Search Results

You are looking at 1 - 5 of 5 items for :

  • "cyberattacks" x
  • All content x
Clear All

Összefoglalás. Jelen cikk célja a járműipar egyes területeit érintő kiberbiztonsági kockázatok vizsgálata. Fentiekkel összhangban a cikk első részében a járműipar kiberbiztonsági szempontból releváns területei kerülnek meghatározásra. Ezt követően megtörténik a 2018. évben rögzített járműipari kibertámadások kockázatalapú értékelő elemzése.

Summary. Nowadays, cybersecurity has a critical impact to our lives. The Internet has also got a substantial role in our days since many people are constantly connected to the Internet (e.g., through online social networks) . Besides, numerous personal and individual devices are connected. The growing number of connected devices and cyberspace expansion make our lives easier. However, this affects our privacy, with the potential for unauthorized use of personal information. In summary, life in a networked world carries unknown dangers.

In the future, many new risk factors are expected to occur, which will significantly increase the level of cybersecurity threats. Examining the aspects of the automotive industry, we should mention the summary of which explores the field’s problems through novel theoretical solutions and related practical considerations. The book pays special attention to vehicle communication and networked systems. This book examines three main scientific directions for 5G-compliant vehicle-to-vehicle communication and cooperative vehicle control: modeling and testing capabilities for vehicle-to-vehicle communication, state-of-the-art technologies related to the physical layer, and MAC design procedures .

Cheng and colleagues examined the communication channels currently applied in the automotive industry or that are expected to be applied soon. Particular attention has been paid to examining the tasks and challenges that need to be addressed in order to support the spread of the connected transport systems in the future. The evaluation focused on the cooperation of connected vehicles. Their study also outlined the most important security risks and challenges associated with new communication solutions.

In the light of the above-mentioned considerations, it can be said that the emergence of connected and autonomous vehicles can make a significant contribution to the positive effects of cyberspace, but can also have a disadvantageous impact on the vulnerability of transport processes.

In line with this, it is important to examine and understand the vulnerabilities of connected and autonomous vehicles, the threats to vehicles. With this knowledge, automotive cybersecurity professionals’ responsibility is to develop appropriate security functions and capabilities for connected and autonomous vehicles and transport systems. This enables the systems to detect, evaluate, and, if necessary, treat different attacks and malicious interventions.

Along with the above objectives, many research studies in the automotive segment have already focused on identifying cybersecurity assessment frameworks for motor vehicles. Among these, it is worth highlighting the projects “HEAling Vulnerabilities to ENhance Software Security and Safety” and “E-safety vehicle intrusion protected applications” .

Open access
Orvosi Hetilap
Authors: Tamás Palicz, Tibor Sas, József Tisóczki, Balázs Bencsik, and Tamás Joó

retrospective impact analysis of the WannaCry cyberattack on the NHS. NPJ Digit Med. 2019; 2: 98. 10 Ehrenfeld JM. WannaCry, cybersecurity and health

Open access

2617. 9 Dadkhah M, Borchardt G, Maliszewski T. Fraud in academic publishing: researchers under cyber-attacks. Am J Med. 2017; 130: 27–30. 10 Memon AR. Predatory

Open access

Deliv. , vol. 23 , pp. 1812 – 1820 , 2008 . 10.1109/TPWRD.2008.919046 [31] S. Mousavian , J. Valenzuela , and J. Wang , “ A probabilistic risk mitigation model for cyber-attacks to PMU networks ,” IEEE Trans. Power Syst. , vol. 30 , pp. 156

Open access

impossibility of making changes to the data register by the previous date; increase of the level of state databases protection from unauthorized interference, in particular from cyberattacks; reducing fraud, since each record will be uniquely encoded and tied to

Free access