Distributed Energy Resources (DERs), such as solar photovoltaic (PV) systems, wind turbines, and energy storage systems, offer many benefits, including increased energy efficiency, sustainability, and grid reliability. However, their integration into the smart grid also introduces new vulnerabilities to cyber threats. The smart grid is becoming more digitalized, with advanced technologies like Internet of Things (IoT) devices, communication networks, and automation systems that enable the integration of DER systems. While this enhances grid efficiency and control, it creates more entry points for attackers and thus expands the attack surface for potential cyber threats. Protecting DERs from cyberattacks is crucial to maintaining the overall reliability, security, and privacy of the smart grid. The adopted cybersecurity strategies should not only address current threats but also anticipate future dangers. This requires ongoing risk assessments, staying updated on emerging threats, and being prepared to adapt cybersecurity measures accordingly. This paper highlights some critical points regarding the importance of cybersecurity for Distributed Energy Resources (DERs) and the evolving landscape of the smart grid. This research study shows that there is need for a proactive and adaptable cybersecurity approach that encompasses prevention, detection, response, and recovery to safeguard these critical energy systems against cyber threats, both today and in the future. This work serves as a valuable tool in enhancing the cybersecurity posture of utilities and grid-connected DER owners and operators. It allows them to make informed decisions, protect critical infrastructure, and ensure the reliability and security of grid-connected DER systems in an evolving energy landscape.
The rapid expansion of smart cities has led to the widespread deployment of Internet of Things (IoT) devices for real-time data collection and urban optimization. However, these interconnected systems face critical cybersecurity risks, including data tampering, unauthorized access, and privacy breaches. This paper proposes a blockchain-based framework designed to enhance the security, integrity, and resilience of IoT data in smart city environments. Leveraging a private blockchain, the system ensures decentralized, tamper-proof data storage, and transaction verification through digital signatures and a lightweight Proof of Work consensus mechanism. Smart contracts are employed to automate access control and respond to anomalies in real time. A Python-based simulation demonstrates the framework’s effectiveness in securing IoT communications. The system supports rapid transaction validation with minimal latency and enables timely detection of anomalous patterns through integrated machine learning. Evaluations show that the framework maintains consistent performance across diverse smart city components such as transportation, healthcare, and building security. These results highlight the potential of the proposed solution to enable secure, scalable, and real-time IoT ecosystems for modern urban infrastructures.
The study is focusing on cyberspace—a new type of space mastered by humans with the help of digital technologies. This systematic review uses SPAR-4-SLR protocol to analyze over 30 years of scholarly research indexed in Scopus database, highlighting five time periods: before 1995, 1996–2008, 2009–2012, 2013–2019, and after 2020. A final sample of 6645 publications in social sciences, Business, management and accounting (BMA), and Economics, econometrics and finance (EEF) was analyzed across multiple parameters, including: chronology, types of documents, sources, countries, institutions, authors, topics, and most cited publications. The review has systematized information about the most influential organizations and individuals involved in cyberspace research. First of all, these are researchers from the United States, the United Kingdom, and China. Key journals that publish research on the topic have been identified, and a ranked list of funding organizations supporting research on the social and economic aspects of cyberspace are identified. The study provides insights into the achievements of the social and economic sciences in cyberspace over the past 30 years. The results will be useful to scholars who seek for a general overview on the topic of cyberspace, as well as experts and policymakers developing mechanisms and tools for regulating cyberspace as a mixture of the virtual and real worlds.
The technological infrastructure is the basis for the successful implementation and operation of information systems in small and medium enterprises. The study aimed to demonstrate the impact of cybersecurity on entrepreneurship strategies in small and medium enterprises. Through technological infrastructure in Balqa Governorate. The study population consisted of small and medium enterprises in Balqa Governorate in Jordan. The study followed the descriptive analytical approach and relied on the questionnaire to collect data. The sample size was 360 individuals were randomly select. The Statistical Package for Social Sciences (SPSS) was use to analyze the data. The study reached a set of results, including that the management of small and medium enterprises is committed to continuous supervision and control of customer information. Dealing with reliable parties to ensure the confidentiality of information, following strict standards for disclosure and circulation of customer data and information based on legal texts. Maintaining the privacy of customers’ financial data, in addition to supporting the successes of individuals based on the personal efforts of employees, providing a suitable work environment for employees, sustaining excellence and achievement, and working to increase awareness among its employees of the importance of innovation and creativity in work. The study recommended that customer data confidentiality should be consider a top priority for small and medium enterprises. The data should be stored in more than one place at the same time, that project websites should follow a privacy policy, and that the customer’s identity should be verify before submitting his data and documents, by involving employees in small and medium enterprises in specialized courses and workshops to demonstrate the importance of data and information confidentiality.
The growing interconnectedness of the world has led to a rise in cybersecurity risks. Although it is increasingly conventional to use technology to assist business transactions, exposure to these risks must be minimised to allow business owners to do transactions in a secure manner. While a wide range of studies have been undertaken regarding the effects of cyberattacks on several industries and sectors, However, very few studies have focused on the effects of cyberattacks on the educational sector, specifically higher educational institutions (HEIs) in West Africa. Consequently, this study developed a survey and distributed it to HEIs particularly universities in West Africa to examine the data architectures they employed, the cyberattacks they encountered during the COVID-19 pandemic period, and the role of data analysis in decision-making, as well as the countermeasures employed in identifying and preventing cyberattacks. A total of one thousand, one hundred and sixty-four (1164) responses were received from ninety-three (93) HEIs and analysed. According to the study’s findings, data-informed architecture was adopted by 71.8% of HEIs, data-driven architecture by 24.1%, and data-centric architecture by 4.1%, all of which were vulnerable to cyberattacks. In addition, there are further concerns around data analysis techniques, staff training gaps, and countermeasures for cyberattacks. The study’s conclusion includes suggestions for future research topics and recommendations for repelling cyberattacks in HEIs.
The proposed research work encompasses implications for infrastructure particularly the cybersecurity as an essential in soft infrastructure, and policy making particularly on secure access management of infrastructure governance. In this study, we introduce a novel parameter focusing on the timestamp duration of password entry, enhancing the algorithm titled EPSBalgorithmv01 with seven parameters. The proposed parameter incorporates an analysis of the historical time spent by users entering their passwords, employing ARIMA for processing. To assess the efficacy of the updated algorithm, we developed a simulator and employed a multi-experimental approach. The evaluation utilized a test dataset comprising 617 authentic records from 111 individuals within a selected company spanning from 2017 to 2022. Our findings reveal significant advancements in EPSBalgorithmv01 compared to its predecessor namely EPSBalgorithmv00. While EPSBalgorithmv00 struggled with a recognition rate of 28.00% and a precision of 71.171, EPSBalgorithmv01 exhibited a recognition rate of 17% with a precision of 82.882%. Despite a decrease in recognition rate, EPSBalgorithmv01 demonstrates a notable improvement of approximately 14% over EPSBalgorithmv00.
Copyright © by EnPress Publisher. All rights reserved.