End User Security Issues (original) (raw)

A Critical Analysis of the Effectiveness of Cyber Security Defenses in UAE Government Agencies

Cyberspace has become the new frontier for countries to demonstrate power. Nations that have developed defense tools or those that can successfully launch attacks against adversaries will become the next global superpowers [1], [2]. While cyber threats and attacks by government agencies are well documented, most widespread attacks are done by individuals or hacking groups for personal gains [3], [4]. The UAE has become a major target for cyber conflicts due to increased economic activity, tourism, technology and rise of the oil and gas industry. Furthermore, the wide spread of internet in the region to the tune of 88% has exposed it to attackers [3].Recent attacks against Saudi Arabia’s ARAMCO and Qatar RasGas and the Stuxnet attack on the Iranian nuclear plants are often cited as examples [3], [5]. Previousreports show that the UAE Government is set to double expenditure on homeland security [6]. Therefore, we need to assess whether available cybersecurity defenses are effective and guarantee comprehensive cybersecurity strategies that would uphold the highest security standards in line with the vision 2030. In this paper, a critical review of the existing cyber security mechanisms has been done and a framework for effective management of cyber security threats proposed for the UAE government agencies.

State of the States on Cybersecurity

2015

Eight U.S. states are leading the rest in cybersecurity readiness. In “State of the States on Cybersecurity,” Senior Fellow Francesca Spidalieri reviews the efforts of state governments in California, Maryland, Michigan, New Jersey, New York, Texas, Virginia, and Washington. These states provide a collective overview of sound approaches to “protect infrastructure, information, and operations.” The study highlights effective mechanisms and creative solutions that state governments and their leaders have devised to take advantage of existing assets, to better protect critical infrastructure, to promote information sharing, to grow their cybersecurity industry, and to attract qualified talent to their states. It is important that cybersecurity measures are enforced at the state-level to protect citizens and reduce cyber risks. Maintaining the most recent security products, tools, and plans is just as important as educating users in the proper practices to reduce their cyber risks. The initiatives exemplified throughout this new report provide models for other states and jurisdictions to follow and offer a useful set of effective mechanisms and activities at the state-level to put recommended action into practice.

CyberSecurity: An Excerpt From The Manual, "An Intelligent Next Step: Understanding Smart Grid Structure, Security, and Technology"

The current electricity utility system and its residing design principles can be traced back to the late 19th century when electricity needs were simple and power generation was localized and focused on community needs. This one-way interaction made it difficult for the grid to respond to the ever changing and arising energy demands of the 21st century. For over a century advances in information and communication technology (ICT) have made improvements to the grids efficiency, reliability, and quality of service (QoS). Yet, the utility industry has squandered many chances to fully exploit ICT advancements. The smart grid introduces a two-way communication infrastructure where electricity and information regarding generation, storage, transmission, distribution, and consumption can be exchanged between the utility and its consumer. In this paper, a detailed investigation of distribution services, power line communication (PLC) and wireless transmission characteristics, smart metering, area networks, and operation security is presented. This paper discusses the challenges and opportunities ICT presents to the future of the smart grid. We argue that through advancements in ICT, the smart grid provides a solution in creating an uninterruptible power supply that is more secure, more efficient, and more reliable than existing principles and technologies.

Mobile Devices: The Case for Cyber Security Hardened Systems

Mobile devices are becoming a method to provide an efficient and convenient way to access, find and share information; however, the availability of this information has caused an increase in cyber attacks. Currently, cyber threats range from Trojans and viruses to botnets and toolkits. Presently, 96% of mobile devices do not have pre-installed security software while approximately 65% of the vulnerabilities are found within the application layer. This lack in security and policy driven systems is an opportunity for malicious cyber attackers to hack into the various popular devices. Traditional security software found in desktop computing platforms, such as firewalls, antivirus, and encryption, is widely used by the general public in mobile devices. Moreover, mobile devices are even more vulnerable than personal desktop computers because more people are using mobile devices to do personal tasks. This review attempts to display the importance of developing a national security policy created for mobile devices in order to protect sensitive and confidential data.

Overview of the Importance of Corporate Security in business

International Journal of Innovative Research in Science, Engineering and Technology, 2019

This article gives an overview of the importance of corporate security in today's business. Information security has stood out as paramount importance to organizations. The security of any system and people continues to remain a top priority for the company. In every organization or business, the employees can possibly represent their organizations to enormous amounts of cyber risks. Every employee in the organization have accountability to remain vigilant and properly respond to security threats as they arise. In today's busy World, every corporate security is focusing on ensuring that they secure their customers, facilities, systems and ensure that they are designing security into their client solutions. Few key initiatives include collaborating with the IT organization on foundational projects such as securing remote access, transforming the identity and access administration services and improving the identification and remediation of vulnerabilities. As we seek to protect the company's brand name and the client's trust, it is vitally important for every organization to consider security a key responsibility. When organizations choose to disrespect security policies & procedures, the organization is at danger. Through the organizational control lens, tried to explain the corporate security precaution-taking behavior. In this article, we will discuss how the security attack happens and how can it be prevented, data security and cybersecurity. IMPORTANCE GUIDELINES OF CORPORATE SECURITY 2