首页 > 最新文献

2010 Information Security for South Africa最新文献

英文 中文
Digital Evidence Management Plan 数字证据管理计划
Pub Date : 2010-09-30 DOI: 10.1109/ISSA.2010.5588661
C. Grobler, B. Louwrens
The degree of the reliability, integrity, and availability of information in organizations can determine the credibility of the organization. As people and applications generate information, the information is stored in various places. It is vital for the organization to know where information is stored, what format it is, and how to access it. Not all information will be evidence but it is essential that organizations identify potential evidence proactively. Good evidence is a business enabler. Organizations require ‘good’ evidence to demonstrate due diligence with respect to good corporate and IT governance and to investigate and manage internal and external incidents. All internal and external forensic investigations hinge on ‘good’ evidence. Evidence in itself is not absolute, but is valuable when used to establish the truth about a particular incident. The paper will define digital evidence, propose a theoretical Evidence Management Plan (EMP), and briefly discuss potential benefits and constraints of the implementation of the proposed EMP.
组织中信息的可靠性、完整性和可用性的程度可以决定组织的可信度。当人们和应用程序生成信息时,这些信息存储在不同的地方。对于组织来说,了解信息的存储位置、格式以及访问方式是至关重要的。并非所有信息都将成为证据,但组织必须主动识别潜在的证据。好的证据是业务的推动者。组织需要“良好”的证据来证明良好的公司和IT治理方面的尽职调查,并调查和管理内部和外部事件。所有内部和外部的法医调查都取决于“好的”证据。证据本身并不是绝对的,但当用于确定特定事件的真相时,证据是有价值的。本文将定义数字证据,提出一个理论上的证据管理计划(EMP),并简要讨论实施拟议EMP的潜在好处和限制。
{"title":"Digital Evidence Management Plan","authors":"C. Grobler, B. Louwrens","doi":"10.1109/ISSA.2010.5588661","DOIUrl":"https://doi.org/10.1109/ISSA.2010.5588661","url":null,"abstract":"The degree of the reliability, integrity, and availability of information in organizations can determine the credibility of the organization. As people and applications generate information, the information is stored in various places. It is vital for the organization to know where information is stored, what format it is, and how to access it. Not all information will be evidence but it is essential that organizations identify potential evidence proactively. Good evidence is a business enabler. Organizations require ‘good’ evidence to demonstrate due diligence with respect to good corporate and IT governance and to investigate and manage internal and external incidents. All internal and external forensic investigations hinge on ‘good’ evidence. Evidence in itself is not absolute, but is valuable when used to establish the truth about a particular incident. The paper will define digital evidence, propose a theoretical Evidence Management Plan (EMP), and briefly discuss potential benefits and constraints of the implementation of the proposed EMP.","PeriodicalId":423118,"journal":{"name":"2010 Information Security for South Africa","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130167839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
On monitoring information flow of outsourced data 论外包数据信息流的监控
Pub Date : 2010-09-30 DOI: 10.1109/ISSA.2010.5588602
Anne Kayem
Data outsourcing is an Internet-based paradigm that allows organizations to share data cost-effectively by transferring data to a third-party service provider for management. Enforcing outsourced data privacy in untrustworthy environments is challenging because the data needs to be kept secret both from unauthorized users and the service provider (SP). Existing approaches propose that the data owner(s) encrypt the data before it is transferred to the service provider to preserve confidentiality. Access is only granted to a user initiated program if the key presented can decrypt the data into a readable format. Therefore the data owner can control access to the data without having to worry about the management costs. However, this approach fails to monitor the data once it has been retrieved from the SP's end. So, a user can retrieve information from the SP's end and share it with unauthorized users or even the SP. We propose a conceptual framework, based on the concept of dependence graphs, for monitoring data exchanges between programs in order to prevent unauthorized access. The framework has a distributed architecture which is suitable for data outsourcing environments and the web in general. Each data object contains a cryptographic tag (like an invisible digital watermark) that is computed by using a cryptographic hash function to combine the checksum of the data and the encryption key. In order to execute an operation with a data object the key presented for decryption must match the one associated with the user's role and generate a cryptographic tag that matches the one embedded into the data. Tracing data exchanges, in this way, can leverage data privacy for organizations that transfer data management to third party service providers.
数据外包是一种基于internet的范例,它允许组织通过将数据传输给第三方服务提供商进行管理来经济有效地共享数据。在不可信的环境中执行外包数据隐私是具有挑战性的,因为数据需要对未经授权的用户和服务提供商(SP)保密。现有的方法建议数据所有者在将数据传输给服务提供者之前对其进行加密,以保持机密性。只有当提供的密钥能够将数据解密为可读格式时,才授予用户启动的程序访问权限。因此,数据所有者可以控制对数据的访问,而不必担心管理成本。但是,一旦从SP端检索到数据,这种方法就无法监视数据。因此,用户可以从服务提供商端检索信息,并与未经授权的用户甚至服务提供商共享信息。我们提出了一个基于依赖图概念的概念框架,用于监控程序之间的数据交换,以防止未经授权的访问。该框架采用分布式架构,一般适用于数据外包环境和web。每个数据对象都包含一个加密标记(类似于不可见的数字水印),通过使用加密散列函数将数据的校验和和加密密钥组合在一起计算该标记。为了对数据对象执行操作,用于解密的密钥必须与用户角色关联的密钥匹配,并生成与嵌入到数据中的密钥匹配的加密标记。以这种方式跟踪数据交换,可以为将数据管理转移给第三方服务提供商的组织利用数据隐私。
{"title":"On monitoring information flow of outsourced data","authors":"Anne Kayem","doi":"10.1109/ISSA.2010.5588602","DOIUrl":"https://doi.org/10.1109/ISSA.2010.5588602","url":null,"abstract":"Data outsourcing is an Internet-based paradigm that allows organizations to share data cost-effectively by transferring data to a third-party service provider for management. Enforcing outsourced data privacy in untrustworthy environments is challenging because the data needs to be kept secret both from unauthorized users and the service provider (SP). Existing approaches propose that the data owner(s) encrypt the data before it is transferred to the service provider to preserve confidentiality. Access is only granted to a user initiated program if the key presented can decrypt the data into a readable format. Therefore the data owner can control access to the data without having to worry about the management costs. However, this approach fails to monitor the data once it has been retrieved from the SP's end. So, a user can retrieve information from the SP's end and share it with unauthorized users or even the SP. We propose a conceptual framework, based on the concept of dependence graphs, for monitoring data exchanges between programs in order to prevent unauthorized access. The framework has a distributed architecture which is suitable for data outsourcing environments and the web in general. Each data object contains a cryptographic tag (like an invisible digital watermark) that is computed by using a cryptographic hash function to combine the checksum of the data and the encryption key. In order to execute an operation with a data object the key presented for decryption must match the one associated with the user's role and generate a cryptographic tag that matches the one embedded into the data. Tracing data exchanges, in this way, can leverage data privacy for organizations that transfer data management to third party service providers.","PeriodicalId":423118,"journal":{"name":"2010 Information Security for South Africa","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125340312","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A novel protocol to allow revocation of votes a hybrid voting system 一种允许撤销投票的新协议——混合投票系统
Pub Date : 2010-09-30 DOI: 10.1109/ISSA.2010.5588262
Oliver Spycher, R. Haenni
A hybrid voting system allows voters to revoke their electronic vote at the polling station. This approach is meant to provide full individual and universal verifiability without introducing the threats of vote buying or voter coercion. Such an integration of traditional and electronic voting systems requires the voters' ability to prove whether they have already voted electronically, and if so, to show which of all the electronic votes published on the public bulletin board is theirs. This paper proposes in full cryptographic detail a novel e-voting protocol that allows voters to unambiguously show and prove to voting officials at the polling station if they have cast an electronic vote. If this is the case, the voters can use their secret credentials to locate their votes on the public bulletin board without giving up the secrecy of the credentials. Remarkably, our protocol enables them to do so, even if their votes have been cast by a third party that got hold of their credentials. We thus address the hardest possible attack on a voter's right to vote. Furthermore, unlike pure e-voting systems, our protocol allows the hybrid system to provide coercion-resistance even when voters are allowed to vote for write-in candidates. Our approach is meant to appeal to governments that aim at offering voters the choice between two channels for casting votes, rather than fully replacing their traditional paper-based voting scheme with an e-voting system.1
混合投票系统允许选民在投票站撤销他们的电子投票。这种方法的目的是提供充分的个人和普遍的可核查性,而不引入购买选票或强迫选民的威胁。这种传统和电子投票系统的整合要求选民有能力证明他们是否已经通过电子方式投票,如果是的话,还要显示在公共公告栏上公布的所有电子投票中,哪一张是他们的。本文以完整的密码学细节提出了一种新的电子投票协议,该协议允许选民明确地向投票站的投票官员展示和证明他们是否投了电子票。如果是这种情况,选民可以使用他们的秘密凭证在公共公告板上找到他们的投票,而不放弃凭证的保密性。值得注意的是,我们的协议允许他们这样做,即使他们的投票是由掌握他们凭证的第三方投的。因此,我们处理对选民投票权的最严厉的攻击。此外,与纯粹的电子投票系统不同,我们的协议允许混合系统提供抗胁迫性,即使选民被允许投票给自填候选人。我们的方法旨在吸引旨在为选民提供两种投票渠道选择的政府,而不是用电子投票系统完全取代传统的纸质投票方案
{"title":"A novel protocol to allow revocation of votes a hybrid voting system","authors":"Oliver Spycher, R. Haenni","doi":"10.1109/ISSA.2010.5588262","DOIUrl":"https://doi.org/10.1109/ISSA.2010.5588262","url":null,"abstract":"A hybrid voting system allows voters to revoke their electronic vote at the polling station. This approach is meant to provide full individual and universal verifiability without introducing the threats of vote buying or voter coercion. Such an integration of traditional and electronic voting systems requires the voters' ability to prove whether they have already voted electronically, and if so, to show which of all the electronic votes published on the public bulletin board is theirs. This paper proposes in full cryptographic detail a novel e-voting protocol that allows voters to unambiguously show and prove to voting officials at the polling station if they have cast an electronic vote. If this is the case, the voters can use their secret credentials to locate their votes on the public bulletin board without giving up the secrecy of the credentials. Remarkably, our protocol enables them to do so, even if their votes have been cast by a third party that got hold of their credentials. We thus address the hardest possible attack on a voter's right to vote. Furthermore, unlike pure e-voting systems, our protocol allows the hybrid system to provide coercion-resistance even when voters are allowed to vote for write-in candidates. Our approach is meant to appeal to governments that aim at offering voters the choice between two channels for casting votes, rather than fully replacing their traditional paper-based voting scheme with an e-voting system.1","PeriodicalId":423118,"journal":{"name":"2010 Information Security for South Africa","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121061687","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A Digital Forensic Readiness framework for South African SME's 南非中小企业的数字取证准备框架
Pub Date : 2010-09-30 DOI: 10.1109/ISSA.2010.5588281
D. Barske, A. Stander, J. Jordaan
In this digital age, most business is conducted electronically. This contemporary paradigm creates openings for potentially harmful unanticipated information security incidents of both a criminal or civil nature, with the potential to cause considerable direct and indirect damage to smaller businesses. Electronic evidence is fundamental to the successful handling of such incidents. If an organisation does not prepare proactively for such incidents it is highly likely that important relevant digital evidence will not be available. Not being able to respond effectively could be extremely damaging to smaller companies, as they are unable to absorb losses as easily as larger organisations. In order to prepare smaller businesses for incidents of this nature, the implementation of Digital Forensic Readiness policies and procedures is necessitated. Numerous varying factors such as the perceived high cost, as well as the current lack of forensic skills, make the implementation of Digital Forensic Readiness appear difficult if not infeasible for smaller organisations. In order to solve this problem it is necessary to develop a scalable and flexible framework for the implementation of Digital Forensic Readiness based on the individual risk profile of a small to medium enterprise (SME). This paper aims to determine, from literature, the concepts of Digital Forensic Readiness and how they apply to SMEs. Based on the findings, the aspects of Digital Forensics and organisational characteristics that should be included in such a framework is highlighted.
在这个数字时代,大多数业务都是通过电子方式进行的。这种当代的模式为潜在的有害的意外信息安全事件(包括刑事或民事性质)创造了机会,有可能对小型企业造成相当大的直接和间接损害。电子证据是成功处理此类事件的基础。如果组织没有为此类事件做好积极准备,则很可能无法获得重要的相关数字证据。不能有效应对可能对小公司造成极大的损害,因为它们无法像大公司那样轻易地吸收损失。为了让小型企业为这种性质的事件做好准备,有必要实施数字取证准备政策和程序。许多不同的因素,如高成本,以及目前缺乏取证技能,使得数字取证准备对于小型组织来说即使不是不可行的,实施起来也很困难。为了解决这个问题,有必要根据中小型企业(SME)的个人风险概况,开发一个可扩展和灵活的框架来实施数字取证准备。本文旨在从文献中确定数字取证准备的概念以及它们如何应用于中小企业。根据调查结果,数字取证和组织特征方面应该包括在这样一个框架被强调。
{"title":"A Digital Forensic Readiness framework for South African SME's","authors":"D. Barske, A. Stander, J. Jordaan","doi":"10.1109/ISSA.2010.5588281","DOIUrl":"https://doi.org/10.1109/ISSA.2010.5588281","url":null,"abstract":"In this digital age, most business is conducted electronically. This contemporary paradigm creates openings for potentially harmful unanticipated information security incidents of both a criminal or civil nature, with the potential to cause considerable direct and indirect damage to smaller businesses. Electronic evidence is fundamental to the successful handling of such incidents. If an organisation does not prepare proactively for such incidents it is highly likely that important relevant digital evidence will not be available. Not being able to respond effectively could be extremely damaging to smaller companies, as they are unable to absorb losses as easily as larger organisations. In order to prepare smaller businesses for incidents of this nature, the implementation of Digital Forensic Readiness policies and procedures is necessitated. Numerous varying factors such as the perceived high cost, as well as the current lack of forensic skills, make the implementation of Digital Forensic Readiness appear difficult if not infeasible for smaller organisations. In order to solve this problem it is necessary to develop a scalable and flexible framework for the implementation of Digital Forensic Readiness based on the individual risk profile of a small to medium enterprise (SME). This paper aims to determine, from literature, the concepts of Digital Forensic Readiness and how they apply to SMEs. Based on the findings, the aspects of Digital Forensics and organisational characteristics that should be included in such a framework is highlighted.","PeriodicalId":423118,"journal":{"name":"2010 Information Security for South Africa","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126693568","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 48
A conceptual operational risk model for SMEs: Impact on organisational information technology 中小企业的概念性运营风险模型:对组织信息技术的影响
Pub Date : 2010-09-30 DOI: 10.1109/ISSA.2010.5588329
A. Bayaga, Stephen Flowerday
Building on prior research related to the impact of information technology (IT) and operational risk management (OPM) in the context of SMEs, this paper proposes there is a relationship between IT operational risk management and performances of SMEs. Specifically, a model is developed showing the relationship between IT operational risks, evaluation models, principal causes of IT failure, change management requirements, characteristic(s) of business information and lastly disorganised (chaotic) state of organisation(s) will never lead to the same results of operational risk management (ORM). Conceptual and empirical literature is explained within this model. The discussions are then used to generate research propositions that represent the models which in effect provide insight on how the variables are linked. Hence, further research can prove empirically the relationships and hence provide a contribution in the area of IT operational risk with regards to SMEs.
基于先前对中小企业背景下信息技术(IT)和操作风险管理(OPM)影响的相关研究,本文提出IT操作风险管理与中小企业绩效之间存在关系。具体来说,开发了一个模型,显示了IT运营风险、评估模型、IT失败的主要原因、变更管理需求、业务信息特征以及组织的混乱状态之间的关系,这些关系永远不会导致运营风险管理(ORM)的相同结果。概念和实证文献在这个模型中解释。然后,这些讨论被用来产生代表模型的研究命题,这些模型实际上提供了对变量如何联系的见解。因此,进一步的研究可以从经验上证明这种关系,从而为中小企业的IT运营风险领域提供贡献。
{"title":"A conceptual operational risk model for SMEs: Impact on organisational information technology","authors":"A. Bayaga, Stephen Flowerday","doi":"10.1109/ISSA.2010.5588329","DOIUrl":"https://doi.org/10.1109/ISSA.2010.5588329","url":null,"abstract":"Building on prior research related to the impact of information technology (IT) and operational risk management (OPM) in the context of SMEs, this paper proposes there is a relationship between IT operational risk management and performances of SMEs. Specifically, a model is developed showing the relationship between IT operational risks, evaluation models, principal causes of IT failure, change management requirements, characteristic(s) of business information and lastly disorganised (chaotic) state of organisation(s) will never lead to the same results of operational risk management (ORM). Conceptual and empirical literature is explained within this model. The discussions are then used to generate research propositions that represent the models which in effect provide insight on how the variables are linked. Hence, further research can prove empirically the relationships and hence provide a contribution in the area of IT operational risk with regards to SMEs.","PeriodicalId":423118,"journal":{"name":"2010 Information Security for South Africa","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133775154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Phishing within e-commerce: A trust and confidence game 电子商务中的网络钓鱼:一个信任和信心的游戏
Pub Date : 2010-09-30 DOI: 10.1109/ISSA.2010.5588333
Gregory M Megaw, Stephen Flowerday
E-Commerce has been plagued with problems since its inception and this paper examines one of these problems: The lack of user trust in E-commerce created by the risk of phishing. Phishing has grown exponentially together with the expansion of the Internet. This growth and the advancement of technology has not only benefitted honest Internet users, but has enabled criminals to increase their effectiveness which has caused considerable damage to this budding area of commerce. Moreover, it has negatively impacted on both the user and online business, breaking down the trust relationship between them. In an attempt to explore this problem, the following was considered; firstly, e-commerce's vulnerability to phishing attacks. By referring to the Common Criteria Security Model, various critical security areas within e-commerce are identified, and with that, the areas of vulnerability and weakness. Secondly, the methods and techniques used in phishing such as phishing emails, phishing websites and addresses, distributed attacks and redirected attacks as well as the data that phishers seek to obtain, is examined. Furthermore, the way to reduce the risk of phishing and in turn increase the trust between users and websites is explored. Here the importance of Trust and the Uncertainty Reduction Theory plus the fine balance between trust and control is explored. Finally, the paper presents Critical Success Factors that aid in phishing prevention and control, these being: User Authentication, Website Authentication, Email Authentication, Data Cryptography, Communication, and Active Risk Mitigation.
电子商务从一开始就受到各种问题的困扰,本文研究了其中一个问题:网络钓鱼风险造成的用户对电子商务缺乏信任。网络钓鱼随着互联网的发展呈指数级增长。这种增长和技术的进步不仅使诚实的互联网用户受益,而且使犯罪分子能够提高他们的效率,这给这个新兴的商业领域造成了相当大的损害。此外,它对用户和在线业务都产生了负面影响,破坏了他们之间的信任关系。为了探讨这个问题,我们考虑了以下几点;首先,电子商务容易受到网络钓鱼攻击。通过引用公共标准安全模型,可以确定电子商务中的各种关键安全领域,以及漏洞和弱点领域。其次,研究了网络钓鱼所使用的方法和技术,如网络钓鱼电子邮件、网络钓鱼网站和地址、分布式攻击和重定向攻击,以及网络钓鱼者试图获取的数据。此外,还探讨了如何降低网络钓鱼的风险,从而增加用户与网站之间的信任。本文探讨了信任和不确定性减少理论的重要性,以及信任与控制之间的微妙平衡。最后,本文提出了有助于网络钓鱼预防和控制的关键成功因素,这些因素是:用户身份验证、网站身份验证、电子邮件身份验证、数据加密、通信和主动风险缓解。
{"title":"Phishing within e-commerce: A trust and confidence game","authors":"Gregory M Megaw, Stephen Flowerday","doi":"10.1109/ISSA.2010.5588333","DOIUrl":"https://doi.org/10.1109/ISSA.2010.5588333","url":null,"abstract":"E-Commerce has been plagued with problems since its inception and this paper examines one of these problems: The lack of user trust in E-commerce created by the risk of phishing. Phishing has grown exponentially together with the expansion of the Internet. This growth and the advancement of technology has not only benefitted honest Internet users, but has enabled criminals to increase their effectiveness which has caused considerable damage to this budding area of commerce. Moreover, it has negatively impacted on both the user and online business, breaking down the trust relationship between them. In an attempt to explore this problem, the following was considered; firstly, e-commerce's vulnerability to phishing attacks. By referring to the Common Criteria Security Model, various critical security areas within e-commerce are identified, and with that, the areas of vulnerability and weakness. Secondly, the methods and techniques used in phishing such as phishing emails, phishing websites and addresses, distributed attacks and redirected attacks as well as the data that phishers seek to obtain, is examined. Furthermore, the way to reduce the risk of phishing and in turn increase the trust between users and websites is explored. Here the importance of Trust and the Uncertainty Reduction Theory plus the fine balance between trust and control is explored. Finally, the paper presents Critical Success Factors that aid in phishing prevention and control, these being: User Authentication, Website Authentication, Email Authentication, Data Cryptography, Communication, and Active Risk Mitigation.","PeriodicalId":423118,"journal":{"name":"2010 Information Security for South Africa","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130584851","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Towards an information security framework for service-oriented architecture 面向服务的体系结构的信息安全框架
Pub Date : 2010-09-30 DOI: 10.1109/ISSA.2010.5588272
J. Chetty, M. Coetzee
Service-oriented architectures support distributed heterogeneous environments where business transactions occur among loosely connected services. Ensuring a secure infrastructure for this environment is challenging. There are currently various approaches to addressing information security, each with its own set of benefits and difficulties. Additionally, organisations can adopt vendor-based information security frameworks to assist them in implementing adequate information security controls. Unfortunately, there is no standard information security framework that has been adopted for service-oriented architectures. This paper analyses the information security challenges faced by service-oriented architectures. Information security components for a service-oriented architecture environment are proposed. These components were developed collectively from service-oriented architecture design principles, the ISO/IEC 27002:2005 standard, and other service-oriented architecture governance frameworks. The information security framework can assist organisations in determining information security controls for service-oriented architectures, aligned to current ISO/IEC 27002:2005 standards.
面向服务的体系结构支持分布式异构环境,其中业务事务发生在松散连接的服务之间。为这种环境确保安全的基础设施是一项挑战。目前有各种处理信息安全的方法,每种方法都有自己的优点和困难。此外,机构可以采用以供应商为基础的资讯保安架构,以协助他们实施适当的资讯保安控制。不幸的是,面向服务的体系结构还没有采用标准的信息安全框架。分析了面向服务的体系结构所面临的信息安全挑战。提出了面向服务的体系结构环境下的信息安全组件。这些组件是根据面向服务的体系结构设计原则、ISO/IEC 27002:2005标准和其他面向服务的体系结构治理框架共同开发的。信息安全框架可以帮助组织确定面向服务的体系结构的信息安全控制,与当前的ISO/IEC 27002:2005标准保持一致。
{"title":"Towards an information security framework for service-oriented architecture","authors":"J. Chetty, M. Coetzee","doi":"10.1109/ISSA.2010.5588272","DOIUrl":"https://doi.org/10.1109/ISSA.2010.5588272","url":null,"abstract":"Service-oriented architectures support distributed heterogeneous environments where business transactions occur among loosely connected services. Ensuring a secure infrastructure for this environment is challenging. There are currently various approaches to addressing information security, each with its own set of benefits and difficulties. Additionally, organisations can adopt vendor-based information security frameworks to assist them in implementing adequate information security controls. Unfortunately, there is no standard information security framework that has been adopted for service-oriented architectures. This paper analyses the information security challenges faced by service-oriented architectures. Information security components for a service-oriented architecture environment are proposed. These components were developed collectively from service-oriented architecture design principles, the ISO/IEC 27002:2005 standard, and other service-oriented architecture governance frameworks. The information security framework can assist organisations in determining information security controls for service-oriented architectures, aligned to current ISO/IEC 27002:2005 standards.","PeriodicalId":423118,"journal":{"name":"2010 Information Security for South Africa","volume":"212 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122655173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Secure publish-subscribe mediated virtual organizations 安全的发布-订阅中介虚拟组织
Pub Date : 2010-09-30 DOI: 10.1109/ISSA.2010.5588301
R. Ssekibuule
Digital technologies such as publish-subscribe systems present dynamic services support for inter-organizational activities. In order for these systems to achieve usage acceptance, various security requirements have to be met by the enabling technologies. In this article, we focus on confidentiality, privacy and integrity requirements for Publishers and Subscribers in a Publish-Subscribe mediated electronic market. We consider a virtual organization architecture, in which subscribers dynamically join and leave various organizations. We review techniques previously suggested in literature for providing confidentiality, privacy and integrity requirements and then present a new solution which is based on cryptographic hashes and public-key cryptography.
发布-订阅系统等数字技术为组织间活动提供了动态服务支持。为了使这些系统获得使用认可,启用技术必须满足各种安全需求。在本文中,我们将重点讨论以发布-订阅为中介的电子市场中发布者和订阅者的机密性、隐私性和完整性需求。我们考虑一个虚拟组织体系结构,其中订阅者动态地加入和离开各种组织。我们回顾了先前文献中提出的用于提供机密性、隐私性和完整性要求的技术,然后提出了一个基于加密哈希和公钥加密的新解决方案。
{"title":"Secure publish-subscribe mediated virtual organizations","authors":"R. Ssekibuule","doi":"10.1109/ISSA.2010.5588301","DOIUrl":"https://doi.org/10.1109/ISSA.2010.5588301","url":null,"abstract":"Digital technologies such as publish-subscribe systems present dynamic services support for inter-organizational activities. In order for these systems to achieve usage acceptance, various security requirements have to be met by the enabling technologies. In this article, we focus on confidentiality, privacy and integrity requirements for Publishers and Subscribers in a Publish-Subscribe mediated electronic market. We consider a virtual organization architecture, in which subscribers dynamically join and leave various organizations. We review techniques previously suggested in literature for providing confidentiality, privacy and integrity requirements and then present a new solution which is based on cryptographic hashes and public-key cryptography.","PeriodicalId":423118,"journal":{"name":"2010 Information Security for South Africa","volume":"263 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120873197","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An investigation and survey of response options for Intrusion Response Systems (IRSs) 入侵响应系统(IRSs)响应方案的调查与调查
Pub Date : 2010-09-30 DOI: 10.1109/ISSA.2010.5588654
N. B. Anuar, M. Papadaki, S. Furnell, N. Clarke
The rise of attacks and incidents need additional and distinct methods of response. This paper starts a discussion by differentiating the type of operation mode such as Intrusion Detection Systems (IDSs), Intrusion Prevention Systems (IPSs) and Intrusion Response Systems (IRSs). Using characteristics of response and attack time frame, a response model is proposed to distinguish between active and passive response options. The characteristics of response include level of operations, speed and time of response, ability to learn and ability to cooperate with other devices. This paper uses the attack time frame as a response model to show the relationship between active and passive response. Furthermore, the Response Model for Intrusion Response Systems shows some other different approaches and stages of active response. Finally, in order to investigate the most common response used by security practitioner and to justify the response model, studies involving 34 samples products from both commercial and non-commercial are analysed. As a result, this paper shows a clear distinction between the options of responses.
攻击和事件的增加需要额外和独特的反应方法。本文首先对入侵检测系统(ids)、入侵防御系统(ips)和入侵响应系统(IRSs)的运行模式进行了分类讨论。利用响应和攻击时间框架的特征,提出了一种区分主动和被动响应选项的响应模型。响应的特征包括操作水平、响应速度和时间、学习能力和与其他设备的合作能力。本文采用攻击时间框架作为响应模型来表示主动和被动响应之间的关系。此外,入侵响应系统的响应模型还显示了主动响应的其他不同方法和阶段。最后,为了调查安全从业者使用的最常见的反应,并证明反应模型的合理性,研究涉及34个样本产品从商业和非商业分析。因此,本文显示了响应选项之间的明显区别。
{"title":"An investigation and survey of response options for Intrusion Response Systems (IRSs)","authors":"N. B. Anuar, M. Papadaki, S. Furnell, N. Clarke","doi":"10.1109/ISSA.2010.5588654","DOIUrl":"https://doi.org/10.1109/ISSA.2010.5588654","url":null,"abstract":"The rise of attacks and incidents need additional and distinct methods of response. This paper starts a discussion by differentiating the type of operation mode such as Intrusion Detection Systems (IDSs), Intrusion Prevention Systems (IPSs) and Intrusion Response Systems (IRSs). Using characteristics of response and attack time frame, a response model is proposed to distinguish between active and passive response options. The characteristics of response include level of operations, speed and time of response, ability to learn and ability to cooperate with other devices. This paper uses the attack time frame as a response model to show the relationship between active and passive response. Furthermore, the Response Model for Intrusion Response Systems shows some other different approaches and stages of active response. Finally, in order to investigate the most common response used by security practitioner and to justify the response model, studies involving 34 samples products from both commercial and non-commercial are analysed. As a result, this paper shows a clear distinction between the options of responses.","PeriodicalId":423118,"journal":{"name":"2010 Information Security for South Africa","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115880283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 50
Social engineering attack detection model: SEADM 社会工程攻击检测模型:SEADM
Pub Date : 2010-09-30 DOI: 10.1109/ISSA.2010.5588500
Monique Bezuidenhout, Francois Mouton, H. Venter
Social engineering is a real threat to industries in this day and age even though the severity of it is extremely downplayed. The difficulty with social engineering attacks is mostly the ability to identify them. Social engineers target call centre employees, as they are normally underpaid, under skilled workers whom have limited knowledge about the information technology infrastructure. These workers are thus easy targets for the social engineer. This paper proposes a model which can be used by these workers to detect social engineering attacks in a call centre environment. The model is a quick and effective way to determine if the requester is trying to manipulate an individual into disclosing information to which the requester does not have authorization for.
在这个时代,社会工程对工业是一个真正的威胁,尽管它的严重性被大大低估了。社会工程攻击的困难主要在于识别它们的能力。社会工程师的目标是呼叫中心的员工,因为他们的工资通常较低,缺乏对信息技术基础设施了解有限的熟练工人。因此,这些工人很容易成为社会工程师的目标。本文提出了一个模型,该模型可以被这些工作人员用来检测呼叫中心环境中的社会工程攻击。该模型是一种快速有效的方法,可以确定请求者是否试图操纵个人,使其披露请求者没有授权的信息。
{"title":"Social engineering attack detection model: SEADM","authors":"Monique Bezuidenhout, Francois Mouton, H. Venter","doi":"10.1109/ISSA.2010.5588500","DOIUrl":"https://doi.org/10.1109/ISSA.2010.5588500","url":null,"abstract":"Social engineering is a real threat to industries in this day and age even though the severity of it is extremely downplayed. The difficulty with social engineering attacks is mostly the ability to identify them. Social engineers target call centre employees, as they are normally underpaid, under skilled workers whom have limited knowledge about the information technology infrastructure. These workers are thus easy targets for the social engineer. This paper proposes a model which can be used by these workers to detect social engineering attacks in a call centre environment. The model is a quick and effective way to determine if the requester is trying to manipulate an individual into disclosing information to which the requester does not have authorization for.","PeriodicalId":423118,"journal":{"name":"2010 Information Security for South Africa","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115642449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 70
期刊
2010 Information Security for South Africa
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1