About Cabling Installation & Maintenance

Our mission: Bringing practical business and technical intelligence to today's structured cabling professionals

For more than 30 years, Cabling Installation & Maintenance has provided useful, practical information to professionals responsible for the specification, design, installation and management of structured cabling systems serving enterprise, data center and other environments. These professionals are challenged to stay informed of constantly evolving standards, system-design and installation approaches, product and system capabilities, technologies, as well as applications that rely on high-performance structured cabling systems. Our editors synthesize these complex issues into multiple information products. This portfolio of information products provides concrete detail that improves the efficiency of day-to-day operations, and equips cabling professionals with the perspective that enables strategic planning for networks’ optimum long-term performance.

Throughout our annual magazine, weekly email newsletters and 24/7/365 website, Cabling Installation & Maintenance digs into the essential topics our audience focuses on.

  • Design, Installation and Testing: We explain the bottom-up design of cabling systems, from case histories of actual projects to solutions for specific problems or aspects of the design process. We also look at specific installations using a case-history approach to highlight challenging problems, solutions and unique features. Additionally, we examine evolving test-and-measurement technologies and techniques designed to address the standards-governed and practical-use performance requirements of cabling systems.
  • Technology: We evaluate product innovations and technology trends as they impact a particular product class through interviews with manufacturers, installers and users, as well as contributed articles from subject-matter experts.
  • Data Center: Cabling Installation & Maintenance takes an in-depth look at design and installation workmanship issues as well as the unique technology being deployed specifically for data centers.
  • Physical Security: Focusing on the areas in which security and IT—and the infrastructure for both—interlock and overlap, we pay specific attention to Internet Protocol’s influence over the development of security applications.
  • Standards: Tracking the activities of North American and international standards-making organizations, we provide updates on specifications that are in-progress, looking forward to how they will affect cabling-system design and installation. We also produce articles explaining the practical aspects of designing and installing cabling systems in accordance with the specifications of established standards.

Cabling Installation & Maintenance is published by Endeavor Business Media, a division of EndeavorB2B.

Contact Cabling Installation & Maintenance

Editorial

Patrick McLaughlin

Serena Aburahma

Advertising and Sponsorship Sales

Peter Fretty - Vice President, Market Leader

Tim Carli - Business Development Manager

Brayden Hudspeth - Sales Development Representative

Subscriptions and Memberships

Subscribe to our newsletters and manage your subscriptions

Feedback/Problems

Send a message to our general in-box

 

Tam Nguyen, CISSP Announces New Research Paper: 'Toward Human Digital Twins for Cybersecurity Simulations on the Metaverse'

Published by JMIR Publications in JMIRx Med

Visualization of Cybonto
Visualization of Cybonto

A visualization of the Cybonto core ontology, reflecting the complexities of future Human Digital Twins' cognitive systems.

TUCSON, Ariz. - May 5, 2022 - (Newswire.com)

Tam Nguyen, CISSP and a research fellow at the University of Arizona, has published a new research paper in JMIR Publications: "Toward Human Digital Twins for Cybersecurity Simulations on the Metaverse: Ontological and Network Science Approach".

Technological revolution has familiarized the world with a new concept: the Metaverse. The Metaverse is a massive unified digital realm created from virtual and augmented reality, blockchain, social networks, cloud infrastructure, 3D networks etc. simulating the real world. With this growing digital universe, cybersecurity becomes even more important. Currently, cyber-defense strategies are still reactive and slow; while it usually takes just 15 hours for hackers to break through the defense, defenders take 200-300 days to discover a breach. In his paper, Nguyen suggests expanding the scope of Digital Twins (DTs) and Human Digital Twins (HDTs) in the Metaverse for cybersecurity defense purposes.

DTs are virtual models designed to accurately reflect physical objects like routers, servers, IoT systems. HDTs are a specialized form of DTs which can act as system users, system admins, and malicious agents. Because HDTs are completely autonomous, they can interact with other HDTs and DTs. Therefore, complex cybersecurity simulations can be played out in secured sections of the Metaverse. The key is building realistic Human Digital Twins that can think and act like real hackers/defenders.

Nguyen's recently published paper in JMIR presents a conceptual framework for running massive cybersecurity simulations on the Metaverse with HDTs. The framework relies on a novel cybersecurity behavioral ontology or 'Cybonto', which aims to enhance Human Digital Twins' cognitive systems. At the core of Cybonto, it is a collection of 108 psychology constructs and thousands of related paths based on 20 time-tested psychology theories. HDT design teams can implement Cybonto so that their HDTs can realistically mimic the thought processes and behaviors of system users, system admins, and even malicious agents. Challenging cybersecurity scenarios may then be simulated 24/7 on secured sections of the Metaverse. Simulated results may offer insights into the complex interdependent networks of systems, users, admins, and hackers. Such insights will lead to more proactive and more effective cybersecurity strategies.

Cybonto is versatile. It can be used for other purposes such as manually analyzing hackers' behaviors, and automatic analysis of behavioral-cybersecurity knowledge texts. Cybonto can also find uses beyond cybersecurity in the medical field for applied psychology training, automatic analysis of electronic health records, and virtual community psychology experiments. 

Nguyen is open to further discussions at tamn@email.arizona.edu.




Press Release Service by Newswire.com

Original Source: Tam Nguyen, CISSP Announces New Research Paper: 'Toward Human Digital Twins for Cybersecurity Simulations on the Metaverse'
Stock Quote API & Stock News API supplied by www.cloudquote.io
Quotes delayed at least 20 minutes.
By accessing this page, you agree to the following
Privacy Policy and Terms Of Service.