Countering the Menace of Ransomware
US has undertaken a number of initiatives on cybersecurity, specifically ransomware, one of them being the Counter-Ransomware Initiative Meeting held in October 2021. Whether this attempt by the US to mobilise a larger group of countries to discuss ransomware will lead to real outcomes, or is just meant to endorse its actions, remains to be seen.
Growing Cyber Risks to Energy Infrastructure
Cyber-related risks to the energy sector can be minimised by strategic intelligence gathering on potential threat actors, weaving of cyber security strategies into corporate decisions, industry-wide collaboration as well as up-to-date backup systems.
Cybersecurity and Threats: Cyberterrorism and the Order Today
The ever-growing dependence of man on cybernetworks has unbridled a modish genre of cyberthreat called cyberterrorism. The pervasive cyberspace has provided an advantageous operational frontier to the terrorists for executing cyberattacks on critical infrastructures, spreading hate propaganda over the Internet and using it for recruitment, planning and effecting terror attacks.
Modeling Attribution of Cyber Attacks Using Bayesian Belief Networks
The article makes an attempt to bring to the fore the various factors which are considered in the due process of attribution of a cyber-attack and the correlation of credible attribution with cyber deterrence. The focal point of the article is a three-step approach to model the decision-making process behind attribution of cyber-attacks using Bayesian Belief Networks and a case study to elucidate on the functioning of the model.
US Elections 2020 and the Cybersecurity Challenges
It is critical to reduce the risks associated with cyber-enabled elections by ensuring end-to-end verifiability, protection of voter database, managing risks to the election infrastructure and curbing the menace of disinformation.
Decoding Cyberattack on Australia
With the adoption of varied digital means in times of pandemic, the states are likely to witness increased cyberattacks. Absence of an effective response would only mean an open playground for perpetrators.