Bo Luo Bo Luo is a professor with EECS department at the University of Kansas. He is also the director of the Information Assurance Laboratory (IAL) at KU's Information and Telecommunication Technology Center (ITTC). He received Ph.D. degree from The Pennsylvania State University in 2008, M....
We are an information security and data protection consulting company. Our talented team of cyber security professionals really knows what they’re doing! We are former law enforcement personnel (Prosecutors, Ministry of Defence personnel etc.). Military veterans, Data protection officers and General ...
Current approaches in gauging infrastructural resilience are qualitative and cannot quantify the degree of maturity. Thus, this article presents a Cybersecurity Resilience Measurement Model (CRMM) for quantitative assessment of CNII resilience maturity. Considering the effects of pre-event, during-event ...
As a progressive security strategy, the zero trust model has attracted notable attention and importance within the realm of network security, especially in the context of the Internet of Things (IoT). This paper aims to evaluate the current research regarding zero trust and to highlight its pract...
Great public unrest was also caused by the renewal of the US-Japan Security Treaty of 1960. In 1960, Saburo Arasaka took control of the Arasaka Corporation. After the Korean War, and accelerated by it, the recovery of Japan's economy flourished.[3] The 1970s and 80s saw the country ...
The State of the Union speech before Congress was largely about the national security of the United States and the threat to other democracies from world war that was being waged across the continents in the eastern hemisphere. In the speech, he made a break with the long-held tradition of ...
It has enabled bullies to target their victims via digital mediums and sometimes even totally anonymously, adding an increased degree of threat to the equation. The phenomenon of cyberbullying has been defined and established via various terms such as: Cyberbullying Email bullying Electronic bullying...
funds are transferred between e-commerce market and traditional financial market. There is no explicit boundary between these two, because we can always consider the online financial services, such as security trading and P2P lending, as a kind of e-commerce but the merchandises are monetary goods...
Among the series of problems with regard to the legal regulation of cyber attacks is how the self-defense doctrine applies to them. In itself, the self-defense notion was always an interesting subject, but now with the emergence of a new security threat posed by the development of technologies...
Recent events concerning the Kaspersky anti-virus software in the UK and the Android operating system in the US have highlighted the significance of the domesticity of digital products for national cybersecurity, and the importance of establishing the or