ترغب بنشر مسار تعليمي؟ اضغط هنا

Challenges in cybersecurity: Lessons from biological defense systems

96   0   0.0 ( 0 )
 نشر من قبل Simon Levin
 تاريخ النشر 2021
والبحث باللغة English




اسأل ChatGPT حول البحث

We explore the commonalities between methods for assuring the security of computer systems (cybersecurity) and the mechanisms that have evolved through natural selection to protect vertebrates against pathogens, and how insights derived from studying the evolution of natural defenses can inform the design of more effective cybersecurity systems. More generally, security challenges are crucial for the maintenance of a wide range of complex adaptive systems, including financial systems, and again lessons learned from the study of the evolution of natural defenses can provide guidance for the protection of such systems.



قيم البحث

اقرأ أيضاً

We present results of different approaches to model the evolution of the COVID-19 epidemic in Argentina, with a special focus on the megacity conformed by the city of Buenos Aires and its metropolitan area, including a total of 41 districts with over 13 million inhabitants. We first highlight the relevance of interpreting the early stage of the epidemic in light of incoming infectious travelers from abroad. Next, we critically evaluate certain proposed solutions to contain the epidemic based on instantaneous modifications of the reproductive number. Finally, we build increasingly complex and realistic models, ranging from simple homogeneous models used to estimate local reproduction numbers, to fully coupled inhomogeneous (deterministic or stochastic) models incorporating mobility estimates from cell phone location data. The models are capable of producing forecasts highly consistent with the official number of cases with minimal parameter fitting and fine-tuning. We discuss the strengths and limitations of the proposed models, focusing on the validity of different necessary first approximations, and caution future modeling efforts to exercise great care in the interpretation of long-term forecasts, and in the adoption of non-pharmaceutical interventions backed by numerical simulations.
Increasing volatilities within power transmission and distribution force power grid operators to amplify their use of communication infrastructure to monitor and control their grid. The resulting increase in communication creates a larger attack surf ace for malicious actors. Indeed, cyber attacks on power grids have already succeeded in causing temporary, large-scale blackouts in the recent past. In this paper, we analyze the communication infrastructure of power grids to derive resulting fundamental challenges of power grids with respect to cybersecurity. Based on these challenges, we identify a broad set of resulting attack vectors and attack scenarios that threaten the security of power grids. To address these challenges, we propose to rely on a defense-in-depth strategy, which encompasses measures for (i) device and application security, (ii) network security, (iii) physical security, as well as (iv) policies, procedures, and awareness. For each of these categories, we distill and discuss a comprehensive set of state-of-the art approaches, and identify further opportunities to strengthen cybersecurity in interconnected power grids.
Labelling user data is a central part of the design and evaluation of pervasive systems that aim to support the user through situation-aware reasoning. It is essential both in designing and training the system to recognise and reason about the situat ion, either through the definition of a suitable situation model in knowledge-driven applications, or through the preparation of training data for learning tasks in data-driven models. Hence, the quality of annotations can have a significant impact on the performance of the derived systems. Labelling is also vital for validating and quantifying the performance of applications. In particular, comparative evaluations require the production of benchmark datasets based on high-quality and consistent annotations. With pervasive systems relying increasingly on large datasets for designing and testing models of users activities, the process of data labelling is becoming a major concern for the community. In this work we present a qualitative and quantitative analysis of the challenges associated with annotation of user data and possible strategies towards addressing these challenges. The analysis was based on the data gathered during the 1st International Workshop on Annotation of useR Data for UbiquitOUs Systems (ARDUOUS) and consisted of brainstorming as well as annotation and questionnaire data gathered during the talks, poster session, live annotation session, and discussion session.
153 - Siyuan Dong , Jun Cao , Zhong Fan 2021
Smart local energy system (SLES) is considered as a promising pathway facilitating a more effective and localised operation, benefited from the complex information and communication technology (ICT) infrastructures and Internet of things (IoT) techno logies. As a part of the critical infrastructure, it is important to not only put effective detection and management to tackle potential cybersecurity issues, but also require considerable numbers of standards to ensure the security of the internet of things system to minimise the risks. This study aims to review the existing standards, investigate how the compatibility with SLES development, and identify the area to focus on in the future. Although existing standards and protocols are highly fragmented, our findings suggest that many of them can meet the requirements of the applications and infrastructures of SLES. Additionally, many standards have been introduced to protect information security and personal privacy due to their increasing importance. The research also suggests that the industry needs to produce more affordable and cyber-secured devices and services. For the government and regulators, relevant guidelines on the minimum function and security requirements for applications should be provided. Additionally, compliance testing and certifications should be in place and carried out by an independent third party to ensure the components of SLES ecosystem with a satisfied security level by design.
152 - G. Altarelli 2013
We present a concise review of the experimental developments on neutrino mixing and their theoretical implications as presented and discussed at this Conference. The recent data disfavour many models but the surviving ones still span a wide range goi ng from Anarchy (no structure, no symmetry in the neutrino sector) to a maximum of symmetry, as for the models based on discrete non-abelian flavour groups which can be improved following the indications from the recent data.
التعليقات
جاري جلب التعليقات جاري جلب التعليقات
سجل دخول لتتمكن من متابعة معايير البحث التي قمت باختيارها
mircosoft-partner

هل ترغب بارسال اشعارات عن اخر التحديثات في شمرا-اكاديميا