期刊文献+
共找到12篇文章
< 1 >
每页显示 20 50 100
Cyber Resilience through Real-Time Threat Analysis in Information Security
1
作者 Aparna Gadhi Ragha Madhavi Gondu +1 位作者 Hitendra Chaudhary Olatunde Abiona 《International Journal of Communications, Network and System Sciences》 2024年第4期51-67,共17页
This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends t... This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends that they are not the same. The concept of cyber security is explored, which goes beyond protecting information resources to include a wider variety of assets, including people [1]. Protecting information assets is the main goal of traditional information security, with consideration to the human element and how people fit into the security process. On the other hand, cyber security adds a new level of complexity, as people might unintentionally contribute to or become targets of cyberattacks. This aspect presents moral questions since it is becoming more widely accepted that society has a duty to protect weaker members of society, including children [1]. The study emphasizes how important cyber security is on a larger scale, with many countries creating plans and laws to counteract cyberattacks. Nevertheless, a lot of these sources frequently neglect to define the differences or the relationship between information security and cyber security [1]. The paper focus on differentiating between cybersecurity and information security on a larger scale. The study also highlights other areas of cybersecurity which includes defending people, social norms, and vital infrastructure from threats that arise from online in addition to information and technology protection. It contends that ethical issues and the human factor are becoming more and more important in protecting assets in the digital age, and that cyber security is a paradigm shift in this regard [1]. 展开更多
关键词 Cybersecurity Information Security Network Security Cyber Resilience Real-Time Threat Analysis Cyber Threats Cyberattacks Threat Intelligence Machine Learning Artificial Intelligence Threat Detection Threat Mitigation Risk Assessment Vulnerability Management Incident Response Security Orchestration Automation Threat Landscape Cyber-Physical Systems Critical Infrastructure Data Protection Privacy Compliance Regulations Policy Ethics CYBERCRIME Threat Actors Threat Modeling Security Architecture
下载PDF
Enhancing Police Officers’ Cybercrime Investigation Skills Using a Checklist Tool
2
作者 Abdelkhalek Ibrahim Alastal Ashraf Hassan Shaqfa 《Journal of Data Analysis and Information Processing》 2023年第2期121-143,共23页
This paper addressed the current state of police officers’ capabilities, skills, and their readiness to deal with the developments of cybercrime. This study discussed definition of cybercrime, cybercrime categories a... This paper addressed the current state of police officers’ capabilities, skills, and their readiness to deal with the developments of cybercrime. This study discussed definition of cybercrime, cybercrime categories as well as comparison between traditional criminal techniques and cybercrime. As the abilities and skills required for detectives to investigate cybercrime have been discussed. Additionally, literature review and related work, was addressed challenges role of the police in combating cybercrime and facing cybercrime policing. We proposed the main tool in the study which is “Checklist of essential skills for a cybercrime investigator”. Thus, to gain the ability to Identify technical and practical requirements in terms of skills, programs, and equipment to achieve effective and professional results in fight cybercrimes. 展开更多
关键词 cybercrimes Cyber Security Digital Forensic Police Officer SKILLS CHECKLIST
下载PDF
Optimal Weighted Extreme Learning Machine for Cybersecurity Fake News Classification
3
作者 Ashit Kumar Dutta Basit Qureshi +3 位作者 Yasser Albagory Majed Alsanea Manal Al Faraj Abdul Rahaman Wahab Sait 《Computer Systems Science & Engineering》 SCIE EI 2023年第3期2395-2409,共15页
Fake news and its significance carried the significance of affecting diverse aspects of diverse entities,ranging from a city lifestyle to a country global relativity,various methods are available to collect and determ... Fake news and its significance carried the significance of affecting diverse aspects of diverse entities,ranging from a city lifestyle to a country global relativity,various methods are available to collect and determine fake news.The recently developed machine learning(ML)models can be employed for the detection and classification of fake news.This study designs a novel Chaotic Ant Swarm with Weighted Extreme Learning Machine(CAS-WELM)for Cybersecurity Fake News Detection and Classification.The goal of the CAS-WELM technique is to discriminate news into fake and real.The CAS-WELM technique initially pre-processes the input data and Glove technique is used for word embed-ding process.Then,N-gram based feature extraction technique is derived to gen-erate feature vectors.Lastly,WELM model is applied for the detection and classification of fake news,in which the weight value of the WELM model can be optimally adjusted by the use of CAS algorithm.The performance validation of the CAS-WELM technique is carried out using the benchmark dataset and the results are inspected under several dimensions.The experimental results reported the enhanced outcomes of the CAS-WELM technique over the recent approaches. 展开更多
关键词 CYBERSECURITY CYBERCRIME fake news data classification machine learning metaheuristics
下载PDF
A Study on the Existing Cybersecurity Policies and Strategies in Combating Increased Cybercrime in Zambia
4
作者 Gerry Mutibo Siampondo Bwalya Chansa 《Journal of Information Security》 2023年第4期294-303,共10页
The incidence of cybercrime in Zambia is rising, with perpetrators exhibiting a growing tendency to focus on corporate entities and private citizens. The Zambian government has tried to resolve the issue of network pr... The incidence of cybercrime in Zambia is rising, with perpetrators exhibiting a growing tendency to focus on corporate entities and private citizens. The Zambian government has tried to resolve the issue of network protection dangers through the execution of different approaches and procedures. Notwithstanding, the adequacy of these actions has been restricted. The present research investigates Zambia’s extant cybersecurity policies and strategies and delineates several domains where enhancements can be made. The research provides several suggestions on how the Zambian government can enhance its efforts to address cybercrime. This research employs a qualitative approach to investigate the extent of cybersecurity policies and strategies in Zambia by analyzing secondary data. The study seeks to offer valuable insights into the efficacy of Zambia’s cybersecurity framework in addressing the escalating menace of cybercrime by scrutinizing pertinent literature, government reports, and academic articles. The results of this study provide valuable insights into the difficulties encountered by the nation and propose suggestions for improving current policies and strategies. 展开更多
关键词 CYBERSECURITY CYBERCRIME Zambia POLICIES STRATEGIES Qualitative Analysis Secondary Data
下载PDF
Cybersecurity and Domestic Terrorism: Purpose and Future
5
作者 Robb Shawe Ian R. McAndrew 《Journal of Software Engineering and Applications》 2023年第10期548-560,共13页
The increasing utilization of digital technologies presents risks to critical systems due to exploitation by terrorists. Cybersecurity entails proactive and reactive measures designed to protect software and electroni... The increasing utilization of digital technologies presents risks to critical systems due to exploitation by terrorists. Cybersecurity entails proactive and reactive measures designed to protect software and electronic devices from any threats. However, the rising cases of cyber threats are carried out by domestic terrorists who share particular ideologies or grievances. This paper analyzes the increasing cyber-attack instances and mechanisms to counter these threats. Additionally, it addresses the growing concern of domestic terrorism and its impact on national security. Finally, it provides an overview of gaps and possible areas of future research to promote cybersecurity. 展开更多
关键词 Cyber-Attacks CYBERCRIME CYBERSECURITY Cyber Threats Domestic Terrorism
下载PDF
Forensics Issues in Cloud Computing
6
作者 Aqil Burney Muhammad Asif Zain Abbas 《Journal of Computer and Communications》 2016年第10期63-69,共7页
Cloud computing is an emerging technology that is being widely adopted throughout the world due to its ease-of-use. Organizations of all types can use it without pre-requisites such as IT infra-structure, technical sk... Cloud computing is an emerging technology that is being widely adopted throughout the world due to its ease-of-use. Organizations of all types can use it without pre-requisites such as IT infra-structure, technical skills, managerial overload, storage capacity, processing power, and data recovery or privacy setup. It can be availed by all clients as per their needs, expectations and budget. However, cloud computing introduces new kinds of security vulnerabilities that need to be ad-dressed. Traditional “Computer Forensics” deals with detection, preemption and prevention of IT triggered frauds and crimes but it lacks the ability to deal with cybercrimes pertaining to cloud computing environment. In this paper, we focus on forensics issues in cloud computing, assess limitations of forensic team and present the obstacles faced during investigation. 展开更多
关键词 Computer Forensics Cloud Computing cybercrimes Cloud Security Cloud Service Provider
下载PDF
Computer Forensics-An Essential Element of Modern IT Security
7
作者 Frank Y.W.Law K.P.Chow 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2014年第6期5-8,共4页
Computer forensics is the science of obtaining,preserving,and documenting evidence from computers,mobile devices as well as other digital electronic storage devices.All must be done in a manner designed to preserve th... Computer forensics is the science of obtaining,preserving,and documenting evidence from computers,mobile devices as well as other digital electronic storage devices.All must be done in a manner designed to preserve the probative value of the evidence and to assure its admissibility in a legal proceeding.However,computer forensics is continually evolving as existing technologies progress and new technologies are introduced.For example,digital investigators are required to investigate content on mobile device or data stored at the cloud servers.With the popularity of computers in everyday life as well as the acceleration of cybercrime rates in recent years,computer forensics is becoming an essential element of modern IT security.This paper will cover the development of computer forensics in law enforcement and discuss the development in the latest live forensics skillsets.A number of interested areas of computer forensics will be also highlighted to explain how it can support IT security and civil / criminal investigation. 展开更多
关键词 computer forensics CYBERCRIME digital evidence
下载PDF
Integration of User-system View for Cyber Crime Analysis: A Semi-automatic Approach
8
作者 K.P. Chow Erica S.L. Ho +5 位作者 Lucas C.K. Hui S.M. Yiu Tom Y.M. Lai R.S. Xu Y Mai Xiaoxi Fan 《中国司法鉴定》 2012年第5期50-58,共9页
There is a rapid rise in cybercrime cases. There does not exist any effective forensic methods to deal with these eybercrime cases. Investigators are required to study the details of a large amount of tedious source i... There is a rapid rise in cybercrime cases. There does not exist any effective forensic methods to deal with these eybercrime cases. Investigators are required to study the details of a large amount of tedious source in order to understand the crime model and dig out the evidence. This requires a lot of effort and may result in human errors. In order to overcome these potential errors that may cause by the investigators, we propose a semi-automatic approach that integrates the user view (based on a high level study of the forensic investigator) and the system view (based on the automatic analysis of the source codes) to assist investigators in refining the scope of the investigation. The approach has been verified using a real cybercrime case and the method has been shown to be effective in assisting the investigators in refining the scope of investigation and understanding the crime model. The semi-automatic approach has improved the efficiency and reliability of the digital forensic analysis of cybercrime cases involving large volume of digital evidence from multiple sources. 展开更多
关键词 CYBERCRIME ANALYSIS forensic methodology SEMI-AUTOMATIC APPROACH
下载PDF
Google Maps Security Concerns
9
作者 Aqil Burney Muhammad Asif +1 位作者 Zain Abbas Shamaila Burney 《Journal of Computer and Communications》 2018年第1期275-283,共9页
Google Maps and other such maps in GIS have a lot of significance in every one’s life for in modern world due to technological development as well as contemporary needs in travelling, business planning, agriculture, ... Google Maps and other such maps in GIS have a lot of significance in every one’s life for in modern world due to technological development as well as contemporary needs in travelling, business planning, agriculture, e-marketing supply chain management, census and planning and excessive use of mobile phones. Being a revolutionary technology, it attracts the users from its inception. It has been revolutionary in having an impact on one’s daily life by helping one explore geographical locations virtually anywhere on the whole planet. It has become a norm that people use Google Maps before or while commuting to a certain place as most of the people rely on it to provide the shortest or fastest route to a destination. Google Maps has had a profound impact not only one’s personal life, but has opened new avenues of marketing, business intelligence, urban planning, infrastructure strategy development, as well as traffic engineering. Hence, no one can deny the impact it has had on our society in a short period. However, Google Maps has security concerns associated with its use. This is because whenever a user is searching for a geographical location on Google Maps, there is no way to ascertain his/her intention. As result, whatever is requested by the user, it is provided without much security checks or personal specific logging history. Criminal minded people may use the technology to carry out unwarranted and uncalled-for activities such as terror attacks, exploitation of military assets, target killing, trailing a potential victim, kidnapping, demanding ransom money, and compromising national security etc. Numbers of such activities may be carried out using the guidance from “Google Maps” without getting noticed. This is largely due to that anonymous login is allowed into Google Maps. The paper highlights the main security issues that exist in the use of Google Maps and suggests the key areas to improve upon. In this research paper, we discuss the security concerns related to Google Maps utilization and try to identify the associated risks that may be worst in some situations due to that it is significant to assess the usage of this tremendous technology. We categorize the millions of Anonymous Google Maps users into two major categories (Anonymous Good Users and Anonymous Bad Users) based on Google Maps browsing and analyze the associated risks and potential threats and propose the way to minimize them. In future, if Google Maps adopts the proposed techniques and improves upon, then its utilization minimizes security concerns and makes the world much safe place. 展开更多
关键词 Google Maps ANONYMOUS USERS CYBERCRIME SECURITY Issues SECURITY CONCERNS Spatial Information Signup Mechanism Potential Threats
下载PDF
Cyber Security Crimes, Ethics and a Suggested Algorithm to Overcome Cyber-Physical Systems Problems (CybSec1)
10
作者 Abou_el_ela Abdou Hussien 《Journal of Information Security》 2021年第1期56-78,共23页
Digital systems have changed our world and will continue to change it. Supportive government policy, a strong research base and history of industrial success place the benefits of an emerging digital society. Protecti... Digital systems have changed our world and will continue to change it. Supportive government policy, a strong research base and history of industrial success place the benefits of an emerging digital society. Protecting benefits and minimizing risks requires reliable and robust cyber security, backed by a robust research and translation system. Trust is essential for growth and maintenance of participation in the digital community. Organizations gain trust by acting in a trustworthy way leading to building reliable and secure systems, treating people, their privacy and their data with respect, and providing reliable and understandable information to help people understand how safe they are. Research and revolution in industry and academia will continue to make important contributions to create flexible and reliable digital environment. Cyber Security has </span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;">a </span></span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;">main role in the field of information technology because securing information has become one of the greatest challenges today. When we think about the cyber security, the first thing that comes to our mind is “cyber crimes” which </span></span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;">are</span></span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;"> increasing exponentially day by day. Many governments and firms are taking many measures to prevent these cybercrimes. Besides the various measures, cyber security remains a major concern. This paper intended to give </span></span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;">a </span></span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;">deep overview of the concepts and principles of cyber security that affect the safety and security in an international context. It mainly focuses on challenges faced by cyber security on the latest technologies and focuses also on introducing security types, cyber security techniques, cyber security ethics, trends that change the face of cyber security and finally attempting to solve one of the most serious cyber security crimes of violating privacy on the internet by improving the security of sensitive personal information (SPI) in Cyber-physical systems using a selected proposed algorithm that analyzes the user’s information resources and determines the valid data to be encrypted, then uses adaptive acquisition methods to collect the information and finally a new cryptographic method is used to complete SPI secure encryption according to acquisition results as described in details in Section 4. 展开更多
关键词 Cyber Security CYBERCRIME Cyber Ethics Social Media Cloud Computing Android Apps
下载PDF
Awareness about the Online Security Threat and Ways to Secure the Youths
11
作者 Yeshi Nidup 《Journal of Cyber Security》 2021年第3期133-148,共16页
This study aimed to find out the awareness about the online security threat and understanding of the preventive measures to secure the youths from online risks.For this,a quantitative method was applied and the survey... This study aimed to find out the awareness about the online security threat and understanding of the preventive measures to secure the youths from online risks.For this,a quantitative method was applied and the survey questionnaire was instituted to collect the data randomly from the youths studying in class eleven and higher.A total of 264 youths,147 female and 117 male responded to the survey questionnaire.The data was organized and analyzed using Excel data analysis tool package,interpreted and represented in the form of graphs with some explanations.The awareness about the online security threat was found to be good with 20 percent completely aware and 58 percent aware of it.The knowledge about the two-factor authentication was found to be quite poor.There are 20.4 percent who knows a little and 14.7 percent who do not know anything and 29.5 percent who are not sure about it.The use of cloud encryption,security and protection with firewalls is not so familiar amongst the youth.However,the use of strong passwords for their mobile and other gadgets were mostly applied by the youths.The youths were also found to be concerned with the software and the system in their mobile and other gadgets as they responded that they update it frequently. 展开更多
关键词 Cyber security CYBERCRIME information
下载PDF
Cloud repository as a malicious service:challenge,identification and implication
12
作者 Xiaojing Liao Sumayah Alrwais +4 位作者 Kan Yuan Luyi Xing XiaoFeng Wang Shuang Hao Raheem Beyah 《Cybersecurity》 2018年第1期245-262,共18页
The popularity of cloud hosting services also brings in new security chal-lenges:it has been reported that these services are increasingly utilized by miscreants for their malicious online activities.Mitigating this e... The popularity of cloud hosting services also brings in new security chal-lenges:it has been reported that these services are increasingly utilized by miscreants for their malicious online activities.Mitigating this emerging threat,posed by such“bad repositories”(simply Bar),is challenging due to the different hosting strategy to traditional hosting service,the lack of direct observations of the repositories by those outside the cloud,the reluctance of the cloud provider to scan its customers’repositories without their consent,and the unique evasion strategies employed by the adversary.In this paper,we took the first step toward understanding and detecting this emerging threat.Using a small set of“seeds”(i.e.,confirmed Bars),we identified a set of collective features from the websites they serve(e.g.,attempts to hide Bars),which uniquely characterize the Bars.These features were utilized to build a scanner that detected over 600 Bars on leading cloud platforms like Amazon,Google,and 150 K sites,including popular ones like groupon.com,using them.Highlights of our study include the pivotal roles played by these repositories on malicious infrastructures and other important discoveries include how the adversary exploited legitimate cloud repositories and why the adversary uses Bars in the first place that has never been reported.These findings bring such malicious services to the spotlight and contribute to a better understanding and ultimately eliminating this new threat. 展开更多
关键词 CLOUD CYBERCRIME Malicious hosting service
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部