Modern industrial equipment are networked to interact with both internal and external systems, enabling automated decision-making with minimal or no human intervention. While this new environment creates efficiencies, it exposes the environment to cyber threats. This chapter explores the use of cybersecurity testbeds to study best practices in architecting and defending environments that contain industrial systems. Cybersecurity testbeds – physical, virtual, and hybrid – are used in different sectors for research and validation. Virtual testbeds hold promise as they enable design flexibility, reconfiguration, and scale to support various types of research studies. This chapter discusses the value of virtual cybersecurity testbeds and demonstrates a case study on the use of virtual testbeds using a simple industrial control system and a common attack. The concepts apply to more complex set ups and more complex attack structures. Virtual cybersecurity testbed can support researchers, practitioners, and educators interested in defending critical infrastructure environments and industrial systems.
Today's industrial equipment is connected over a network to communicate with external systems and make decisions without human intervention, making it vulnerable to cyberattacks and showing the importance of research. This study explored the implementation of a cloud-based virtual testbed for a smart factory for cybersecurity testing and research. As a first step, this paper reports on developing an environment with one programmable logic controller (PLC) simulating a conveyor belt setup. The study examined different virtualization platforms and network designs. In addition, it executed a denial-of-service attack and identified its signature indicators. The study found that VMware Workstation Pro is the most suitable virtualization platform and that network input and output are the DoS attack's signature indicators.
This paper presents a prime aspect of Augmented and Virtual Reality development in the field of healthcare. We explored several recent works and articles and a comparison between generic application development and immersive technology-based application is included. The paper talks about more practical approaches that can be taken to enhance the effectiveness of the application.
The resources (infrastructure) to complete this study are provided by the University of Cincinnati’s Center for Simulation and Virtual Environment Research (UCSIM). And several experiments and projects in the field of health care are used as a reference to make conclusions.
In this paper, I study how general technology users perceive the dark web. In this study,
I conducted research on what these users know about dark web technologies, activities,
content, and how their perceptions changed after a first-hand experience on dark web
marketplaces and sites. I aimed to tackle myths and misconceptions that users had about the
dark web and present new data in order to educate and bring awareness to the dark web to
those who may never have the opportunity or reason to come upon this information on their
own. It is my hope that the findings of this paper and the experiences of the participants will
foster the spread of knowledge and awareness to both the threats and benefits that the dark
web contributes to society.
In this paper, I study how medical records are being used by cyber-criminal for financial gain and patient manipulation. I studied what kind of criminal organizations may be involved in these operations and confirmed incidents from the black market. I conducted a literature review which generated several sources from online databases. I determined five major criminal factions that are most likely to use compromised medical records, determined possible motivations and looked at several cases of medical records being sold on the black market. The healthcare industry’s digitization efforts have left it tremendously ill-equip to combat emerging threats. It is evident that the healthcare industry must take extreme measures in order to counteract the evolving threat landscape. It is my hope that the findings of paper will being to shed light on these issues and help healthcare professionals understand what kind of threats the industry is facing.