{"title":"The Role of Social Engineering in Cybersecurity and Its Impact","authors":"Bandar S. Almutairi, Abdurahman Alghamdi","doi":"10.4236/jis.2022.134020","DOIUrl":"https://doi.org/10.4236/jis.2022.134020","url":null,"abstract":"","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70334519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hadoop Distributed File System Security Challenges and Examination of Unauthorized Access Issue","authors":"Wahid Rajeh","doi":"10.4236/jis.2022.132002","DOIUrl":"https://doi.org/10.4236/jis.2022.132002","url":null,"abstract":"","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70334683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Redistricting is the process of grouping all census blocks within a region to form larger subdivisions, or districts. The process is typically subject to some hard rules and some (soft) preferences to improve fairness of the solution. Achieving public consensus on the fairness of proposed redistricting plans is highly desirable. Unfortunately, fair redistricting is an NP hard optimization problem. The complexity of the process makes it even more challenging to convince the public of the fairness of the proposed solution. This paper pro-poses a completely transparent blockchain based strategy to promote public participation in the redistricting process, to increase public confidence in the outcome of the process. The proposed approach is based on the fact that one does not have to worry about how the NP hard problem was solved, as long as it is possible for anyone to compute a “goodness” metric for the proposed plan. In the proposed approach, anyone can submit a plan along with the ex-pected metric. Only the plan with the best claimed metric needs to be eva-luated in a blockchain network.
{"title":"Blockchain Based Redistricting with Public Participation","authors":"M. Ramkumar, Naresh Adhikari","doi":"10.4236/jis.2022.133009","DOIUrl":"https://doi.org/10.4236/jis.2022.133009","url":null,"abstract":"Redistricting is the process of grouping all census blocks within a region to form larger subdivisions, or districts. The process is typically subject to some hard rules and some (soft) preferences to improve fairness of the solution. Achieving public consensus on the fairness of proposed redistricting plans is highly desirable. Unfortunately, fair redistricting is an NP hard optimization problem. The complexity of the process makes it even more challenging to convince the public of the fairness of the proposed solution. This paper pro-poses a completely transparent blockchain based strategy to promote public participation in the redistricting process, to increase public confidence in the outcome of the process. The proposed approach is based on the fact that one does not have to worry about how the NP hard problem was solved, as long as it is possible for anyone to compute a “goodness” metric for the proposed plan. In the proposed approach, anyone can submit a plan along with the ex-pected metric. Only the plan with the best claimed metric needs to be eva-luated in a blockchain network.","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70334846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cybersecurity: Identifying the Vulnerability Intensity Function (<i>VIF</i>) and Vulnerability Index Indicator (<i>VII</i>) of a Computer Operating System","authors":"Ranju Karki, C. Tsokos","doi":"10.4236/jis.2022.134019","DOIUrl":"https://doi.org/10.4236/jis.2022.134019","url":null,"abstract":"","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70334973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Iorliam, Raymond U. Dugeri, B. O. Akumba, S. Otor
Investigations towards studying terrorist activities have recently attracted a great amount of research interest. In this paper, we investigate the use of the Apriori algorithm on the Global Terrorism Database (GTD) for forensic investigation purposes. Recently, the Apriori algorithm, which could be considered a forensic tool, has been used to study terrorist activities and patterns across the world. As such, our motivation is to utilise the Apriori algorithm approach on the GTD to study terrorist activities and the areas/states in Nigeria with high frequencies of terrorist activities. We observe that the most preferred method of terrorist attacks in Nigeria is through armed assault. Again, our experiment shows that attacks in Nigeria are mostly successful. Also, we observe from our investigations that most terrorists in Nigeria are not suicidal. The main application of this work can be used by forensic experts to assist law enforcement agencies in decision making when handling terrorist attacks in Nigeria.
{"title":"A Forensic Investigation of Terrorism in Nigeria: An Apriori Algorithm Approach","authors":"A. Iorliam, Raymond U. Dugeri, B. O. Akumba, S. Otor","doi":"10.4236/jis.2021.124015","DOIUrl":"https://doi.org/10.4236/jis.2021.124015","url":null,"abstract":"Investigations towards studying terrorist activities \u0000have recently attracted a great amount of research interest. In this paper, we \u0000investigate the use of the Apriori algorithm on the Global Terrorism Database \u0000(GTD) for forensic investigation purposes. Recently, the Apriori algorithm, \u0000which could be considered a forensic tool, has been used to study terrorist activities and \u0000patterns across the world. As such, our motivation is to utilise the Apriori \u0000algorithm approach on the GTD to study terrorist activities and the areas/states \u0000in Nigeria with high frequencies of terrorist activities. We observe that the \u0000most preferred method of terrorist attacks in Nigeria is through armed assault. \u0000Again, our experiment shows that attacks in Nigeria are mostly successful. \u0000Also, we observe from our investigations that most terrorists in Nigeria are \u0000not suicidal. The main application of this work can be used by forensic experts \u0000to assist law enforcement agencies in decision making when handling terrorist \u0000attacks in Nigeria.","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47676930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Today, the internet extensively impacts people’s lives through improved communications, interactions, and the exchange of information. Despite all these positive effects, it also causes in significant negative issues. Over the recent years, cases of online fraud, cyber-bullying, racial abuse, gambling, and pornography have increased due to the lack of self-control and overall awareness among internet users. Therefore, there is a need to create awareness and training on cybersecurity in schools to protect students from cyber-bullying, online fraud, and being targets of prejudice. Research reveals that the level of self-control and awareness among internet users is still moderate and low. To ensure cybersecurity awareness and knowledge among internet users, young people need to get educated on how to operate safely in cyberspace. This education will guarantee that they understand how to protect themselves from cybercrimes. To this extent, this research paper will explore the essence of cybersecurity education in schools and provide strategies that educators can utilize to promote cybersecurity education across learning institutions. This paper will thus conclude how cybersecurity training can be implemented in a learning institution.
{"title":"Relevance of Cybersecurity Education at Pedagogy Levels in Schools","authors":"Eric Amankwa","doi":"10.4236/jis.2021.124013","DOIUrl":"https://doi.org/10.4236/jis.2021.124013","url":null,"abstract":"Today, the internet extensively impacts people’s \u0000lives through improved communications, interactions, and the \u0000exchange of information. Despite all these positive effects, it also causes in \u0000significant negative issues. Over the recent years, cases of online fraud, \u0000cyber-bullying, racial abuse, gambling, and pornography have increased due to \u0000the lack of self-control and overall awareness among internet users. Therefore, \u0000there is a need to create awareness and training on cybersecurity in schools to \u0000protect students from cyber-bullying, online fraud, and being targets of \u0000prejudice. Research reveals that the level of self-control and awareness among \u0000internet users is still moderate and low. To ensure cybersecurity awareness and \u0000knowledge among internet users, young people need to get educated on how to operate \u0000safely in cyberspace. This education will guarantee that they understand how to \u0000protect themselves from cybercrimes. To this extent, this research paper will \u0000explore the essence of cybersecurity education in schools and provide \u0000strategies that educators can utilize to promote cybersecurity education across \u0000learning institutions. This paper will thus conclude how cybersecurity training \u0000can be implemented in a learning institution.","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49462723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
O. Oluoha, Terungwa Simon Yange, G. Okereke, F. Bakpo
Cyber criminals have become a formidable treat in today’s world. This present reality has placed cloud computing platforms under constant treats of cyber-attacks at all levels, with an ever-evolving treat landscape. It has been observed that the number of threats faced in cloud computing is rising exponentially mainly due to its widespread adoption, rapid expansion and a vast attack surface. One of the front-line tools employed in defense against cyber-attacks is the Intrusion Detection Systems (IDSs). In recent times, an increasing number of researchers and cyber security practitioners alike have advocated the use of deception-based techniques in IDS and other cyber security defenses as against the use of traditional methods. This paper presents an extensive overview of the deception technology environment, as well as a review of current trends and implementation models in deception-based Intrusion Detection Systems. Issues mitigating the implementation of deception based cyber security defenses are also investigated.
{"title":"Cutting Edge Trends in Deception Based Intrusion Detection Systems—A Survey","authors":"O. Oluoha, Terungwa Simon Yange, G. Okereke, F. Bakpo","doi":"10.4236/jis.2021.124014","DOIUrl":"https://doi.org/10.4236/jis.2021.124014","url":null,"abstract":"Cyber criminals have become a formidable treat in \u0000today’s world. This present reality has placed cloud computing platforms under \u0000constant treats of cyber-attacks at all levels, with an ever-evolving treat \u0000landscape. It has been observed that the number of threats faced in cloud \u0000computing is rising exponentially mainly due to its widespread adoption, rapid \u0000expansion and a vast attack surface. One of the front-line tools employed in \u0000defense against cyber-attacks is the Intrusion Detection Systems (IDSs). In \u0000recent times, an increasing number of researchers and cyber security practitioners \u0000alike have advocated the use of deception-based techniques in IDS and other \u0000cyber security defenses as against the use of traditional methods. This paper \u0000presents an extensive overview of the deception technology environment, as well \u0000as a review of current trends and implementation models in deception-based \u0000Intrusion Detection Systems. Issues mitigating the implementation of deception \u0000based cyber security defenses are also investigated.","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46248386","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Faisal Nabi, Muhammad Saqib Malhi, Muhammad Farhan, Umar Mahmood
Security practices such as Audits that often focus on penetration testing are performed to find flaws in some types of vulnerability & use tools, which have been tailored to resolve certain risks based on code errors, code conceptual assumptions bugs, etc. Most existing security practices in e-Commerce are dealt with as an auditing activity. They may have policies of security, which are enforced by auditors who enable a particular set of items to be reviewed, but also fail to find vulnerabilities, which have been established in compliance with application logic. In this paper, we will investigate the problem of business logic vulnerability in the component-based rapid development of e-commerce applications while reusing design specification of component. We propose secure application functional processing Logic Security technique for component-based e-commerce application, based on security requirement of e-business process and security assurance logical component behaviour specification approach to formulize and design a solution for business logic vulnerability phenomena.
{"title":"Process of Security Assurance Technique for Application Functional Logic in E-Commerce Systems","authors":"Faisal Nabi, Muhammad Saqib Malhi, Muhammad Farhan, Umar Mahmood","doi":"10.4236/JIS.2021.123010","DOIUrl":"https://doi.org/10.4236/JIS.2021.123010","url":null,"abstract":"Security \u0000practices such as Audits that often focus on penetration testing are performed \u0000to find flaws in some types of vulnerability & use tools, which have been \u0000tailored to resolve certain risks based on code errors, code conceptual assumptions bugs, etc. Most existing security practices in e-Commerce \u0000are dealt with as an auditing activity. They may have \u0000policies of security, which are enforced by auditors who enable a particular \u0000set of items to be reviewed, but also fail \u0000to find vulnerabilities, which have been established in compliance with application logic. In this paper, we will \u0000investigate the problem of business logic vulnerability in the \u0000component-based rapid development of e-commerce applications while reusing \u0000design specification of component. We propose secure application functional \u0000processing Logic Security technique for component-based \u0000e-commerce application, based on security requirement of e-business process and security assurance logical component \u0000behaviour specification approach to \u0000formulize and design a solution for business logic vulnerability phenomena.","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":"12 1","pages":"189-211"},"PeriodicalIF":0.0,"publicationDate":"2021-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44294765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Blockchain is an emerging technology that has recently been the focus for many researchers who have highlighted its diverse applications including healthcare. Transparency in managing unsolicited patient complaints is important in healthcare for both patients and healthcare providers; in addition, patient complaints analysis is significant to the continued quality improvement. Accordingly, the purpose of this study is to understand the nature of patient complaints management in the healthcare settings, explore the implications of blockchain on the management of patient complaints, and identify limitations in the usage of blockchain. Structured qualitative review and content analysis of the literature methods were used through multiple inclusion and exclusion phases for the scope of this research. Blockchain technology characteristics have been analyzed and approximated with desired features in the patients’ complaint management. Patient complaints provide valuable information to drive continuous improvements in healthcare. Blockchain is described as transparent, decentralized, immutable and anonymous. Results of this research found that a complaint Management system that is built on blockchain technology might have desired features that involve data integrity, security and transparency. Blockchain does have certain limitations that involve cybersecurity, scalability, confidentiality, readiness to adopt it, and is uncertainty about its impact. As a conclusion, implementing a system to manage patient complaints that is based on blockchain technology is promising, due to its desired possible features.
{"title":"Blockchain Implications in the Management of Patient Complaints in Healthcare","authors":"Yazan M. Alkhateeb","doi":"10.4236/JIS.2021.123011","DOIUrl":"https://doi.org/10.4236/JIS.2021.123011","url":null,"abstract":"Blockchain is an emerging technology that has recently been the focus for many researchers who have highlighted its \u0000diverse applications including healthcare. Transparency in managing \u0000unsolicited patient complaints is important in healthcare for both patients and \u0000healthcare providers; in addition, patient complaints analysis is significant \u0000to the continued quality improvement. Accordingly, the purpose of this study is \u0000to understand the nature of patient complaints management in the healthcare \u0000settings, explore the implications of blockchain on the management of patient \u0000complaints, and identify limitations in the usage of blockchain. Structured \u0000qualitative review and content analysis of the literature methods were used \u0000through multiple inclusion and exclusion phases for the scope of this research. \u0000Blockchain technology characteristics have been analyzed and approximated with \u0000desired features in the patients’ complaint management. Patient complaints \u0000provide valuable information to drive continuous improvements in healthcare. Blockchain is described as transparent, decentralized, immutable and anonymous. \u0000Results of this research found that a complaint Management system that is built \u0000on blockchain technology might have desired features that involve data \u0000integrity, security and transparency. Blockchain does have certain limitations \u0000that involve cybersecurity, scalability, confidentiality, readiness to adopt \u0000it, and is uncertainty about its impact. As a conclusion, implementing a system to manage patient complaints that is based \u0000on blockchain technology is promising, due to its desired possible features.","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48874949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}