Towards a Contemporary Definition of Cybersecurity
- URL: http://arxiv.org/abs/2302.02274v1
- Date: Sun, 5 Feb 2023 01:25:50 GMT
- Title: Towards a Contemporary Definition of Cybersecurity
- Authors: Francesco Schiliro
- Abstract summary: The article seeks to offer a comprehensive definition of the term "cybersecurity" to accentuate its multidisciplinary perspectives.
The report will offer a unified framework for examining activities that constitute the concept resulting in a new definition.
- Score: 0.0
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: The report provides an intricate analysis of cyber security defined in
contemporary operational digital environments. An extensive literature review
is formed to determine how the construct is reviewed in modern scholarly
contexts. The article seeks to offer a comprehensive definition of the term
"cybersecurity" to accentuate its multidisciplinary perspectives. A meaningful
concise, and inclusive dimension will be provided to assist in designing
scholarly discourse on the subject. The report will offer a unified framework
for examining activities that constitute the concept resulting in a new
definition; "Cybersecurity is the collection and concerting of resources
including personnel and infrastructure, structures, and processes to protect
networks and cyber-enabled computer systems from events that compromise the
integrity and interfere with property rights, resulting in some extent of the
loss." The encapsulation of the interdisciplinary domains will be critical in
improving understanding and response to emerging challenges in cyberspace.
Related papers
- CyberNFTs: Conceptualizing a decentralized and reward-driven intrusion detection system with ML [0.0]
The study employs an analytical and comparative methodology, examining the synergy between cutting-edge Web3 technologies and information security.
The proposed model incorporates blockchain concepts, cyber non-fungible token (cyberNFT) rewards, machine learning algorithms, and publish/subscribe architectures.
arXiv Detail & Related papers (2024-08-31T21:15:26Z) - Service Level Agreements and Security SLA: A Comprehensive Survey [51.000851088730684]
This survey paper identifies state of the art covering concepts, approaches, and open problems of SLA management.
It contributes by carrying out a comprehensive review and covering the gap between the analyses proposed in existing surveys and the most recent literature on this topic.
It proposes a novel classification criterium to organize the analysis based on SLA life cycle phases.
arXiv Detail & Related papers (2024-01-31T12:33:41Z) - SemProtector: A Unified Framework for Semantic Protection in Deep Learning-based Semantic Communication Systems [51.97204522852634]
We present a unified framework that aims to secure an online semantic communications system with three semantic protection modules.
Specifically, these protection modules are able to encrypt semantics to be transmitted by an encryption method, mitigate privacy risks from wireless channels by a perturbation mechanism, and calibrate distorted semantics at the destination.
Our framework enables an existing online SC system to dynamically assemble the above three pluggable modules to meet customized semantic protection requirements.
arXiv Detail & Related papers (2023-09-04T06:34:43Z) - A Survey of Network Requirements for Enabling Effective Cyber Deception [0.0]
This paper investigates the crucial network requirements essential for the successful implementation of effective cyber deception techniques.
With a focus on diverse network architectures and topologies, we delve into the intricate relationship between network characteristics and the deployment of deception mechanisms.
arXiv Detail & Related papers (2023-09-01T00:38:57Z) - Semantic Communications for Artificial Intelligence Generated Content
(AIGC) Toward Effective Content Creation [75.73229320559996]
This paper develops a conceptual model for the integration of AIGC and SemCom.
A novel framework that employs AIGC technology is proposed as an encoder and decoder for semantic information.
The framework can adapt to different types of content generated, the required quality, and the semantic information utilized.
arXiv Detail & Related papers (2023-08-09T13:17:21Z) - Detecting Vulnerable Nodes in Urban Infrastructure Interdependent
Network [30.78792992230233]
We model the interdependent network as a heterogeneous graph and propose a system based on graph neural network with reinforcement learning.
The presented system leverages deep learning techniques to understand and analyze the heterogeneous graph, which enables us to capture the risk of cascade failure and discover vulnerable infrastructures of cities.
arXiv Detail & Related papers (2023-07-19T09:53:56Z) - Graph Mining for Cybersecurity: A Survey [61.505995908021525]
The explosive growth of cyber attacks nowadays, such as malware, spam, and intrusions, caused severe consequences on society.
Traditional Machine Learning (ML) based methods are extensively used in detecting cyber threats, but they hardly model the correlations between real-world cyber entities.
With the proliferation of graph mining techniques, many researchers investigated these techniques for capturing correlations between cyber entities and achieving high performance.
arXiv Detail & Related papers (2023-04-02T08:43:03Z) - Building a Resilient Cybersecurity Posture: A Framework for Leveraging
Prevent, Detect and Respond Functions and Law Enforcement Collaboration [0.0]
This research paper compares and contrasts the CyRLEC Framework with the NIST Cybersecurity Framework.
The CyRLEC Framework takes a broader view of cybersecurity, including proactive prevention, early detection, rapid response to cyber-attacks, and close collaboration with law enforcement agencies.
arXiv Detail & Related papers (2023-03-20T05:16:54Z) - Beyond kinetic harm and towards a dynamic conceptualization of
cyberterrorism [0.0]
After more than two decades of discussion, the concept of cyberterrorism remains plagued by confusion.
This article presents the result of an integrative review which maps the development of the term and situates the communities that have shaped the debate.
arXiv Detail & Related papers (2020-12-16T16:23:11Z) - Adversarial Machine Learning Attacks and Defense Methods in the Cyber
Security Domain [58.30296637276011]
This paper summarizes the latest research on adversarial attacks against security solutions based on machine learning techniques.
It is the first to discuss the unique challenges of implementing end-to-end adversarial attacks in the cyber security domain.
arXiv Detail & Related papers (2020-07-05T18:22:40Z) - Cyber Security Behaviour In Organisations [0.0]
This review explores the academic and policy literature in the context of everyday cyber security in organisations.
It identifies four behavioural sets that influences how people practice cyber security.
These are compliance with security policy, intergroup coordination and communication, phishing/email behaviour, and password behaviour.
arXiv Detail & Related papers (2020-04-24T14:17:46Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.