首页 > 最新文献

2016 Information Security for South Africa (ISSA)最新文献

英文 中文
PoPI Act - opt-in and opt-out compliance from a data value chain perspective: A South African insurance industry experiment 数据价值链视角下的PoPI法案选择加入和选择退出合规:南非保险业实验
Pub Date : 2016-08-17 DOI: 10.1109/ISSA.2016.7802923
Paulus Swartz, A. D. Veiga
Personal information is collected and processed by various companies when individuals buy products and services, share their information on social media or enter their details in competitions and so on. This personal information, which could potentially also be shared with third party companies, is analyzed to tailor services and products to consumer's preferences and online behavior, with the objective of creating a data value chain. When the Protection of Personal Information (PoPI) Act (2013) comes into effect in South Africa, companies will have to comply with the conditions of PoPI and protect individuals' personal information accordingly. Companies will only be allowed to use personal information for the agreed purpose it was collected for and must obtain individuals' consent to share or further process their information. This research sets out to monitor the flow of personal information through an experiment to establish if data value chains are shaped within the South African insurance industry, and to establish whether the consumer's personal information, which is part of the data value chain, is processed in line with certain conditions of PoPI. The experiment highlighted that some of the insurance companies in the selected sample did not comply with the opt-in or opt-out preferences of the researcher. In addition some did not meet with the condition to obtain consent before sharing personal information with third parties for marketing purposes. No formal data value chains could be identified during the time frame of this experiment as it was found that the researcher was contacted randomly about generic marketing and communication offerings.
当个人购买产品和服务,在社交媒体上分享自己的信息,或者在比赛中输入自己的详细信息等时,个人信息被各种公司收集和处理。这些个人信息也可能与第三方公司共享,这些信息会被分析,以根据消费者的偏好和在线行为定制服务和产品,目的是创建一个数据价值链。当个人信息保护法(PoPI)(2013)在南非生效时,公司必须遵守PoPI的条件,并相应地保护个人信息。公司只被允许将个人信息用于约定的收集目的,并且必须获得个人同意才能共享或进一步处理他们的信息。本研究旨在通过一项实验来监测个人信息的流动,以确定数据价值链是否在南非保险行业内形成,并确定作为数据价值链一部分的消费者个人信息是否按照PoPI的某些条件进行处理。实验强调,在所选样本中的一些保险公司没有遵守研究员的选择加入或选择退出偏好。此外,一些公司在与第三方分享个人信息用于营销目的之前未达到征得同意的条件。在这个实验的时间框架内,没有正式的数据价值链可以确定,因为研究人员被随机联系了通用营销和通信产品。
{"title":"PoPI Act - opt-in and opt-out compliance from a data value chain perspective: A South African insurance industry experiment","authors":"Paulus Swartz, A. D. Veiga","doi":"10.1109/ISSA.2016.7802923","DOIUrl":"https://doi.org/10.1109/ISSA.2016.7802923","url":null,"abstract":"Personal information is collected and processed by various companies when individuals buy products and services, share their information on social media or enter their details in competitions and so on. This personal information, which could potentially also be shared with third party companies, is analyzed to tailor services and products to consumer's preferences and online behavior, with the objective of creating a data value chain. When the Protection of Personal Information (PoPI) Act (2013) comes into effect in South Africa, companies will have to comply with the conditions of PoPI and protect individuals' personal information accordingly. Companies will only be allowed to use personal information for the agreed purpose it was collected for and must obtain individuals' consent to share or further process their information. This research sets out to monitor the flow of personal information through an experiment to establish if data value chains are shaped within the South African insurance industry, and to establish whether the consumer's personal information, which is part of the data value chain, is processed in line with certain conditions of PoPI. The experiment highlighted that some of the insurance companies in the selected sample did not comply with the opt-in or opt-out preferences of the researcher. In addition some did not meet with the condition to obtain consent before sharing personal information with third parties for marketing purposes. No formal data value chains could be identified during the time frame of this experiment as it was found that the researcher was contacted randomly about generic marketing and communication offerings.","PeriodicalId":330340,"journal":{"name":"2016 Information Security for South Africa (ISSA)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133622092","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Mobile device usage in higher education institutions in South Africa 南非高等教育机构的移动设备使用情况
Pub Date : 2016-08-01 DOI: 10.1109/ISSA.2016.7802925
R. D. Kock, L. Futcher
Cyber security threats are on the rise as the use of personally owned devices are increasing within higher education institutions. This is due to the rapid adoption of the Bring Your Own Device (BYOD) trend. In 2014, 92% of students used laptops globally for academic purposes, 44% used tablets, and 68% used smart phones. In addition, 89% of higher education institutions in the United States and United Kingdom allow students, faculty and non-academic staff to access their network using personally owned mobile devices. A great concern is that although BYOD is widely accepted in higher education institutions, security is somewhat lacking. In addition, cyber-security threats have switched their focus to mobile devices. Therefore, the number of new mobile vulnerabilities reported each year has increased. Furthermore, in 2014, 10% of global cyber security breaches took place in the education sector with a total of 31 breaches resulting in the exposure of 1,359,190 identities. This placed the educational sector at the top of the list with the third most cyber-security breaches in 2014, behind the healthcare and retail sectors. A literature survey, together with a single explanatory case study involving a higher education institution in South Africa were used to determine typical mobile device usage in an academic context. As a result of completing the study, it is clear that there is a high demand for the use of BYOD in higher education institutions in South Africa and that BYOD is vital to the academic success of its students. This paper discusses mobile device usage in higher education institutions in South Africa. In addition, it provides some key factors for higher education institutions to consider when dealing with the increased demand for BYOD usage.
随着高等教育机构越来越多地使用个人拥有的设备,网络安全威胁也在上升。这是由于自带设备(BYOD)趋势的迅速普及。2014年,全球92%的学生使用笔记本电脑进行学习,44%使用平板电脑,68%使用智能手机。此外,美国和英国89%的高等教育机构允许学生、教师和非学术人员使用个人拥有的移动设备访问他们的网络。一个令人担忧的问题是,虽然BYOD在高等教育机构中被广泛接受,但安全性却有所欠缺。此外,网络安全威胁的焦点已经转移到移动设备上。因此,每年报告的新移动漏洞数量都在增加。此外,2014年,全球有10%的网络安全漏洞发生在教育领域,共有31起漏洞导致1,359,190个身份暴露。这使得教育行业成为2014年网络安全漏洞排名第三的行业,仅次于医疗和零售行业。一项文献调查,以及涉及南非高等教育机构的单一解释性案例研究,用于确定学术背景下典型的移动设备使用情况。完成这项研究的结果是,很明显,南非高等教育机构对BYOD的使用有很高的需求,BYOD对学生的学业成功至关重要。本文讨论了南非高等教育机构中移动设备的使用情况。此外,它还为高等教育机构在应对日益增长的BYOD使用需求时提供了一些关键因素。
{"title":"Mobile device usage in higher education institutions in South Africa","authors":"R. D. Kock, L. Futcher","doi":"10.1109/ISSA.2016.7802925","DOIUrl":"https://doi.org/10.1109/ISSA.2016.7802925","url":null,"abstract":"Cyber security threats are on the rise as the use of personally owned devices are increasing within higher education institutions. This is due to the rapid adoption of the Bring Your Own Device (BYOD) trend. In 2014, 92% of students used laptops globally for academic purposes, 44% used tablets, and 68% used smart phones. In addition, 89% of higher education institutions in the United States and United Kingdom allow students, faculty and non-academic staff to access their network using personally owned mobile devices. A great concern is that although BYOD is widely accepted in higher education institutions, security is somewhat lacking. In addition, cyber-security threats have switched their focus to mobile devices. Therefore, the number of new mobile vulnerabilities reported each year has increased. Furthermore, in 2014, 10% of global cyber security breaches took place in the education sector with a total of 31 breaches resulting in the exposure of 1,359,190 identities. This placed the educational sector at the top of the list with the third most cyber-security breaches in 2014, behind the healthcare and retail sectors. A literature survey, together with a single explanatory case study involving a higher education institution in South Africa were used to determine typical mobile device usage in an academic context. As a result of completing the study, it is clear that there is a high demand for the use of BYOD in higher education institutions in South Africa and that BYOD is vital to the academic success of its students. This paper discusses mobile device usage in higher education institutions in South Africa. In addition, it provides some key factors for higher education institutions to consider when dealing with the increased demand for BYOD usage.","PeriodicalId":330340,"journal":{"name":"2016 Information Security for South Africa (ISSA)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131765125","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Social network phishing: Becoming habituated to clicks and ignorant to threats?
Pub Date : 2016-08-01 DOI: 10.1109/ISSA.2016.7802935
Edwin Donald Frauenstein, Stephen Flowerday
With the rise in number of reported phishing cases in statistical reports and online news, it is apparent that the threat of phishing is not retreating. Phishers continuously seek new methods to deceive individuals into sharing their confidential information. As a result, today the traditional form of conducting phishing solely through email and spoofed websites has evolved. Social network phishing is a serious threat as it reaches a far wider audience, consequently affecting both business and private individuals. This paper argues that due to the constant updates of information users are engaged in on social networking sites, users may become habituated to clicking and sharing links, liking posts, copying and pasting messages, and uploading and downloading media content, thus resulting in information overload. This behavioral priming leads users to becoming more susceptible to social engineering attacks on social networks as they do not cognitively process messages with a security lens. This paper introduces social network phishing and briefly discusses activities users engage in on social networks sites, thus highlighting the formation of “bad” habits. Further, existing information processing models applicable to this context are discussed.
随着统计报告和网络新闻中报告的网络钓鱼案件数量的增加,很明显,网络钓鱼的威胁并没有消退。网络钓鱼者不断寻找新的方法来欺骗个人分享他们的机密信息。因此,今天仅通过电子邮件和欺骗网站进行网络钓鱼的传统形式已经发展。社交网络钓鱼是一种严重的威胁,因为它的受众范围更广,因此影响到企业和个人。本文认为,由于用户在社交网站上所从事的信息的不断更新,用户可能会习惯于点击和分享链接、点赞帖子、复制和粘贴消息、上传和下载媒体内容,从而导致信息过载。这种行为启动导致用户更容易受到社交网络上的社会工程攻击,因为他们没有从安全的角度来认知处理信息。本文介绍了社交网络钓鱼,并简要讨论了用户在社交网站上从事的活动,从而突出了“坏”习惯的形成。此外,还讨论了适用于此上下文的现有信息处理模型。
{"title":"Social network phishing: Becoming habituated to clicks and ignorant to threats?","authors":"Edwin Donald Frauenstein, Stephen Flowerday","doi":"10.1109/ISSA.2016.7802935","DOIUrl":"https://doi.org/10.1109/ISSA.2016.7802935","url":null,"abstract":"With the rise in number of reported phishing cases in statistical reports and online news, it is apparent that the threat of phishing is not retreating. Phishers continuously seek new methods to deceive individuals into sharing their confidential information. As a result, today the traditional form of conducting phishing solely through email and spoofed websites has evolved. Social network phishing is a serious threat as it reaches a far wider audience, consequently affecting both business and private individuals. This paper argues that due to the constant updates of information users are engaged in on social networking sites, users may become habituated to clicking and sharing links, liking posts, copying and pasting messages, and uploading and downloading media content, thus resulting in information overload. This behavioral priming leads users to becoming more susceptible to social engineering attacks on social networks as they do not cognitively process messages with a security lens. This paper introduces social network phishing and briefly discusses activities users engage in on social networks sites, thus highlighting the formation of “bad” habits. Further, existing information processing models applicable to this context are discussed.","PeriodicalId":330340,"journal":{"name":"2016 Information Security for South Africa (ISSA)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125830003","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Unsupervised learning for robust Bitcoin fraud detection 鲁棒比特币欺诈检测的无监督学习
Pub Date : 2016-08-01 DOI: 10.1109/ISSA.2016.7802939
Patrick M. Monamo, Vukosi Marivate, Bhekisipho Twala
The rampant absorption of Bitcoin as a cryptographic currency, along with rising cybercrime activities, warrants utilization of anomaly detection to identify potential fraud. Anomaly detection plays a pivotal role in data mining since most outlying points contain crucial information for further investigation. In the financial world which the Bitcoin network is part of by default, anomaly detection amounts to fraud detection. This paper investigates the use of trimmed k-means, that is capable of simultaneous clustering of objects and fraud detection in a multivariate setup, to detect fraudulent activity in Bitcoin transactions. The proposed approach detects more fraudulent transactions than similar studies or reports on the same dataset.
随着比特币作为一种加密货币的泛滥,以及网络犯罪活动的增加,需要利用异常检测来识别潜在的欺诈行为。异常检测在数据挖掘中起着至关重要的作用,因为大多数离群点包含了进一步研究的关键信息。在默认情况下,比特币网络是金融世界的一部分,异常检测相当于欺诈检测。本文研究了修剪k-means的使用,它能够在多元设置中同时进行对象聚类和欺诈检测,以检测比特币交易中的欺诈活动。该方法比在相同数据集上的类似研究或报告检测到更多的欺诈交易。
{"title":"Unsupervised learning for robust Bitcoin fraud detection","authors":"Patrick M. Monamo, Vukosi Marivate, Bhekisipho Twala","doi":"10.1109/ISSA.2016.7802939","DOIUrl":"https://doi.org/10.1109/ISSA.2016.7802939","url":null,"abstract":"The rampant absorption of Bitcoin as a cryptographic currency, along with rising cybercrime activities, warrants utilization of anomaly detection to identify potential fraud. Anomaly detection plays a pivotal role in data mining since most outlying points contain crucial information for further investigation. In the financial world which the Bitcoin network is part of by default, anomaly detection amounts to fraud detection. This paper investigates the use of trimmed k-means, that is capable of simultaneous clustering of objects and fraud detection in a multivariate setup, to detect fraudulent activity in Bitcoin transactions. The proposed approach detects more fraudulent transactions than similar studies or reports on the same dataset.","PeriodicalId":330340,"journal":{"name":"2016 Information Security for South Africa (ISSA)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126693758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 89
SHA-1 and the Strict Avalanche Criterion SHA-1和严格雪崩准则
Pub Date : 2016-08-01 DOI: 10.1109/ISSA.2016.7802926
Y. Motara, B. Irwin
The Strict Avalanche Criterion (SAC) is a measure of both confusion and diffusion, which are key properties of a cryptographic hash function. This work provides a working definition of the SAC, describes an experimental methodology that can be used to statistically evaluate whether a cryptographic hash meets the SAC, and uses this to investigate the degree to which compression function of the SHA-1 hash meets the SAC. The results (P <; 0.01) are heartening: SHA-1 closely tracks the SAC after the first 24 rounds, and demonstrates excellent properties of confusion and diffusion throughout.
严格雪崩准则(SAC)是对混淆和扩散的度量,这是加密哈希函数的关键属性。这项工作提供了SAC的工作定义,描述了一种实验方法,可用于统计评估加密哈希是否满足SAC,并使用它来研究SHA-1哈希的压缩函数满足SAC的程度。结果(P <;0.01)是令人振奋的:SHA-1在前24轮之后密切跟踪SAC,并在整个过程中表现出出色的混淆和扩散特性。
{"title":"SHA-1 and the Strict Avalanche Criterion","authors":"Y. Motara, B. Irwin","doi":"10.1109/ISSA.2016.7802926","DOIUrl":"https://doi.org/10.1109/ISSA.2016.7802926","url":null,"abstract":"The Strict Avalanche Criterion (SAC) is a measure of both confusion and diffusion, which are key properties of a cryptographic hash function. This work provides a working definition of the SAC, describes an experimental methodology that can be used to statistically evaluate whether a cryptographic hash meets the SAC, and uses this to investigate the degree to which compression function of the SHA-1 hash meets the SAC. The results (P <; 0.01) are heartening: SHA-1 closely tracks the SAC after the first 24 rounds, and demonstrates excellent properties of confusion and diffusion throughout.","PeriodicalId":330340,"journal":{"name":"2016 Information Security for South Africa (ISSA)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123181903","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Recognizing surgically altered faces using local edge gradient Gabor magnitude pattern 利用局部边缘梯度Gabor幅度模式识别手术改变的面部
Pub Date : 2016-08-01 DOI: 10.1109/ISSA.2016.7802937
Chollette C. Olisah, Peter Ogedebe
For humans, every face is unique and can be recognized amongst similar faces. This is yet to be so for machines. Our assumption is that beneath the uncertain primitive visual features of face images are intrinsic structural patterns that uniquely distinguish a sample face from those of other faces. In order to unlock the intrinsic structural patterns, this paper presents in a typical face recognition framework a new descriptor, namely the local edge gradient Gabor magnitude (LEGGM) descriptor. LEGGM first of all uncovers the primitive inherent structural pattern (PISP) locked in every pixel through determining the pixel gradient in relation to its neighbors. Then, the resulting output is embedded in the pixel original (grey-level) pattern using additive function. This forms a pixel's complete structural pattern, which is further encoded using Gabor wavelets to encode the frequency characteristics of the resulting pattern. From these steps emerges an efficient descriptor for describing every pixel point in a face image. The proposed descriptor-based face recognition method shows impressive results over contemporary descriptors on the Plastic surgery database despite using a base classifier and without employing subspace learning. The ability of the descriptor to be adapted to real-world face recognition scenario is demonstrated by running experiments with a heterogeneous database.
对于人类来说,每张脸都是独一无二的,可以在相似的脸中被识别出来。对于机器来说,这还没有实现。我们的假设是,在人脸图像不确定的原始视觉特征之下,存在着内在的结构模式,这些结构模式独特地将样本人脸与其他人脸区分开来。为了解开固有的结构模式,本文在典型的人脸识别框架中提出了一种新的描述子,即局部边缘梯度Gabor幅度(LEGGM)描述子。LEGGM首先通过确定像素相对于其邻居的梯度来揭示锁定在每个像素中的原始固有结构模式(PISP)。然后,使用加性函数将结果输出嵌入到像素原始(灰度)模式中。这形成了一个像素的完整结构模式,使用Gabor小波进一步编码产生的模式的频率特征。从这些步骤中产生一个有效的描述符来描述人脸图像中的每个像素点。提出的基于描述符的人脸识别方法在整形外科数据库上显示了令人印象深刻的结果,尽管使用了基本分类器并且没有使用子空间学习。通过在异构数据库中运行实验,证明了描述符适应现实世界人脸识别场景的能力。
{"title":"Recognizing surgically altered faces using local edge gradient Gabor magnitude pattern","authors":"Chollette C. Olisah, Peter Ogedebe","doi":"10.1109/ISSA.2016.7802937","DOIUrl":"https://doi.org/10.1109/ISSA.2016.7802937","url":null,"abstract":"For humans, every face is unique and can be recognized amongst similar faces. This is yet to be so for machines. Our assumption is that beneath the uncertain primitive visual features of face images are intrinsic structural patterns that uniquely distinguish a sample face from those of other faces. In order to unlock the intrinsic structural patterns, this paper presents in a typical face recognition framework a new descriptor, namely the local edge gradient Gabor magnitude (LEGGM) descriptor. LEGGM first of all uncovers the primitive inherent structural pattern (PISP) locked in every pixel through determining the pixel gradient in relation to its neighbors. Then, the resulting output is embedded in the pixel original (grey-level) pattern using additive function. This forms a pixel's complete structural pattern, which is further encoded using Gabor wavelets to encode the frequency characteristics of the resulting pattern. From these steps emerges an efficient descriptor for describing every pixel point in a face image. The proposed descriptor-based face recognition method shows impressive results over contemporary descriptors on the Plastic surgery database despite using a base classifier and without employing subspace learning. The ability of the descriptor to be adapted to real-world face recognition scenario is demonstrated by running experiments with a heterogeneous database.","PeriodicalId":330340,"journal":{"name":"2016 Information Security for South Africa (ISSA)","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116432045","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A framework towards governing “Bring Your Own Device in SMMEs” 中小企业“自备设备”的管理框架
Pub Date : 2016-08-01 DOI: 10.1109/ISSA.2016.7802922
N. Fani, R. V. Solms, M. Gerber
Information is a critically important asset that has been used for decades within organizations. Like any asset, there are threats to the information that impact processes such as; email retrieval and access to organizational system services. As a consequence of the threats, attention to the security of the information is important. Technology is utilized to secure information and the cost affiliated to the technology can be dire. As technology evolves with each transitory decade, there are different phenomenon's that attempt to process and secure organizational information whilst reducing costs. The evolution of technology has developed a new phenomenon called “Bring Your Own Device” (BYOD). BYOD is a phenomenon that allows employees to use their own personal mobile device to complete organizational tasks. The adoption of BYOD expands from large organizations to small, medium and micro enterprises (SMMEs). With the adoption of BYOD there are benefits and more significantly risks associated to BYOD. Therefore, this paper will discuss the SMME context and its challenges towards the governance of BYOD. In addition, there will be a discussion on how organizations can govern BYOD in an SMME context by considering the existing BYOD approaches and provide an approach suitable for SMMEs. Furthermore, the suitable BYOD approach for an SMME context will further be evaluated and compared against the existing BYOD approaches that were identified. The research process of the study is conducted within the design-oriented research paradigm utilizing a cyclic approach.
信息是一项极其重要的资产,已经在组织中使用了数十年。与任何资产一样,信息也存在影响流程的威胁,例如;电子邮件检索和访问组织系统服务。由于这些威胁,对信息安全的关注是很重要的。技术被用来保护信息,与技术相关的成本可能是可怕的。随着每一个短暂的十年技术的发展,在降低成本的同时,有不同的现象试图处理和保护组织信息。科技的发展产生了一种新现象,叫做“自带设备”(BYOD)。BYOD是一种允许员工使用自己的个人移动设备来完成组织任务的现象。BYOD的采用从大型组织扩展到中小微企业(SMMEs)。随着BYOD的采用,自带设备既有好处,也有更大的风险。因此,本文将讨论中小企业背景及其对BYOD治理的挑战。此外,还将讨论组织如何通过考虑现有的BYOD方法来管理中小企业的BYOD,并提供适合中小企业的方法。此外,将进一步评估适合中小企业环境的BYOD方法,并与已确定的现有BYOD方法进行比较。本研究的研究过程是在以设计为导向的研究范式内进行的,采用循环方法。
{"title":"A framework towards governing “Bring Your Own Device in SMMEs”","authors":"N. Fani, R. V. Solms, M. Gerber","doi":"10.1109/ISSA.2016.7802922","DOIUrl":"https://doi.org/10.1109/ISSA.2016.7802922","url":null,"abstract":"Information is a critically important asset that has been used for decades within organizations. Like any asset, there are threats to the information that impact processes such as; email retrieval and access to organizational system services. As a consequence of the threats, attention to the security of the information is important. Technology is utilized to secure information and the cost affiliated to the technology can be dire. As technology evolves with each transitory decade, there are different phenomenon's that attempt to process and secure organizational information whilst reducing costs. The evolution of technology has developed a new phenomenon called “Bring Your Own Device” (BYOD). BYOD is a phenomenon that allows employees to use their own personal mobile device to complete organizational tasks. The adoption of BYOD expands from large organizations to small, medium and micro enterprises (SMMEs). With the adoption of BYOD there are benefits and more significantly risks associated to BYOD. Therefore, this paper will discuss the SMME context and its challenges towards the governance of BYOD. In addition, there will be a discussion on how organizations can govern BYOD in an SMME context by considering the existing BYOD approaches and provide an approach suitable for SMMEs. Furthermore, the suitable BYOD approach for an SMME context will further be evaluated and compared against the existing BYOD approaches that were identified. The research process of the study is conducted within the design-oriented research paradigm utilizing a cyclic approach.","PeriodicalId":330340,"journal":{"name":"2016 Information Security for South Africa (ISSA)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131914765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Identity management for e-government Libya as a case study 以利比亚电子政务身份管理为例进行研究
Pub Date : 2016-08-01 DOI: 10.1109/ISSA.2016.7802936
Othoman Elaswad, C. Jensen
Governments are strengthening their identity (ID) management strategies to deliver new and improved online services to their citizens. Such online services typically include applications for different types of permissions, requests for different types of official documents and management of different types of entitlements. The ID management scheme must therefore be able to correctly authenticate citizens and link online presence to real world identities. Many countries, in particular in the developing world, are currently introducing national ID management schemes for the first time. While most of these countries have paper based records, many of these are regionally based and few of these have been consolidated, so these records may contain incorrect, incomplete, inconsistent or redundant information. In this paper, we explore the design space for national ID management and online authentication schemes, in this context. In particular, we propose a simple model for issuing national ID numbers that satisfy these goals and use this model to examine two different ID management schemes implemented in Libya, which allows us to compare different approaches to national identity management. The two schemes were implemented within a fairly short time, so we may assume that the cultural, social, educational and technological factors remain unchanged. This allows a direct comparison of objectives and means. Based on this examination, we evaluate the current Libyan ID number system with respect to the identified objectives. Our evaluation of the two Libyan NID schemes show that if National Identity Management does not fully meet the requirements identified in our simple model, then it may be vulnerable to various forms of online risks such as impersonation and identity theft attacks. Considering online crime, during the design of an Identity Management system, is especially important in developing countries, where such crimes have not previously existed in the society.
各国政府正在加强其身份管理战略,为其公民提供新的和改进的在线服务。此类在线服务通常包括申请不同类型的许可、请求不同类型的官方文件以及管理不同类型的权利。因此,身份管理方案必须能够正确地认证公民,并将在线存在与现实世界的身份联系起来。许多国家,特别是发展中国家,目前正在首次实行国家身份证管理计划。虽然大多数这些国家都有纸质记录,但其中许多是基于区域的,其中很少有合并记录,因此这些记录可能包含不正确、不完整、不一致或冗余的信息。在此背景下,我们探讨了国家身份管理和在线认证方案的设计空间。特别是,我们提出了一个简单的模型,用于发放满足这些目标的国民身份证号码,并使用该模型来检查在利比亚实施的两种不同的身份证管理方案,这使我们能够比较不同的国民身份管理方法。这两个方案都是在相当短的时间内实施的,所以我们可以假设文化、社会、教育和技术因素没有改变。这样可以直接比较目标和手段。在此基础上,我们根据确定的目标评估当前利比亚身份证号码系统。我们对利比亚两个NID方案的评估表明,如果国家身份管理不能完全满足我们简单模型中确定的要求,那么它可能容易受到各种形式的在线风险的影响,例如冒充和身份盗窃攻击。考虑到网络犯罪,在身份管理系统的设计过程中,在发展中国家尤其重要,在这些国家,社会上以前从未存在过此类犯罪。
{"title":"Identity management for e-government Libya as a case study","authors":"Othoman Elaswad, C. Jensen","doi":"10.1109/ISSA.2016.7802936","DOIUrl":"https://doi.org/10.1109/ISSA.2016.7802936","url":null,"abstract":"Governments are strengthening their identity (ID) management strategies to deliver new and improved online services to their citizens. Such online services typically include applications for different types of permissions, requests for different types of official documents and management of different types of entitlements. The ID management scheme must therefore be able to correctly authenticate citizens and link online presence to real world identities. Many countries, in particular in the developing world, are currently introducing national ID management schemes for the first time. While most of these countries have paper based records, many of these are regionally based and few of these have been consolidated, so these records may contain incorrect, incomplete, inconsistent or redundant information. In this paper, we explore the design space for national ID management and online authentication schemes, in this context. In particular, we propose a simple model for issuing national ID numbers that satisfy these goals and use this model to examine two different ID management schemes implemented in Libya, which allows us to compare different approaches to national identity management. The two schemes were implemented within a fairly short time, so we may assume that the cultural, social, educational and technological factors remain unchanged. This allows a direct comparison of objectives and means. Based on this examination, we evaluate the current Libyan ID number system with respect to the identified objectives. Our evaluation of the two Libyan NID schemes show that if National Identity Management does not fully meet the requirements identified in our simple model, then it may be vulnerable to various forms of online risks such as impersonation and identity theft attacks. Considering online crime, during the design of an Identity Management system, is especially important in developing countries, where such crimes have not previously existed in the society.","PeriodicalId":330340,"journal":{"name":"2016 Information Security for South Africa (ISSA)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125256202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Effect of varying node mobility in the analysis of black hole attack on MANET reactive routing protocols 黑洞攻击分析中节点移动性变化对MANET被动路由协议的影响
Pub Date : 2016-08-01 DOI: 10.1109/ISSA.2016.7802930
Lineo Mejaele, E. O. Ochola
Mobile Ad-hoc Networks (MANETs) features such as open medium, dynamic topology, lack of centralised management and lack of infrastructure expose them to a number of security attacks. Black hole attack is one type of attack that is more common in MANET reactive routing protocols such as Ad-hoc On-demand Distance Vector (AODV) and Dynamic Source Routing (DSR). Black hole attack takes advantage of route discovery process in reactive routing protocols. In this type of attack, a malicious node misleads other nodes in the network by pretending to have the shortest and updated route to a target node whose packets it wants to interrupt. It then redirects all packets destined to a target node to itself and discards them instead of forwarding. This paper analyses the performance of AODV and DSR when attacked by black hole, by varying the mobility of the nodes in the network. The analysis is carried out by simulating scenarios of AODV based MANET and DSR based MANET using Network Simulator 2 (NS-2) and introducing the black hole attack in each of the scenarios. The different scenarios are generated by changing the mobility of the nodes. The performance metrics that are used to do the analysis are throughput, packet delivery ratio and end-to-end delay. The simulation results show that the performance of both AODV and DSR degrades in the presence of black hole attack. Throughput and packet delivery ratio decrease when the network is attacked by black hole because the malicious node absorbs or discards some of the packets. End-to-end delay is also reduced in the presence of a black hole attack because a malicious node pretends to have a valid route to destination without checking the routing table, and therefore shortens the route discovery process. The results also show that throughput decreases slightly when mobility of the nodes is increased in the network. The increase in the speed of the nodes decreases both end-to-end delay and packet delivery ratio.
移动自组织网络(manet)的特点,如开放介质、动态拓扑、缺乏集中管理和缺乏基础设施,使它们暴露在许多安全攻击之下。黑洞攻击是一种更常见的攻击类型,在MANET被动路由协议中,如Ad-hoc按需距离矢量(AODV)和动态源路由(DSR)。黑洞攻击利用了响应式路由协议中的路由发现过程。在这种类型的攻击中,恶意节点通过假装拥有到目标节点的最短且更新的路由来误导网络中的其他节点,从而中断目标节点的数据包。然后,它将所有预定到目标节点的数据包重定向到自己,并丢弃它们而不是转发。本文通过改变网络中节点的移动性,分析了AODV和DSR在受到黑洞攻击时的性能。利用网络模拟器2 (Network Simulator 2, NS-2)对基于AODV的MANET和基于DSR的MANET进行仿真分析,并在每种场景中引入黑洞攻击。通过改变节点的移动性,可以生成不同的场景。用于进行分析的性能指标是吞吐量、数据包传送率和端到端延迟。仿真结果表明,在存在黑洞攻击的情况下,AODV和DSR的性能都有所下降。当网络受到黑洞攻击时,由于恶意节点会吸收或丢弃部分报文,导致吞吐量和报文投递率下降。在存在黑洞攻击的情况下,端到端延迟也会减少,因为恶意节点在不检查路由表的情况下假装有一条到达目的地的有效路由,从而缩短了路由发现过程。结果还表明,当网络中节点的移动性增加时,吞吐量略有下降。节点速度的提高降低了端到端延迟和数据包分发率。
{"title":"Effect of varying node mobility in the analysis of black hole attack on MANET reactive routing protocols","authors":"Lineo Mejaele, E. O. Ochola","doi":"10.1109/ISSA.2016.7802930","DOIUrl":"https://doi.org/10.1109/ISSA.2016.7802930","url":null,"abstract":"Mobile Ad-hoc Networks (MANETs) features such as open medium, dynamic topology, lack of centralised management and lack of infrastructure expose them to a number of security attacks. Black hole attack is one type of attack that is more common in MANET reactive routing protocols such as Ad-hoc On-demand Distance Vector (AODV) and Dynamic Source Routing (DSR). Black hole attack takes advantage of route discovery process in reactive routing protocols. In this type of attack, a malicious node misleads other nodes in the network by pretending to have the shortest and updated route to a target node whose packets it wants to interrupt. It then redirects all packets destined to a target node to itself and discards them instead of forwarding. This paper analyses the performance of AODV and DSR when attacked by black hole, by varying the mobility of the nodes in the network. The analysis is carried out by simulating scenarios of AODV based MANET and DSR based MANET using Network Simulator 2 (NS-2) and introducing the black hole attack in each of the scenarios. The different scenarios are generated by changing the mobility of the nodes. The performance metrics that are used to do the analysis are throughput, packet delivery ratio and end-to-end delay. The simulation results show that the performance of both AODV and DSR degrades in the presence of black hole attack. Throughput and packet delivery ratio decrease when the network is attacked by black hole because the malicious node absorbs or discards some of the packets. End-to-end delay is also reduced in the presence of a black hole attack because a malicious node pretends to have a valid route to destination without checking the routing table, and therefore shortens the route discovery process. The results also show that throughput decreases slightly when mobility of the nodes is increased in the network. The increase in the speed of the nodes decreases both end-to-end delay and packet delivery ratio.","PeriodicalId":330340,"journal":{"name":"2016 Information Security for South Africa (ISSA)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117094484","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
An interactive visual library model to improve awareness in handling of business information 一个交互式可视化库模型,用于提高处理业务信息的意识
Pub Date : 2016-08-01 DOI: 10.1109/ISSA.2016.7802924
P. Delport, M. Gerber, Nader Sohrabi Safa
Information technology has changed organisational processes significantly. However, information security is still a controversial issue among experts in this domain. Information security breaches lead to loss of reputation, competitive advantages, intellectual properties, productivity, and revenue and in the worst scenario leads to bankruptcy. In this regard, awareness plays a vital role to mitigate information security threats. This study aims to present different threats that effect confidentiality, integrity and availability of information, pertaining to administrative employees, in an integrated and informative design, based on a review of literature. In addition, a possible interactive visual library is proposed, through a proof of concept that contributes to administrative employees' information security awareness. The results shed some light on this information security awareness issue, and provides the means for further academic study.
信息技术极大地改变了组织流程。然而,信息安全问题在该领域的专家中仍然是一个有争议的问题。信息安全漏洞会导致声誉、竞争优势、知识产权、生产力和收入的损失,在最坏的情况下会导致破产。在这方面,意识对于减轻信息安全威胁起着至关重要的作用。本研究的目的是提出不同的威胁,影响机密性,完整性和可用性的信息,有关行政雇员,在一个综合和信息的设计,基于文献综述。此外,通过概念验证,提出了一种可能的交互式可视化库,有助于管理员工的信息安全意识。研究结果揭示了这一信息安全意识问题,并为进一步的学术研究提供了手段。
{"title":"An interactive visual library model to improve awareness in handling of business information","authors":"P. Delport, M. Gerber, Nader Sohrabi Safa","doi":"10.1109/ISSA.2016.7802924","DOIUrl":"https://doi.org/10.1109/ISSA.2016.7802924","url":null,"abstract":"Information technology has changed organisational processes significantly. However, information security is still a controversial issue among experts in this domain. Information security breaches lead to loss of reputation, competitive advantages, intellectual properties, productivity, and revenue and in the worst scenario leads to bankruptcy. In this regard, awareness plays a vital role to mitigate information security threats. This study aims to present different threats that effect confidentiality, integrity and availability of information, pertaining to administrative employees, in an integrated and informative design, based on a review of literature. In addition, a possible interactive visual library is proposed, through a proof of concept that contributes to administrative employees' information security awareness. The results shed some light on this information security awareness issue, and provides the means for further academic study.","PeriodicalId":330340,"journal":{"name":"2016 Information Security for South Africa (ISSA)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133275662","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2016 Information Security for South Africa (ISSA)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1