“…They focused on the impact of phishing attacks conducted through emails and suspicious links. According to the literature reviews of the researchers, Corallo et al [31] conducted a systematic literature review on cybersecurity awareness in the domain of industrial internet of things. Kennedy and Chiasson [32] performed a thorough systematic review containing scholarly publications and industry tools/software concerning cybersecurity awareness and education intended for online working users that were established in the previous 20 years.…”
Currently, cybersecurity plays an essential role in computing and information technology due to its direct effect on organizations’ critical assets and information. Cybersecurity is applied using integrity, availability, and confidentiality to protect organizational assets and information from various malicious attacks and vulnerabilities. The COVID-19 pandemic has generated different cybersecurity issues and challenges for businesses as employees have become accustomed to working from home. Firms are speeding up their digital transformation, making cybersecurity the current main concern. For software and hardware systems protection, organizations tend to spend an excessive amount of money procuring intrusion detection systems, antivirus software, antispyware software, and encryption mechanisms. However, these solutions are not enough, and organizations continue to suffer security risks due to the escalating list of security vulnerabilities during the COVID-19 pandemic. There is a thriving need to provide a cybersecurity awareness and training framework for remote working employees. The main objective of this research is to propose a CAT framework for cybersecurity awareness and training that will help organizations to evaluate and measure their employees’ capability in the cybersecurity domain. The proposed CAT framework will assist different organizations in effectively and efficiently managing security-related issues and challenges to protect their assets and critical information. The developed CAT framework consists of three key levels and twenty-five core practices. Case studies are conducted to evaluate the usefulness of the CAT framework in cybersecurity-based organizational settings in a real-world environment. The case studies’ results showed that the proposed CAT framework can identify employees’ capability levels and help train them to effectively overcome the cybersecurity issues and challenges faced by the organizations.
“…They focused on the impact of phishing attacks conducted through emails and suspicious links. According to the literature reviews of the researchers, Corallo et al [31] conducted a systematic literature review on cybersecurity awareness in the domain of industrial internet of things. Kennedy and Chiasson [32] performed a thorough systematic review containing scholarly publications and industry tools/software concerning cybersecurity awareness and education intended for online working users that were established in the previous 20 years.…”
Currently, cybersecurity plays an essential role in computing and information technology due to its direct effect on organizations’ critical assets and information. Cybersecurity is applied using integrity, availability, and confidentiality to protect organizational assets and information from various malicious attacks and vulnerabilities. The COVID-19 pandemic has generated different cybersecurity issues and challenges for businesses as employees have become accustomed to working from home. Firms are speeding up their digital transformation, making cybersecurity the current main concern. For software and hardware systems protection, organizations tend to spend an excessive amount of money procuring intrusion detection systems, antivirus software, antispyware software, and encryption mechanisms. However, these solutions are not enough, and organizations continue to suffer security risks due to the escalating list of security vulnerabilities during the COVID-19 pandemic. There is a thriving need to provide a cybersecurity awareness and training framework for remote working employees. The main objective of this research is to propose a CAT framework for cybersecurity awareness and training that will help organizations to evaluate and measure their employees’ capability in the cybersecurity domain. The proposed CAT framework will assist different organizations in effectively and efficiently managing security-related issues and challenges to protect their assets and critical information. The developed CAT framework consists of three key levels and twenty-five core practices. Case studies are conducted to evaluate the usefulness of the CAT framework in cybersecurity-based organizational settings in a real-world environment. The case studies’ results showed that the proposed CAT framework can identify employees’ capability levels and help train them to effectively overcome the cybersecurity issues and challenges faced by the organizations.
“…In this industrial scenario, personnel should be aware of network security issues to prevent or minimize network security incidents and enterprise data leakage. Corallo et al [13] conducted the literature review and research on network security awareness in the context of the Industrial Internet of ings (IIoT). ey comprehensively summarized the theme of network security by analyzing how to deal with network security awareness in the context of IIoT.…”
Section: Iot and The Dissemination Of Music Ichmentioning
This work aims to optimize and innovate the protection, inheritance, and dissemination of Intangible Cultural Heritage (ICH). Based on the Internet of Things (IoT), this work designs the music ICH development path under the cultural concept by integrating music ICH with the tourism industry in the smart city environment. Specifically, it innovatively proposes the integration mechanism of immersive scene design of music ICH with smart city’s tourism industry in the Internet of Things (IoT) context. Consequently, the music ICH brand equity evaluation model is built. This model can evaluate the importance of cultural and asset value of music ICH. The comprehensive evaluation index system of music ICH mainly includes four primary indexes (with eight secondary indexes): the live performance, historical value, music audience, and the tourism industry integration. In addition, at the beginning of the model iteration, the pattern recognition accuracy of the traditional model is only 67.5%. Then, the recognition accuracy of the traditional model can reach 72.5% at the 500th iteration. In contrast, the average recognition accuracy of the improved model can reach 80%, and the highest can reach 82.5%. This work can provide technical support and guarantee for formulating and optimizing music ICH protection strategies.
“…To create a strongly protected environment and private ecosystem that automatically performs operations and avoids intermediate intrusions. In this regard, a secure ecosystem has required that handle and manage industrial production unit to be available, which means the system should be prevented from unnecessary delay and protected from malicious attacks against the IoPS [16]. In addition, the integrity and transparency of the IIoT-enabled transactions is another critical aspect of the existing smart production systems.…”
With the rapid enhancement in the design and development of the Internet of Things creates a new research interest in the adaptation in industrial domains. It is due to the impact of distributed emerging technology and topology of industrial Internet of Things and the security-related resource constraints of industrial 5.0. This conducts new paradigm along with critical challenges to the existing information preservation, node transactions and communication, transmission, trust and privacy, and security protection related problems. These critical aspects pose serious limitations and issues for the industry to provide industrial data integrity, information exchange reliability, provenance, and trustworthiness for the overall activities and service delivery prospects. In addition, the intersection of blockchain and industrial IoT has gained more consideration and research interest. However, there is an emerging limitation between the inadequate performance of industrial IoT and connected nodes, and the high resource requirement of permissioned private blockchain ledger has not yet been tackled with the complete solution. Due to the introductions of NuCypher Re-Encryption infrastructure, hashing tree and allocation, and deployment of blockchain proof-of-work required more computational power as well. This paper is divided into three different folds; first, we studied various related literature of blockchain-enabling industrial Internet of Things and its critical implementation challenging aspects along with the solution. Secondly, we proposed a blockchain hyperledger sawtooth-enabled framework. This framework provides a secure and trusted execution environment, in which service delivery mechanisms and protocols are designed with an acknowledgment, including the immutable ledger storage security, along with the peer-topeer network on-chain and off-chain communication of industrial activities. Thirdly, we design pseudochain codes and consensus protocols to provide smooth industrial node streamline transactions and broadcast content. The proposed multiple proof-of-work investigated and simulated using Hyperledger Sawtooth-enabled docker for testing to exchange information between connected devices of industrial Internet of Things within the limited usage of resource constraints.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.