Risk Management: Cybersecurity
A cyberattack does not occur spontaneously for it requires some planning and preparation. These attacks make use of a variety of techniques, including methods of social engineering, and they are prepared stealthily and a long time in advance, says IT security expert Stefan Rass, associate professor at the Institute for Applied Informatics (InfAI), Alpen-Adria-Universität Klagenfurt (AAU).
“A Trojan is usually smuggled into a computer as an attachment to an e-mail”, Prof. Rass explains. Then, for a long period, nothing happens. Weeks or even months later, when the effects of a cyberattack become apparent, most people won’t associate the events with the e-mail. Everything you need to carry out an IT infrastructure attack can be purchased from the Darknet: “The supply chain works very smoothly there. It means that anybody can become an attacker; it’s not necessary to have a lot of technical knowledge,” Rass says.
As cyberattacks become more frequent, it therefore behoves public institutions and companies to improve their risk management in order to be prepared for any threats, according to Prof. Rass.
Recent hacking incidents, including attacks on large-scale infrastructure organisations such as the electricity grid in the Ukraine, increase the general awareness about the issue of managing cybersecurity risk. “However, as a general fact, IT security does not tend to bring a direct return on investment," Rass notes. "Sometimes, it results in making things slower and more complicated. Security investments do not produce profits, but rather they avoid losses.”
Prof. Rass is part of an IT security team that is currently working on a set of support tools designed to simplify the decision-making process for institutions of this kind. In order to answer questions such as “Which technical units are at risk”, “Which security measures should be integrated?” or “How likely is an attack?”, a computer-aided method should develop a decision recommendation. Statistical data serve as a basis, while the method itself is based on game theory, the professor adds.
Source: Alpen-Adria-Universität Klagenfurt | Graz | Wien
Image Credit: Pixabay
Published on : Tue, 4 Jul 2017
Print as PDF
Key FeaturesWe can provide an impressive range of clinical tools and deliver a remarkable clinical experience. On your PACS, off your PACS, within the surgical suite and beyond, iNtuition ensures your workflow is seamless and your imaging costs are minimized....
Our iNtuition iEMV viewer can display many types of images. It can even do some pretty amazingly advanced things. As a leader in advanced visualization, you can trust that TeraRecon can deliver impressive capabilities, but we strive to make it simple,...
WHAT YOU SEE IS WHAT YOU GET3D Advanced Visualization is at the core of TeraRecon DNA. We are extending our capability to the 3D printing world with a dedicated image processing workflow to enhance 3D printing outcomes. Printing your model is easier...
We can work across many PACS systems. No matter the size of your organization, iNtuition iReview can help you look across your imaging archives and create a unified interpretation view that’s made just for you. The configurable display protocols and user...