首页 > 最新文献

2015 Information Security for South Africa (ISSA)最新文献

英文 中文
Mapping ‘Security Safeguard’ Requirements in a data privacy legislation to an international privacy framework: A compliance methodology 将数据隐私立法中的“安全保障”要求映射到国际隐私框架:合规方法
Pub Date : 2015-11-23 DOI: 10.1109/ISSA.2015.7335062
I. Govender
It is commonplace for organisations to collect personal information to be processed and stored on their systems. Until recently, there was no comprehensive legislation that addressed the `processing' of personal information by organisations in South Africa. The Protection of Personal Information Bill (“POPI”) was signed into law in November 2013 and is expected to come into effect, later this year (2015). POPI is informed by international data privacy legislation. The implications are that it will be incumbent for organisations to revisit how they `handle' peoples' personal information. This can be a daunting task as evidenced by countries that still find it a challenge to comply with data privacy laws that have been enacted there, a while ago. This article proposes a methodology to comply with POPI. The Generally Accepted Privacy Principles (GAPP) is an American/Canadian framework containing international privacy requirements with best practices. Both, POPI and GAPP address a common purpose: `How personal information is collected, used, retained, disclosed, and disposed.' GAPP is reputed as a solid benchmark for good privacy practice, comprising of ten overarching privacy principles which yields a set of criteria for effective management of privacy risks and compliance. Much of the provisions in POPI is addressed in GAPP. A key condition (Security Safeguards) in POPI stipulates what aspects of personal information must be adequately secured, with limited insight on how to go about this process. Accordingly, this article proposes a methodology to fill this gap. All of the provisions under `Security Safeguards' in POPI is mapped onto GAPP, thereby contextualising GAPP to facilitate compliance with South Africa's data privacy legislation and to the same end, complying with international privacy laws. This framework could also be implemented as a checklist/auditing document, guiding the organisation in its implementation of data privacy and POPI compliance.
组织收集个人信息并将其处理和存储在其系统中是司空见惯的。直到最近,南非还没有全面的立法来解决组织对个人信息的“处理”问题。《个人信息保护法案》(“POPI”)于2013年11月签署成为法律,预计将于今年晚些时候(2015年)生效。POPI遵循国际资料私隐法例。这意味着企业有责任重新审视他们如何“处理”人们的个人信息。这可能是一项艰巨的任务,正如一些国家所证明的那样,它们仍然认为遵守不久前颁布的数据隐私法是一项挑战。本文提出了一种遵从POPI的方法。普遍接受的隐私原则(GAPP)是美国/加拿大的框架,包含国际隐私要求和最佳实践。POPI和新闻出版总署都有一个共同的目的:“如何收集、使用、保留、披露和处理个人信息。”GAPP被誉为良好隐私实践的坚实基准,包括十项总体隐私原则,这些原则产生了一套有效管理隐私风险和合规的标准。POPI中的许多条款在GAPP中得到了解决。POPI中的一个关键条件(安全保障)规定了个人信息的哪些方面必须得到充分保护,但对如何进行这一过程的了解有限。因此,本文提出了一种方法来填补这一空白。POPI中“安全保障”项下的所有条款都映射到GAPP,从而将GAPP置于背景中,以促进遵守南非的数据隐私立法,并达到同样的目的,遵守国际隐私法。该框架也可以作为检查表/审计文件实施,指导组织实施数据隐私和POPI合规性。
{"title":"Mapping ‘Security Safeguard’ Requirements in a data privacy legislation to an international privacy framework: A compliance methodology","authors":"I. Govender","doi":"10.1109/ISSA.2015.7335062","DOIUrl":"https://doi.org/10.1109/ISSA.2015.7335062","url":null,"abstract":"It is commonplace for organisations to collect personal information to be processed and stored on their systems. Until recently, there was no comprehensive legislation that addressed the `processing' of personal information by organisations in South Africa. The Protection of Personal Information Bill (“POPI”) was signed into law in November 2013 and is expected to come into effect, later this year (2015). POPI is informed by international data privacy legislation. The implications are that it will be incumbent for organisations to revisit how they `handle' peoples' personal information. This can be a daunting task as evidenced by countries that still find it a challenge to comply with data privacy laws that have been enacted there, a while ago. This article proposes a methodology to comply with POPI. The Generally Accepted Privacy Principles (GAPP) is an American/Canadian framework containing international privacy requirements with best practices. Both, POPI and GAPP address a common purpose: `How personal information is collected, used, retained, disclosed, and disposed.' GAPP is reputed as a solid benchmark for good privacy practice, comprising of ten overarching privacy principles which yields a set of criteria for effective management of privacy risks and compliance. Much of the provisions in POPI is addressed in GAPP. A key condition (Security Safeguards) in POPI stipulates what aspects of personal information must be adequately secured, with limited insight on how to go about this process. Accordingly, this article proposes a methodology to fill this gap. All of the provisions under `Security Safeguards' in POPI is mapped onto GAPP, thereby contextualising GAPP to facilitate compliance with South Africa's data privacy legislation and to the same end, complying with international privacy laws. This framework could also be implemented as a checklist/auditing document, guiding the organisation in its implementation of data privacy and POPI compliance.","PeriodicalId":126848,"journal":{"name":"2015 Information Security for South Africa (ISSA)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125503892","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Characterization and analysis of NTP amplification based DDoS attacks 基于NTP放大的DDoS攻击特征与分析
Pub Date : 2015-11-23 DOI: 10.1109/ISSA.2015.7335069
L. Rudman, B. Irwin
Network Time Protocol based DDoS attacks saw a lot of popularity throughout 2014. This paper shows the characterization and analysis of two large datasets containing packets from NTP based DDoS attacks captured in South Africa. Using a series of Python based tools, the dataset is analysed according to specific parts of the packet headers. These include the source IP address and Time-to-live (TTL) values. The analysis found the top source addresses and looked at the TTL values observed for each address. These TTL values can be used to calculate the probable operating system or DDoS attack tool used by an attacker. We found that each TTL value seen for an address can indicate the number of hosts attacking the address or indicate minor routing changes. The Time-to-Live values, as a whole, are then analysed to find the total number used throughout each attack. The most frequent TTL values are then found and show that the migratory of them indicate the attackers are using an initial TTL of 255. This value can indicate the use of a certain DDoS tool that creates packets with that exact initial TTL. The TTL values are then put into groups that can show the number of IP addresses a group of hosts are targeting.
基于网络时间协议的DDoS攻击在2014年非常流行。本文展示了两个大型数据集的特征和分析,其中包含在南非捕获的基于NTP的DDoS攻击的数据包。使用一系列基于Python的工具,根据包头的特定部分分析数据集。这些包括源IP地址和生存时间(TTL)值。分析找到了顶级源地址,并查看了每个地址的TTL值。这些TTL值可用于计算攻击者可能使用的操作系统或DDoS攻击工具。我们发现,一个地址的每个TTL值都可以指示攻击该地址的主机数量,或者指示较小的路由更改。然后分析整个生存时间值,以找到每次攻击中使用的总数。然后找到最常见的TTL值,并显示它们的迁移表明攻击者正在使用255的初始TTL。此值可以指示使用某个DDoS工具创建具有相同初始TTL的数据包。然后将TTL值分组,以显示一组主机所针对的IP地址的数量。
{"title":"Characterization and analysis of NTP amplification based DDoS attacks","authors":"L. Rudman, B. Irwin","doi":"10.1109/ISSA.2015.7335069","DOIUrl":"https://doi.org/10.1109/ISSA.2015.7335069","url":null,"abstract":"Network Time Protocol based DDoS attacks saw a lot of popularity throughout 2014. This paper shows the characterization and analysis of two large datasets containing packets from NTP based DDoS attacks captured in South Africa. Using a series of Python based tools, the dataset is analysed according to specific parts of the packet headers. These include the source IP address and Time-to-live (TTL) values. The analysis found the top source addresses and looked at the TTL values observed for each address. These TTL values can be used to calculate the probable operating system or DDoS attack tool used by an attacker. We found that each TTL value seen for an address can indicate the number of hosts attacking the address or indicate minor routing changes. The Time-to-Live values, as a whole, are then analysed to find the total number used throughout each attack. The most frequent TTL values are then found and show that the migratory of them indicate the attackers are using an initial TTL of 255. This value can indicate the use of a certain DDoS tool that creates packets with that exact initial TTL. The TTL values are then put into groups that can show the number of IP addresses a group of hosts are targeting.","PeriodicalId":126848,"journal":{"name":"2015 Information Security for South Africa (ISSA)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123378470","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Biometric identification: Are we ethically ready? 生物识别:我们在伦理上准备好了吗?
Pub Date : 2015-11-23 DOI: 10.1109/ISSA.2015.7335051
K. Renaud, A. Hoskins, R. V. Solms
“Give us your fingerprint, your Iris print, your photograph. Trust us; we want to make your life easier!” This is the implicit message behind many corporations' move towards avid collection and use of biometrics, and they expect us to accept their assurances at face value. Despite their attempts to sell this as a wholly philanthropic move, the reality is that it is often done primarily to ease their own processes or to increase profit. They offer no guarantees, allow no examination of their processes, and treat detractors with derision or sanction. The current biometric drive runs counter to emergent wisdom about the futility of a reductionist approach to humanity. Ameisen et al. (2007) point out that the field of integrative biology is moving towards a more holistic approach, while biometrics appear to be moving in the opposite direction, reducing humans to sets of data with cartographic locators: a naïve over-simplification of the uniqueness that characterizes humanity. They argue that biometrics treat the body as an object to be measured, but in fact the body is a subject, the instantiation of the individual's self, subject to vulnerability and mortality. Treating it merely as a measured and recorded object denies the body's essential right to dignity. Here we explore various concerning aspects of the global move towards widespread biometric use.
“给我们你的指纹、虹膜指纹和照片。相信我们;我们想让你的生活更轻松!”这是许多公司热衷于收集和使用生物识别技术背后隐含的信息,他们希望我们接受他们表面上的保证。尽管他们试图将此举完全作为慈善之举来推销,但现实情况是,这样做往往主要是为了简化自己的流程或增加利润。他们不提供任何保证,不允许对自己的流程进行审查,并以嘲笑或制裁的方式对待诋毁者。当前的生物识别驱动与新兴的智慧背道而驰,这种智慧认为人类的简化方法是徒劳的。Ameisen等人(2007)指出,综合生物学领域正朝着更全面的方向发展,而生物识别学似乎正朝着相反的方向发展,将人类减少到一组带有地图定位器的数据:naïve过度简化了人类特征的独特性。他们认为,生物识别技术将身体视为一个可以测量的物体,但事实上,身体是一个主体,是个体自我的实例,易受伤害和死亡的影响。仅仅把它当作一个测量和记录的物体,否认了身体的基本尊严权。在这里,我们探讨了全球广泛使用生物识别技术的各个方面。
{"title":"Biometric identification: Are we ethically ready?","authors":"K. Renaud, A. Hoskins, R. V. Solms","doi":"10.1109/ISSA.2015.7335051","DOIUrl":"https://doi.org/10.1109/ISSA.2015.7335051","url":null,"abstract":"“Give us your fingerprint, your Iris print, your photograph. Trust us; we want to make your life easier!” This is the implicit message behind many corporations' move towards avid collection and use of biometrics, and they expect us to accept their assurances at face value. Despite their attempts to sell this as a wholly philanthropic move, the reality is that it is often done primarily to ease their own processes or to increase profit. They offer no guarantees, allow no examination of their processes, and treat detractors with derision or sanction. The current biometric drive runs counter to emergent wisdom about the futility of a reductionist approach to humanity. Ameisen et al. (2007) point out that the field of integrative biology is moving towards a more holistic approach, while biometrics appear to be moving in the opposite direction, reducing humans to sets of data with cartographic locators: a naïve over-simplification of the uniqueness that characterizes humanity. They argue that biometrics treat the body as an object to be measured, but in fact the body is a subject, the instantiation of the individual's self, subject to vulnerability and mortality. Treating it merely as a measured and recorded object denies the body's essential right to dignity. Here we explore various concerning aspects of the global move towards widespread biometric use.","PeriodicalId":126848,"journal":{"name":"2015 Information Security for South Africa (ISSA)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126342004","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A formal qualitative risk management approach for IT security IT安全的正式定性风险管理方法
Pub Date : 2015-11-23 DOI: 10.1109/ISSA.2015.7335053
Bessy Mahopo, Hanifa Abdullah, M. Mujinga
Information technology (IT) security, which is concerned about protecting the confidentiality, integrity and availability of information technology assets, inherently possesses a significant amount of risk, some known and some unknown. IT security risk management has gained considerable attention over the past decade due to the collapsing of some large organisations in the world. Previous investigative research in the field of IT security have indicated that despite the efforts that organisations employ to reduce IT security risks, the trend of IT security attacks are still increasing. One of the contributing factors to poor management of IT security risk is attributed to the fact that IT security risk management is often left to the technical security technologist who do not necessarily employ formal risk management tools and reasoning. For this reason, organisations find themselves in a position where they do not have the correct approach to identify, assess and treat IT security risks. Employing a formal risk based approach in managing IT security risk assist in ensuring that risks that matter to an organisation are accounted for and as a result, receive the correct level of attention. Defining an approach of how IT security risk is managed should be seen as a fundamental task, which is the basis of this research. The objective of this paper is to propose an approach for identifying, assessing and treating IT security risk which incorporates a robust risk analysis and assessment process. The risk analysis process aims to make use of a comprehensive IT security risk universe which caters for the complex and dynamic nature of IT security. The research will contribute to the field of IT security by using a consolidated approach that utilises coherent characteristics of the available qualitative risk management frameworks to provide a stronger approach that will enable organisations to treat IT security risk better.
信息技术(IT)安全关注的是保护信息技术资产的机密性、完整性和可用性,它固有地具有大量的风险,有些是已知的,有些是未知的。在过去的十年中,由于世界上一些大型组织的崩溃,IT安全风险管理已经获得了相当大的关注。以往在资讯科技保安领域的调查研究显示,尽管各机构致力减低资讯科技保安风险,但资讯科技保安攻击的趋势仍在增加。导致IT安全风险管理不善的因素之一是,IT安全风险管理通常留给技术安全技术人员,他们不一定采用正式的风险管理工具和推理。由于这个原因,组织发现他们没有正确的方法来识别、评估和处理IT安全风险。采用正式的基于风险的方法来管理IT安全风险有助于确保对组织有影响的风险得到考虑,并因此得到适当的关注。定义如何管理IT安全风险的方法应该被视为一项基本任务,这是本研究的基础。本文的目的是提出一种识别、评估和处理IT安全风险的方法,该方法包含一个强大的风险分析和评估过程。风险分析过程旨在利用全面的资讯科技保安风险范围,以迎合资讯科技保安的复杂性和动态性。该研究将通过使用一种综合方法,利用可用的定性风险管理框架的一致特征,提供一种更强大的方法,使组织能够更好地处理IT安全风险,从而为IT安全领域做出贡献。
{"title":"A formal qualitative risk management approach for IT security","authors":"Bessy Mahopo, Hanifa Abdullah, M. Mujinga","doi":"10.1109/ISSA.2015.7335053","DOIUrl":"https://doi.org/10.1109/ISSA.2015.7335053","url":null,"abstract":"Information technology (IT) security, which is concerned about protecting the confidentiality, integrity and availability of information technology assets, inherently possesses a significant amount of risk, some known and some unknown. IT security risk management has gained considerable attention over the past decade due to the collapsing of some large organisations in the world. Previous investigative research in the field of IT security have indicated that despite the efforts that organisations employ to reduce IT security risks, the trend of IT security attacks are still increasing. One of the contributing factors to poor management of IT security risk is attributed to the fact that IT security risk management is often left to the technical security technologist who do not necessarily employ formal risk management tools and reasoning. For this reason, organisations find themselves in a position where they do not have the correct approach to identify, assess and treat IT security risks. Employing a formal risk based approach in managing IT security risk assist in ensuring that risks that matter to an organisation are accounted for and as a result, receive the correct level of attention. Defining an approach of how IT security risk is managed should be seen as a fundamental task, which is the basis of this research. The objective of this paper is to propose an approach for identifying, assessing and treating IT security risk which incorporates a robust risk analysis and assessment process. The risk analysis process aims to make use of a comprehensive IT security risk universe which caters for the complex and dynamic nature of IT security. The research will contribute to the field of IT security by using a consolidated approach that utilises coherent characteristics of the available qualitative risk management frameworks to provide a stronger approach that will enable organisations to treat IT security risk better.","PeriodicalId":126848,"journal":{"name":"2015 Information Security for South Africa (ISSA)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122615343","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The state of database forensic research 数据库取证研究现状
Pub Date : 2015-11-23 DOI: 10.1109/ISSA.2015.7335071
W. Hauger, M. Olivier
A sentiment that is quite often encountered in database forensic research material is the scarcity of scientific research in this vital area of digital forensics. Databases have been around for many years in the digital space and have moved from being exclusively used in specialised applications of big corporations to becoming a means to an end in even the simplest end-user applications. Newer disciplines such as cloud forensics seem to be producing a far greater volume of new research material than database forensics. This paper firstly investigates the validity of the expressed sentiment. It also attempts to establish possible reasons for the apparent lack of research in this area. A survey was conducted of scientific research material that was published after an initial assessment was performed in 2009. The gathered database forensic material was compared to scientific material published in the same period in the cloud forensic discipline. The survey indicated that the speed of research into database forensics has increased since the 2009 paper. However the area of cloud forensics has produced twice the amount of new research in the same time period. The factors that made cloud forensics an attractive research area are either not applicable to database forensics or no longer play a significant role. This would explain the lesser interest in performing research in database forensics.
在数据库取证研究材料中经常遇到的一种观点是,在数字取证这一重要领域缺乏科学研究。数据库在数字领域已经存在了很多年,并且已经从专门用于大公司的专门应用程序转变为甚至在最简单的最终用户应用程序中成为一种手段。像云取证这样的新学科似乎比数据库取证产生了更多的新研究材料。本文首先考察了情感表达的效度。它还试图找出这一领域明显缺乏研究的可能原因。对2009年进行初步评估后发表的科学研究材料进行了调查。将收集到的数据库法医材料与同期在云法医学科中发表的科学材料进行比较。调查显示,自2009年那篇论文发表以来,对数据库取证的研究速度有所加快。然而,云取证领域在同一时期产生了两倍于此的新研究。使云取证成为一个有吸引力的研究领域的因素要么不适用于数据库取证,要么不再发挥重要作用。这就解释了为什么人们对数据库取证的研究兴趣不大。
{"title":"The state of database forensic research","authors":"W. Hauger, M. Olivier","doi":"10.1109/ISSA.2015.7335071","DOIUrl":"https://doi.org/10.1109/ISSA.2015.7335071","url":null,"abstract":"A sentiment that is quite often encountered in database forensic research material is the scarcity of scientific research in this vital area of digital forensics. Databases have been around for many years in the digital space and have moved from being exclusively used in specialised applications of big corporations to becoming a means to an end in even the simplest end-user applications. Newer disciplines such as cloud forensics seem to be producing a far greater volume of new research material than database forensics. This paper firstly investigates the validity of the expressed sentiment. It also attempts to establish possible reasons for the apparent lack of research in this area. A survey was conducted of scientific research material that was published after an initial assessment was performed in 2009. The gathered database forensic material was compared to scientific material published in the same period in the cloud forensic discipline. The survey indicated that the speed of research into database forensics has increased since the 2009 paper. However the area of cloud forensics has produced twice the amount of new research in the same time period. The factors that made cloud forensics an attractive research area are either not applicable to database forensics or no longer play a significant role. This would explain the lesser interest in performing research in database forensics.","PeriodicalId":126848,"journal":{"name":"2015 Information Security for South Africa (ISSA)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127003932","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
AFA-RFID: Physical layer authentication for passive RFID tags AFA-RFID:无源RFID标签的物理层认证
Pub Date : 2015-11-23 DOI: 10.1109/ISSA.2015.7335078
Gregory Stuart Smith, M. Coetzee
Radio Frequency IDentification, or RFID, is a ubiquitous technology found across many industries, but which is susceptible to breaches of information security. This research introduces analogue fingerprints as a means to authenticate passive RFID tags. An authentication model implemented at the physical layer of a passive RFID tag, using analogue fingerprints is proposed. The use of analogue computing principles increases the amount of potential authentication data whilst reducing the potential for counterfeiting.
无线射频识别技术(RFID)是一种普遍存在于许多行业的技术,但它很容易受到信息安全破坏的影响。本研究引入模拟指纹作为一种验证无源RFID标签的手段。提出了一种基于模拟指纹的无源RFID标签物理层认证模型。模拟计算原理的使用增加了潜在认证数据的数量,同时减少了伪造的可能性。
{"title":"AFA-RFID: Physical layer authentication for passive RFID tags","authors":"Gregory Stuart Smith, M. Coetzee","doi":"10.1109/ISSA.2015.7335078","DOIUrl":"https://doi.org/10.1109/ISSA.2015.7335078","url":null,"abstract":"Radio Frequency IDentification, or RFID, is a ubiquitous technology found across many industries, but which is susceptible to breaches of information security. This research introduces analogue fingerprints as a means to authenticate passive RFID tags. An authentication model implemented at the physical layer of a passive RFID tag, using analogue fingerprints is proposed. The use of analogue computing principles increases the amount of potential authentication data whilst reducing the potential for counterfeiting.","PeriodicalId":126848,"journal":{"name":"2015 Information Security for South Africa (ISSA)","volume":"230 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121867487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Cloud supply chain resilience 云供应链弹性
Pub Date : 2015-11-23 DOI: 10.1109/ISSA.2015.7335076
Andrea Herrera, L. Janczewski
Cloud computing is a service-based computing resources sourcing model that is changing the way in which companies deploy and operate information and communication technologies (ICT). This model introduces several advantages compared with traditional environments along with typical outsourcing benefits reshaping the ICT services supply chain by creating a more dynamic ICT environment plus a broader variety of service offerings. This leads to higher risk of disruption and brings additional challenges for organisational resilience, defined herein as the ability of organisations to survive and also to thrive when exposed to disruptive incidents. This paper draws on supply chain theory and supply chain resilience concepts in order to identify a set of coordination mechanisms that positively impact ICT operational resilience processes within cloud supply chains and packages them into a conceptual model.
云计算是一种基于服务的计算资源采购模式,它正在改变公司部署和操作信息和通信技术(ICT)的方式。该模型引入了与传统环境相比的几个优势,以及通过创建更动态的ICT环境和更广泛的服务产品来重塑ICT服务供应链的典型外包优势。这导致了更高的中断风险,并给组织弹性带来了额外的挑战,这里定义为组织在暴露于破坏性事件时生存和发展的能力。本文利用供应链理论和供应链弹性概念,以确定一套协调机制,这些机制对云供应链中的ICT运营弹性过程产生积极影响,并将其打包成一个概念模型。
{"title":"Cloud supply chain resilience","authors":"Andrea Herrera, L. Janczewski","doi":"10.1109/ISSA.2015.7335076","DOIUrl":"https://doi.org/10.1109/ISSA.2015.7335076","url":null,"abstract":"Cloud computing is a service-based computing resources sourcing model that is changing the way in which companies deploy and operate information and communication technologies (ICT). This model introduces several advantages compared with traditional environments along with typical outsourcing benefits reshaping the ICT services supply chain by creating a more dynamic ICT environment plus a broader variety of service offerings. This leads to higher risk of disruption and brings additional challenges for organisational resilience, defined herein as the ability of organisations to survive and also to thrive when exposed to disruptive incidents. This paper draws on supply chain theory and supply chain resilience concepts in order to identify a set of coordination mechanisms that positively impact ICT operational resilience processes within cloud supply chains and packages them into a conceptual model.","PeriodicalId":126848,"journal":{"name":"2015 Information Security for South Africa (ISSA)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132404749","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Data aggregation using homomorphic encryption in wireless sensor networks 基于同态加密的无线传感器网络数据聚合
Pub Date : 2015-11-23 DOI: 10.1109/ISSA.2015.7335058
T. D. Ramotsoela, G. Hancke
Secure information aggregation using homomorphic encryption in wireless sensor networks allows data to be aggregated without having to decrypt the packets. While data aggregation provides a means to reduce network traffic, homomorphic encryption increases the size of the packets and this could negatively affect system performance. This is because energy consumption of the nodes is directly proportional to the amount of data transferred. In this paper, the effect of this increased packet size was investigated for the Domingo-Ferrer encryption scheme and compared to a symmetric encryption scheme. It was found that the symmetric encryption scheme outperforms the homomorphic encryption scheme for smaller networks, but as the network size grows, homomorphic encryption starts outperforming symmetric encryption. It was also found that the homomorphic encryption scheme does not significantly reduce the performance of plaintext aggregation.
在无线传感器网络中使用同态加密的安全信息聚合允许在不解密数据包的情况下聚合数据。虽然数据聚合提供了一种减少网络流量的方法,但同态加密增加了数据包的大小,这可能会对系统性能产生负面影响。这是因为节点的能耗与传输的数据量成正比。在本文中,研究了这种增加的数据包大小对Domingo-Ferrer加密方案的影响,并与对称加密方案进行了比较。研究发现,在较小的网络中,对称加密方案优于同态加密方案,但随着网络规模的增长,同态加密开始优于对称加密。研究还发现,同态加密方案不会显著降低明文聚合的性能。
{"title":"Data aggregation using homomorphic encryption in wireless sensor networks","authors":"T. D. Ramotsoela, G. Hancke","doi":"10.1109/ISSA.2015.7335058","DOIUrl":"https://doi.org/10.1109/ISSA.2015.7335058","url":null,"abstract":"Secure information aggregation using homomorphic encryption in wireless sensor networks allows data to be aggregated without having to decrypt the packets. While data aggregation provides a means to reduce network traffic, homomorphic encryption increases the size of the packets and this could negatively affect system performance. This is because energy consumption of the nodes is directly proportional to the amount of data transferred. In this paper, the effect of this increased packet size was investigated for the Domingo-Ferrer encryption scheme and compared to a symmetric encryption scheme. It was found that the symmetric encryption scheme outperforms the homomorphic encryption scheme for smaller networks, but as the network size grows, homomorphic encryption starts outperforming symmetric encryption. It was also found that the homomorphic encryption scheme does not significantly reduce the performance of plaintext aggregation.","PeriodicalId":126848,"journal":{"name":"2015 Information Security for South Africa (ISSA)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123267261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
The effects of the PoPI Act on small and medium enterprises in South Africa PoPI法案对南非中小企业的影响
Pub Date : 2015-11-23 DOI: 10.1109/ISSA.2015.7335054
J. Botha, M. Eloff, I. Swart
The Protection of Personal Information (PoPI) Act was created to promote the constitutional right to privacy in South Africa by safeguarding personal identifiable information (PII). This Act respects the right to privacy of customers and employees and also acknowledges the need for businesses to collect and use personal information[1]. Having this type of legislation in place is without a doubt very beneficial to most individuals. However, the effects that the PoPI Act will have on South African small to medium enterprises (SMEs) have not been explored in detail. Current practices such as direct marketing are perceived as a cost effective option for driving sales in SMEs[2] and this option will largely be removed once PoPI is in effect. The POPI Act is a substantial piece of legislation with complex intricacies not easily understood. This complexity adds on to the difficulty SMEs experience when attempting to comply with the Act[3]. Irrespective of the complexity, PoPI is not something that can be ignored and a data information privacy regulator has been established by government. All business owners, not just of big companies, need to comply with this Act or face significant consequences. The regulators will be looking to make examples of organisations not complying and it is of utmost importance to ensure compliance or face the consequences[4]. This paper explores the possible effects of the PoPI Act on SMEs in South Africa, focusing in particular on the marketing strategies used by surveyed SMEs. It also investigates the current compliance of SMEs and reasons why SMEs are battling to comply.
《个人信息保护法》(PoPI)的制定是为了通过保护个人可识别信息(PII)来促进南非宪法对隐私权的保护。该法案尊重客户和员工的隐私权,也承认企业收集和使用个人信息的必要性[1]。有这种类型的立法到位无疑是非常有利于大多数人。然而,PoPI法案将对南非中小企业(SMEs)产生的影响尚未得到详细探讨。目前的做法,如直接营销被认为是推动中小企业销售的成本效益选择[2],一旦PoPI生效,这一选择将在很大程度上被取消。POPI法案是一项实质性的立法,其复杂性不容易理解。这种复杂性增加了中小企业在试图遵守该法案时遇到的困难[3]。无论其复杂性如何,PoPI都是不可忽视的,政府已经建立了数据信息隐私监管机构。所有企业主,不仅仅是大公司,都需要遵守这项法案,否则将面临严重后果。监管机构将对不遵守规定的组织进行惩戒,确保遵守规定或面临后果至关重要[4]。本文探讨了PoPI法案对南非中小企业的可能影响,特别关注被调查中小企业使用的营销策略。它还调查了中小企业目前的合规情况以及中小企业努力合规的原因。
{"title":"The effects of the PoPI Act on small and medium enterprises in South Africa","authors":"J. Botha, M. Eloff, I. Swart","doi":"10.1109/ISSA.2015.7335054","DOIUrl":"https://doi.org/10.1109/ISSA.2015.7335054","url":null,"abstract":"The Protection of Personal Information (PoPI) Act was created to promote the constitutional right to privacy in South Africa by safeguarding personal identifiable information (PII). This Act respects the right to privacy of customers and employees and also acknowledges the need for businesses to collect and use personal information[1]. Having this type of legislation in place is without a doubt very beneficial to most individuals. However, the effects that the PoPI Act will have on South African small to medium enterprises (SMEs) have not been explored in detail. Current practices such as direct marketing are perceived as a cost effective option for driving sales in SMEs[2] and this option will largely be removed once PoPI is in effect. The POPI Act is a substantial piece of legislation with complex intricacies not easily understood. This complexity adds on to the difficulty SMEs experience when attempting to comply with the Act[3]. Irrespective of the complexity, PoPI is not something that can be ignored and a data information privacy regulator has been established by government. All business owners, not just of big companies, need to comply with this Act or face significant consequences. The regulators will be looking to make examples of organisations not complying and it is of utmost importance to ensure compliance or face the consequences[4]. This paper explores the possible effects of the PoPI Act on SMEs in South Africa, focusing in particular on the marketing strategies used by surveyed SMEs. It also investigates the current compliance of SMEs and reasons why SMEs are battling to comply.","PeriodicalId":126848,"journal":{"name":"2015 Information Security for South Africa (ISSA)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122842868","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Beacons and their uses for digital forensics purposes 信标及其用于数字取证的用途
Pub Date : 2015-11-23 DOI: 10.1109/ISSA.2015.7335074
Luke Lubbe, Martin Oliver
This article relates to the field of digital forensics with a particular focus on web (World Wide Web) beacons and how they can be utilized for digital forensic purposes. A web beacon or more commonly “web bug” is an example of a hidden resource reference in a webpage, which when the webpage is loaded, is requested from a third party source. The purpose of a web beacon is to track the browsing habits of a particular IP address. This paper proposes a novel technique that utilizes the presence of web beacons to create a unique ID for a website, to test this a practical investigation is performed. The practical investigation involves an automated scanning of web beacons on a number of websites, this scanning process involves identifying which beacons are present on a web page and recording the presence of those beacons, the results of this scanning process is then encoded into a table for human analyses. The result of the investigation show promise and incentivizes further research. Real world implications, future work and possible Improvements on the methods which were used in this study are finally discussed.
本文涉及数字取证领域,特别关注web(万维网)信标以及如何将它们用于数字取证目的。网络信标或更常见的“网络bug”是网页中隐藏的资源引用的一个例子,当网页加载时,它是从第三方源请求的。网络信标的目的是跟踪特定IP地址的浏览习惯。本文提出了一种利用网络信标的存在为网站创建唯一ID的新技术,为了测试这一点,进行了实际调查。实际调查包括对许多网站上的网络信标进行自动扫描,这个扫描过程包括识别哪些信标出现在网页上并记录这些信标的存在,然后将扫描过程的结果编码到一个表中供人类分析。调查结果显示了前景,并激励了进一步的研究。最后讨论了本研究中使用的方法对现实世界的影响,未来的工作和可能的改进。
{"title":"Beacons and their uses for digital forensics purposes","authors":"Luke Lubbe, Martin Oliver","doi":"10.1109/ISSA.2015.7335074","DOIUrl":"https://doi.org/10.1109/ISSA.2015.7335074","url":null,"abstract":"This article relates to the field of digital forensics with a particular focus on web (World Wide Web) beacons and how they can be utilized for digital forensic purposes. A web beacon or more commonly “web bug” is an example of a hidden resource reference in a webpage, which when the webpage is loaded, is requested from a third party source. The purpose of a web beacon is to track the browsing habits of a particular IP address. This paper proposes a novel technique that utilizes the presence of web beacons to create a unique ID for a website, to test this a practical investigation is performed. The practical investigation involves an automated scanning of web beacons on a number of websites, this scanning process involves identifying which beacons are present on a web page and recording the presence of those beacons, the results of this scanning process is then encoded into a table for human analyses. The result of the investigation show promise and incentivizes further research. Real world implications, future work and possible Improvements on the methods which were used in this study are finally discussed.","PeriodicalId":126848,"journal":{"name":"2015 Information Security for South Africa (ISSA)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124000151","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2015 Information Security for South Africa (ISSA)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1