In this paper, I will be analyzing bibliography of 10 authors. I have selected the following 10 articles for the bibliography: Article 1: An Annotated Bibliography Semaan, B. and Mark, G. 2011. Technology-mediated social arrangements to resolve breakdowns in infrastructure during the ongoing disruption. ACM Trans. Comput.-Hum. Interact. 18, 4, Article 21 (December 2011), 21 pages. DOI = 10.1145/2063231.2063235 http://doi.acm.org/10.1145/2063231.2063235 When societies experience disruption as caused by natural disasters, various official government agencies, relief organizations, and emergent citizen groups engage in activities that aid in the recovery effort—the process that leads to the resumption of normal life. In war environments, however, …show more content…
This article focuses on the current relationship between networked systems and cyber crimes, analyzes the nature of the relationship from a fundamental engineering perspective, and systematically explores where and how future advances in networked systems might influence the evolution of cyber-attacks, even inadvertently giving rise to new forms of cyber crimes. Historical data reveals that technological advances in engineering system design, including communications and transportation, have been often accompanied by a lack of foresight. The greater the extent of the advancement, the deeper the potential chasm and more severe the damage incurred when a clever perpetrator successfully exploits the weaknesses. My brief summary, this article covered challenges in computer crimes, computer network security computer viruses, computer security, DATA protection and CYBERTERRORISM. The greatest threat to any networked system comes from an intelligent individual or a team dedicated to harming the system. The most logical and perhaps the only recourse lies in the designers expending serious effort to uncover any flaws and errors in the system design before the perpetrators find them, through holistic thinking and simulation, both prior to developing the prototype and after the system is …show more content…
Although there is no doubt that the wireless communication architecture will play a significant role in smart grid, the wireless network introduces additional vulnerabilities, given the scale of potential threats. Therefore, the physical layer security issue is of first priority in the study of smart grid and has already attracted substantial attention in the industry and academia. In this paper, we aimed to present a general overview of the physical layer security in the wireless smart grid and cover the effective countermeasures proposed in the literature of smart grid to date. We first investigate the security challenges from malicious attacks. Specifically, two typical forms of malicious attack in smart grid, namely, jamming and bad data injecting, are studied. In addition, the related countermeasures against these malicious attacks are illustrated. Further, we analyze the state of the art of the privacy issues in the smart grid. The private information and privacy concerns are introduced, and then the effective solutions to privacy security are provided. Finally, voltage regulation, a security topic that has been hardly studied in the wireless smart grid domain, is
Section 7 shows the limitations of the paper. At long last, Section 8 closes the paper and in addition depicting its impediments. 2. Related work Many types of survey and review researches have been done in the field of intrusion detection on the network, wireless sensor networks (WSN), cloud computing, and other areas.
With widespread use of internet services, the network scale is expanding on daily basis and as the network scale increases so will the scale of security threats which can be applied to system connected to the network. Viruses and Intrusions are amongst most common threats that affects computer systems. Virus attacks can be controlled by proper antivirus installation and by keeping the antivirus up to date. Whereas any unauthorized access in the computer system by an intruder can be termed as Intrusion and controlled by IDS. Intruders can be grouped into two major categories which are external and internal Intruders.
Marques Underwood INSS 391 Security and the Future With the transition of companies leaning towards advancing through the usage of big data, cybersecurity and the trends in technology are creating an increase in threats. The goal is to protect the databases and devices used at these companies before they are hacked and compromised for unwanted reasons. We’ll see the general concerns with security in the IT field, and steps that specific companies are taking to prevent and adopt to the landscape of the future in security. Devices are increasing at a rapid pace these days, meaning the more data is being expanding.
In A Paradise Built in Hell, Rebecca Solnit focuses on the occurrences of the aftermaths of five major North American disasters and how strong bonds within communities form because of those disasters. Each case study provides a concrete description of what surviving residents themselves understand to be an unusual sociological change arising in the midst of casualties, disorientation, homelessness, and significant loss of all kinds. Reflecting on the 1906 San Francisco earthquake; the enormous 1917 explosion in Halifax, Nova Scotia; the devastating 1985 Mexico City quake; Lower Manhattan after the 9/11 terrorist attacks; and Hurricane Katrina’s 2005 deluge of New Orleans, Solnit brings a new perspective to these heart-wrenching tragedies. Solnit tells many enlightening stories of altruism and courageous social action. Moreover, although providing insight on these tragedies, Solnit presents her case with a redundant political bias and can seem to show problems that were not there.
These natural disasters can drive distrust within communities. For example, in an analysis of natural disaster data, evidence was found by Dawn Brancati and Rakhi Bhavnani that “...natural disasters result in a high likelihood of conflict because victims compete with one another for scarce resources such as relief aid, housing and so forth” (Kang 1-2). Due to the scarcity of essential resources, those affected are fighting over them promoting conflict within a community. Instead of connecting, the people are competing against each other to survive. However, the use of the resources in a more efficient way can help to reduce fighting over resources.
The Great Mississippi River Flood of 1927 has taught many emergency managers to strive to correct deficiencies from focusing events from the past by valuing and protecting the people from communities from anticipated
Now focusing on cyber security and communication security which are the following parts that make up the national security. Each one of these parts are responsible for a specific function. Cybercrime is attacking the information systems, sometimes identity theft, but in some cases fraud. By providing insight into causes of cybercrime, its participants their motivations, then we identify some of the major issues dealing with these crimes. With cybercrime being nondiscriminatory, also dramatically increase.
Emergency management describes the process of preparing for disasters, responding to their occurrence and putting in place both structural and nonstructural measures to mitigate against them. Emergency management has come a long way in terms of evolution in the United States of America. In terms of evolution, there have been a number of changes with evidence in shift from state to federal and local involvement in disaster management. This paper will thus discuss the evolution of emergency management as well as the lessons that have come as a result of this evolution. The evolution can be traced back to the biblical times, Moses himself tried to manage floods by splitting the Red Sea (George et al, p. 1).
Purdy, Elizabeth Rholetter, PhD. "Cyberterrorism." Salem Press Encyclopedia. September 2013. EBSCOhost, search.ebscohost.com/login.aspx?direct=true$db=t60&AN=89677539. Accessed.
The Stafford Act was enacted in 1988 and determines how and when the federal government is allowed to intervene in a natural disaster. It also defines the type of assistance to be provided as well as the distribution of funds among the federal, state and local governments. FEMA is responsible for coordinating the assistance identified in the Stafford Act. However, FEMA has to answer to the Secretary of Homeland Security rather than making their own decisions. The authors describe how our current governmental system isn’t well equipped to deal with major devastation such as Hurricane Katrina.
Though the community only has a small effect on the overall picture, they are the most vulnerable to all disasters and threats. Therefore, it is the responsibility of the community to prepare one another and assess the potential risks and hazards within their community in addition to what steps are needed to address the issues. It is this preemptive response and planning, especially in locations with historically reoccurring hazards that reduce the disaster effects and overall cost. This community-based effort conducted by community groups has the, “potential to make a significant and long-lasting contributions to reducing local vulnerability and strengthening adaptive capacities” (Allen, 2006, p. 97). One example of a community-organized group is Community Emergency Response Teams or CERT.
News media experts have noted that Hurricane Katrina in 2005 was the first demonstration of how disaster response was changing and that individuals possessed “an unprecedented capacity to access, share, create and apply information” (Nachison, 2005). The use of social media facilitated collaborative online efforts to locate missing people and emergency housing, and coordinate volunteers (Nelson et al., 2010 as cited in Goldfine, 2011). Hurricane Katrina was one of the first natural disasters that “marked the coming of age of participatory media” (Haddow & Haddow, 2009). During Hurricane Katrina, social media was established as the ‘go-to’ platform for information (PR Newswire, 2011). As this disaster occurred when the internet was gaining popularity,
Cybersecurity has become a growing cause for concern in the United States and indeed countries around the world. On February 9, 2016 President Barack Obama announced his Cybersecurity National Action plan (CNAP) to further the nations efforts to protect government agencies, citizens, and businesses from cyber threats domestic and abroad. However, cybersecurity is not a new issue in fact it is as old as the internet itself. With that said, I keep thinking back to that warm September day stained with the image of an enormous fireball engulfing our small TV set. This horrific day changed the course of history forever along with my future career path.
With computer technologies and the internet has connected the world together with the ability to communicate with people in different countries. As a society, we have become very dependent on computers and when the systems go down we cannot function as well, businesses cannot conduct their business. With the internet connecting the world together, it gives concerns for cyber-terrorism and cyber-attacks. Cyberterrorism is when a group attacks a target with intention of causing harm and further political, social, religious, or other goals. Cyber-attacks are attacks on a target system carried about by different people and may not be associated with a terrorist group.
Personal vision about the future of cyberwarfare Cyberwarfare already exists in reality and has been spread out among countries or organizations over the past few decades. The rising technologies including artificial intelligence and computational neural networks used by future computers will not only be significant in a new era of power and communications, but will also broaden the channel for cybercrimes, attacks and warfare. Future cyberwarfare will continue to scale up attacks against governments, corporations and even civilians in the next decade where it will be on par with traditional military and will might surpass these tactics. Future cyberwarfare will not just be targeted against military agencies or other government agencies.