2013 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops) 2013
DOI: 10.1109/percomw.2013.6529554
|View full text |Cite
|
Sign up to set email alerts
|

A taxonomy of cyber attack and defence mechanisms for emergency management networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2014
2014
2020
2020

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 11 publications
(8 citation statements)
references
References 25 publications
0
8
0
Order By: Relevance
“…The classification of cyber attack and defense mechanisms for emergency management networks aims to support a common understanding of the associated cyber attack and defense mechanisms. Attack mechanisms are classified according to three aspects, according to the network, according to the attacked functions and attack factors, while the defense mechanism is determined by the type of protection, the degree of distribution and organizational elements [26]. In addition, the problems of cybersecurity in emergency management are divided into three groups determined by the criticality of time (refers to emergency situations), when decisions must be made and quickly transmitted.…”
Section: Fig 1 Relationship Of Ccis With Cpsmentioning
confidence: 99%
“…The classification of cyber attack and defense mechanisms for emergency management networks aims to support a common understanding of the associated cyber attack and defense mechanisms. Attack mechanisms are classified according to three aspects, according to the network, according to the attacked functions and attack factors, while the defense mechanism is determined by the type of protection, the degree of distribution and organizational elements [26]. In addition, the problems of cybersecurity in emergency management are divided into three groups determined by the criticality of time (refers to emergency situations), when decisions must be made and quickly transmitted.…”
Section: Fig 1 Relationship Of Ccis With Cpsmentioning
confidence: 99%
“…The position of each defence measure in the loop corresponds to the type of system vulnerability that the defence measure aims to patch. Cyber security defence measures are often categorised as either preventive or reactive [39]. Preventive defence measures, such as authentication and access control, prevent malicious payloads from being inputted to a system at all, whereas reactive defence measures, such as anomaly-based or signature-based defences, detect that a malicious payload has been inputted and trigger a response to counteract the attack [22].…”
Section: Attack and Defence Modelling Frameworkmentioning
confidence: 99%
“…Time-critical decisions are also an integral aspect to emergency first responders (Loukas et al 2013) and to the Cyber Response Teams who may also have to fend off a cyber-attack during an emergency response. Based on models of quickening conflict escalation by Mallery (2011), Kello (2013, p. 34) warned:…”
Section: Stock Marketsmentioning
confidence: 99%