Cyber Resilience

A special issue of Information (ISSN 2078-2489). This special issue belongs to the section "Information and Communications Technology".

Deadline for manuscript submissions: closed (1 May 2021) | Viewed by 6845

Special Issue Editor


E-Mail Website
Guest Editor
Information Security Center, Innopolis University, Kazan 420500, Russia
Interests: computer science; cyber security; cyber resilience

Special Issue Information

Dear Colleagues,

Modern cyber systems, especially those based on the technologies of Industry 4.0 (Artificial Intelligence (AI), cloud and fog computing, 6G, IoT/IIoT, Big Data and ETL, Q-computing, Blockchain, VR/AR, and others) do not have the required cyber resilience for targeted operation under conditions of heterogeneous mass cyberattacks due to the high structural and functional complexity of these systems, a potential danger of existing vulnerabilities, and “sleep” hardware and software tabs, the so-called “digital bombs”. Moreover, modern cyber security tools, including antivirus protection, vulnerability scanners, as well as systems for detecting, preventing, and neutralizing computer attacks, are still not sufficiently effective. The applied classical methods and means of ensuring reliability, response, and recovery using the capabilities of structural and functional redundancy, N-multiple reservation, standardization, and reconfiguration are no longer suitable as they do not provide the required cyber resilience or prevent catastrophic consequences.

The above pose a problematic situation that lies in the contradiction between the ever-increasing need to ensure cyber resilience of critical information infrastructure under the conditions of destructive software impacts and the imperfection of methods and means of timely detection, prevention, and neutralization of cyberattacks. The removal of this contradiction requires the resolution of an urgent scientific and technical problem—the organization of cyber resilience of information infrastructure in terms of heterogeneous mass cyberattacks, based on new models and methods of similarity theory, big data collection and processing and stream data extraction, transfer, and load (ETL), deep learning, and semantic and cognitive analysis.

Problems of ensuring reliability, response, recovery, and cyber resilience of critical information infrastructure and related information have received the attention of leading foreign and domestic scientific researchers from the start. However, in the conditions of heterogeneous mass cyberattacks (especially previously unknown ones), it is necessary to ensure cyber resilience critical information infrastructure, providing that the process of restoring the functioning of its component systems, in the course of destructive programmatic impacts, helps towards a reduction of significant or catastrophic consequences. The main idea behind this solution to the problem is using the abovementioned infrastructure’s ability to produce immunity to disturbances of the computational processes under exposure conditions, similarly to the immune system protecting a living organism. This requires the resolution of a scientific problem—the organization of cyber resilience information infrastructure in the context of heterogeneous mass cyberattacks, based on new models and methods of the similarity theory, big data collection and processing (ETL), deep learning, and semantic and cognitive analysis. The main goal is to provide the required level of cyber resilience of the aforementioned systems under the conditions of both known and previously unknown destructive program actions.

Prof. Dr. Sergei A. Petrenko
Guest Editor

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Information is an international peer-reviewed open access monthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 1600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • Cyber systems of 4.0 Industry
  • Cyber resilience management concept
  • Quantitative metrics and cyber resistance measures
  • Cyber resiliency engineering framework
  • Business continuity management

Published Papers (2 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

27 pages, 2843 KiB  
Article
Conceptualising a Cloud Business Intelligence Security Evaluation Framework for Small and Medium Enterprises in Small Towns of the Limpopo Province, South Africa
by Moses Moyo and Marianne Loock
Information 2021, 12(3), 128; https://0-doi-org.brum.beds.ac.uk/10.3390/info12030128 - 17 Mar 2021
Cited by 4 | Viewed by 3383
Abstract
The purpose of this study was to investigate security evaluation practices among small and medium enterprises (SMEs) in small South African towns when adopting cloud business intelligence (Cloud BI). The study employed a quantitative design in which 57 SMEs from the Limpopo Province [...] Read more.
The purpose of this study was to investigate security evaluation practices among small and medium enterprises (SMEs) in small South African towns when adopting cloud business intelligence (Cloud BI). The study employed a quantitative design in which 57 SMEs from the Limpopo Province were surveyed using an online questionnaire. The study found that: (1) the level of cybersecurity threats awareness among decision-makers was high; (2) decision-makers preferred simple checklists and guidelines over conventional security policies, standards, and frameworks; and (3) decision-makers considered financial risks, data and application security, and cloud service provider reliability as the main aspects to consider when evaluating Cloud BI applications. The study conceptualised a five-component security framework for evaluating Cloud BI applications, integrating key aspects of conventional security frameworks and methodologies. The framework was validated for relevance by IT specialists and acceptance by SME owners. The Spearman correlational test for relevance and acceptance of the proposed framework was found to be highly significant at p < 0.05. The study concluded that SMEs require user-friendly frameworks for evaluating Cloud BI applications. The major contribution of this study is the security evaluation framework conceptualised from the best practices of existing security standards and frameworks for use by decision-makers from small towns in Limpopo. The study recommends that future research consider end-user needs when customising or proposing new solutions for SMEs in small towns. Full article
(This article belongs to the Special Issue Cyber Resilience)
Show Figures

Figure 1

17 pages, 1613 KiB  
Article
Improving Cybersafety Maturity of South African Schools
by Elmarie Kritzinger
Information 2020, 11(10), 471; https://0-doi-org.brum.beds.ac.uk/10.3390/info11100471 - 04 Oct 2020
Cited by 6 | Viewed by 2591
Abstract
This research investigated the current maturity levels of cybersafety in South African schools. The maturity level indicates if schools are prepared to assist relevant role players (teachers and learners) in establishing a cybersafety culture within the school environment. The research study measured the [...] Read more.
This research investigated the current maturity levels of cybersafety in South African schools. The maturity level indicates if schools are prepared to assist relevant role players (teachers and learners) in establishing a cybersafety culture within the school environment. The research study measured the maturity levels of cybersafety in 24 South African schools by evaluating the four main elements that are needed to improve cybersafety within schools. These elements are (1) leadership and policies, (2) infrastructure, (3) education, and (4) standards and inspection. The study used a UK-approved measurement tool (360safe) to measure the cybersafety maturity of schools within South Africa, using five levels of compliance (Level 1: full compliance, to Level 5: no compliance). The data analysis clearly indicated that all the schools that participated in the study had a significantly low level of cybersafety maturity and compliance. Schools are starting to adopt technology as part of their educational and social approach to prepare learners for the future, but there is a clear lack of supporting cybersafety awareness, policies, practices and procedures within South African schools. The research proposed a step-by-step approach involving a ten-phase cybersafety plan to empower schools to create and grow their own cybersafety culture. Full article
(This article belongs to the Special Issue Cyber Resilience)
Show Figures

Figure 1

Back to TopTop