The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the growth of digital infrastructure, cyber-attacks are increasing in the real-world. Cyber-attacks are deliberate exploitation of computer systems, technology-dependent enterprises, and networks. Deception, i.e., the act of making someone believe in something that is not true, could be a way of countering cyber-attacks. In this paper, we propose a real-time simulation environment (“Deception...
OpenStack is a cloud operating system that controls large pools of compute, storage, and networking resources throughout a datacenter. OpenStack lets users deploy virtual machines and other instances which handle different tasks for managing a cloud environment. A cloud usually possesses profound resources, and has full control and dynamic allocation capability of its resources. Cloud offers us the...
The consumption of banking applications are more and popular on Android devices but it is not secure. To make secure on those confidential application such as banking, business application and personal data, password is provided to enhance privacy. Nowadays those passwords are easily usurped by hackers through shoulder side attacks or observing videos. To overcome from this inconveniences of accessing...
The denial of service attack is the most powerful damaging attacks used by hackers to harm a business or organization. This attack is one of most dangerous cyber-attacks. It causes service outages and the loss of millions, depending on the time of attack. In past few years, the use of the attack has enlarged due to the accessibility of free tools. This tool can be blocked simply by having a good firewall,...
Cyber-attacks are increasing in the real-world and they cause widespread damage to cyber-infrastructure and loss of information. Deception, i.e., the act of making someone believe something that is not true, could be a way of countering cyber-attacks. In this paper, we propose a deception game, which we used to evaluate the decision-making of a hacker in the presence of deception. In an experiment,...
In the last few years, Android becomes one of the most popular mobile operating system in the whole world, as a side effect of this popularity, Android becomes the most preferred destination of hackers with different aims, some of them look for making money and others are just having fun by storming the privacy of the others without their permission. Nowadays, Android security has become a big problem...
In this paper we describe the hacker culture by analyzing 25 years of communication on one of the oldest and most renowned hacker websites. For this purpose, we utilize a previously documented text analysis technique [14] which provides an efficient and effective method of producing a quick overview of values underlying any written text. The technique allows for the creation of culture profiles of...
The next-generation smart grid will rely highly on telecommunications infrastructure for data transfer between various systems. Anywhere we have data transfer in a system is a potential security threat. When we consider the possibility of smart grid data being at the heart of our critical systems infrastructure it is imperative that we do all we can to ensure the confidentiality, availability and...
The availability of electricity is fundamental to modern society. It is at the top of the list of critical infrastructures and its interruption can have severe consequences. This highly important system is now evolving to become more reliable, efficient, and clean. This evolving infrastructure has become known as the smart grid; and these future smart grid systems will rely heavily on ICT. This infrastructure...
Electronic Commerce is process of doing business through computer networks. A person sitting on his chair in front of a computer can access all the facilities of the Internet to buy or sell the products. Unlike traditional commerce that is carried out physically with effort of a person to go & get products, ecommerce has made it easier for human to reduce physical work and to save time. which...
The Communities vary from country to country. There are civil societies and rural communities, which also differ in terms of geography climate and economy. This shows that the use of social networks vary from region to region depending on the demographics of the communities. So, in this paper, we researched the most important problems of the Social Network, as well as the risk which is based on the...
Current lifestyle of organizations depend on information exchange and easy access to allow for a progressive business continuity. All these are done with computers and the internet and with the fast pace at which information sharing through the internet is evolving, so as the level of threat increases to hackers with malicious intent. The methods of cyber-attacks are changing for faster results and...
Toward the ultimate goal of enhancing human performance in cyber security, we attempt to understand the cognitive components of cyber security expertise. Our initial focus is on cyber security attackers - often called “hackers”. Our first aim is to develop behavioral measures of accuracy and response time to examine the cognitive processes of pattern-recognition, reasoning and decision-making that...
This paper outlines the main risks associated with var-ious types of hacker activities, analyzes the main trends in the development of the Russian cybercrime market, estimates the shares and the financial performance of the Russian segment of the global cybercrime market, and forecasts market trends for 2012.
This paper represents a sequel to the 2008 ICITST Conference paper “Hackers and Hollywood: Considering Filmic Cyberthreats in Security Risk Analysis”. That paper looked at how hackers are represented in the movies and how that representation may impact a range of fields, including; in the education of computer students, organisational computer security, and in the behaviour of the general public when...
While research on computer hackers has a long history, most of the studies in the past three decades have been qualitative and anecdotal in nature. The question why young computer talents become computer hackers remains. Based on the results of a case study, we conducted a survey based empirical study using the scenario based research methodology. Statistical analyses show that three primary factors...
Web applications are a fundamental pillar of today's globalized world. Society depends and relies on them for business and daily life. However, web applications are under constant attack by hackers that exploit their vulnerabilities to access valuable assets and disrupt business. Many studies and reports on web application security problems analyze the victim's perspective by detailing the vulnerabilities...
This paper summarizes the structure of WinPcap and introduces the capture principle of Ethernet packets. Based on multithreading technology, WinPcap captures the network layer packets. The design and realization method are provided by this paper. The overall optimization of system has improved the ability of the packet capture and greatly reduced the rate of packet loss. Data contents of the captured...
We have focused on a particular mechanism of providing network security: firewall technology. Firewalls provide a false sense of security because they have inherent flaws that are continuously exploited by hackers. Current firewalls lack in providing adequate security against insiders. Literature suggests that these limitations arise from the deficiencies in firewall design. This paper presents a...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.