期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
Cybersecurity Attacks on Academic Data and Personal Information and the Mediating Role of Education and Employment
1
作者 Ahmad Reda Alzighaibi 《Journal of Computer and Communications》 2021年第11期77-90,共14页
The cyberspace has simultaneously presented opportunities and challenges alike for personal data security and privacy, as well as the process of research and learning. Moreover, information such as academic data, rese... The cyberspace has simultaneously presented opportunities and challenges alike for personal data security and privacy, as well as the process of research and learning. Moreover, information such as academic data, research data, personal data, proprietary knowledge, complex equipment designs and blueprints for yet to be patented products has all become extremely susceptible to Cybersecurity attacks. This research will investigate factors that affect that may have an influence on perceived ease of use of Cybersecurity, the influence of perceived ease of use on the attitude towards using Cybersecurity, the influence of attitude towards using Cybersecurity on the actual use of Cybersecurity and the influences of job positions on perceived ease of use of Cybersecurity and on the attitude towards using Cybersecurity and on the actual use of Cybersecurity. A model was constructed to investigate eight hypotheses that are related to the investigation. An online questionnaire was constructed to collect data and results showed that hypotheses 1 to 7 influence were significant. However, hypothesis 8 turned out to be insignificant and no influence was found between job positions and the actual use of Cybersecurity. 展开更多
关键词 cybersecurity attack Technology Acceptance Model (TAM) Model Academic Data Saudi Arabia
下载PDF
Time sensitive networking security:issues of precision time protocol and its implementation 被引量:1
2
作者 Davide Berardi Nils OTippenhauer +2 位作者 Andrea Melis Marco Prandini Franco Callegati 《Cybersecurity》 EI CSCD 2023年第4期1-13,共13页
Time Sensitive Networking(TSN)will be an integral component of industrial networking.Time synchronization in TSN is provided by the IEEE-1588,Precision Time Protocol(PTP)protocol.The standard,dating back to 2008,margi... Time Sensitive Networking(TSN)will be an integral component of industrial networking.Time synchronization in TSN is provided by the IEEE-1588,Precision Time Protocol(PTP)protocol.The standard,dating back to 2008,marginally addresses security aspects,notably not encompassing the frames designed for management purposes(Type Length Values or TLVs).In this work we show that the TLVs can be abused by an attacker to reconfigure,manipulate,or shut down time synchronization.The effects of such an attack can be serious,ranging from interruption of operations to actual unintended behavior of industrial devices,possibly resulting in physical damages or even harm to operators.The paper analyzes the root causes of this vulnerability,and provides concrete examples of attacks leveraging it to de-synchronize the clocks,showing that they can succeed with limited resources,realistically available to a malicious actor. 展开更多
关键词 Time synchronization Time sensitive networking Precision time protocol cybersecurity attacks
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部