Exploring The Correlation between Cyber Security Awareness, Protection Measures and the State of Victimhood: The Case Study of Ambo University’s Academic Staffs

Abstract: The advancement of information communication technology has triggered a revolution in using the Internet for legitimate educational purposes on university campuses. Therefore, the Internet has changed the way of human communication and contributed to the development of mankind. On the other hand it is regrettable that its revolution has helped malicious users to exploit it for the malign purpose to commit a cyberspace crime that has in turn negatively affected fellow users who were preyed on by cyber predators. This work aimed to examine the awareness of cybersecurity, the measures taken to protect against cyberattacks and the state of victimization among professors at Ambo University.

Read more...

End-to-End Service Monitoring for Zero-Touch Networks

In this work, we propose the Monitoring Model Generator (MMG) component to automatically construct templates for service monitoring. MMG implements a novel methodology where service deployment models and standard information models are used as inputs to generate a high-level monitoring template, called Service Monitoring Model (SMM) and built upon an ontology-based schema based on the Resource Description Framework (RDF) vocabulary.

Read more...

CSA – Cloud Security Framework

A few weeks ago, an article on the new CIS 18 framework was published on this site. CIS is one of the go to frameworks for security assessments, but the cloud has its own set of controls and a framework developed by the Cloud Security Alliance (CSA). They have recently released a new version of their framework as well. This article will introduce the CSA and its security framework.

Read more...

Cyberattacks Shine Spotlight on Operational Technology Vulnerabilities for Every Industry

Recent high-profile ransomware and cyberattacks expose vulnerabilities in commercial buildings that are far too widespread. In fact, the same headline-making exposures of late can be faced by any company that uses operational technology (OT) and information technology (IT).
Smart leaders across the nation and around the world should be thinking: “Maybe it could happen here.” The question becomes how to prevent similar attacks and how to position your organization to meet upcoming cybersecurity mandates with wide-ranging implications. Those of us in the cybersecurity business are aware of many such incidents, including some stories from my experience.

Read more...

The One, Two, Three of Cyber Threat Detection

When it comes to protecting your organisation from cyber-attacks, threat detection can play a critical role in your overall defence strategy. Primarily this is because the earlier you can detect a threat, the earlier you can mitigate it and stop it turning into an attack. A well-executed threat detection capability can also pre-empt attacks before they occur based on a single network log.

Read more...

Cybersecurity Rising Among America’s Infrastructure Priorities

Less than a month ago, President Biden released his proposed budget for Fiscal Year 2022 that includes $9.8 billion in funding for cybersecurity enhancements. Cyberbreaches are making the headlines too often – almost on a weekly basis – and those are only the attacks that are reported. Not only are the breaches costly, but they also are dangerous. Potential threats to public safety as a result of cyberbreaches, in fact, are daunting. The Administration has made it clear that the Federal government intends to provide as much protection to the nation’s overall infrastructure as possible.

Read more...