Tag Archives: CyberSecurity

Review of Pedagogical Principles of Cyber Security Exercises

Modern digitalized cyber domains are extremely complex ensemble. Cyber attacks or incidents against system may affect capricious effects for another system or even for physical devices. For understanding and training to encounter those effects requires an effective and complex simulation capability. Cyber Security Exercises are an effective expedient for training and learning measures and operations […]

Model Fooling Attacks Against Medical Imaging: A Short Survey

This study aims to find a list of methods to fool artificial neural networks used in medical imaging. We collected a short list of publications related to machine learning model fooling to see if these methods have been used in the medical imaging domain. Specifically, we focused our interest to pathological whole slide images used […]

The National Cyber Security Exercise 2020

The Institute of Information Technology of JAMK University of Applied Sciences and JYVSECTEC are organizing the National Cyber ​​Security Exercise 2020 for Finnish State Administration organisations (KYHA20vh). The Exercise takes place in Jyväskylä from 28 September to 2 October 2020. This KYHA20vh exercise is a continuum of the series of National Cyber Security Exercises that […]

Model for Cyber Security Information Sharing in Healthcare Sector

In the modern society almost all services are based on data-networks and networked systems. Especially through the growing digitalization an increasing number of services is connected to data-networks. One example of a highly digitalized domain is the healthcare sector, where a cyber-attack could cause extreme circumstances. Decision making requires knowledge about the current situation. Particularly, […]

CISS2020-OL: Attacking the Secure Water Treatment testbed

JYVSECTEC Red Team participated in CISS2020-OL Critical Infrastructure Security Showdown 2020 Online competition and placed 3rd out of 17 teams. CISS2020-OL participants were invited by iTrust, Centre for Research in Cyber Security at the Singapore University of Technology and Design (SUTD). CISS2020 invites red teams to try their best at disrupting their Secure Water Treatment […]

Adding Realism to Cyber Security Exercises – Populating RGCE environment

Our Realistic Global Cyber Environment (RGCE) is a feature rich live cyber range that brings together a realistic global world and organization environments in an isolated private cloud. RGCE’s global world functions the same way as the real Internet; however, it is fully controlled by JYVSECTEC. The Internet of RGCE has similar counterparts as the real […]

A Design Model for a Degree Programme in Cyber Security

The need for skillful cyber security workforce has increased dramatically during the last ten years. The contents of the degree programmes have not been able to respond to this need adequately and the curriculum contents have not always met the industry’s knowledge needs. In this paper, we describe a model for designing a degree programme […]

Cyber security in the healthcare sector Conference

We are organising Cyber security in the healthcare sector conference together with the European Cyber Security Organisation ECSO, Regional Council of Central Finland, and West Finland European Office, under Finland’s Presidency of the Council of the European Union. Conference is part of the Healthcare Cyber Range project. Conference is held on 9th of October 2019, […]

On Application-Layer DDoS Attack Detection in High-Speed Encrypted Networks

Application-layer denial-of-service attacks have become a serious threat to modern high-speed computer networks and systems. Unlike network-layer attacks, application-layer attacks can be performed by using legitimate requests from legitimately connected network machines which makes these attacks undetectable for signature-based intrusion detection systems. Moreover, the attacks may utilize protocols that encrypt the data of network connections […]