New Challenges in Information Security and Privacy and Cyber Resilience

A special issue of Electronics (ISSN 2079-9292). This special issue belongs to the section "Networks".

Deadline for manuscript submissions: 15 September 2024 | Viewed by 2032

Special Issue Editors


E-Mail
Guest Editor
Institute of Computer Science, Foundation for Research and Technology–Hellas (FORTH), Vassilika Vouton, 70013 Heraklion, Greece
Interests: information systems security and privacy; risk assessment; digital forensics and cyber threat intelligence; security training and cyber-ranges; and disaster mitigation planning in critical infrastructures
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
School of Electrical and Computer Engineering, Technical University of Crete, Akrotiri Campus, 731 00 Chania, Greece
Interests: systems and network security; security policy; privacy; high-speed networks
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
Department of Informatics, University of Oslo, Gaustadalléen 23B, 0373 Oslo, Norway
Interests: cyber (threat) intelligence representation, sharing, and reasoning; information modeling; systems interoperability and standardization; security orchestration and automation; threat management; artificial intelligence

E-Mail Website
Guest Editor
Faculty of Science and Technology, Bournemouth University, Bournemouth BH12 5BB, UK
Interests: AI in cybersecurity; cryptography; cyberdefence exercises; information warfare and security
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

This Special Issue, 'New Challenges in Information Security, Privacy, and Cyber Resilience', will address the evolving landscape of digital threats and the need for innovative strategies to safeguard sensitive information, uphold privacy, and fortify organizational resilience in the face of cyber incidents.

In an era marked by rapid technological advancement, the proliferation of interconnected devices, and the widespread adoption of cloud computing, digital ecosystems have become increasingly vulnerable. This Special Issue delves into emerging threats such as sophisticated cyber-attacks, ransomware, data breaches, supply chain security, and social engineering techniques, providing a platform for experts, researchers, and practitioners to explore novel approaches to data security.

The Special Issue emphasizes the intricate interplay between information security, privacy, and cyber resilience and highlights the pressing need for holistic frameworks that not only fortify digital fortifications, but also uphold the privacy rights of individuals and organizations. We are seeking cutting-edge research on encryption protocols, authentication mechanisms, and access control systems that strike a balance between security and privacy.

This Special Issue will also focus on cyber resilience—the capacity to anticipate, prepare for, respond to, and recover from cyber incidents—covering topics such as incident response planning, threat intelligence sharing, and the role of human factors in bolstering cyber resilience.

The Special Issue seeks to bridge the gap between theoretical advancements and real-world applications, fostering a collaborative environment between academia and industry. It aims to equip cybersecurity professionals with the knowledge and tools necessary to stay ahead of evolving threats, ensuring the continued integrity, confidentiality, and availability of critical information.

The research published in this Special Issue will provide definitive resource for scholars, practitioners, and policymakers working towards a safer and more secure digital future.

Topics of interest include, but are not limited to:

  • Cybersecurity in modern computerized ecosystems (e.g., Internet of Things (IoT), cyber-physical systems (CPS), supply chains, smart cities and intelligent environments, etc.);
  • Privacy preservation and data protection in the digital era;
  • Cyber resilience of critical infrastructures;
  • Artificial intelligence in cyber protection;
  • Cyber threat intelligence and information sharing among collaborating organizations and communities;
  • Incident response planning and playbooks;
  • Secure development lifecycle for software and hardware;
  • Opensource software/hardware guarantees and bill of materials (BOM);
  • Security validation and theoretic aspects of security;
  • Cyber ranges training, raising awareness, and ethical aspects.

Dr. George Hatzivasilis
Prof. Dr. Sotiris Ioannidis
Dr. Vasileios Mavroeidis
Prof. Dr. Vasilis Katos
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Electronics is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • cybersecurity in modern computerized ecosystems 
  • privacy preservation and data protection in the digital era
  • cyber resilience of critical infrastructures

Published Papers (2 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

14 pages, 2721 KiB  
Article
Automated Conversion of CVE Records into an Expert System, Dedicated to Information Security Risk Analysis, Knowledge-Base Rules
by Dovydas Benetis, Donatas Vitkus, Justinas Janulevičius, Antanas Čenys and Nikolaj Goranin
Electronics 2024, 13(13), 2642; https://doi.org/10.3390/electronics13132642 - 5 Jul 2024
Cited by 1 | Viewed by 442
Abstract
Expert systems (ESs) can be seen as a perspective method for risk analysis process automation, especially in the case of small- and medium-sized enterprises that lack internal security resources. Expert system practical applicability is limited by the fact that the creation of an [...] Read more.
Expert systems (ESs) can be seen as a perspective method for risk analysis process automation, especially in the case of small- and medium-sized enterprises that lack internal security resources. Expert system practical applicability is limited by the fact that the creation of an expert system knowledge base requires a lot of manual work. External knowledge sources, such as attack trees, web pages, and ontologies, are already proven to be valuable sources for the automated creation of knowledge base rules, thus leading to more effective creation of specialized expert systems. This research proposes a new method of automated conversion of CVE data from the National Vulnerability Database (version CVSS 2) into the knowledge base of an expert system and flags CVE records that have higher risk due to already existing exploit tools. This manuscript also contains a description of the method for implementing software and a practical evaluation of conversion results. The uniqueness of the proposed method is incorporation of the records included in the Cybersecurity and Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities Catalog. Full article
Show Figures

Figure 1

20 pages, 3321 KiB  
Article
Design and Implementation of a UMLRPAsec-Extension for Robotic Process Automation
by Anastasiya Kurylets and Nikolaj Goranin
Electronics 2024, 13(4), 769; https://doi.org/10.3390/electronics13040769 - 15 Feb 2024
Cited by 1 | Viewed by 894
Abstract
Ensuring RPA (robotic process automation) security is a critical aspect when developing and operating automated software robots. One of the key steps for developing secure software robots is the design stage: the identification and specification of the requirements for the security of the [...] Read more.
Ensuring RPA (robotic process automation) security is a critical aspect when developing and operating automated software robots. One of the key steps for developing secure software robots is the design stage: the identification and specification of the requirements for the security of the system, the description of system precedents, the interaction between the classes involved in the robot being created, etc. Designs using security-oriented formal modeling languages, such as the UMLsec extension of UML, involve not only a visual representation of diagrams but also the possibility to focus the attention on security issues. However, currently, in the scientific community, there is no possibility of using stereotypes specialized for robots—a mechanism for expanding the unified modeling language that would explicitly reflect a specific problem in the subject area. In this article, we propose that the UMLRPAsec-extension for RPA can be used to model security in the RPA context. Full article
Show Figures

Figure 1

Back to TopTop