首页 > 最新文献

International Journal of Security and Its Applications最新文献

英文 中文
Information Security in Healthcare Organizations using Low-Interaction Honeypot Intrusion Detection System 低交互蜜罐入侵检测系统在医疗机构信息安全中的应用
Pub Date : 2017-09-30 DOI: 10.14257/IJSIA.2017.11.9.07
Aastha Yadav, Sarthak Raisurana, H. Balaji, P. Lalitha, Ronnie D. Caytiles, N. Iyengar
Healthcare Organizations have seen an alarming rise in cyber-attacks in the recent years. One way a hacker could get control was by breaking into a medical network to gain access over the active medical devices that patients rely on for their survival. Our network model proposes a low-interaction and a medium-interaction honeypot based intrusion detection system using Dionaea and Kippo SSH to secure our internal network and study the activities of the intruders. We also look at a possible Metasploit attack and Brute force attack logged by Dionaea and Kippo SSH which prepares the Malware Analysis report of the suspicious file downloaded.
近年来,医疗保健组织的网络攻击数量惊人地增加。黑客获得控制权的一种方法是闯入医疗网络,访问患者赖以生存的活跃医疗设备。我们的网络模型提出了一个基于低交互和中等交互蜜罐的入侵检测系统,该系统使用Dioaea和Kippo SSH来保护我们的内部网络并研究入侵者的活动。我们还查看了Dioaea和Kippo SSH记录的可能的Metasploit攻击和Brute force攻击,该SSH准备下载的可疑文件的恶意软件分析报告。
{"title":"Information Security in Healthcare Organizations using Low-Interaction Honeypot Intrusion Detection System","authors":"Aastha Yadav, Sarthak Raisurana, H. Balaji, P. Lalitha, Ronnie D. Caytiles, N. Iyengar","doi":"10.14257/IJSIA.2017.11.9.07","DOIUrl":"https://doi.org/10.14257/IJSIA.2017.11.9.07","url":null,"abstract":"Healthcare Organizations have seen an alarming rise in cyber-attacks in the recent years. One way a hacker could get control was by breaking into a medical network to gain access over the active medical devices that patients rely on for their survival. Our network model proposes a low-interaction and a medium-interaction honeypot based intrusion detection system using Dionaea and Kippo SSH to secure our internal network and study the activities of the intruders. We also look at a possible Metasploit attack and Brute force attack logged by Dionaea and Kippo SSH which prepares the Malware Analysis report of the suspicious file downloaded.","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":"11 1","pages":"95-108"},"PeriodicalIF":0.0,"publicationDate":"2017-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44886736","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Double Length Sponge Construction DLP-Sponge 双长度海绵结构dlp海绵
Pub Date : 2017-08-31 DOI: 10.14257/ijsia.2017.11.8.04
B. T. Hammad, N. Jamil, M. Rusli, M. Z’aba
In this paper, a new sponge construction called DLP-Sponge is proposed, which takes an arbitrary length of input and yields an output of random length. We prove that this construction is resistant against generic attacks such as multicollision attacks with a better complexity 2 2(c+3)/2 even when a small capacity is used, i.e. lightweight cryptography, where c is the capacity. Furthermore, it is used in building other cryptographic primitives such as block cipher, cryptographic hash functions and Message Authentication Codes (MACs).
本文提出了一种新的海绵结构,称为DLP-Sponge,它采用任意长度的输入,产生随机长度的输出。我们证明,即使使用较小的容量(即轻量级加密,其中c为容量),这种结构也可以抵抗诸如多重碰撞攻击之类的通用攻击,并且具有更好的复杂度22 (c+3)/2。此外,它还用于构建其他加密原语,如分组密码、加密散列函数和消息认证码(mac)。
{"title":"Double Length Sponge Construction DLP-Sponge","authors":"B. T. Hammad, N. Jamil, M. Rusli, M. Z’aba","doi":"10.14257/ijsia.2017.11.8.04","DOIUrl":"https://doi.org/10.14257/ijsia.2017.11.8.04","url":null,"abstract":"In this paper, a new sponge construction called DLP-Sponge is proposed, which takes an arbitrary length of input and yields an output of random length. We prove that this construction is resistant against generic attacks such as multicollision attacks with a better complexity 2 2(c+3)/2 even when a small capacity is used, i.e. lightweight cryptography, where c is the capacity. Furthermore, it is used in building other cryptographic primitives such as block cipher, cryptographic hash functions and Message Authentication Codes (MACs).","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":"11 1","pages":"45-58"},"PeriodicalIF":0.0,"publicationDate":"2017-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45587862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Extended Design and Implementation of Certificate Authorities 证书颁发机构的扩展设计和实现
Pub Date : 2017-08-31 DOI: 10.14257/IJSIA.2017.11.8.02
Sarvesh Tanwar, Anil Kumar
The most important security services of Public Key Infrastructure (PKI) such as e authentication, integrity, confidentiality and non- repudiation enables its clients to maintain a level of trust. It enables clients to exchange information over unsecure public network such as Internet. PKI proves the identity of an individual or an organization via digital certificates which binds information of client and public key. Public keys are store in public key directory. A PKI system works by having a Certificate Authority (CA) that is responsible for issuing and revoking certificates. Certificates are basic source of trust in online transactions. The aim of this paper is to design and implement a CA that can create and manage public key certificates. We have proposed a trusted hierarchical trust model which is extension of work done by Janabi et al.. [4]. The proposed system is designed and implemented using JAVA programming language, MYSQL database server and Apache web server.
公钥基础设施(PKI)最重要的安全服务,如身份验证、完整性、机密性和不可抵赖性,使其客户端能够保持一定程度的信任。它使客户端能够通过不安全的公共网络(如Internet)交换信息。PKI通过绑定客户端信息和公钥的数字证书来证明个人或组织的身份。公钥存储在公钥目录中。PKI系统的工作原理是由证书颁发机构(CA)负责颁发和吊销证书。证书是在线交易中信任的基本来源。本文的目的是设计和实现一个可以创建和管理公钥证书的CA。我们提出了一个可信的分层信任模型,它是Janabi等人[4]工作的扩展。该系统采用JAVA编程语言、MYSQL数据库服务器和Apache web服务器进行设计和实现。
{"title":"Extended Design and Implementation of Certificate Authorities","authors":"Sarvesh Tanwar, Anil Kumar","doi":"10.14257/IJSIA.2017.11.8.02","DOIUrl":"https://doi.org/10.14257/IJSIA.2017.11.8.02","url":null,"abstract":"The most important security services of Public Key Infrastructure (PKI) such as e authentication, integrity, confidentiality and non- repudiation enables its clients to maintain a level of trust. It enables clients to exchange information over unsecure public network such as Internet. PKI proves the identity of an individual or an organization via digital certificates which binds information of client and public key. Public keys are store in public key directory. A PKI system works by having a Certificate Authority (CA) that is responsible for issuing and revoking certificates. Certificates are basic source of trust in online transactions. The aim of this paper is to design and implement a CA that can create and manage public key certificates. We have proposed a trusted hierarchical trust model which is extension of work done by Janabi et al.. [4]. The proposed system is designed and implemented using JAVA programming language, MYSQL database server and Apache web server.","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":"11 1","pages":"13-26"},"PeriodicalIF":0.0,"publicationDate":"2017-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45572716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Provably Secure Android-Based Mobile Banking Protocol 一个可证明安全的基于android的移动银行协议
Pub Date : 2017-08-31 DOI: 10.14257/IJSIA.2017.11.8.06
Hisham S. Elganzoury, A. A. Hafez, A. A. Hegazy
The rising vogue of smart phones and tablets has led users to complete their daily works (such as M-Banking) with these devices. Therefore, mobile banking needs to become more proper, reliable, effective; and secure. Security is the most crucial requirement in mobile banking, since all the communications are via unsecure networks such as the Internet. Providing main security services; Confidentiality, Integrity, and Authentication (CIA) between any two communicating parties must be ensured and guaranteed. Many vulnerabilities may make Users’ confidential information vulnerable to risks. These vulnerabilities can take different shapes, such as fixed values-based security techniques, one factor authentication, separate hard token-based authentication, hardware thievery, and Android OS based attacks. This paper proposes a new secure scheme for mobile banking applications to overcome these risks. Then, the proposed scheme is analyzed, and compared to the most powered approaches. Finally, performance key identifiers are assessed and validated.
智能手机和平板电脑的日益流行使得用户通过这些设备完成日常工作(如移动银行)。因此,手机银行需要变得更加恰当、可靠、有效;和安全。安全是手机银行最重要的要求,因为所有的通信都是通过互联网等不安全的网络进行的。提供主要保安服务;必须确保通信双方之间的机密性、完整性和身份验证(CIA)。许多漏洞可能会使用户的机密信息面临风险。这些漏洞可以采取不同的形式,例如基于固定值的安全技术、单因素身份验证、单独的基于硬令牌的身份验证、硬件盗窃和基于Android OS的攻击。本文提出了一种新的移动银行应用安全方案来克服这些风险。然后,对该方案进行了分析,并与最强大的方法进行了比较。最后,评估和验证性能关键标识符。
{"title":"A Provably Secure Android-Based Mobile Banking Protocol","authors":"Hisham S. Elganzoury, A. A. Hafez, A. A. Hegazy","doi":"10.14257/IJSIA.2017.11.8.06","DOIUrl":"https://doi.org/10.14257/IJSIA.2017.11.8.06","url":null,"abstract":"The rising vogue of smart phones and tablets has led users to complete their daily works (such as M-Banking) with these devices. Therefore, mobile banking needs to become more proper, reliable, effective; and secure. Security is the most crucial requirement in mobile banking, since all the communications are via unsecure networks such as the Internet. Providing main security services; Confidentiality, Integrity, and Authentication (CIA) between any two communicating parties must be ensured and guaranteed. Many vulnerabilities may make Users’ confidential information vulnerable to risks. These vulnerabilities can take different shapes, such as fixed values-based security techniques, one factor authentication, separate hard token-based authentication, hardware thievery, and Android OS based attacks. This paper proposes a new secure scheme for mobile banking applications to overcome these risks. Then, the proposed scheme is analyzed, and compared to the most powered approaches. Finally, performance key identifiers are assessed and validated.","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":"11 1","pages":"77-88"},"PeriodicalIF":0.0,"publicationDate":"2017-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44883179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
When Android Apps Open Ports to Handle Network Requests: Functionality or Security Vulnerability? 当Android应用程序打开端口处理网络请求:功能还是安全漏洞?
Pub Date : 2017-08-31 DOI: 10.14257/ijsia.2017.11.8.05
H. Yue, Yuqing Zhang
Large amounts of Android apps (applications) are found to open network ports to handle network requests to realize some specific functions, e.g., access from web page to Android app, communication between computer and Android device, file transmission in LAN (Local Area Network) environment, etc. However, an opened network port also provides an interface for attackers to visit the app. If a network request can trigger sensitive behaviors of a port-opening app without being e ff ective authorized by the app, it would pose security threats to the user, and we consider this app has port-opening vulnerability. In this paper, we first study the universality of port-opening apps in current Android app stores, the purposes of opening network ports and the possible attacks that the vulnerable apps may su ff er from. Then we propose a detection method of port-opening vulnerability of Android app based on static analysis and implement a detection tool— APOVD (Android Port-Opening Vulnerability Detection). APOVD first judges whether an opened port can lead to the occurrence of sensitive behaviors by the method of reachability analysis and taint analysis. Then the technique of static program slicing is used to judge whether there exists adequate access controls in the paths to reach each sensitive behavior. If there exists a path to reach a sensitive behavior and no adequate access control in this path, APOVD considers that the app under test has port-opening vulnerability. 1187 port-opening Android apps are found in 15600 popular apps, and 407 of them are identified as having port-opening vulnerability with the help of APOVD. The result shows that APOVD is e ff ective in detecting port-opening vulnerability.
大量安卓应用程序(应用程序)被发现打开网络端口来处理网络请求,以实现某些特定功能,例如从网页访问安卓应用、计算机与安卓设备之间的通信、局域网环境中的文件传输等。然而,打开的网络端口也为攻击者访问应用程序提供了接口。如果网络请求可以在未经应用程序有效授权的情况下触发端口打开应用程序的敏感行为,则会对用户构成安全威胁,我们认为该应用程序存在端口打开漏洞。在本文中,我们首先研究了当前安卓应用商店中端口开放应用程序的普遍性、开放网络端口的目的以及易受攻击的应用程序可能受到的攻击。然后,我们提出了一种基于静态分析的Android应用程序端口打开漏洞检测方法,并实现了一个检测工具——APOVD(Android端口打开漏洞)。APOVD首先通过可达性分析和污染分析的方法来判断一个开放的端口是否会导致敏感行为的发生。然后使用静态程序切片技术来判断路径中是否存在足够的访问控制以达到每个敏感行为。如果存在到达敏感行为的路径,并且该路径中没有足够的访问控制,APOVD认为测试中的应用程序存在端口打开漏洞。在15600个热门应用程序中发现1187个开放端口的安卓应用程序,其中407个应用程序在APOVD的帮助下被识别为存在端口开放漏洞。结果表明,APOVD能够有效地检测端口打开漏洞。
{"title":"When Android Apps Open Ports to Handle Network Requests: Functionality or Security Vulnerability?","authors":"H. Yue, Yuqing Zhang","doi":"10.14257/ijsia.2017.11.8.05","DOIUrl":"https://doi.org/10.14257/ijsia.2017.11.8.05","url":null,"abstract":"Large amounts of Android apps (applications) are found to open network ports to handle network requests to realize some specific functions, e.g., access from web page to Android app, communication between computer and Android device, file transmission in LAN (Local Area Network) environment, etc. However, an opened network port also provides an interface for attackers to visit the app. If a network request can trigger sensitive behaviors of a port-opening app without being e ff ective authorized by the app, it would pose security threats to the user, and we consider this app has port-opening vulnerability. In this paper, we first study the universality of port-opening apps in current Android app stores, the purposes of opening network ports and the possible attacks that the vulnerable apps may su ff er from. Then we propose a detection method of port-opening vulnerability of Android app based on static analysis and implement a detection tool— APOVD (Android Port-Opening Vulnerability Detection). APOVD first judges whether an opened port can lead to the occurrence of sensitive behaviors by the method of reachability analysis and taint analysis. Then the technique of static program slicing is used to judge whether there exists adequate access controls in the paths to reach each sensitive behavior. If there exists a path to reach a sensitive behavior and no adequate access control in this path, APOVD considers that the app under test has port-opening vulnerability. 1187 port-opening Android apps are found in 15600 popular apps, and 407 of them are identified as having port-opening vulnerability with the help of APOVD. The result shows that APOVD is e ff ective in detecting port-opening vulnerability.","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":"11 1","pages":"59-76"},"PeriodicalIF":0.0,"publicationDate":"2017-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46670624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Study of Self-Similarity for Detection of Rate-based Network Anomalies 基于速率的网络异常检测的自相似性研究
Pub Date : 2017-08-31 DOI: 10.14257/IJSIA.2017.11.8.03
Gagandeep Kaur, V. Saxena, J. Gupta
In this paper, we have reviewed state of the art works done in the field of anomaly detection in general and network based anomaly detection in particular. The current anomaly detection techniques with respect to rate based network anomalies have been examined and their strengths and weaknesses have been highlighted. The applicability of scale-invariant property of self-similarity as a parameter for detection of anomalies from normal network traffic behaviors has been studied in depth. From the studies of scaleinvariance and it's usage in detecting anomalies like flash crowds, DDoS attacks, outages, portscans, etc. it was realized that wavelets are a good tool that can be used for n-level decomposition of aggregated network traffic.
在本文中,我们回顾了异常检测领域的最新研究成果,特别是基于网络的异常检测。对目前基于速率的网络异常检测技术进行了研究,并指出了它们的优缺点。深入研究了自相似度的尺度不变特性作为检测正常网络流量行为异常的参数的适用性。从尺度不变性的研究和它在检测异常(如闪电人群、DDoS攻击、中断、端口扫描等)中的使用来看,我们意识到小波是一个很好的工具,可以用于聚合网络流量的n级分解。
{"title":"Study of Self-Similarity for Detection of Rate-based Network Anomalies","authors":"Gagandeep Kaur, V. Saxena, J. Gupta","doi":"10.14257/IJSIA.2017.11.8.03","DOIUrl":"https://doi.org/10.14257/IJSIA.2017.11.8.03","url":null,"abstract":"In this paper, we have reviewed state of the art works done in the field of anomaly detection in general and network based anomaly detection in particular. The current anomaly detection techniques with respect to rate based network anomalies have been examined and their strengths and weaknesses have been highlighted. The applicability of scale-invariant property of self-similarity as a parameter for detection of anomalies from normal network traffic behaviors has been studied in depth. From the studies of scaleinvariance and it's usage in detecting anomalies like flash crowds, DDoS attacks, outages, portscans, etc. it was realized that wavelets are a good tool that can be used for n-level decomposition of aggregated network traffic.","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":"11 1","pages":"27-44"},"PeriodicalIF":0.0,"publicationDate":"2017-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45244411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Collaborative Agent-based Model for Distributed Defense against DDoS Attacks in ISP Networks 基于协作代理的ISP分布式DDoS防御模型
Pub Date : 2017-08-31 DOI: 10.14257/IJSIA.2017.11.8.01
Karanbir Singh, Dr. Kanwalvir Singh Dhindsa, B. Bhushan
{"title":"Collaborative Agent-based Model for Distributed Defense against DDoS Attacks in ISP Networks","authors":"Karanbir Singh, Dr. Kanwalvir Singh Dhindsa, B. Bhushan","doi":"10.14257/IJSIA.2017.11.8.01","DOIUrl":"https://doi.org/10.14257/IJSIA.2017.11.8.01","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":"11 1","pages":"1-12"},"PeriodicalIF":0.0,"publicationDate":"2017-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43693534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Towards an ethical online payment system through cryptography and next generation communication network 通过密码学和下一代通信网络实现道德在线支付系统
Pub Date : 2017-08-16 DOI: 10.14257/IJSIA.2017.11.10.03
M. Hassan, A. Shuriye, Momoh J. E. Salam, A. Abdalla, O. Khalifa
Abstract The internet brings unprecedented connectivity and communications for both social and commercial settings. There have been many businesses that offer their products and services completely online. Nowadays, even the break and mortar businesses use the internet in a way or another to promote their offerings and to reach people and places they would have never thought of reaching them before the internet era. Conventional online payment systems such as credit and debit cards have enabled such a revolutionary way of doing business. However, conventional financial system has been generating catastrophic disasters to the world. The great depression of 1930s, the World War II, the dot com bubble at the beginning of the new century, and the recent financial crisis that has begun on 2008; to name a few. This will persist if we keep trusting the old ways of finance. This paper investigates the relatively new online payment system termed “Bitcoin” which embraces intentionally or unintentionally the principle of Islamic finance such as saving, compared to the conventional financial system of borrowing, lending and “Riba” (interest).
摘要互联网为社交和商业环境带来了前所未有的连接和通信。已经有许多企业完全在线提供产品和服务。如今,即使是实体企业也以某种方式使用互联网来推广他们的产品,并接触到他们在互联网时代之前从未想过会接触到的人和地方。传统的在线支付系统,如信用卡和借记卡,已经实现了这样一种革命性的商业方式。然而,传统的金融体系给世界带来了灾难性的灾难。20世纪30年代的大萧条、第二次世界大战、新世纪初的网络泡沫,以及最近始于2008年的金融危机;仅举几个例子。如果我们继续相信旧的金融方式,这种情况就会持续下去。本文研究了一种名为“比特币”的相对较新的在线支付系统,与传统的借贷和“Riba”(利息)金融系统相比,该系统有意或无意地包含了伊斯兰金融的原则,如储蓄。
{"title":"Towards an ethical online payment system through cryptography and next generation communication network","authors":"M. Hassan, A. Shuriye, Momoh J. E. Salam, A. Abdalla, O. Khalifa","doi":"10.14257/IJSIA.2017.11.10.03","DOIUrl":"https://doi.org/10.14257/IJSIA.2017.11.10.03","url":null,"abstract":"Abstract The internet brings unprecedented connectivity and communications for both social and commercial settings. There have been many businesses that offer their products and services completely online. Nowadays, even the break and mortar businesses use the internet in a way or another to promote their offerings and to reach people and places they would have never thought of reaching them before the internet era. Conventional online payment systems such as credit and debit cards have enabled such a revolutionary way of doing business. However, conventional financial system has been generating catastrophic disasters to the world. The great depression of 1930s, the World War II, the dot com bubble at the beginning of the new century, and the recent financial crisis that has begun on 2008; to name a few. This will persist if we keep trusting the old ways of finance. This paper investigates the relatively new online payment system termed “Bitcoin” which embraces intentionally or unintentionally the principle of Islamic finance such as saving, compared to the conventional financial system of borrowing, lending and “Riba” (interest).","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":"11 1","pages":"25-34"},"PeriodicalIF":0.0,"publicationDate":"2017-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41659555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Information Security Content Development for Awareness Training Programs in Healthcare 医疗保健领域意识培训项目的信息安全内容开发
Pub Date : 2017-07-31 DOI: 10.14257/IJSIA.2017.11.7.07
A. Ghazvini, Z. Shukur
Human error is recognized as the major cause of data breaches across the healthcare industry. Training and education are effective approaches to help employees adhere to appropriate behaviors that do not compromise information assets. However, not all awareness training programs are effective. One of the main failures in implementing successful awareness programs is the training content. In many cases, the training content is reported to be too informative or too advance. The aim of this paper is to propose a guideline to develop information security content for awareness training programs. Developing a rich and attractive training content is the key to an effective awareness program. It is necessary to ensure that important information security issues are effectively communicated with employees during awareness training programs, and employees are not over-trained or under-trained. The paper demonstrates the process of information security policy augmentation for a selected healthcare organization, and develops information security content from the augmented policy document. The focus of the training content is to enforce the organization’s internal information security policies.
在整个医疗保健行业,人为错误被认为是导致数据泄露的主要原因。培训和教育是帮助员工遵守不损害信息资产的适当行为的有效方法。然而,并不是所有的意识训练项目都有效。实施成功的意识项目的主要失败之一是培训内容。在许多情况下,培训内容被报告为信息量太大或太高级。本文的目的是提出一个指导方针,以制定信息安全内容的意识培训计划。开发丰富而有吸引力的培训内容是有效开展意识培训的关键。有必要确保重要的信息安全问题在意识培训项目中有效地与员工沟通,员工不会培训过度或培训不足。本文演示了选定医疗保健组织的信息安全策略增强过程,并从增强的策略文档中开发信息安全内容。培训内容的重点是执行组织的内部信息安全策略。
{"title":"Information Security Content Development for Awareness Training Programs in Healthcare","authors":"A. Ghazvini, Z. Shukur","doi":"10.14257/IJSIA.2017.11.7.07","DOIUrl":"https://doi.org/10.14257/IJSIA.2017.11.7.07","url":null,"abstract":"Human error is recognized as the major cause of data breaches across the healthcare industry. Training and education are effective approaches to help employees adhere to appropriate behaviors that do not compromise information assets. However, not all awareness training programs are effective. One of the main failures in implementing successful awareness programs is the training content. In many cases, the training content is reported to be too informative or too advance. The aim of this paper is to propose a guideline to develop information security content for awareness training programs. Developing a rich and attractive training content is the key to an effective awareness program. It is necessary to ensure that important information security issues are effectively communicated with employees during awareness training programs, and employees are not over-trained or under-trained. The paper demonstrates the process of information security policy augmentation for a selected healthcare organization, and develops information security content from the augmented policy document. The focus of the training content is to enforce the organization’s internal information security policies.","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":"11 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2017-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47464149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Smart System for Forest Fire Using Sensor Network 基于传感器网络的森林火灾智能系统
Pub Date : 2017-07-31 DOI: 10.14257/IJSIA.2017.11.7.01
Ahmad A. A. Alkhatib, M. Alia, Adnan A. Hnaif
Wireless sensor network systems deploy a dense array of small, low-cost sensors that observe the local environment. The system can be deployed anywhere, even in inaccessible places. This technology can provide real time monitoring for forest fires. Ignition can be determined rapidly, depending on the wake/sleep schedule of the system nodes. This study investigates the coverage and fire detection ability of a wireless network system. Sub-networks in randomly-distributed nodes convert the network from being randomly distributed to being organised, and reduce the operation time and energy consumption of each node. Dividing the network into three sub-networks increases network battery lifetime by 2.7% and increases energy performance by 63% compared to conventional fire detection networks. The proposed network only requires each node to be equipped with a cheap temperature sensor. Analysis of data from multiple sensors can indicate not only the presence of a fire, but also its intensity, behaviour and direction of spread, which can greatly assist firefighting efforts.
无线传感器网络系统部署了密集的小型、低成本传感器阵列,用于观察本地环境。该系统可以部署在任何地方,甚至是无法访问的地方。这项技术可以为森林火灾提供实时监测。点火可以根据系统节点的唤醒/睡眠时间表快速确定。本研究调查了无线网络系统的覆盖范围和火灾探测能力。随机分布节点中的子网络将网络从随机分布转变为有组织,减少了每个节点的操作时间和能耗。与传统的火灾探测网络相比,将网络划分为三个子网络可使网络电池寿命延长2.7%,能源性能提高63%。所提出的网络只需要每个节点都配备一个廉价的温度传感器。对来自多个传感器的数据进行分析,不仅可以指示火灾的存在,还可以指示其强度、行为和蔓延方向,这可以极大地帮助消防工作。
{"title":"Smart System for Forest Fire Using Sensor Network","authors":"Ahmad A. A. Alkhatib, M. Alia, Adnan A. Hnaif","doi":"10.14257/IJSIA.2017.11.7.01","DOIUrl":"https://doi.org/10.14257/IJSIA.2017.11.7.01","url":null,"abstract":"Wireless sensor network systems deploy a dense array of small, low-cost sensors that observe the local environment. The system can be deployed anywhere, even in inaccessible places. This technology can provide real time monitoring for forest fires. Ignition can be determined rapidly, depending on the wake/sleep schedule of the system nodes. This study investigates the coverage and fire detection ability of a wireless network system. Sub-networks in randomly-distributed nodes convert the network from being randomly distributed to being organised, and reduce the operation time and energy consumption of each node. Dividing the network into three sub-networks increases network battery lifetime by 2.7% and increases energy performance by 63% compared to conventional fire detection networks. The proposed network only requires each node to be equipped with a cheap temperature sensor. Analysis of data from multiple sensors can indicate not only the presence of a fire, but also its intensity, behaviour and direction of spread, which can greatly assist firefighting efforts.","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":" ","pages":"1-16"},"PeriodicalIF":0.0,"publicationDate":"2017-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48340275","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
期刊
International Journal of Security and Its Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1