Open Access Open Access  Restricted Access Subscription or Fee Access

Cyber Security of Critical Infrastructure

Vidharshana M, Sangami M. R, Mahasuwetha M, B. M. Rajesh

Abstract


This study provides a political analysis and evaluation of the benefits brought by critical security in cyberspace. It shows the limits of cybersecurity in national security, the use of artificial intelligence and investigative ethics to protect critical infrastructure. Previously investigated and discusses cybersecurity value conflicts and ethical issues in national security by analyzing data from data dating back to 2016. Along with this, it also includes a medical review of the latest research on the potential of artificial intelligence and cyber threats to the country's infrastructure. This section provides a review of four studies aimed at encouraging greater connectivity between the digital and non-digital infrastructures that support this field. The interchange of results was analyzed in the previous year's data.


Keywords


Critical infrastructures Cybersecurity·Ethical issues National Critical infrastructures, Cybersecurity, Ethical issues, National security, Value conflict

Full Text:

PDF

References


Adeel M, Chaudhry A, Shaikh R etal (2005) Taxonomy of cybercrimes and legislation in Pakistan. In: Proceedings of 1st international conference on information and communication technology, ICICT 2005, p35

Brundage M, Avin S, Clark J.etal (2018) The malicious use of artificial intelligence: forecasting, prevention, and mitigation. ArXiv:1802.07228. http://arxiv.org/abs/1802.07228. Last access 7 July 2019

Berk R, Heidari H, Jabbari S et al (2017) A convex framework for fair regression. ArXiv:1706.02409. http://arxiv.org/abs/1706.02409. Last access 7 July 2019

Baylon C (2017) Lessons from Stuxnet and the realm of cyber and nuclear security: implications for ethics in cyber warfare. In: Taddeo M, Glorioso L (eds) Ethics and policies for cyber opera-tions. Springer, Cham, pp-213–229. https://doi.org/10.1007/978-3-319-45300-2_12

Bucci S (2012) Joining cybercrime and cyberterrorism: a likely scenario. In: Reveron DS (ed) Cyberspace and national security: threats, opportunities, and power in a virtual world. George Town University Press, Washington, DC, pp57–68

Chouldechova A, Roth A (2018) The frontiers of fairness in machine learning. ArXiv:1810.08810. http://arxiv.org/abs/1810.08810. Last access 7 July 2019

Phahlamohlaka J. Globalisation and national security issues for the state: implications for national ICT policies. InIFIP International conference on Human choice and computers 2008 Sep 25 (pp. 95-107). Boston, MA: Springer US.

Chouldechova A (2016) Fair prediction with disparate impact: a study of bias in recidivism predic-tion instruments. ArXiv:1610.07524. http://arxiv.org/abs/1610.07524. Last access 7 July 2019

Geers K. The challenge of cyber attack deterrence. Computer Law & Security Review. 2010 May 1;26(3):298-303.

Faqir RS. Cyber Crimes in Jordan: A Legal Assessment on the Effectiveness of Information System Crimes Law No (30) of 2010. International Journal of Cyber Criminology. 2013 Jan 1;7(1).

Hui KL, Teo HH, Lee SY. The value of privacy assurance: An exploratory field experiment. MIS quarterly. 2007 Mar 1:19-33.

Commission of the European Communities (2006) Communication from the Commission on a European Programme for Critical Infrastructure Protection.https://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=COM:2006:0786:FIN:EN:PDF. Last access 7 July 2019

Corbett-Davies S, Pierson E, Feller A etal (2017) Algorithmic decision making and the cost of fairness. ArXiv 1701.08230https://doi.org/10.1145/3097983.309809

Deibert R (2011) Tracking the emerging arms race in cyberspace. Bull At Sci 67(1):1–8. https://journals.sagepub.com/doi/pdf/10.1177/0096340210393703

Klare BF, Burge MJ, Klontz JC, Bruegge RW, Jain AK. Face recognition performance: Role of demographic information. IEEE Transactions on information forensics and security. 2012 Oct 8;7(6):1789-801.

Introna L, Wood D. Picturing algorithmic surveillance: The politics of facial recognition systems. Surveillance & Society. 2004;2(2/3):177-98.

Donohue I, Petchey OL, Montoya JM, Jackson AL, McNally L, Viana M, Healy K, Lurgi M, O'Connor NE, Emmerson MC. On the dimensionality of ecological stability. Ecology letters. 2013 Apr;16(4):421-9.

Hiller JS, Russell RS. The challenge and imperative of private sector cybersecurity: An international comparison. Computer Law & Security Review. 2013 Jun 1;29(3):236-45.

Arulkumaran K, Deisenroth MP, Brundage M, Bharath AA. Deep reinforcement learning: A brief survey. IEEE Signal Processing Magazine. 2017 Nov 9;34(6):26-38.

Brundage M, Avin S, Clark J, Toner H, Eckersley P, Garfinkel B, Dafoe A, Scharre P, Zeitzoff T, Filar B, Anderson H. The malicious use of artificial intelligence: Forecasting, prevention, and mitigation. arXiv preprint arXiv:1802.07228. 2018 Feb 20.




DOI: https://doi.org/10.37591/jotssn.v10i2.7675

Refbacks

  • There are currently no refbacks.


Copyright (c) 2023 Journal of Telecommunication, Switching Systems and Networks