2023
DOI: 10.9770/ird.2023.5.1(6)
|View full text |Cite
|
Sign up to set email alerts
|

Industrial Control Systems (ICS) cyber prediction model

Abstract: Acceleration of scientific and technical progress, speeding up of technological changes, IT process globalisation and integration of OT processes invoked new challenges in preparing cyber strategies. Issues with adapting strategy for a particular specificity, region and specific cyber-attacks are not applicable. Therefore, a natural need arises to adjust the process for future cyber-attacks. It should be noted that the vast majority of organisations still need to possess a strategy that has been developed in c… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
2
0
1

Year Published

2023
2023
2023
2023

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 23 publications
0
2
0
1
Order By: Relevance
“…Penetration of Internet brought various insecurities and crimes (Aleksejeva et al, 2021;Kovács, 2022;Grega, Nečas, 2022;Lavrinenko et al, 2022;Sikimić, 2022;Katina et al, 2023). One of crimes, relatively new on the international scene and inevitably linked to the development as well as increased use of information and communication technologies, is solicitation of children for sexual purposes, also referred to as sexual solicitation or contacting a minor for the purpose of leading him or her to engage in sexual activity.…”
Section: Introductionmentioning
confidence: 99%
“…Penetration of Internet brought various insecurities and crimes (Aleksejeva et al, 2021;Kovács, 2022;Grega, Nečas, 2022;Lavrinenko et al, 2022;Sikimić, 2022;Katina et al, 2023). One of crimes, relatively new on the international scene and inevitably linked to the development as well as increased use of information and communication technologies, is solicitation of children for sexual purposes, also referred to as sexual solicitation or contacting a minor for the purpose of leading him or her to engage in sexual activity.…”
Section: Introductionmentioning
confidence: 99%
“…The effects of these impacts are often ambivalent (Bodford et. al., 2018;Chojnacki, 2021;Katina et al, 2023). The social assessment of certain types of social action is highly controversial.…”
Section: Introductionmentioning
confidence: 99%
“…Pavyzdžiui, pradiniu lygmeniu organizacija nustato problemas, kurias reikia išspręsti, naudodama kibernetinio sau- gumo modelį, analizuoja teisines problemas, turinčias įtakos kibernetiniam saugumui, apibrėžia organizacijos politiką, peržiūri valdymo sistemą ir nustato, kuris skyrius ar asmuo dalyvauja sprendimų priėmimo procese. Taip pat organizacija analizuoja vidines ir išorines rizikas, turinčias įtakos organizacijos veiklai, bei darbe naudojamas technologijas, mokosi suprasti, kad bet kuri organizacija gali nukentėti dėl technologinių ar socialinių aspektų, o tai yra pagrindas tobulinti organizacijos kibernetinį saugumą (Katina et al, 2023).…”
Section: Kritinės Infrastruktūros Kibernetinio Saugumo Valdymo Spragų...unclassified