the probability of successful packet transmission. In the context of the software and application security, analyze the software developing failures for a secure programming practice. The expert uses a prototype interactive |
10. |
(2013). REGULATING CYBER-SECURITY, 107(4), 1504-1567. Retrieved from https://www.copyright.com/ccc/basicSearch.do? &operation=go&searchType=0 &lastSearch=simple&all=on&titleOrStdNo=0029-3571 |
In this article, the key points for cyber security are the detection of the malicious code, take proper initiatives for making the system more reliable for cyber security. Furthermore, formulation of an efficient system that can withstand the severe attacks by an intruder and have the capability to recover from the adverse circumstance and respond according to the outcome of the cyber-attack. Numerous organization once noticed some malicious data transmission with a system is temporarily isolated to avoid the transmission of the infected data in the network system. The private firm mainly uses these cyber security facilities and invests an enormous amount in these field like $5billion. Cyber-security mainly comprises of vulnerabilities, threats, and |
11. |
Barnett, D., Sell, T., Lord, R., Jenkins, C., Terbush, J., & Burke, T. (2013). Cyber Security Threats To Public Health, 5(1). |
This journal article emphasizes on cyber-related public health challenges. Health Information Technology for Economic and Clinical Health (HITECH) Act enlightens on the requirement of increase in the fund for health information technology for protecting health information and public health infrastructure. The pubic heath sectors impose the cyber security system for the betterment of the health care delivery system, homeland security, and the public safety. Moreover, they also focus on the stakeholder framework of the communities, academia, media and the employee and the business. These stakeholders often have to face the cyber threats like physical destruction in systems, loss of integrity, availability and confidentiality. The health care delivery system also faces subtle threats like theft of patient information that signifies secrecy, disturbance in attention because of software outages that are known as unavailability and the loss of confidence in health care providers that resembles the situation of the integrity.These public health sectors face problem in disruption of emergency telephone lines and EMS system along with the reputational damage, financial gain and fraud, commercial advantage and economic damage by the intruder. These sectors mitigate this situation these health care take initiative for IT budget constraints and formulate an effective security strategy. Trusted identities and controlling access to information system in the computer are taken into consideration that is protected by antivirus, firewalls and other data encryption tools for cyber security. |
12. |
Harašta, J. (2013). CYBER SECURITY IN YOUNG DEMOCRACIES, 20(4), 1457–1472. |
This paper mainly focuses on This article is enlightens on the comparison of Czech Republic andLithuania in the practices of the cybernetic security. Digitization and the information society changed the business procedures while increasing the risks for the duplicity and disreputability. Cybernetic security is required in every country and society for to establishing and protecting the distributive information within the organization. It preserves all the crucial information of their communal that must have to be handled with proper care so that no intruder can hamper the confidentiality of those people. Legislative Framework is often used by major countries like Germany and USA for supporting the cyber security in developing various field like conducting safe e-commerce facilities to the consumers and protecting those communal as well as the organization themselves in the cyber space. The administration, including the Presidential office, takes initiatives to encourage the necessity of the cyber security by establishing principle regarding shared responsibility of the entire society in the context of cyber security along with the motivating innovations within cyber experts and the evolving generation for formulating a better cyber security network. |