An Overview, Threats and Security Measures of Cyber Security in Sports Medicine
VerifiedAdded on  2023/05/29
|18
|5544
|242
AI Summary
This paper discusses the importance of cyber security in sports medicine and the risks and vulnerabilities associated with data transfer. It explores various cyber threats such as backdoor, denial of service attacks, eavesdropping, phishing, and more. The paper also provides case studies of data breaches in private sports companies and suggests solutions to mitigate these risks.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: CYBER SECURITY IN SPORTS MEDICINE
An Overview, Threats and Security Measures of Cyber Security in Sports Medicine
Name of the Student
Name of the University
Author’s Note:
An Overview, Threats and Security Measures of Cyber Security in Sports Medicine
Name of the Student
Name of the University
Author’s Note:
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1
CYBER SECURITY IN SPORTS MEDICINE
Table of Contents
Introduction................................................................................................................................2
Problem Statement.....................................................................................................................2
Objectives...................................................................................................................................3
Literature Review Regarding the Problem.................................................................................3
Probable Cyber Risks or Threats in Sports Medicine............................................................4
Case Studies of Data Breaches in Private Sports Company..................................................7
Literature Review Regarding the Solution.................................................................................9
Using of Big Data.................................................................................................................10
Internet of Things.................................................................................................................11
Solutions...................................................................................................................................11
Action Plan for Implementing Chosen Solution......................................................................13
Conclusion................................................................................................................................13
References................................................................................................................................15
CYBER SECURITY IN SPORTS MEDICINE
Table of Contents
Introduction................................................................................................................................2
Problem Statement.....................................................................................................................2
Objectives...................................................................................................................................3
Literature Review Regarding the Problem.................................................................................3
Probable Cyber Risks or Threats in Sports Medicine............................................................4
Case Studies of Data Breaches in Private Sports Company..................................................7
Literature Review Regarding the Solution.................................................................................9
Using of Big Data.................................................................................................................10
Internet of Things.................................................................................................................11
Solutions...................................................................................................................................11
Action Plan for Implementing Chosen Solution......................................................................13
Conclusion................................................................................................................................13
References................................................................................................................................15
2
CYBER SECURITY IN SPORTS MEDICINE
Introduction
Cyber security or computer security can be stated as protection of computerized
systems from any type of damage or theft to the respective software, electronic data and
hardware1. Moreover, misdirection and disruption of various services that are provided are
also checked with the help of cyber security. A major importance is provided to this cyber
security for incrementing reliance on computerized systems, wireless networks like Wireless
Fidelity and Bluetooth and even Internet connection2. The major and noteworthy
vulnerabilities, which are being discovered are eventually documented within subsequent
database of CVE or Common Vulnerabilities and Exposures.
The most common types of cyber threats are denial of service attack, direct access
attacks, eavesdropping, phishing, spamming, multi vector attacks, polymorphic attacks, social
engineering attacks, privilege escalation, backdoor threat, spoofing, tampering and several
others. These risks are required to be mitigated with the help of cyber security3. The
following project paper outlines a brief discussion on threats as well as security measures of
cyber security within Sports medicine. Several solutions will be identified in this project
paper and an action plan will be provided for selected solution.
Problem Statement
The exchange of data could be specifically helpful for athletes in sports medicine for
the core purpose of preventing all types of hurts and even increment of enactment. However,
security susceptibilities as well nonexistence of security instructions eventually characterizes
1 Von Solms, Rossouw, and Johan Van Niekerk. "From information security to cyber security." computers &
security38 (2013): 97-102.
2 Wang, Wenye, and Zhuo Lu. "Cyber security in the smart grid: Survey and challenges." Computer
Networks 57, no. 5 (2013): 1344-1371.
3 Hahn, Adam, Aditya Ashok, Siddharth Sridhar, and Manimaran Govindarasu. "Cyber-physical security
testbeds: Architecture, application, and evaluation for smart grid." IEEE Transactions on Smart Grid 4, no. 2
(2013): 847-855.
CYBER SECURITY IN SPORTS MEDICINE
Introduction
Cyber security or computer security can be stated as protection of computerized
systems from any type of damage or theft to the respective software, electronic data and
hardware1. Moreover, misdirection and disruption of various services that are provided are
also checked with the help of cyber security. A major importance is provided to this cyber
security for incrementing reliance on computerized systems, wireless networks like Wireless
Fidelity and Bluetooth and even Internet connection2. The major and noteworthy
vulnerabilities, which are being discovered are eventually documented within subsequent
database of CVE or Common Vulnerabilities and Exposures.
The most common types of cyber threats are denial of service attack, direct access
attacks, eavesdropping, phishing, spamming, multi vector attacks, polymorphic attacks, social
engineering attacks, privilege escalation, backdoor threat, spoofing, tampering and several
others. These risks are required to be mitigated with the help of cyber security3. The
following project paper outlines a brief discussion on threats as well as security measures of
cyber security within Sports medicine. Several solutions will be identified in this project
paper and an action plan will be provided for selected solution.
Problem Statement
The exchange of data could be specifically helpful for athletes in sports medicine for
the core purpose of preventing all types of hurts and even increment of enactment. However,
security susceptibilities as well nonexistence of security instructions eventually characterizes
1 Von Solms, Rossouw, and Johan Van Niekerk. "From information security to cyber security." computers &
security38 (2013): 97-102.
2 Wang, Wenye, and Zhuo Lu. "Cyber security in the smart grid: Survey and challenges." Computer
Networks 57, no. 5 (2013): 1344-1371.
3 Hahn, Adam, Aditya Ashok, Siddharth Sridhar, and Manimaran Govindarasu. "Cyber-physical security
testbeds: Architecture, application, and evaluation for smart grid." IEEE Transactions on Smart Grid 4, no. 2
(2013): 847-855.
3
CYBER SECURITY IN SPORTS MEDICINE
a specified risk to the respective game players for their person security or privacy. Moreover
subsequent market that is surrounding game after proper inclusion of gambles on game
results, advertising contracts and ticket sales are also at stake. However, it is being noticed
that during real time data transfer, the entire procedure could allow an instant diagnoses and
hence is being utilized for criminal purposes by attackers.
Objectives
The few objectives for completing this project paper after proper exploration of data
breaches in sports medicine are as follows:
i) To explore the previous cases of data breaches of private sports related data.
ii) To analyse major ethical concerns as well as security risks for sports medicine.
iii) To provide suitable solutions to the sports organization regarding data transfer of
sports medicine.
iv) To provide action items for proper improvement of cyber security efforts in sports
organizations.
Literature Review Regarding the Problem
According to Amin et al.4, with an increment in frequency, the respective medical
devices or organizational databases have eventually become data driven as well as network
linked for the core purpose of providing accessible, current and reliable health related data or
information. For sports medicine, a proper exchange of data is extremely important for these
athletes for preventing against such injuries and hence improving overall athletic
performances. Due to higher risk of data getting stolen during data transfer, a proper security
4 Amin, Saurabh, Xavier Litrico, Shankar Sastry, and Alexandre M. Bayen. "Cyber security of water SCADA
systems—Part I: Analysis and experimentation of stealthy deception attacks." IEEE Transactions on Control
Systems Technology 21, no. 5 (2013): 1963-1970.
CYBER SECURITY IN SPORTS MEDICINE
a specified risk to the respective game players for their person security or privacy. Moreover
subsequent market that is surrounding game after proper inclusion of gambles on game
results, advertising contracts and ticket sales are also at stake. However, it is being noticed
that during real time data transfer, the entire procedure could allow an instant diagnoses and
hence is being utilized for criminal purposes by attackers.
Objectives
The few objectives for completing this project paper after proper exploration of data
breaches in sports medicine are as follows:
i) To explore the previous cases of data breaches of private sports related data.
ii) To analyse major ethical concerns as well as security risks for sports medicine.
iii) To provide suitable solutions to the sports organization regarding data transfer of
sports medicine.
iv) To provide action items for proper improvement of cyber security efforts in sports
organizations.
Literature Review Regarding the Problem
According to Amin et al.4, with an increment in frequency, the respective medical
devices or organizational databases have eventually become data driven as well as network
linked for the core purpose of providing accessible, current and reliable health related data or
information. For sports medicine, a proper exchange of data is extremely important for these
athletes for preventing against such injuries and hence improving overall athletic
performances. Due to higher risk of data getting stolen during data transfer, a proper security
4 Amin, Saurabh, Xavier Litrico, Shankar Sastry, and Alexandre M. Bayen. "Cyber security of water SCADA
systems—Part I: Analysis and experimentation of stealthy deception attacks." IEEE Transactions on Control
Systems Technology 21, no. 5 (2013): 1963-1970.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
4
CYBER SECURITY IN SPORTS MEDICINE
is quite mandatory to all of these resources and assets of sports organizations5. The attackers
could easily use confidential data for using them in criminal activities. Since, devices and
data have become more prevalent as well as useful, proper privacy and security is extremely
important for safety of athletes. Moreover, it is vital to continuously audit several data
systems and also monitoring potential breaches and then informing the parties regarding
rights or responsibilities for utilization and distribution of data. As per Ning, Liu and Yang 6
the proper utilization of the technologies is responsible for providing utmost benefits,
however risks and threats are also present in these technologies.
Probable Cyber Risks or Threats in Sports Medicine
The sports medicine or sports organization comprise of few of major and the most
significant cyber risks or threats that are extremely vulnerable for them and these are required
to be mitigated on time for avoiding all types of vulnerabilities or attacks. This type of
vulnerability is extremely weak for designing, implementation, internal controlling and
operations7. For proper security of computerized systems, it is extremely important for
understanding attacks, which could be made against attacks and all of the threats of sports
organizations are provided below:
i) Backdoor: The first important and significant cyber threat is backdoor. This
backdoor within computerized systems is an algorithm as well as a cryptosystem, which is
the secret methodology for bypassing the security controls and normal authentication.
Cherdantseva et al.8 stated that this backdoor might even exist for number of reasons after
5 Buczak, Anna L., and Erhan Guven. "A survey of data mining and machine learning methods for cyber
security intrusion detection." IEEE Communications Surveys & Tutorials 18, no. 2 (2016): 1153-1176.
6 Ning, Huansheng, Hong Liu, and Laurence Yang. "Cyber-entity security in the Internet of
things." Computer (2013): 1.
7 Elmaghraby, Adel S., and Michael M. Losavio. "Cyber security challenges in Smart Cities: Safety, security
and privacy." Journal of advanced research 5, no. 4 (2014): 491-497.
8 Cherdantseva, Yulia, Pete Burnap, Andrew Blyth, Peter Eden, Kevin Jones, Hugh Soulsby, and Kristan
Stoddart. "A review of cyber security risk assessment methods for SCADA systems." Computers & security 56
CYBER SECURITY IN SPORTS MEDICINE
is quite mandatory to all of these resources and assets of sports organizations5. The attackers
could easily use confidential data for using them in criminal activities. Since, devices and
data have become more prevalent as well as useful, proper privacy and security is extremely
important for safety of athletes. Moreover, it is vital to continuously audit several data
systems and also monitoring potential breaches and then informing the parties regarding
rights or responsibilities for utilization and distribution of data. As per Ning, Liu and Yang 6
the proper utilization of the technologies is responsible for providing utmost benefits,
however risks and threats are also present in these technologies.
Probable Cyber Risks or Threats in Sports Medicine
The sports medicine or sports organization comprise of few of major and the most
significant cyber risks or threats that are extremely vulnerable for them and these are required
to be mitigated on time for avoiding all types of vulnerabilities or attacks. This type of
vulnerability is extremely weak for designing, implementation, internal controlling and
operations7. For proper security of computerized systems, it is extremely important for
understanding attacks, which could be made against attacks and all of the threats of sports
organizations are provided below:
i) Backdoor: The first important and significant cyber threat is backdoor. This
backdoor within computerized systems is an algorithm as well as a cryptosystem, which is
the secret methodology for bypassing the security controls and normal authentication.
Cherdantseva et al.8 stated that this backdoor might even exist for number of reasons after
5 Buczak, Anna L., and Erhan Guven. "A survey of data mining and machine learning methods for cyber
security intrusion detection." IEEE Communications Surveys & Tutorials 18, no. 2 (2016): 1153-1176.
6 Ning, Huansheng, Hong Liu, and Laurence Yang. "Cyber-entity security in the Internet of
things." Computer (2013): 1.
7 Elmaghraby, Adel S., and Michael M. Losavio. "Cyber security challenges in Smart Cities: Safety, security
and privacy." Journal of advanced research 5, no. 4 (2014): 491-497.
8 Cherdantseva, Yulia, Pete Burnap, Andrew Blyth, Peter Eden, Kevin Jones, Hugh Soulsby, and Kristan
Stoddart. "A review of cyber security risk assessment methods for SCADA systems." Computers & security 56
5
CYBER SECURITY IN SPORTS MEDICINE
proper inclusion of original designing and from poor configuration. This type of attacks
might even be added by authenticated or authorized parties and hence allow few of legitimate
access or even by attackers for all types of malicious reasons. A significant vulnerability is
also created with this type of cyber threat.
ii) Denial of Service Attacks: The DoS or denial of service attack is designed for
making network resource or machine unavailable for intended or authorized users. The
attacks could deny the services to individual victims like deliberately entering erroneous or
wrong password for causing accounts of victims to get locked and also overloading major
abilities of network and machine, hence blocking authenticated users9. When network attack
from anyone IP address could be blocked by addition of firewall rules. This type of attack
could be extremely common for sports organization, since attacker might change IP address
and obtain data during data transfer.
iii) Direct Access Attacks: The third important and significant example of cyber threat
for sports organization is direct access attack. The attacker, who is obtaining physical access
to computer is extremely easier for directly copying of data10. These attacks might even
compromise with security by simply making modifications in respective operating system
and by proper installation of software worms or by utilizing wireless mice11. The disk
encryption is being designed for prevention against these attacks.
iv) Eavesdropping: Another vital and noteworthy cyber risk is eavesdropping. In this
type of attack, the attacker or hacker surreptitiously listens to any private conversation,
(2016): 1-27.
9 Sou, Kin Cheong, Henrik Sandberg, and Karl Henrik Johansson. "On the exact solution to a smart grid cyber-
security analysis problem." IEEE Transactions on Smart Grid4, no. 2 (2013): 856-865.
10 Craigen, Dan, Nadia Diakun-Thibault, and Randy Purse. "Defining cybersecurity." Technology Innovation
Management Review 4, no. 10 (2014).
11 Cavelty, Myriam Dunn. "Breaking the cyber-security dilemma: Aligning security needs and removing
vulnerabilities." Science and engineering ethics 20, no. 3 (2014): 701-715.
CYBER SECURITY IN SPORTS MEDICINE
proper inclusion of original designing and from poor configuration. This type of attacks
might even be added by authenticated or authorized parties and hence allow few of legitimate
access or even by attackers for all types of malicious reasons. A significant vulnerability is
also created with this type of cyber threat.
ii) Denial of Service Attacks: The DoS or denial of service attack is designed for
making network resource or machine unavailable for intended or authorized users. The
attacks could deny the services to individual victims like deliberately entering erroneous or
wrong password for causing accounts of victims to get locked and also overloading major
abilities of network and machine, hence blocking authenticated users9. When network attack
from anyone IP address could be blocked by addition of firewall rules. This type of attack
could be extremely common for sports organization, since attacker might change IP address
and obtain data during data transfer.
iii) Direct Access Attacks: The third important and significant example of cyber threat
for sports organization is direct access attack. The attacker, who is obtaining physical access
to computer is extremely easier for directly copying of data10. These attacks might even
compromise with security by simply making modifications in respective operating system
and by proper installation of software worms or by utilizing wireless mice11. The disk
encryption is being designed for prevention against these attacks.
iv) Eavesdropping: Another vital and noteworthy cyber risk is eavesdropping. In this
type of attack, the attacker or hacker surreptitiously listens to any private conversation,
(2016): 1-27.
9 Sou, Kin Cheong, Henrik Sandberg, and Karl Henrik Johansson. "On the exact solution to a smart grid cyber-
security analysis problem." IEEE Transactions on Smart Grid4, no. 2 (2013): 856-865.
10 Craigen, Dan, Nadia Diakun-Thibault, and Randy Purse. "Defining cybersecurity." Technology Innovation
Management Review 4, no. 10 (2014).
11 Cavelty, Myriam Dunn. "Breaking the cyber-security dilemma: Aligning security needs and removing
vulnerabilities." Science and engineering ethics 20, no. 3 (2014): 701-715.
6
CYBER SECURITY IN SPORTS MEDICINE
usually within the hosts of any network. Several programs are being utilized by the attackers
for eavesdropping over the systems of the Internet service providers12. Moreover, the
machines could even operate as the closed systems and hence could be easily eavesdropped
through the monitoring of electromagnetic transmissions that are being generated by
hardware.
v) Multi Vector Attacks: In the multi vector attack, the cyber criminals eventually
combine the range of several threats that are being implemented at the various stages and at
the several points of entry for infecting the networks and computers. This is a basic and
significant type of the distributed denial of service attacks.
vi) Polymorphic Attacks: The polymorphic virus is extremely harmful, intrusive and
destructive kind of malware, which could morph or change and hence makes it difficult for
detecting with the antimalware programs13. The subsequent evolution of the malicious codes
could also occur within the variety of ways like changing of filenames.
vii) Phishing: It is a fraudulent attempt of attacker for acquiring any type of
confidential or sensitive information like passwords or usernames directly from users. This
type of attack is generally carried out by email spoofing and instant messaging.
viii) Privilege Escalation: The next significant type of cyber threat for sports
organization is privilege escalation. It describes the subsequent situation, where any attacker
without authorization would elevate the privileges or access level. As per Noam and
12 Wells, Lee J., Jaime A. Camelio, Christopher B. Williams, and Jules White. "Cyber-physical security
challenges in manufacturing systems." Manufacturing Letters 2, no. 2 (2014): 74-77.
13 Sommestad, Teodor, Mathias Ekstedt, and Hannes Holm. "The cyber security modeling language: A tool for
assessing the vulnerability of enterprise system architectures." IEEE Systems Journal 7, no. 3 (2013): 363-373.
CYBER SECURITY IN SPORTS MEDICINE
usually within the hosts of any network. Several programs are being utilized by the attackers
for eavesdropping over the systems of the Internet service providers12. Moreover, the
machines could even operate as the closed systems and hence could be easily eavesdropped
through the monitoring of electromagnetic transmissions that are being generated by
hardware.
v) Multi Vector Attacks: In the multi vector attack, the cyber criminals eventually
combine the range of several threats that are being implemented at the various stages and at
the several points of entry for infecting the networks and computers. This is a basic and
significant type of the distributed denial of service attacks.
vi) Polymorphic Attacks: The polymorphic virus is extremely harmful, intrusive and
destructive kind of malware, which could morph or change and hence makes it difficult for
detecting with the antimalware programs13. The subsequent evolution of the malicious codes
could also occur within the variety of ways like changing of filenames.
vii) Phishing: It is a fraudulent attempt of attacker for acquiring any type of
confidential or sensitive information like passwords or usernames directly from users. This
type of attack is generally carried out by email spoofing and instant messaging.
viii) Privilege Escalation: The next significant type of cyber threat for sports
organization is privilege escalation. It describes the subsequent situation, where any attacker
without authorization would elevate the privileges or access level. As per Noam and
12 Wells, Lee J., Jaime A. Camelio, Christopher B. Williams, and Jules White. "Cyber-physical security
challenges in manufacturing systems." Manufacturing Letters 2, no. 2 (2014): 74-77.
13 Sommestad, Teodor, Mathias Ekstedt, and Hannes Holm. "The cyber security modeling language: A tool for
assessing the vulnerability of enterprise system architectures." IEEE Systems Journal 7, no. 3 (2013): 363-373.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
7
CYBER SECURITY IN SPORTS MEDICINE
Gonzalez14 standardized users have the significant ability of fooling system for providing
them subsequent access to restricted data.
ix) Social Engineering: The social engineering eventually aims in convincing the
user for disclosing the secrets like usernames or passwords. This type of attack is extremely
common during the relevant data transfer.
x) Spoofing: It is the specific act of masquerading as one of the valid entity by the
falsification of confidential data like IP address for the purpose of gaining access to resources
and information, which is unauthorized for obtaining15. Email spoofing and IP address
spoofing are the most common examples here.
Case Studies of Data Breaches in Private Sports Company
Several popular case studies are present for data breaches in sports organizations and
these case studies have taken place in all over the world. Amongst several security breaches,
two most popular and significant data breaches in sports industry regarding sports medicine
are as follows:
i) WADA Doping: According to Max16 the first popular case study of such
breaching is WADA doping. In September 2014, a Russian cyber espionage group called
Fancy Bear has hacked the WADA or World Anti Doping Agency. The hacking group
released private medical data as well as evidence for doping on their 41 Olympic athletes.
They have included three famous athletes of the US; who were Simone Biles, an Olympic
14 Ben-Asher, Noam, and Cleotilde Gonzalez. "Effects of cyber security knowledge on attack
detection." Computers in Human Behavior 48 (2015): 51-61.
15 Amin, Saurabh, Xavier Litrico, S. Shankar Sastry, and Alexandre M. Bayen. "Cyber security of water
SCADA systems—Part II: Attack detection using enhanced hydrodynamic models." IEEE Transactions on
Control Systems Technology 21, no. 5 (2013): 1679-1693.
16 Greenwald, Max. "Cybersecurity in Sports." (2017).
CYBER SECURITY IN SPORTS MEDICINE
Gonzalez14 standardized users have the significant ability of fooling system for providing
them subsequent access to restricted data.
ix) Social Engineering: The social engineering eventually aims in convincing the
user for disclosing the secrets like usernames or passwords. This type of attack is extremely
common during the relevant data transfer.
x) Spoofing: It is the specific act of masquerading as one of the valid entity by the
falsification of confidential data like IP address for the purpose of gaining access to resources
and information, which is unauthorized for obtaining15. Email spoofing and IP address
spoofing are the most common examples here.
Case Studies of Data Breaches in Private Sports Company
Several popular case studies are present for data breaches in sports organizations and
these case studies have taken place in all over the world. Amongst several security breaches,
two most popular and significant data breaches in sports industry regarding sports medicine
are as follows:
i) WADA Doping: According to Max16 the first popular case study of such
breaching is WADA doping. In September 2014, a Russian cyber espionage group called
Fancy Bear has hacked the WADA or World Anti Doping Agency. The hacking group
released private medical data as well as evidence for doping on their 41 Olympic athletes.
They have included three famous athletes of the US; who were Simone Biles, an Olympic
14 Ben-Asher, Noam, and Cleotilde Gonzalez. "Effects of cyber security knowledge on attack
detection." Computers in Human Behavior 48 (2015): 51-61.
15 Amin, Saurabh, Xavier Litrico, S. Shankar Sastry, and Alexandre M. Bayen. "Cyber security of water
SCADA systems—Part II: Attack detection using enhanced hydrodynamic models." IEEE Transactions on
Control Systems Technology 21, no. 5 (2013): 1679-1693.
16 Greenwald, Max. "Cybersecurity in Sports." (2017).
8
CYBER SECURITY IN SPORTS MEDICINE
gymnast and Tennis players Venus Williams and Serena17. This attack on the WADA was
considered as a spear phishing attack. It is extremely difficult for protecting against the flaws
in code. This type of doping is an unethical activity and it enhances use of banned athletic
performance enhancing drugs by the respective athletic competitors. Although, it is believed
that athletes get opportunity of increasing their strength; it is completely banned in every
sports. The sports hence became a victim of such activities for few of their athletes.
The typical spear phishing attack of this WADA doping comprises of the
unsuspecting user receiving email for looking legitimate and the user clicking on the link
within the email as well as entering the credentials over the WADA webpage18. This WADA
attack eventually targeted the employees and was termed as the potential retaliation against
the significant investigation in Russian doping for 2016 Olympic Games. The data that was
released comprised of the private information regarding athletes.
Big data is considered as the most relevant and important technology for eradicating
this issue. Due to several attributes of big data like velocity, volume, variety and veracity,
WADA doping could have been easily identified and performances would have been
improved through real time business analytics. Moreover, since this technology is responsible
for avoiding all types of preventable outbreaks. Hence, doping could have been reduced to a
high level.
ii) Houston Astros Hack: Max19 stated that the employees of St. Louis Cardinals have
broken into the computer network of Houston Astros in the year of 2013. These employees
have utilized the old password of the former general manager for breaking in. The database of
17 Luiijf, Eric, Kim Besseling, and Patrick De Graaf. "Nineteen national cyber security strategies." International
Journal of Critical Infrastructures 6 9, no. 1-2 (2013): 3-31.
18 Hong, Junho, Chen-Ching Liu, and Manimaran Govindarasu. "Integrated anomaly detection for cyber security
of the substations." IEEE Transactions on Smart Grid 5, no. 4 (2014): 1643-1653.
19 Greenwald, Max. "Cybersecurity in Sports." (2017).
CYBER SECURITY IN SPORTS MEDICINE
gymnast and Tennis players Venus Williams and Serena17. This attack on the WADA was
considered as a spear phishing attack. It is extremely difficult for protecting against the flaws
in code. This type of doping is an unethical activity and it enhances use of banned athletic
performance enhancing drugs by the respective athletic competitors. Although, it is believed
that athletes get opportunity of increasing their strength; it is completely banned in every
sports. The sports hence became a victim of such activities for few of their athletes.
The typical spear phishing attack of this WADA doping comprises of the
unsuspecting user receiving email for looking legitimate and the user clicking on the link
within the email as well as entering the credentials over the WADA webpage18. This WADA
attack eventually targeted the employees and was termed as the potential retaliation against
the significant investigation in Russian doping for 2016 Olympic Games. The data that was
released comprised of the private information regarding athletes.
Big data is considered as the most relevant and important technology for eradicating
this issue. Due to several attributes of big data like velocity, volume, variety and veracity,
WADA doping could have been easily identified and performances would have been
improved through real time business analytics. Moreover, since this technology is responsible
for avoiding all types of preventable outbreaks. Hence, doping could have been reduced to a
high level.
ii) Houston Astros Hack: Max19 stated that the employees of St. Louis Cardinals have
broken into the computer network of Houston Astros in the year of 2013. These employees
have utilized the old password of the former general manager for breaking in. The database of
17 Luiijf, Eric, Kim Besseling, and Patrick De Graaf. "Nineteen national cyber security strategies." International
Journal of Critical Infrastructures 6 9, no. 1-2 (2013): 3-31.
18 Hong, Junho, Chen-Ching Liu, and Manimaran Govindarasu. "Integrated anomaly detection for cyber security
of the substations." IEEE Transactions on Smart Grid 5, no. 4 (2014): 1643-1653.
19 Greenwald, Max. "Cybersecurity in Sports." (2017).
9
CYBER SECURITY IN SPORTS MEDICINE
Astros included discussions of internal trade, proprietary data of team statistics and players’
data. FBI has not subsequently disclosed the breach severity, however, this type of break in
was not found out for the number of months and hence the entire information system was
being stolen by the attackers20. Astros did not have any security in their database and this was
an important reason for such breaches. Furthermore, old passwords were also not changed
and employees got the scope for such data breaching. A proper security audit should have
been introduced by Astros, however, no such policy or audit was found.
This particular attack could have been restricted with the help of Internet of Things
technology. Since, IoT has distinct applications like wearables. Being a sports organization,
St. Louis Cardinals could have easily used IoT for their employees and hence only
authenticated users would get the chance to access data. Moreover, the attackers would not
get any chance for data breaching and data would be safe and secured.
Literature Review Regarding the Solution
The growth or development of the smart devices like smart phones, several smart
devices or smart televisions is another important reason for introducing cyber security within
any particular organization. These various devices are responsible for constitution of the
Internet of Things or IoT21. The most significant advantage of the cyber security is to manage
all types of vulnerabilities and attacks or threats. This vulnerability is stated as the weakness
in designing, implementation, internal control or operation.
The information security that is being designed for the subsequent maintenance of the
CIA or confidentiality, integrity as well as availability of data. Moreover, this information
20 Knowles, William, Daniel Prince, David Hutchison, Jules Ferdinand Pagna Disso, and Kevin Jones. "A survey
of cyber security management in industrial control systems." International journal of critical infrastructure
protection 9 (2015): 52-80.
21 Fielder, Andrew, Emmanouil Panaousis, Pasquale Malacaria, Chris Hankin, and Fabrizio Smeraldi. "Decision
support approaches for cyber security investment." Decision Support Systems 86 (2016): 13-23.
CYBER SECURITY IN SPORTS MEDICINE
Astros included discussions of internal trade, proprietary data of team statistics and players’
data. FBI has not subsequently disclosed the breach severity, however, this type of break in
was not found out for the number of months and hence the entire information system was
being stolen by the attackers20. Astros did not have any security in their database and this was
an important reason for such breaches. Furthermore, old passwords were also not changed
and employees got the scope for such data breaching. A proper security audit should have
been introduced by Astros, however, no such policy or audit was found.
This particular attack could have been restricted with the help of Internet of Things
technology. Since, IoT has distinct applications like wearables. Being a sports organization,
St. Louis Cardinals could have easily used IoT for their employees and hence only
authenticated users would get the chance to access data. Moreover, the attackers would not
get any chance for data breaching and data would be safe and secured.
Literature Review Regarding the Solution
The growth or development of the smart devices like smart phones, several smart
devices or smart televisions is another important reason for introducing cyber security within
any particular organization. These various devices are responsible for constitution of the
Internet of Things or IoT21. The most significant advantage of the cyber security is to manage
all types of vulnerabilities and attacks or threats. This vulnerability is stated as the weakness
in designing, implementation, internal control or operation.
The information security that is being designed for the subsequent maintenance of the
CIA or confidentiality, integrity as well as availability of data. Moreover, this information
20 Knowles, William, Daniel Prince, David Hutchison, Jules Ferdinand Pagna Disso, and Kevin Jones. "A survey
of cyber security management in industrial control systems." International journal of critical infrastructure
protection 9 (2015): 52-80.
21 Fielder, Andrew, Emmanouil Panaousis, Pasquale Malacaria, Chris Hankin, and Fabrizio Smeraldi. "Decision
support approaches for cyber security investment." Decision Support Systems 86 (2016): 13-23.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
10
CYBER SECURITY IN SPORTS MEDICINE
security is a basic subset of cyber security. The most significant elements of the cyber
security are application security, network security, end user education, information security,
operational security, business continuity planning or BCP and disaster recovery or DR
planning22. There is a constant evolving nature of the security risks and hence these risks are
required to be resolved with utmost efficiency and priority. Although, various threats and
risks are present for the sports organizations, some of the most significant and important
solutions could be implemented for the proper eradication of these attacks.
Using of Big Data
According to Maria and Sasse23 the recent several technological advances within the
sensors, computing and storage capacity have substantially produced huge amount of
information regarding athletes. Big data would be extremely effective and efficient for
removal of every identified risk or threat. The professional sports league could easily track as
well as store the player’s information. The data of player movement could be easily shared
with the help of big data and thus there is lesser chance of data getting hacked or lost 24.
Various sports organizations like NFL and MLB have started using this technology for
avoiding security breaches.
Internet of Things
The second effective solution that could be significant for data breaches in sports
organizations is IoT or internet of things. Since, this is the network of several devices, home
appliances and vehicles, which comprise of software, connectivity and actuators; it could be
22 Liu, Yang, Armin Sarabi, Jing Zhang, Parinaz Naghizadeh, Manish Karir, Michael Bailey, and Mingyan Liu.
"Cloudy with a Chance of Breach: Forecasting Cyber Security Incidents." In USENIX Security Symposium, pp.
1009-1024. 2015.
23 Bada, Maria, and Angela Sasse. "Cyber security awareness campaigns: Why do they fail to change
behaviour?." (2014).
24 Ashok, Aditya, Adam Hahn, and Manimaran Govindarasu. "Cyber-physical security of wide-area monitoring,
protection and control in a smart grid environment." Journal of advanced research 5, no. 4 (2014): 481-489.
CYBER SECURITY IN SPORTS MEDICINE
security is a basic subset of cyber security. The most significant elements of the cyber
security are application security, network security, end user education, information security,
operational security, business continuity planning or BCP and disaster recovery or DR
planning22. There is a constant evolving nature of the security risks and hence these risks are
required to be resolved with utmost efficiency and priority. Although, various threats and
risks are present for the sports organizations, some of the most significant and important
solutions could be implemented for the proper eradication of these attacks.
Using of Big Data
According to Maria and Sasse23 the recent several technological advances within the
sensors, computing and storage capacity have substantially produced huge amount of
information regarding athletes. Big data would be extremely effective and efficient for
removal of every identified risk or threat. The professional sports league could easily track as
well as store the player’s information. The data of player movement could be easily shared
with the help of big data and thus there is lesser chance of data getting hacked or lost 24.
Various sports organizations like NFL and MLB have started using this technology for
avoiding security breaches.
Internet of Things
The second effective solution that could be significant for data breaches in sports
organizations is IoT or internet of things. Since, this is the network of several devices, home
appliances and vehicles, which comprise of software, connectivity and actuators; it could be
22 Liu, Yang, Armin Sarabi, Jing Zhang, Parinaz Naghizadeh, Manish Karir, Michael Bailey, and Mingyan Liu.
"Cloudy with a Chance of Breach: Forecasting Cyber Security Incidents." In USENIX Security Symposium, pp.
1009-1024. 2015.
23 Bada, Maria, and Angela Sasse. "Cyber security awareness campaigns: Why do they fail to change
behaviour?." (2014).
24 Ashok, Aditya, Adam Hahn, and Manimaran Govindarasu. "Cyber-physical security of wide-area monitoring,
protection and control in a smart grid environment." Journal of advanced research 5, no. 4 (2014): 481-489.
11
CYBER SECURITY IN SPORTS MEDICINE
easily used by the sports organizations for avoiding any type of data breaching. The player
development and player safety are proper maintained with the applications of IoT and this is
done by the proper analysis of data that are being collected through the several devices.
Solutions
The two solutions that are extremely effective and efficient for the proper eradication
of the cyber security breaches for the sports medicine in sports organization are as follows:
i) Big Data: The big data are the collection of data sets, which are extremely large as
well as complicated for the traditional data processing application software25. The data
substantially offer higher statistical power and hence leads to the high falsified discovery rate.
The most significant challenges of this big data are storing of data, analysis of data, capturing
of data, searching, transferring, visualization, and sharing and information privacy. There are
three significant components of big data, which are velocity, variety and volume. The current
usability of the big data eventually refers to the proper utilization of user behaviour analytics
and predictive analytics26. The Radio Frequency Identification or RFID readers as well as the
wireless sensor network are being utilized within the system for obtaining major benefits.
Regarding the sports organizations, big data could be extremely effective for ceasing
any type of cyber threat or cyber-attack and hence the players’ data are protected. For the
case study of Astros Houston, the employees were responsible for stealing the passwords for
breaking into the system and gaining sports data27. However, if they would have implemented
the technology of big data, they would have been able to resolve and avoid this type of cyber
25 Abomhara, Mohamed, and Geir M. Køien. "Cyber security and the internet of things: vulnerabilities, threats,
intruders and attacks." Journal of Cyber Security 4, no. 1 (2015): 65-88.
26 Craigen, Dan, Nadia Diakun-Thibault, and Randy Purse. "Defining cybersecurity." Technology Innovation
Management Review 4, no. 10 (2014).
27 Von Solms, Rossouw, and Johan Van Niekerk. "From information security to cyber security." computers &
security38 (2013): 97-102.
CYBER SECURITY IN SPORTS MEDICINE
easily used by the sports organizations for avoiding any type of data breaching. The player
development and player safety are proper maintained with the applications of IoT and this is
done by the proper analysis of data that are being collected through the several devices.
Solutions
The two solutions that are extremely effective and efficient for the proper eradication
of the cyber security breaches for the sports medicine in sports organization are as follows:
i) Big Data: The big data are the collection of data sets, which are extremely large as
well as complicated for the traditional data processing application software25. The data
substantially offer higher statistical power and hence leads to the high falsified discovery rate.
The most significant challenges of this big data are storing of data, analysis of data, capturing
of data, searching, transferring, visualization, and sharing and information privacy. There are
three significant components of big data, which are velocity, variety and volume. The current
usability of the big data eventually refers to the proper utilization of user behaviour analytics
and predictive analytics26. The Radio Frequency Identification or RFID readers as well as the
wireless sensor network are being utilized within the system for obtaining major benefits.
Regarding the sports organizations, big data could be extremely effective for ceasing
any type of cyber threat or cyber-attack and hence the players’ data are protected. For the
case study of Astros Houston, the employees were responsible for stealing the passwords for
breaking into the system and gaining sports data27. However, if they would have implemented
the technology of big data, they would have been able to resolve and avoid this type of cyber
25 Abomhara, Mohamed, and Geir M. Køien. "Cyber security and the internet of things: vulnerabilities, threats,
intruders and attacks." Journal of Cyber Security 4, no. 1 (2015): 65-88.
26 Craigen, Dan, Nadia Diakun-Thibault, and Randy Purse. "Defining cybersecurity." Technology Innovation
Management Review 4, no. 10 (2014).
27 Von Solms, Rossouw, and Johan Van Niekerk. "From information security to cyber security." computers &
security38 (2013): 97-102.
12
CYBER SECURITY IN SPORTS MEDICINE
security effectively. Moreover, the applications like easy detection of cyber threats is easily
done with the help of big data. It is also effective for fraud detection.
ii) IoT: The internet of things is the subsequent system for interlinked computing
devices and digital machines for easily transferring the data. The human to human or the
human to computer interactions are checked with the help of this particular technology28. Due
to the presence of web enabled smart devices for using embedded processors and sensors for
secured collection, sending and acting on the data for acquiring from the relevant
environments.
The most suitable application of the internet of things for the sports organizations is
wearables. These types of devices are eventually installed and implemented with the sensors
or software that could collect the information and data regarding the users of sports
organizations. Since, they could broadly cover the fitness and health of the individuals; hence
doping is almost impossible with such IoT devices.
Action Plan for Implementing Chosen Solution
Amongst the solutions of big data and IoT, the most suitable solution for sports
organization is big data29. The action plan for the proper implementation of the big data
solution is given below:
Actions Efficiency Duration of the Action
1. Performing Daily It would be extremely efficient This particular action should
28 Hahn, Adam, Aditya Ashok, Siddharth Sridhar, and Manimaran Govindarasu. "Cyber-physical security
testbeds: Architecture, application, and evaluation for smart grid." IEEE Transactions on Smart Grid 4, no. 2
(2013): 847-855.
29 Cherdantseva, Yulia, Pete Burnap, Andrew Blyth, Peter Eden, Kevin Jones, Hugh Soulsby, and Kristan
Stoddart. "A review of cyber security risk assessment methods for SCADA systems." Computers & security 56
(2016): 1-27.
CYBER SECURITY IN SPORTS MEDICINE
security effectively. Moreover, the applications like easy detection of cyber threats is easily
done with the help of big data. It is also effective for fraud detection.
ii) IoT: The internet of things is the subsequent system for interlinked computing
devices and digital machines for easily transferring the data. The human to human or the
human to computer interactions are checked with the help of this particular technology28. Due
to the presence of web enabled smart devices for using embedded processors and sensors for
secured collection, sending and acting on the data for acquiring from the relevant
environments.
The most suitable application of the internet of things for the sports organizations is
wearables. These types of devices are eventually installed and implemented with the sensors
or software that could collect the information and data regarding the users of sports
organizations. Since, they could broadly cover the fitness and health of the individuals; hence
doping is almost impossible with such IoT devices.
Action Plan for Implementing Chosen Solution
Amongst the solutions of big data and IoT, the most suitable solution for sports
organization is big data29. The action plan for the proper implementation of the big data
solution is given below:
Actions Efficiency Duration of the Action
1. Performing Daily It would be extremely efficient This particular action should
28 Hahn, Adam, Aditya Ashok, Siddharth Sridhar, and Manimaran Govindarasu. "Cyber-physical security
testbeds: Architecture, application, and evaluation for smart grid." IEEE Transactions on Smart Grid 4, no. 2
(2013): 847-855.
29 Cherdantseva, Yulia, Pete Burnap, Andrew Blyth, Peter Eden, Kevin Jones, Hugh Soulsby, and Kristan
Stoddart. "A review of cyber security risk assessment methods for SCADA systems." Computers & security 56
(2016): 1-27.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
13
CYBER SECURITY IN SPORTS MEDICINE
Security Audits for the sports organization
since the regular security audits
could identify data breaches.
be implemented as soon as
the organization is starting.
2. Hiring Big Data Security
Professionals
It is quite efficient as these
security professionals would be
doing the security audits.
This particular action should
be implemented as soon as
the organization is working.
3. Ensuring Usability This particular action would
also ensure usability and
reliability and is quite efficient.
As soon as the big data is
being implemented, the
usability is being ensured.
Conclusion
Therefore, from the above discussion, it can be concluded that cyber security is stated
as the proper protection of various internet linked systems after the inclusion of software,
data and hardware from the cyber threats. Within the technological world, the security
eventually consists of the physical security as well as cyber security for helping the
organizations to protect against all type of unauthorized access to the data centres or
computerized systems. The major focus is provided to the resources and the components of
the crucial system for protecting against the most popular and known threats. There are
several types of cyber security threats, which are required to be mitigated for the welfare of
the organizational resources and relevant as well as confidential data or information. The
above project paper has clearly provided a brief discussion on the various types of threats and
security measures of cyber security for sports medicine. A proper exchange of data is
extremely helpful for the athletes to prevent all types of hurts and then increment the
enactment. Cyber security hence is quite important for the sports medicine and the above
provided project paper has clearly described the various threats that are common for the
CYBER SECURITY IN SPORTS MEDICINE
Security Audits for the sports organization
since the regular security audits
could identify data breaches.
be implemented as soon as
the organization is starting.
2. Hiring Big Data Security
Professionals
It is quite efficient as these
security professionals would be
doing the security audits.
This particular action should
be implemented as soon as
the organization is working.
3. Ensuring Usability This particular action would
also ensure usability and
reliability and is quite efficient.
As soon as the big data is
being implemented, the
usability is being ensured.
Conclusion
Therefore, from the above discussion, it can be concluded that cyber security is stated
as the proper protection of various internet linked systems after the inclusion of software,
data and hardware from the cyber threats. Within the technological world, the security
eventually consists of the physical security as well as cyber security for helping the
organizations to protect against all type of unauthorized access to the data centres or
computerized systems. The major focus is provided to the resources and the components of
the crucial system for protecting against the most popular and known threats. There are
several types of cyber security threats, which are required to be mitigated for the welfare of
the organizational resources and relevant as well as confidential data or information. The
above project paper has clearly provided a brief discussion on the various types of threats and
security measures of cyber security for sports medicine. A proper exchange of data is
extremely helpful for the athletes to prevent all types of hurts and then increment the
enactment. Cyber security hence is quite important for the sports medicine and the above
provided project paper has clearly described the various threats that are common for the
14
CYBER SECURITY IN SPORTS MEDICINE
sports medicine. Moreover, probable solutions are also provided here with an action plan for
the suitable solution.
CYBER SECURITY IN SPORTS MEDICINE
sports medicine. Moreover, probable solutions are also provided here with an action plan for
the suitable solution.
15
CYBER SECURITY IN SPORTS MEDICINE
References
Abomhara, Mohamed, and Geir M. Køien. "Cyber security and the internet of things:
vulnerabilities, threats, intruders and attacks." Journal of Cyber Security 4, no. 1 (2015): 65-
88.
Amin, Saurabh, Xavier Litrico, S. Shankar Sastry, and Alexandre M. Bayen. "Cyber security
of water SCADA systems—Part II: Attack detection using enhanced hydrodynamic
models." IEEE Transactions on Control Systems Technology 21, no. 5 (2013): 1679-1693.
Amin, Saurabh, Xavier Litrico, Shankar Sastry, and Alexandre M. Bayen. "Cyber security of
water SCADA systems—Part I: Analysis and experimentation of stealthy deception
attacks." IEEE Transactions on Control Systems Technology 21, no. 5 (2013): 1963-1970.
Ashok, Aditya, Adam Hahn, and Manimaran Govindarasu. "Cyber-physical security of wide-
area monitoring, protection and control in a smart grid environment." Journal of advanced
research 5, no. 4 (2014): 481-489.
Bada, Maria, and Angela Sasse. "Cyber security awareness campaigns: Why do they fail to
change behaviour?." (2014).
Ben-Asher, Noam, and Cleotilde Gonzalez. "Effects of cyber security knowledge on attack
detection." Computers in Human Behavior 48 (2015): 51-61.
Buczak, Anna L., and Erhan Guven. "A survey of data mining and machine learning methods
for cyber security intrusion detection." IEEE Communications Surveys & Tutorials 18, no. 2
(2016): 1153-1176.
Cavelty, Myriam Dunn. "Breaking the cyber-security dilemma: Aligning security needs and
removing vulnerabilities." Science and engineering ethics 20, no. 3 (2014): 701-715.
CYBER SECURITY IN SPORTS MEDICINE
References
Abomhara, Mohamed, and Geir M. Køien. "Cyber security and the internet of things:
vulnerabilities, threats, intruders and attacks." Journal of Cyber Security 4, no. 1 (2015): 65-
88.
Amin, Saurabh, Xavier Litrico, S. Shankar Sastry, and Alexandre M. Bayen. "Cyber security
of water SCADA systems—Part II: Attack detection using enhanced hydrodynamic
models." IEEE Transactions on Control Systems Technology 21, no. 5 (2013): 1679-1693.
Amin, Saurabh, Xavier Litrico, Shankar Sastry, and Alexandre M. Bayen. "Cyber security of
water SCADA systems—Part I: Analysis and experimentation of stealthy deception
attacks." IEEE Transactions on Control Systems Technology 21, no. 5 (2013): 1963-1970.
Ashok, Aditya, Adam Hahn, and Manimaran Govindarasu. "Cyber-physical security of wide-
area monitoring, protection and control in a smart grid environment." Journal of advanced
research 5, no. 4 (2014): 481-489.
Bada, Maria, and Angela Sasse. "Cyber security awareness campaigns: Why do they fail to
change behaviour?." (2014).
Ben-Asher, Noam, and Cleotilde Gonzalez. "Effects of cyber security knowledge on attack
detection." Computers in Human Behavior 48 (2015): 51-61.
Buczak, Anna L., and Erhan Guven. "A survey of data mining and machine learning methods
for cyber security intrusion detection." IEEE Communications Surveys & Tutorials 18, no. 2
(2016): 1153-1176.
Cavelty, Myriam Dunn. "Breaking the cyber-security dilemma: Aligning security needs and
removing vulnerabilities." Science and engineering ethics 20, no. 3 (2014): 701-715.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
16
CYBER SECURITY IN SPORTS MEDICINE
Cherdantseva, Yulia, Pete Burnap, Andrew Blyth, Peter Eden, Kevin Jones, Hugh Soulsby,
and Kristan Stoddart. "A review of cyber security risk assessment methods for SCADA
systems." Computers & security 56 (2016): 1-27.
Craigen, Dan, Nadia Diakun-Thibault, and Randy Purse. "Defining
cybersecurity." Technology Innovation Management Review 4, no. 10 (2014).
Elmaghraby, Adel S., and Michael M. Losavio. "Cyber security challenges in Smart Cities:
Safety, security and privacy." Journal of advanced research 5, no. 4 (2014): 491-497.
Fielder, Andrew, Emmanouil Panaousis, Pasquale Malacaria, Chris Hankin, and Fabrizio
Smeraldi. "Decision support approaches for cyber security investment." Decision Support
Systems 86 (2016): 13-23.
Greenwald, Max. "Cybersecurity in Sports." (2017).
Hahn, Adam, Aditya Ashok, Siddharth Sridhar, and Manimaran Govindarasu. "Cyber-
physical security testbeds: Architecture, application, and evaluation for smart grid." IEEE
Transactions on Smart Grid 4, no. 2 (2013): 847-855.
Hong, Junho, Chen-Ching Liu, and Manimaran Govindarasu. "Integrated anomaly detection
for cyber security of the substations." IEEE Transactions on Smart Grid 5, no. 4 (2014):
1643-1653.
Knowles, William, Daniel Prince, David Hutchison, Jules Ferdinand Pagna Disso, and Kevin
Jones. "A survey of cyber security management in industrial control systems." International
journal of critical infrastructure protection 9 (2015): 52-80.
Liu, Yang, Armin Sarabi, Jing Zhang, Parinaz Naghizadeh, Manish Karir, Michael Bailey,
and Mingyan Liu. "Cloudy with a Chance of Breach: Forecasting Cyber Security Incidents."
In USENIX Security Symposium, pp. 1009-1024. 2015.
CYBER SECURITY IN SPORTS MEDICINE
Cherdantseva, Yulia, Pete Burnap, Andrew Blyth, Peter Eden, Kevin Jones, Hugh Soulsby,
and Kristan Stoddart. "A review of cyber security risk assessment methods for SCADA
systems." Computers & security 56 (2016): 1-27.
Craigen, Dan, Nadia Diakun-Thibault, and Randy Purse. "Defining
cybersecurity." Technology Innovation Management Review 4, no. 10 (2014).
Elmaghraby, Adel S., and Michael M. Losavio. "Cyber security challenges in Smart Cities:
Safety, security and privacy." Journal of advanced research 5, no. 4 (2014): 491-497.
Fielder, Andrew, Emmanouil Panaousis, Pasquale Malacaria, Chris Hankin, and Fabrizio
Smeraldi. "Decision support approaches for cyber security investment." Decision Support
Systems 86 (2016): 13-23.
Greenwald, Max. "Cybersecurity in Sports." (2017).
Hahn, Adam, Aditya Ashok, Siddharth Sridhar, and Manimaran Govindarasu. "Cyber-
physical security testbeds: Architecture, application, and evaluation for smart grid." IEEE
Transactions on Smart Grid 4, no. 2 (2013): 847-855.
Hong, Junho, Chen-Ching Liu, and Manimaran Govindarasu. "Integrated anomaly detection
for cyber security of the substations." IEEE Transactions on Smart Grid 5, no. 4 (2014):
1643-1653.
Knowles, William, Daniel Prince, David Hutchison, Jules Ferdinand Pagna Disso, and Kevin
Jones. "A survey of cyber security management in industrial control systems." International
journal of critical infrastructure protection 9 (2015): 52-80.
Liu, Yang, Armin Sarabi, Jing Zhang, Parinaz Naghizadeh, Manish Karir, Michael Bailey,
and Mingyan Liu. "Cloudy with a Chance of Breach: Forecasting Cyber Security Incidents."
In USENIX Security Symposium, pp. 1009-1024. 2015.
17
CYBER SECURITY IN SPORTS MEDICINE
Luiijf, Eric, Kim Besseling, and Patrick De Graaf. "Nineteen national cyber security
strategies." International Journal of Critical Infrastructures 6 9, no. 1-2 (2013): 3-31.
Ning, Huansheng, Hong Liu, and Laurence Yang. "Cyber-entity security in the Internet of
things." Computer (2013): 1.
Sommestad, Teodor, Mathias Ekstedt, and Hannes Holm. "The cyber security modeling
language: A tool for assessing the vulnerability of enterprise system architectures." IEEE
Systems Journal 7, no. 3 (2013): 363-373.
Sou, Kin Cheong, Henrik Sandberg, and Karl Henrik Johansson. "On the exact solution to a
smart grid cyber-security analysis problem." IEEE Transactions on Smart Grid4, no. 2
(2013): 856-865.
Von Solms, Rossouw, and Johan Van Niekerk. "From information security to cyber
security." computers & security38 (2013): 97-102.
Wang, Wenye, and Zhuo Lu. "Cyber security in the smart grid: Survey and
challenges." Computer Networks 57, no. 5 (2013): 1344-1371.
Wells, Lee J., Jaime A. Camelio, Christopher B. Williams, and Jules White. "Cyber-physical
security challenges in manufacturing systems." Manufacturing Letters 2, no. 2 (2014): 74-77.
CYBER SECURITY IN SPORTS MEDICINE
Luiijf, Eric, Kim Besseling, and Patrick De Graaf. "Nineteen national cyber security
strategies." International Journal of Critical Infrastructures 6 9, no. 1-2 (2013): 3-31.
Ning, Huansheng, Hong Liu, and Laurence Yang. "Cyber-entity security in the Internet of
things." Computer (2013): 1.
Sommestad, Teodor, Mathias Ekstedt, and Hannes Holm. "The cyber security modeling
language: A tool for assessing the vulnerability of enterprise system architectures." IEEE
Systems Journal 7, no. 3 (2013): 363-373.
Sou, Kin Cheong, Henrik Sandberg, and Karl Henrik Johansson. "On the exact solution to a
smart grid cyber-security analysis problem." IEEE Transactions on Smart Grid4, no. 2
(2013): 856-865.
Von Solms, Rossouw, and Johan Van Niekerk. "From information security to cyber
security." computers & security38 (2013): 97-102.
Wang, Wenye, and Zhuo Lu. "Cyber security in the smart grid: Survey and
challenges." Computer Networks 57, no. 5 (2013): 1344-1371.
Wells, Lee J., Jaime A. Camelio, Christopher B. Williams, and Jules White. "Cyber-physical
security challenges in manufacturing systems." Manufacturing Letters 2, no. 2 (2014): 74-77.
1 out of 18
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
 +13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024  |  Zucol Services PVT LTD  |  All rights reserved.