You will need to summarize each paper.
Summary of Paper 1
Security threats and measures to protect cyber-physical systems – ZHANG Li. WANG Qing. TIAN bin
This paper covers security concerns that are related to cyber physical system (CPS). Additionally, it highlights possible security measures that could be taken to mitigate these threats.
The paper has five main sections. They include an introduction to cyberphysical systems, then the architecture of CPS, and the security concerns associated with these systems.
The next section outlines security countermeasures businesses and users may use. A meaningful conclusion follows (Zhang Wang & Taian, 2013).
CPS, as defined by the authors, is a multi-dimensional system consisting of three components. These are computing environment and networking environment. Physical systems are also included.
American Natural Fund Committee presented the idea of CPS for the first time.
The architecture of a CPS was presented by the authors as a three-tier architecture consisting of the physical environment, the network and the application services.
A typical CPS architecture has three key characteristics: environmental coupling, a range of features and services, as well as the networking systems.
This architecture is composed of three layers. At the bottom, there’s an aware execution layer. Next comes the data transport layer. Finally, there’s the application control and layer.
The physical equipment like RFID readers, sensors and mobile terminals is the aware execution layer.
The data transport layers perform communication and transmission activities with the help of the networking channels.
The application control layer combines the CPS and industry professionals. It also controls processing and transmits information.
It acts as an interface for the user with the CPS (Gyunka 2017).
CPS can present security problems. Here are the top issues identified by each layer.
The aware execution layer often suffers from equipment failure, line faults and electromagnetic interference. This layer also experiences denial of service attacks.
Data transport layer is vulnerable to security threats such as routing attacks or denial of service attacks.
The security threats to the application control layers include data leakage, information theft, malicious codes, control command forged attacks, distributed denial-of-service attacks, and privacy issues in data mining.
The paper also addresses security concerns associated with each layer.
The security threats associated with the aware execution layer will be mitigated and controlled through enhanced protection of the identity node and the use of biometrics. This will also strengthen the legislation and improve the security of the physical system.
For the prevention of security attacks related to the data transport layer, Point-to–Point and End–to–End encryption techniques should be applied.
For the protection of the application control layers security threats, network forensics, advanced authentication/access control and encryption techniques are used (Guo, Luo, & Geng 2013).
The security aspects of CPS were briefly mentioned by the authors.
Summary Of Paper 2
Information security is sometimes confused with cyber security.
In the research paper, the authors provide a definition and detailed explanation of both terms. The information is described in five sections:
Introduction, Information Security Cyber Security, From Information Security To Cyber Security and Conclusion (Solms & Niekerk 2013).
Cybersecurity is a process that involves security goals, security strategies and risk management techniques. Security guidelines and methods are designed to safeguard users and organizations as well as the cyber environment.
According to the authors, security of confidentiality integrity and availability are the three most important security goals.
In the paper, the authors use a top-down approach. This means that they describe the overall concept of security and then go into the details about information security. Then they explain the concept of cybersecurity (Kisa & Tatli 2016).
There are many definitions of information safety that have been offered by technocrats and researchers.
Information security basically refers to the protection of information, as well as all elements.
Information security and information technology can also be interchanged. However, the meanings of these terms are completely different.
Information and Communication Technology (ICT), security refers to the protection and management of information storage devices and systems.
To explain the impact on security concerns, which include various threats that target assets and address their vulnerabilities to cause damage (Gohel & Upadhyay 2016).
The authors have illustrated the meaning of cybersecurity using four scenarios.
Scenario one deals with cyber bullying. This refers to cyberspace being used to embarrass and harass victims, resulting in psychological harm.
The second scenario involves home automation. This is where several people use web to manage their own homes.
It can lead to cyber security risks like unauthorized access by attackers.
Cyber security threats have been a major concern for the entertainment industry.
Similar issues have been discussed in the third scenario (Gupta, Kulariya 2016).
The problem of cyberterrorism has negative effects on many information-based and non-information assets. It is one of the most important issues associated with cyber security. This was discussed in the fourth scenario.
With the help of these scenarios, the authors have explained the differences in ICT security and information security.
ICT security can only be used to protect the security infrastructure and avoid attacks.
Information security is about protecting information and its elements as well ICT assets.
Cyber security could include any asset, such as a person or household appliance, national policy, media, and the like.
Cybersecurity can thus be described as protecting the entire cyberspace and all users who are connected to it, including their national, societal, and personal interests.
International Journal of Advanced Research in Computer Science.
A Study on Cyber Defense Honeynet Technology and Examples of Configuration.
Analyse on HTTP Security Headers in Turkey
ScienceDirect.com: Information security, cyber security, and more – ScienceDirect.
A Survey of Security and Privacy in Emerging Sensor Networks: The Viewpoint of Close-Loop.
ScienceDirect. Security threats and cyber-physical system measures – ScienceDirect.