首页 > 最新文献

ARIS2 - Advanced Research on Information Systems Security最新文献

英文 中文
(In)Security in Wi-Fi networks: a systematic review (二)Wi-Fi网络的安全性:系统综述
Pub Date : 2022-12-30 DOI: 10.56394/aris2.v2i2.18
Diogo Faíscas
Everyone wants to be connected to the internet at every second of their lives. Due to the ease and speed of access, Wi-Fi networks are the main internet connection point of users. The amount and coverage of Wi-Fi networks multiplies each passing day, as all the countries are now trying to give free Wi-Fi at public places. If we search for available networks anywhere with our phone, there will be very few places where there are not at least one or two networks available. In this paper we will do a systematic review of papers and literature indexed in Google Scholar; Research Gate or IEEE and on reliable webpages like Cisco, that analyze the risk to which Wi-Fi networks are exposed and why these networks are insecure. We will specially investigate the most used wireless security protocols like WEP; WPA; WPA2 or WPA3.
每个人都想每时每刻都连接到互联网上。由于接入的方便性和速度,Wi-Fi网络是用户的主要互联网连接点。Wi-Fi网络的数量和覆盖范围每天都在增加,因为所有国家现在都试图在公共场所提供免费Wi-Fi。如果我们用手机在任何地方搜索可用的网络,很少有地方没有至少一个或两个可用的网络。本文将对b谷歌Scholar收录的论文和文献进行系统综述;研究门(Research Gate)或IEEE,以及思科(Cisco)等可靠的网站,这些网站分析了Wi-Fi网络面临的风险,以及这些网络不安全的原因。我们将特别研究最常用的无线安全协议,如WEP;水渍险;WPA2或WPA3。
{"title":"(In)Security in Wi-Fi networks: a systematic review","authors":"Diogo Faíscas","doi":"10.56394/aris2.v2i2.18","DOIUrl":"https://doi.org/10.56394/aris2.v2i2.18","url":null,"abstract":"Everyone wants to be connected to the internet at every second of their lives. Due to the ease and speed of access, Wi-Fi networks are the main internet connection point of users. The amount and coverage of Wi-Fi networks multiplies each passing day, as all the countries are now trying to give free Wi-Fi at public places. If we search for available networks anywhere with our phone, there will be very few places where there are not at least one or two networks available. In this paper we will do a systematic review of papers and literature indexed in Google Scholar; Research Gate or IEEE and on reliable webpages like Cisco, that analyze the risk to which Wi-Fi networks are exposed and why these networks are insecure. We will specially investigate the most used wireless security protocols like WEP; WPA; WPA2 or WPA3.","PeriodicalId":438607,"journal":{"name":"ARIS2 - Advanced Research on Information Systems Security","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130509173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Post-Quantum Cryptography Post-Quantum密码学
Pub Date : 2022-12-30 DOI: 10.1007/978-3-540-88702-7
Jose Pinto
{"title":"Post-Quantum Cryptography","authors":"Jose Pinto","doi":"10.1007/978-3-540-88702-7","DOIUrl":"https://doi.org/10.1007/978-3-540-88702-7","url":null,"abstract":"","PeriodicalId":438607,"journal":{"name":"ARIS2 - Advanced Research on Information Systems Security","volume":"242 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132549608","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 123
Predicting Cybersecurity Risk - A Methodology for Assessments 预测网络安全风险——一种评估方法
Pub Date : 2022-12-30 DOI: 10.56394/aris2.v2i2.23
Daniel Jorge Ferreira, Henrique São Mamede
Defining an appropriate cybersecurity incident response model is a critical challenge that all companies face on a daily basis.However, there is not always an adequate answer. This is due to the lack of predictive models based on data (evidence). There is a significant investment in research to identify the main factors that can cause such incidents, always trying to have the most appropriate response and, consequently, enhancing response capacity and success. At the same time, several different methodologies assess the risk management and maturity level of organizations.There is, however, a gap in determining an organization's degree of proactive responsiveness to successfully adopt cybersecurity and an even more significant gap in assessing it from a risk management perspective. This paper proposes a model to evaluate this capacity, a model that intends to evaluate the methodological aspects of an organization and indicates the apparent gaps that can negatively impact the future of the organization in the management of cybersecurity incidents and presents a model that intends to be proactive.
定义一个适当的网络安全事件响应模型是所有公司每天面临的一个关键挑战。然而,并不总是有一个恰当的答案。这是由于缺乏基于数据(证据)的预测模型。在研究方面投入了大量资金,以确定可能导致此类事件的主要因素,始终努力作出最适当的反应,从而提高反应能力和成功率。同时,几种不同的方法评估组织的风险管理和成熟度水平。然而,在确定组织成功采用网络安全的主动响应程度方面存在差距,从风险管理的角度评估网络安全方面存在更大的差距。本文提出了一个模型来评估这种能力,该模型旨在评估组织的方法方面,并指出可能对组织在网络安全事件管理方面的未来产生负面影响的明显差距,并提出了一个旨在积极主动的模型。
{"title":"Predicting Cybersecurity Risk - A Methodology for Assessments","authors":"Daniel Jorge Ferreira, Henrique São Mamede","doi":"10.56394/aris2.v2i2.23","DOIUrl":"https://doi.org/10.56394/aris2.v2i2.23","url":null,"abstract":"Defining an appropriate cybersecurity incident response model is a critical challenge that all companies face on a daily basis.However, there is not always an adequate answer. This is due to the lack of predictive models based on data (evidence). There is a significant investment in research to identify the main factors that can cause such incidents, always trying to have the most appropriate response and, consequently, enhancing response capacity and success. At the same time, several different methodologies assess the risk management and maturity level of organizations.There is, however, a gap in determining an organization's degree of proactive responsiveness to successfully adopt cybersecurity and an even more significant gap in assessing it from a risk management perspective. This paper proposes a model to evaluate this capacity, a model that intends to evaluate the methodological aspects of an organization and indicates the apparent gaps that can negatively impact the future of the organization in the management of cybersecurity incidents and presents a model that intends to be proactive.","PeriodicalId":438607,"journal":{"name":"ARIS2 - Advanced Research on Information Systems Security","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129795833","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Steganography and Computer Forensics - the art of hiding information: a systematic review 隐写术和计算机取证——隐藏信息的艺术:系统回顾
Pub Date : 2022-12-30 DOI: 10.56394/aris2.v2i2.20
Claudia Sofia Fernandes
This paper focuses on the study of steganoprahy as an anti-forensic method. The purpose of steganography techniques is to hide information from individuals unrelated to its content.  Through a systematic review, the objectives of this article are: (I) explore and investigate the importance of steganography in computer forensics; (II) understand and analyze the methodology used to hide information in a file and (III) understand and analyze the methodology used to extract the information. The results summarize the previous research on this topics and we conclude the article with a warning to develpop more studies regarding this thematic as well as and make the security forces aware of this type of digital evidence and, in the same way that the methodology is being developed, the stegananalysis must also seek, at least, to reach the same technological level
本文主要研究隐写术作为一种反法医方法。隐写技术的目的是对与其内容无关的个人隐藏信息。通过系统的回顾,本文的目标是:(1)探索和调查隐写术在计算机取证中的重要性;(II)理解并分析用于在文件中隐藏信息的方法;(III)理解并分析用于提取信息的方法。结果总结了以前对这一主题的研究,我们总结了一个警告,以发展更多关于这一主题的研究,并使安全部队意识到这种类型的数字证据,并且,以同样的方式,方法正在开发,隐写分析也必须寻求,至少,达到相同的技术水平
{"title":"Steganography and Computer Forensics - the art of hiding information: a systematic review","authors":"Claudia Sofia Fernandes","doi":"10.56394/aris2.v2i2.20","DOIUrl":"https://doi.org/10.56394/aris2.v2i2.20","url":null,"abstract":"This paper focuses on the study of steganoprahy as an anti-forensic method. The purpose of steganography techniques is to hide information from individuals unrelated to its content.  Through a systematic review, the objectives of this article are: (I) explore and investigate the importance of steganography in computer forensics; (II) understand and analyze the methodology used to hide information in a file and (III) understand and analyze the methodology used to extract the information. The results summarize the previous research on this topics and we conclude the article with a warning to develpop more studies regarding this thematic as well as and make the security forces aware of this type of digital evidence and, in the same way that the methodology is being developed, the stegananalysis must also seek, at least, to reach the same technological level","PeriodicalId":438607,"journal":{"name":"ARIS2 - Advanced Research on Information Systems Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123411586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Editorial - ARIS - Advanced Research on Information Security 社论- ARIS -信息安全的高级研究
Pub Date : 2022-12-30 DOI: 10.56394/aris2.v2i2.25
N. Mateus-Coelho
The globe continues to support an abnormal occurrence that has a severe influence on cyber security, which is the conflict between Russia and Ukraine that persists in establishing the first cyber war. This assistance comes as the year 2022 reaches its last range. Since the beginning of this fight, two enormous organizations have been formed in order to investigate potential weaknesses in the security measures used by either side. They exploit weaknesses and resort to force or engage in social engineering in order to achieve their goals.
全球继续支持一种对网络安全产生严重影响的异常现象,这就是持续引发第一次网络战争的俄罗斯和乌克兰之间的冲突。这项援助是在2022年达到最后一个范围时提供的。自从这场斗争开始以来,已经成立了两个庞大的组织,以调查任何一方使用的安全措施的潜在弱点。他们利用弱点,诉诸武力或从事社会工程,以实现他们的目标。
{"title":"Editorial - ARIS - Advanced Research on Information Security","authors":"N. Mateus-Coelho","doi":"10.56394/aris2.v2i2.25","DOIUrl":"https://doi.org/10.56394/aris2.v2i2.25","url":null,"abstract":"The globe continues to support an abnormal occurrence that has a severe influence on cyber security, which is the conflict between Russia and Ukraine that persists in establishing the first cyber war. This assistance comes as the year 2022 reaches its last range. Since the beginning of this fight, two enormous organizations have been formed in order to investigate potential weaknesses in the security measures used by either side. They exploit weaknesses and resort to force or engage in social engineering in order to achieve their goals.","PeriodicalId":438607,"journal":{"name":"ARIS2 - Advanced Research on Information Systems Security","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131808329","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Editorial of ARIS2 - Advanced Research on Information Systems Security, an International Journal 《信息系统安全高级研究》,国际期刊
Pub Date : 2022-08-18 DOI: 10.56394/aris2.v2i1.16
N. Mateus-Coelho
As the year 2022 enters its middle range, the world is assisting an abnormal event with a heavy impact on cyber security, the Russian-Ukraine conflict. Since the beginning of this conflict that two immense groups have been created and explore security flaws within each side and to do so with success, they resort to vulnerabilities, coercion, or social engineering techniques. Protecting information, actors, and their frameworks has emerged as a critical struggle and science has an immense role in performing and maintaining security actors one step forward in this scenario.
在2022年进入中期之际,世界正在协助一件对网络安全产生重大影响的异常事件——俄乌冲突。自从这场冲突开始以来,两个巨大的团体已经被创建,并探索双方的安全漏洞,并成功地做到了这一点,他们求助于漏洞、强制或社会工程技术。保护信息、参与者及其框架已经成为一场关键的斗争,科学在执行和维护安全参与者方面发挥着巨大的作用。
{"title":"Editorial of ARIS2 - Advanced Research on Information Systems Security, an International Journal","authors":"N. Mateus-Coelho","doi":"10.56394/aris2.v2i1.16","DOIUrl":"https://doi.org/10.56394/aris2.v2i1.16","url":null,"abstract":"As the year 2022 enters its middle range, the world is assisting an abnormal event with a heavy impact on cyber security, the Russian-Ukraine conflict. Since the beginning of this conflict that two immense groups have been created and explore security flaws within each side and to do so with success, they resort to vulnerabilities, coercion, or social engineering techniques. Protecting information, actors, and their frameworks has emerged as a critical struggle and science has an immense role in performing and maintaining security actors one step forward in this scenario.","PeriodicalId":438607,"journal":{"name":"ARIS2 - Advanced Research on Information Systems Security","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134215550","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of Infrastructural Challenges, Cybercrime, and the Cashless Policy in Nigeria 分析尼日利亚的基础设施挑战、网络犯罪和无现金政策
Pub Date : 2022-08-11 DOI: 10.56394/aris2.v2i1.15
Ibrahim Musa, S. Magaji, Abul Hassan
Abstract This study makes an analysis of infrastructural challenges and the cashless policy in Kaduna state, Nigeria. A survey was conducted to collect the primary data through a structured questionnaire and interviews with bank customers, bank officials, and security personnel to obtain information on infrastructural challenges since the introduction of the Cashless policy by the Central Bank of Nigeria in 2012. Frequency distribution and simple percentage methods are used to analyze the data.  Findings show that infrastructural challenges include network failure and infrastructural deficiency, debiting by Automated Teller Machine (ATM) without disbursing cash to beneficiaries, problems not rectified quickly by the banks, and charging by banks for using electronic banking methods. This leads to fraud, cybercrimes, and reduced confidence in the banking system. It is recommended that banks should be made to provide the minimum infrastructure required for cashless policy to succeed. In addition, there should be adequate cyber security measures implemented by banks and the government.
摘要本研究分析了尼日利亚卡杜纳州的基础设施挑战和无现金政策。通过结构化问卷调查和对银行客户、银行官员和安全人员的访谈,进行了一项调查,以收集主要数据,以获取自2012年尼日利亚中央银行引入无现金政策以来基础设施挑战的信息。采用频率分布法和简单百分比法对数据进行分析。调查结果显示,基础设施方面的挑战包括网络故障和基础设施不足,通过自动柜员机(ATM)借记而不向受益人支付现金,银行没有迅速纠正问题,以及银行对使用电子银行方法收取费用。这导致了欺诈、网络犯罪和对银行系统信心的下降。建议银行应提供无现金政策成功所需的最低基础设施。此外,银行和政府应该采取适当的网络安全措施。
{"title":"Analysis of Infrastructural Challenges, Cybercrime, and the Cashless Policy in Nigeria","authors":"Ibrahim Musa, S. Magaji, Abul Hassan","doi":"10.56394/aris2.v2i1.15","DOIUrl":"https://doi.org/10.56394/aris2.v2i1.15","url":null,"abstract":"Abstract \u0000This study makes an analysis of infrastructural challenges and the cashless policy in Kaduna state, Nigeria. A survey was conducted to collect the primary data through a structured questionnaire and interviews with bank customers, bank officials, and security personnel to obtain information on infrastructural challenges since the introduction of the Cashless policy by the Central Bank of Nigeria in 2012. Frequency distribution and simple percentage methods are used to analyze the data.  Findings show that infrastructural challenges include network failure and infrastructural deficiency, debiting by Automated Teller Machine (ATM) without disbursing cash to beneficiaries, problems not rectified quickly by the banks, and charging by banks for using electronic banking methods. This leads to fraud, cybercrimes, and reduced confidence in the banking system. It is recommended that banks should be made to provide the minimum infrastructure required for cashless policy to succeed. In addition, there should be adequate cyber security measures implemented by banks and the government.","PeriodicalId":438607,"journal":{"name":"ARIS2 - Advanced Research on Information Systems Security","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117161927","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
ARIS2 - Advanced Research on Information Systems Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1