Cybersecurity Threats and Mitigation measures in Agriculture 4.0 and 5.0

Acrobat Cybersecurity threats and mitigation measures in agriculture 4.0 and 5.0
Author/Researcher: Chrysanthos Maraveas, Muttukrishnan Rajarajan, Konstantinos G Arvaniti, Anna Vatsanidou
Source: https://www.sciencedirect.com/

The primary aim of this study was to explore cybersecurity threats in agriculture 4.0 and 5.0, as well as possible mitigation strategies. A secondary method was employed involving narrative review in which many studies on cybersecurity were sampled and analyzed. The study showed that the main risks that increase cybersecurity threats to agricultural organizations include poor cybersecurity practices, lack of regulations and policies on cybersecurity, and outdated IT software. Moreover, the review indicated that the main cybersecurity threat in agriculture 4.0 and 5.0 involves denial of service attacks that target servers and disrupt the functioning of relevant smart technologies, including equipment for livestock tracking, climate monitoring, logistics and warehousing, and crop monitoring.

The analysis also revealed that malware attacks occur when hackers change the code of a system application to access sensitive farm-related data and may alter the operations of the digitized systems. Some of the impacts of cybersecurity breaches were noted to include data loss, reduced efficiency of digitized systems, and reduced food security. A crucial mitigation strategy against cybersecurity threats includes using advanced technologies such as artificial intelligence (AI), blockchain, and quantum computing to improve malware detection in Internet of Things (IoT) digital equipment and ensure faster response to any threats. The other mitigation measures include training employees on best cybersecurity practices and creating guidelines and regulatory standards on best cybersecurity practices. Read More

Youth Pathways into Cybercrime

Acrobat Youth Pathways into Cybercrime
Author: Research leads: Professor Mary Aiken, Professor Julia Davidson & Dr Philipp Amann
Source: http://www.mdx.ac.uk/
Overview: Many security and police professionals spend their time analysing the technical and mechanical aspects of cybercrime, dissecting malware and exploit tools, forensically analysing code and techniques. However, few actively focus on the social and psychological aspects: who for example is the attacker, what motivates them, and more importantly how and when did this deviant behaviour begin? Understanding the behavioural and developmental aspects of cybercriminality is becoming increasingly important, and underlies the necessity of a shift in focus from sanctions to deterrence and prevention. That being said, there is an urgent need to understand the pathways that lead some young people into cybercrime hence it is important for parents to be aware of their own youth’s online activity and risk. Read More

2016 Trend Micro Security Predictions: The Fine Line

Acrobat 2016 Trend Micro Security Predictions: The Fine Line
Author: Trend Micro Security Team
Source: http://www.trendmicro.com/
Overview: Every year, the triumphs and failures reflected in cyber security stories not only leave us with valuable lessons but also hints of the foreseeable future. Looking closely, we get to pick pieces of the puzzle that we can use to build a vivid picture of what’s to come. Read More