1
|
Alsharida RA, Al-rimy BAS, Al-Emran M, Zainal A. A systematic review of multi perspectives on human cybersecurity behavior. TECHNOLOGY IN SOCIETY 2023; 73:102258. [DOI: 10.1016/j.techsoc.2023.102258] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 09/01/2023]
|
2
|
Qi J. Loss and premium calculation of network nodes under the spread of SIS virus. JOURNAL OF INTELLIGENT & FUZZY SYSTEMS 2023. [DOI: 10.3233/jifs-222308] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 02/25/2023]
Abstract
In the big data and “Internet+” era, the research related cybersecurity risk has attracted much attention. However, Premium pricing for cybersecurity insurance remains in its early days. In this paper, we established a premium pricing method for cybersecurity risks. Firstly, the losses during the cyber infection is modeled by an interacting Markov SIS (Susceptible-Infected-Susceptible) epidemic model. we also proposed a premium simulation method called the Gillespie algorithm, which can be used for simulation of a continuous-time stochastic process. At last, as an example, we calculated the premiums by using premium principles and simulation in a simple network respectively. The numerical case studies demonstrate the premium pricing model performs well, and the premiums based on simulations are rather conservative, and recommended using in practice by comparing the results of premiums.
Collapse
Affiliation(s)
- Ju Qi
- College of Management, University of Science and Technology of China, Hefei, Anhui, China
| |
Collapse
|
3
|
Clim A, Toma A, Zota RD, Constantinescu R. The Need for Cybersecurity in Industrial Revolution and Smart Cities. SENSORS (BASEL, SWITZERLAND) 2022; 23:120. [PMID: 36616718 PMCID: PMC9824218 DOI: 10.3390/s23010120] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 10/13/2022] [Revised: 12/18/2022] [Accepted: 12/19/2022] [Indexed: 06/17/2023]
Abstract
Cities have grown in development and sophistication throughout human history. Smart cities are the current incarnation of this process, with increased complexity and social importance. This complexity has come to involve significant digital components and has thus come to raise the associated cybersecurity concerns. Major security relevant events can cascade into the connected systems making up a smart city, causing significant disruption of function and economic damage. The present paper aims to survey the landscape of scientific publication related to cybersecurity-related issues in relation to smart cities. Relevant papers were selected based on the number of citations and the quality of the publishing journal as a proxy indicator for scientific relevance. Cybersecurity will be shown to be reflected in the selected literature as an extremely relevant concern in the operation of smart cities. Generally, cybersecurity is implemented in actual cities through the concerted application of both mature existing technologies and emerging new approaches.
Collapse
|
4
|
Cains MG, Flora L, Taber D, King Z, Henshel DS. Defining Cyber Security and Cyber Security Risk within a Multidisciplinary Context using Expert Elicitation. RISK ANALYSIS : AN OFFICIAL PUBLICATION OF THE SOCIETY FOR RISK ANALYSIS 2022; 42:1643-1669. [PMID: 33586204 PMCID: PMC9543401 DOI: 10.1111/risa.13687] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Received: 10/01/2019] [Revised: 11/18/2020] [Accepted: 01/06/2021] [Indexed: 05/20/2023]
Abstract
It is important to have and use standardized terminology and develop a comprehensive common understanding of what is meant by cyber security and cyber security risk given the multidisciplinary nature of cyber security and the pervasiveness of cyber security concerns throughout society. Using expert elicitation methods, collaborating cyber researchers from multiple disciplines and two sectors (academia, government-military) were individually interviewed and asked to define cyber security and cyber security risk. Data-driven thematic analysis was used to identify the most salient themes within each definition, sector, and cyber expert group as a whole with results compared to current standards definitions. Network analysis was employed to visualize the interconnection of salient themes within and across sectors and disciplines. When examined as a whole group, "context-driven," "resilient system functionality," and "maintenance of CIA (confidentiality, integrity, availability)" were the most salient themes and influential network nodes for the definition of cyber security, while "impacts of CIA vulnerabilities," "probabilities of outcomes," and "context-driven" were the most salient themes for cyber security risk. We used this expert elicitation process to develop comprehensive definitions of cyber security (cybersecurity) and cyber security risk that encompass the contextual frameworks of all the disciplines represented in the collaboration and explicitly incorporates human factors as significant cyber security risk factors.
Collapse
Affiliation(s)
- Mariana G. Cains
- O'Neill School of Public and Environmental AffairsIndiana UniversityBloomingtonINUSA
| | - Liberty Flora
- O'Neill School of Public and Environmental AffairsIndiana UniversityBloomingtonINUSA
| | - Danica Taber
- O'Neill School of Public and Environmental AffairsIndiana UniversityBloomingtonINUSA
| | - Zoe King
- O'Neill School of Public and Environmental AffairsIndiana UniversityBloomingtonINUSA
| | - Diane S. Henshel
- O'Neill School of Public and Environmental AffairsIndiana UniversityBloomingtonINUSA
| |
Collapse
|
5
|
Distributed Attack Deployment Capability for Modern Automated Penetration Testing. COMPUTERS 2022. [DOI: 10.3390/computers11030033] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
Abstract
Cybersecurity is an ever-changing landscape. The threats of the future are hard to predict and even harder to prepare for. This paper presents work designed to prepare for the cybersecurity landscape of tomorrow by creating a key support capability for an autonomous cybersecurity testing system. This system is designed to test and prepare critical infrastructure for what the future of cyberattacks looks like. It proposes a new type of attack framework that provides precise and granular attack control and higher perception within a set of infected infrastructure. The proposed attack framework is intelligent, supports the fetching and execution of arbitrary attacks, and has a small memory and network footprint. This framework facilitates autonomous rapid penetration testing as well as the evaluation of where detection systems and procedures are underdeveloped and require further improvement in preparation for rapid autonomous cyber-attacks.
Collapse
|
6
|
Khalid Khan S, Shiwakoti N, Stasinopoulos P. A conceptual system dynamics model for cybersecurity assessment of connected and autonomous vehicles. ACCIDENT; ANALYSIS AND PREVENTION 2022; 165:106515. [PMID: 34890922 DOI: 10.1016/j.aap.2021.106515] [Citation(s) in RCA: 3] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Received: 06/09/2021] [Revised: 11/03/2021] [Accepted: 11/29/2021] [Indexed: 06/13/2023]
Abstract
Emerging Connected and Autonomous Vehicles (CAVs) technology have a ubiquitous communication framework. It poses security challenges in the form of cyber-attacks, prompting rigorous cybersecurity measures. There is a lack of knowledge on the anticipated cause-effect relationships and mechanisms of CAVs cybersecurity and the possible system behaviour, especially the unintended consequences. Therefore, this study aims to develop a conceptual System Dynamics (SD) model to analyse cybersecurity in the complex, uncertain deployment of CAVs. Specifically, the SD model integrates six critical avenues and maps their respective parameters that either trigger or mitigate cyber-attacks in the operation of CAVs using a systematic theoretical approach. These six avenues are: i) CAVs communication framework, ii) secured physical access, iii) human factors, iv) CAVs penetration, v) regulatory laws and policy framework, and iv) trust-across the CAVs-industry and among the public. Based on the conceptual model, various system archetypes are analysed. "Fixes that Fail", in which the upsurge in hacker capability is the unintended natural result of technology maturity, requires continuous efforts to combat it. The primary mitigation steps are human behaviour analysis, knowledge of motivations and characteristics of CAVs cyber-attackers, CAVs users and Original Equipment Manufacturers education. "Shifting the burden", where policymakers counter the perceived cyber threats of hackers by updating legislation that also reduces CAVs adaptation by imitations, indicated the need for calculated regulatory and policy intervention. The "limits to success" triggered by CAVs penetration increase the defended hacks to establish regulatory laws, improve trust, and develop more human analysis. However, it may also open up caveats for cyber-crimes and alert that CAVs deployment to be alignment with the intended goals for enhancing cybersecurity. The proposed model can support decision-making and training and stimulate the roadmap towards an optimized, self-regulating, and resilient cyber-safe CAV system.
Collapse
|
7
|
Jones DN, Padilla E, Curtis SR, Kiekintveld C. Network discovery and scanning strategies and the Dark Triad. COMPUTERS IN HUMAN BEHAVIOR 2021. [DOI: 10.1016/j.chb.2021.106799] [Citation(s) in RCA: 4] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/30/2022]
|
8
|
Moustafa AA, Bello A, Maurushat A. The Role of User Behaviour in Improving Cyber Security Management. Front Psychol 2021; 12:561011. [PMID: 34220596 PMCID: PMC8253569 DOI: 10.3389/fpsyg.2021.561011] [Citation(s) in RCA: 4] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Journal Information] [Subscribe] [Scholar Register] [Received: 05/11/2020] [Accepted: 05/03/2021] [Indexed: 11/13/2022] Open
Abstract
Information security has for long time been a field of study in computer science, software engineering, and information communications technology. The term 'information security' has recently been replaced with the more generic term cybersecurity. The goal of this paper is to show that, in addition to computer science studies, behavioural sciences focused on user behaviour can provide key techniques to help increase cyber security and mitigate the impact of attackers' social engineering and cognitive hacking methods (i.e., spreading false information). Accordingly, in this paper, we identify current research on psychological traits and individual differences among computer system users that explain vulnerabilities to cyber security attacks and crimes. Our review shows that computer system users possess different cognitive capabilities which determine their ability to counter information security threats. We identify gaps in the existing research and provide possible psychological methods to help computer system users comply with security policies and thus increase network and information security.
Collapse
Affiliation(s)
- Ahmed A Moustafa
- School of Psychology, Western Sydney University, Sydney, NSW, Australia.,The Marcs Institute for Brain, Behaviour and Development, Western Sydney University, Sydney, NSW, Australia.,Department of Human Anatomy and Physiology, Faculty of Health Sciences, University of Johannesburg, Johannesburg, South Africa
| | - Abubakar Bello
- School of Social Sciences, Western Sydney University, Sydney, NSW, Australia
| | - Alana Maurushat
- School of Social Sciences, Western Sydney University, Sydney, NSW, Australia
| |
Collapse
|
9
|
Dalal RS, Howard DJ, Bennett RJ, Posey C, Zaccaro SJ, Brummel BJ. Organizational science and cybersecurity: abundant opportunities for research at the interface. JOURNAL OF BUSINESS AND PSYCHOLOGY 2021; 37:1-29. [PMID: 33564206 PMCID: PMC7861585 DOI: 10.1007/s10869-021-09732-9] [Citation(s) in RCA: 5] [Impact Index Per Article: 1.3] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Accepted: 01/05/2021] [Indexed: 06/10/2023]
Abstract
Cybersecurity is an ever-present problem for organizations, but organizational science has barely begun to enter the arena of cybersecurity research. As a result, the "human factor" in cybersecurity research is much less studied than its technological counterpart. The current manuscript serves as an introduction and invitation to cybersecurity research by organizational scientists. We define cybersecurity, provide definitions of key cybersecurity constructs relevant to employee behavior, illuminate the unique opportunities available to organizational scientists in the cybersecurity arena (e.g., publication venues that reach new audiences, novel sources of external funding), and provide overall conceptual frameworks of the antecedents of employees' cybersecurity behavior. In so doing, we emphasize both end-users of cybersecurity in organizations and employees focused specifically on cybersecurity work. We provide an expansive agenda for future organizational science research on cybersecurity-and we describe the benefits such research can provide not only to cybersecurity but also to basic research in organizational science itself. We end by providing a list of potential objections to the proposed research along with our responses to these objections. It is our hope that the current manuscript will catalyze research at the interface of organizational science and cybersecurity.
Collapse
Affiliation(s)
- Reeshad S. Dalal
- Department of Psychology, George Mason University, 4400 University Drive, MSN 3F5, Fairfax, VA 22030-4444 USA
| | - David J. Howard
- Department of Psychology and Muma College of Business, University of South Florida, Tampa, FL USA
| | - Rebecca J. Bennett
- Department of Management, College of Business, University of Central Florida, Orlando, FL USA
| | - Clay Posey
- Department of Management, College of Business, University of Central Florida, Orlando, FL USA
- Cybersecurity and Privacy Cluster, University of Central Florida, Orlando, FL USA
| | - Stephen J. Zaccaro
- Department of Psychology, George Mason University, 4400 University Drive, MSN 3F5, Fairfax, VA 22030-4444 USA
| | | |
Collapse
|
10
|
Khan SK, Shiwakoti N, Stasinopoulos P, Chen Y. Cyber-attacks in the next-generation cars, mitigation techniques, anticipated readiness and future directions. ACCIDENT; ANALYSIS AND PREVENTION 2020; 148:105837. [PMID: 33120180 DOI: 10.1016/j.aap.2020.105837] [Citation(s) in RCA: 7] [Impact Index Per Article: 1.4] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Received: 05/19/2020] [Revised: 08/12/2020] [Accepted: 10/03/2020] [Indexed: 06/11/2023]
Abstract
Modern-day Connected and Autonomous Vehicles (CAVs) with more than 100 million code lines, running up-to a hundred Electronic Control Units (ECUs) will create and exchange digital information with other vehicles and intelligent transport networks. Consequently, ubiquitous internal and external communication (controls, commands, and data) within all CAV-related nodes is inevitably the gatekeeper for the smooth operation. Therefore, it is a primary vulnerable area for cyber-attacks that entails stringent and efficient measures in the form of "cybersecurity". There is a lack of systematic and comprehensive review of the literature on cyber-attacks on the CAVs, respective mitigation strategies, anticipated readiness, and research directions for the future. This study aims to analyse, synthesise, and interpret critical areas for the roll-out and progression of CAVs in combating cyber-attacks. Specifically, we described in a structured way a holistic view of potentially critical avenues, which lies at the heart of CAV cybersecurity research. We synthesise their scope with a particular focus on ensuring effective CAVs deployment and reducing the probability of cyber-attack failures. We present the CAVs communication framework in an integrated form, i.e., from In-Vehicle (IV) communication to Vehicle-to-Vehicle (V2X) communication with a visual flowchart to provide a transparent picture of all the interfaces for potential cyber-attacks. The vulnerability of CAVs by proximity (or physical) access to cyber-attacks is outlined with future recommendations. There is a detailed description of why the orthodox cybersecurity approaches in Cyber-Physical System (CPS) are not adequate to counter cyber-attacks on the CAVs. Further, we synthesised a table with consolidated details of the cyber-attacks on the CAVs, the respective CAV communication system, its impact, and the corresponding mitigation strategies. It is believed that the literature discussed, and the findings reached in this paper are of great value to CAV researchers, technology developers, and decision-makers in shaping and developing a robust CAV-cybersecurity framework.
Collapse
Affiliation(s)
- Shah Khalid Khan
- School of Engineering, RMIT University, Carlton, Victoria 3053, Australia.
| | - Nirajan Shiwakoti
- School of Engineering, RMIT University, Carlton, Victoria 3053, Australia
| | | | - Yilun Chen
- School of Engineering, RMIT University, Carlton, Victoria 3053, Australia
| |
Collapse
|
11
|
Linkov V, Zámečník P, Havlíčková D, Pai CW. Human Factors in the Cybersecurity of Autonomous Vehicles: Trends in Current Research. Front Psychol 2019; 10:995. [PMID: 31130903 PMCID: PMC6509749 DOI: 10.3389/fpsyg.2019.00995] [Citation(s) in RCA: 23] [Impact Index Per Article: 3.8] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Journal Information] [Subscribe] [Scholar Register] [Received: 12/14/2018] [Accepted: 04/15/2019] [Indexed: 11/13/2022] Open
Abstract
The cybersecurity of autonomous vehicles (AVs) is an important emerging area of research in traffic safety. Because human failure is the most common reason for a successful cyberattack, human-factor researchers and psychologists might improve AV cybersecurity by researching how to decrease the probability of a successful attack. We review some areas of research connected to the human factor in cybersecurity and find many potential issues. Psychologists might research the characteristics of people prone to cybersecurity failure, the types of scenarios they fail in and the factors that influence this failure or over-trust of AV. Human behavior during a cyberattack might be researched, as well as how to educate people about cybersecurity. Multitasking has an effect on the ability to defend against a cyberattack and research is needed to set the appropriate policy. Human-resource researchers might investigate the skills required for personnel working in AV cybersecurity and how to detect potential defectors early. The psychological profile of cyber attackers should be investigated to be able to set policies to decrease their motivation. Finally, the decrease of driver's driving skills as a result of using AV and its connection to cybersecurity skills is also worth of research.
Collapse
Affiliation(s)
- Václav Linkov
- Department of Traffic Psychology, CDV – Transport Research Centre, Brno, Czechia
| | - Petr Zámečník
- Department of Traffic Psychology, CDV – Transport Research Centre, Brno, Czechia
| | - Darina Havlíčková
- Department of Traffic Psychology, CDV – Transport Research Centre, Brno, Czechia
| | - Chih-Wei Pai
- Graduate Institute of Injury Prevention and Control, College of Public Health, Taipei Medical University, Taipei, Taiwan
| |
Collapse
|