Matches in SemOpenAlex for { <https://semopenalex.org/work/W2146156788> ?p ?o ?g. }
Showing items 1 to 100 of
100
with 100 items per page.
- W2146156788 endingPage "115" @default.
- W2146156788 startingPage "103" @default.
- W2146156788 abstract "Nowadays, assuring the security of the national cyber-space has become a big issue that can only be tackled through collaborative approaches. Threats cannot be confined to a single computer system just as much as computer systems are rendered useless without being con-nected to a supporting network. The authors of this article propose an innovative architecture of a system designated to help governments collect and analyze data about cyber-security in-cidents, from different organizations, dispersed nationwide, and acting within various eco-nomic sectors. The collected data will make us able to determine a national cyber-security alert score that could help policy makers in establishing the best strategies for protecting the national cyber-space.Keywords: Cyber-Security, Incidents, Early-Warning, Intrusion, Detection1 IntroductionA big part of the daily human activity has been transferred in the online environment, and along with that so has the cyber-crime. Cyber-attacks are becoming more and more numerous and complex. There are countries that are developing real cyber-armies, ready to attack in no time.Managing the security of an information sys-tem is not an easy job. We live in the XXI century that seems to be under the sign of major cyber-attacks and even under the sign of cyber-wars.The Internet has become an international crit-ical infrastructure and disturbing its function-ing could cause big damages to any state. A good example in this area is the attack against Estonia in 2007. The country was lit-erally wiped-out from the Internet because of a massive cyber-attack that succeeded in af-fecting numerous governmental websites and some financial institutions also. The attack lasted for 2 weeks.The countries that have critical infrastruc-tures based upon complex informatics sys-tems, connected via the Internet (like the USA), are the first, and most vulnerable, that might suffer from such an attack. Usually, these countries are the most willing to invest in IT security.William J. Lynn, United States Deputy Sec-retary of Defense stated in 2011 that USA could respond to cyber-threats with propor-tional military forces. He also stated that the cyberspace has become a new field of battle among land, sea and air [1]. The 2010 US Cyber Security Strategy also states that the cyber-security is one of the biggest challeng-es of the nation, because the Internet is one of the key factors related to economic com-petiveness and an indispensable instrument of the business environment. The digital in-frastructure is considered a national asset, and protecting this asset is a national priority. [2]Thus, we are assisting to a substantial trans-formation of the international cyber-space, as it becomes a key component of the world economy. Nowadays IT security has a new meaning: it is not a mere defensive concern, but it can also work as an offensive strategy.The problem is that the state of security, be it about an organization or a state, becomes ev-er more difficult to accomplish through iso-lated or individual action. Securing and re-sponding to threats by common efforts and cooperation of all parties that could be af-fected in case of a cyber-security incident, is now the new way of action in cyber-defence. This trend substantially mirrors the hacker community action, which now works at an international level, under the umbrella of or- ganized-crime. When taking an organization, for example, either public or private, the cyber security issue cannot be tackled indi-vidually, but it will have to fulfill at least three conditions: (1) cyber-security legisla-tion that will incriminate the cyber-attacks will have to be put in place, (2) proper ac-tions will have to be taken by the authorities in charge of cyber law enforcement, (3) it needs the help of private security providers that will develop solutions to stop or mitigate the attacks. Security can no longer be locally addressed just by merely installing an antivi-rus or a firewall. …" @default.
- W2146156788 created "2016-06-24" @default.
- W2146156788 creator A5076637921 @default.
- W2146156788 creator A5083771892 @default.
- W2146156788 creator A5088704412 @default.
- W2146156788 date "2012-04-01" @default.
- W2146156788 modified "2023-09-23" @default.
- W2146156788 title "Cyber Security Policy. A methodology for Determining a National Cyber-Security Alert Level" @default.
- W2146156788 cites W1000839021 @default.
- W2146156788 cites W1959016978 @default.
- W2146156788 cites W2002030568 @default.
- W2146156788 cites W2141078707 @default.
- W2146156788 hasPublicationYear "2012" @default.
- W2146156788 type Work @default.
- W2146156788 sameAs 2146156788 @default.
- W2146156788 citedByCount "1" @default.
- W2146156788 countsByYear W21461567882017 @default.
- W2146156788 crossrefType "posted-content" @default.
- W2146156788 hasAuthorship W2146156788A5076637921 @default.
- W2146156788 hasAuthorship W2146156788A5083771892 @default.
- W2146156788 hasAuthorship W2146156788A5088704412 @default.
- W2146156788 hasConcept C110875604 @default.
- W2146156788 hasConcept C111919701 @default.
- W2146156788 hasConcept C11413529 @default.
- W2146156788 hasConcept C134306372 @default.
- W2146156788 hasConcept C136764020 @default.
- W2146156788 hasConcept C139676723 @default.
- W2146156788 hasConcept C14036430 @default.
- W2146156788 hasConcept C144133560 @default.
- W2146156788 hasConcept C17744445 @default.
- W2146156788 hasConcept C199539241 @default.
- W2146156788 hasConcept C201307755 @default.
- W2146156788 hasConcept C2777381055 @default.
- W2146156788 hasConcept C2778572836 @default.
- W2146156788 hasConcept C2779390178 @default.
- W2146156788 hasConcept C2909575446 @default.
- W2146156788 hasConcept C3018725008 @default.
- W2146156788 hasConcept C33923547 @default.
- W2146156788 hasConcept C38652104 @default.
- W2146156788 hasConcept C41008148 @default.
- W2146156788 hasConcept C48103436 @default.
- W2146156788 hasConcept C528167355 @default.
- W2146156788 hasConcept C75684735 @default.
- W2146156788 hasConcept C78458016 @default.
- W2146156788 hasConcept C86803240 @default.
- W2146156788 hasConceptScore W2146156788C110875604 @default.
- W2146156788 hasConceptScore W2146156788C111919701 @default.
- W2146156788 hasConceptScore W2146156788C11413529 @default.
- W2146156788 hasConceptScore W2146156788C134306372 @default.
- W2146156788 hasConceptScore W2146156788C136764020 @default.
- W2146156788 hasConceptScore W2146156788C139676723 @default.
- W2146156788 hasConceptScore W2146156788C14036430 @default.
- W2146156788 hasConceptScore W2146156788C144133560 @default.
- W2146156788 hasConceptScore W2146156788C17744445 @default.
- W2146156788 hasConceptScore W2146156788C199539241 @default.
- W2146156788 hasConceptScore W2146156788C201307755 @default.
- W2146156788 hasConceptScore W2146156788C2777381055 @default.
- W2146156788 hasConceptScore W2146156788C2778572836 @default.
- W2146156788 hasConceptScore W2146156788C2779390178 @default.
- W2146156788 hasConceptScore W2146156788C2909575446 @default.
- W2146156788 hasConceptScore W2146156788C3018725008 @default.
- W2146156788 hasConceptScore W2146156788C33923547 @default.
- W2146156788 hasConceptScore W2146156788C38652104 @default.
- W2146156788 hasConceptScore W2146156788C41008148 @default.
- W2146156788 hasConceptScore W2146156788C48103436 @default.
- W2146156788 hasConceptScore W2146156788C528167355 @default.
- W2146156788 hasConceptScore W2146156788C75684735 @default.
- W2146156788 hasConceptScore W2146156788C78458016 @default.
- W2146156788 hasConceptScore W2146156788C86803240 @default.
- W2146156788 hasIssue "2" @default.
- W2146156788 hasLocation W21461567881 @default.
- W2146156788 hasOpenAccess W2146156788 @default.
- W2146156788 hasPrimaryLocation W21461567881 @default.
- W2146156788 hasRelatedWork W2164314743 @default.
- W2146156788 hasRelatedWork W2271019145 @default.
- W2146156788 hasRelatedWork W2282113798 @default.
- W2146156788 hasRelatedWork W2412253985 @default.
- W2146156788 hasRelatedWork W2487784979 @default.
- W2146156788 hasRelatedWork W2560596517 @default.
- W2146156788 hasRelatedWork W2590048428 @default.
- W2146156788 hasRelatedWork W2771522537 @default.
- W2146156788 hasRelatedWork W277913725 @default.
- W2146156788 hasRelatedWork W2921173506 @default.
- W2146156788 hasRelatedWork W2935614895 @default.
- W2146156788 hasRelatedWork W2995245159 @default.
- W2146156788 hasRelatedWork W3114661429 @default.
- W2146156788 hasRelatedWork W3140787605 @default.
- W2146156788 hasRelatedWork W3153375563 @default.
- W2146156788 hasRelatedWork W3157295170 @default.
- W2146156788 hasRelatedWork W3185989586 @default.
- W2146156788 hasRelatedWork W2592446225 @default.
- W2146156788 hasRelatedWork W2994557551 @default.
- W2146156788 hasRelatedWork W3092307501 @default.
- W2146156788 hasVolume "16" @default.
- W2146156788 isParatext "false" @default.
- W2146156788 isRetracted "false" @default.
- W2146156788 magId "2146156788" @default.
- W2146156788 workType "article" @default.