The recent years have witnessed two major events that have deeply impacted cybersecurity threats. First, the COVID-19 pandemic has drastically increased our dependence upon technology. From individuals to corporations and governments, the overwhelming majority of our activities moved online. As the proportion of human activities performed online is reaching new peaks, cybersecurity becomes a problem of national security. Second, the Russia-Ukraine war is giving us a glimpse of what cyberthreats may look like in future cyberconflicts. From data integrity to identity thievery, and from industrial espionage to hostile manoeuvres from foreign powers, cyberthreats have never been that numerous and diverse. Due to the increase of the magnitude, of the diversity, and of the complexity of cyberthreats, the current security strategies used to face cybercriminality won't be sufficient in the post-crisis era. Therefore, governments need to rethink globally their national security services response strategy. This paper analyses how this new context has impacted cybersecurity for individuals, corporations, and governments, and emphasis the need to reposition the economical identity of the individuals at the center of security response. We propose strategies to optimize law enforcement response from police to counterintelligence, notably through formation, prevention, and interaction with cybercriminality. We then discuss the possibilities to optimize the articulation of the different levels of security response and expertise, by emphasizing the need for coordination between security services, and by proposing strategies to include non-institutional players.
Download full-text PDF |
Source |
---|---|
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC10043949 | PMC |
http://dx.doi.org/10.1016/j.chbr.2023.100282 | DOI Listing |
Pharmacoeconomics
January 2025
Belgian Health Care Knowledge Centre, Brussels, Belgium.
Background: Forecasting future public pharmaceutical expenditure is a challenge for healthcare payers, particularly owing to the unpredictability of new market introductions and their economic impact. No best-practice forecasting methods have been established so far. The literature distinguishes between the top-down approach, based on historical trends, and the bottom-up approach, using a combination of historical and horizon scanning data.
View Article and Find Full Text PDFSensors (Basel)
January 2025
Department of Computer Science, College of Charleston, Charleston, SC 29424, USA.
As modern vehicles continue to evolve, advanced technologies are integrated to enhance the driving experience. A key enabler of this advancement is the Controller Area Network (CAN) bus, which facilitates seamless communication between vehicle components. Despite its widespread adoption, the CAN bus was not designed with security as a priority, making it vulnerable to various attacks.
View Article and Find Full Text PDFSensors (Basel)
December 2024
College of Cryptography Engineering, Engineering University of PAP, Xi'an 710086, China.
With the rapid development of the Internet of Things (IoT), the scope of personal data sharing has significantly increased, enhancing convenience in daily life and optimizing resource management. However, this also poses challenges related to data privacy breaches and holdership threats. Typically, blockchain technology and cloud storage provide effective solutions.
View Article and Find Full Text PDFSensors (Basel)
December 2024
Department of Computer Science & Engineering, Sungkyunkwan University, Suwon 16419, Republic of Korea.
The Internet of Things (IoT) has seen remarkable advancements in recent years, leading to a paradigm shift in the digital landscape. However, these technological strides have introduced new challenges, particularly in cybersecurity. IoT devices, inherently connected to the internet, are susceptible to various forms of attacks.
View Article and Find Full Text PDFSensors (Basel)
December 2024
Rangeland Service, Ministry of Agriculture and Food Security, P.O. Box 30, Rishon LeZion 5025001, Israel.
Acoustic monitoring facilitates the detailed study of herbivore grazing by generating a timeline of sound bursts associated with jaw movements (JMs) that perform bite or chew actions. The unclassified stream of JM events was used here in an observational study to explore the notion of "grazing time". Working with shepherded goat herds in a wooded landscape, a horn-based acoustic sensor with a vibration-type microphone was deployed on a volunteer animal along each of 12 foraging routes.
View Article and Find Full Text PDFEnter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!