Articles in Press

Volume 2 Issue 1


Research

Cyber Hybrid Warfare: Asymmetric threat

Christos Beretas1

Cyber hybrid warfare has been known since antiquity, it is not a new terminology nor a new practice. It can have an effect even more than a regular conventional war. The implementation of the cyber hybrid war aims to misinform, guide and manipulate citizens, disorganize the target state, create panic, overthrow governments, manipulate sensitive situations, intimidate groups, individuals and even shortened groups of the population, and finally to form an opinion according to the enemy's beliefs. Creating online events designed to stimulate citizens to align with the strategy of governments or the strategy of the enemy government is a form of cyber hybrid warfare. The cyber hybrid warfare falls under the category of asymmetric threats as it is not possible to determine how, and the duration of the cyber invasion. The success or not of a cyber hybrid war depends on the organization, the electronic equipment, and the groups of actions they decide according to the means at their disposal to create the necessary digital entities. Finally, the cyber hybrid warfare is often used to show online military equipment aimed at downplaying its moral opponent.

PDF


Review Article

The role of IoT in Smart Cities: Security and Privacy in Smart World

Christos Beretas1

Smart devices, or Internet of Things in other world, are a concept that applies to the electronic objects around us, that is, devices that use built-in sensors to collect data and take action on it within a network. As smart devices collect data about its users, smart cities, they are primary targets for hackers. There are several reports on the web about how vulnerable smart devices are to intrusion and loss of privacy, those online reports also provides details on how routers can be hacked. If the router that connects a smart device is hacked, all smart systems and devices connected to it can be controlled remotely..

PDF


Review Article

How really secure is TOR and the privacy it offers?

Christos Beretas1

TOR is a very popular Project, a global anonymity network loved by millions of internet users, used by people who want to express their opinion online, take malicious actions, transfer files from one location to another without these files are compromised, their location is not detected, etc.

PDF


Review Article

Industrial Control Systems: The Biggest Cyber Threat

Christos Beretas1

Industrial control systems (ICS) are critical, as in these systems, cyber threats have the potential to affect, disorganize, change their mode of operation, act as an information extraction vehicle, and ultimately turn against itself. creating risks to the system itself, infrastructure, downtime, leakage of sensitive data, and even loss of human life. Industrial control systems (ICS) are vital to the operation of all the modern automated infrastructure in the western world, such as power plant and power stations...

PDF


Review Article

The need to create a new model for predicting future cyber threats and its parameters

Christos Beretas1

It is well known in computer science that a quantitative analysis can reveal information about a future cyber attacks, combining and analyzing elements that are necessary to carry out the analysis and on the other hand are elements that substantiate the conclusions and the implementation of the appropriate cyber security methods and policies...

PDF

 

Get In Touch

FT-305/42
Malaysian Township
North Phase KPHB Colony
Hyderabad 500072, India
Email: This email address is being protected from spambots. You need JavaScript enabled to view it.
Phone: +91 9440176789

 

Google Scholar logo.svg