首页 > 最新文献

信息安全(英文)最新文献

英文 中文
Systematic Review on Social Engineering: Hacking by Manipulating Humans 社会工程系统综述:操纵人类的黑客行为
Pub Date : 2020-01-01 DOI: 10.2139/ssrn.3720955
Chandra Sekhar Bhusal
Despite the availability of advanced security software and hardware mechanisms available, still, there has been a breach in the defence system of an organization or individual. Social engineering mostly targets the weakest link in the security system i.e. “Humans” for gaining access to sensitive information by manipulating human psychology. Social engineering attacks are arduous to defend as such attacks are not easily detected by available security software or hardware. This article surveys recent studies on social engineering attacks with discussion on the social engineering phases and categorizing the various attacks into two groups. The main aim of this survey is to examine the various social engineering attacks on individuals and countermeasures against social engineering attacks are also discussed.
尽管有先进的安全软件和硬件机制,但组织或个人的防御系统仍然存在漏洞。社会工程主要针对安全系统中最薄弱的环节,即“人类”,通过操纵人类的心理来获取敏感信息。社会工程攻击很难防御,因为这种攻击不容易被可用的安全软件或硬件检测到。本文综述了社会工程攻击的最新研究,讨论了社会工程阶段,并将各种攻击分为两类。本调查的主要目的是研究对个人的各种社会工程攻击和针对社会工程攻击的对策也进行了讨论。
{"title":"Systematic Review on Social Engineering: Hacking by Manipulating Humans","authors":"Chandra Sekhar Bhusal","doi":"10.2139/ssrn.3720955","DOIUrl":"https://doi.org/10.2139/ssrn.3720955","url":null,"abstract":"Despite the availability of advanced security software and hardware mechanisms available, still, there has been a breach in the defence system of an organization or individual. Social engineering mostly targets the weakest link in the security system i.e. “Humans” for gaining access to sensitive information by manipulating human psychology. Social engineering attacks are arduous to defend as such attacks are not easily detected by available security software or hardware. This article surveys recent studies on social engineering attacks with discussion on the social engineering phases and categorizing the various attacks into two groups. The main aim of this survey is to examine the various social engineering attacks on individuals and countermeasures against social engineering attacks are also discussed.","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"68630307","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Fuzzy VIKOR Approach to Evaluate the Information Security Policies and Analyze the Content of Press Agencies in Gulf Countries 海湾国家新闻机构信息安全政策评价与内容分析的模糊VIKOR方法
Pub Date : 2020-01-01 DOI: 10.4236/jis.2020.114013
A. M. Talib
A news agency is an organization that gathers news reports and sells them to subscribing news organization, such as newspapers, magazines, radio and television broadcasters. A news agency may also be referred to as a wire service, newswire, or news service. The main purpose of this paper is to evaluate the security policies and analyze the content of five press agencies in gulf countries which are (Kuwait News Agency (KUNA), Emirates News Agency (WAM), Saudi Press Agency (SPA), Bahrain News Agency (BNA), and Oman News Agency (OMA)) by using a fuzzy VIKOR approach where linguistic variables are applied to solve the uncertainties and subjectivities in expert decision making. Fuzzy VIKOR approach is one of the best Multi-Criteria Decision Making (MCDM) techniques working in fuzzy environment. This study benefits security and content analysis experts know which press agency has the mandate and the competence to educate the public on news agencies. Besides, this paper contributes to Gulf agencies in helping them in their resolve to ensure the quality of content information and information security policies over the internet.
通讯社是收集新闻报道并将其出售给订阅新闻机构的组织,如报纸、杂志、广播电台和电视广播公司。通讯社也可以被称为通讯社、新闻专线或新闻服务。本文的主要目的是通过使用模糊VIKOR方法来评估海湾国家五家新闻机构(科威特新闻社(KUNA),阿联酋新闻社(WAM),沙特新闻社(SPA),巴林新闻社(BNA)和阿曼新闻社(OMA))的安全政策和分析内容,其中语言变量被应用于解决专家决策中的不确定性和主观性。模糊VIKOR方法是在模糊环境下进行多准则决策的最佳方法之一。这项研究有利于安全和内容分析专家知道哪个新闻机构有授权和能力对公众进行新闻机构教育。此外,本文有助于海湾机构在他们的决心,以确保在互联网上的内容信息和信息安全政策的质量。
{"title":"Fuzzy VIKOR Approach to Evaluate the Information Security Policies and Analyze the Content of Press Agencies in Gulf Countries","authors":"A. M. Talib","doi":"10.4236/jis.2020.114013","DOIUrl":"https://doi.org/10.4236/jis.2020.114013","url":null,"abstract":"A news agency is an organization that gathers news reports and sells them to subscribing news organization, such as newspapers, magazines, radio and television broadcasters. A news agency may also be referred to as a wire service, newswire, or news service. The main purpose of this paper is to evaluate the security policies and analyze the content of five press agencies in gulf countries which are (Kuwait News Agency (KUNA), Emirates News Agency (WAM), Saudi Press Agency (SPA), Bahrain News Agency (BNA), and Oman News Agency (OMA)) by using a fuzzy VIKOR approach where linguistic variables are applied to solve the uncertainties and subjectivities in expert decision making. Fuzzy VIKOR approach is one of the best Multi-Criteria Decision Making (MCDM) techniques working in fuzzy environment. This study benefits security and content analysis experts know which press agency has the mandate and the competence to educate the public on news agencies. Besides, this paper contributes to Gulf agencies in helping them in their resolve to ensure the quality of content information and information security policies over the internet.","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70334820","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Comparing the Area of Data Mining Algorithms in Network Intrusion Detection 数据挖掘算法在网络入侵检测中的应用比较
Pub Date : 2020-01-01 DOI: 10.4236/jis.2020.111001
Yasamin Alagrash, A. Drebee, Nedda Zirjawi
The network-based intrusion detection has become common to evaluate machine learning algorithms. Although the KDD Cup’99 Dataset has class imbalance over different intrusion classes, still it plays a significant role to evaluate machine learning algorithms. In this work, we utilize the singular valued decomposition technique for feature dimension reduction. We further reconstruct the features form reduced features and the selected eigenvectors. The reconstruction loss is used to decide the intrusion class for a given network feature. The intrusion class having the smallest reconstruction loss is accepted as the intrusion class in the network for that sample. The proposed system yield 97.90% accuracy on KDD Cup’99 dataset for the stated task. We have also analyzed the system with individual intrusion categories separately. This analysis suggests having a system with the ensemble of multiple classifiers; therefore we also created a random forest classifier. The random forest classifier performs significantly better than the SVD based system. The random forest classifier achieves 99.99% accuracy for intrusion detection on the same training and testing data set.
基于网络的入侵检测已经成为评估机器学习算法的常用方法。尽管KDD Cup ' 99数据集在不同入侵类之间存在类不平衡,但它在评估机器学习算法方面仍发挥着重要作用。在这项工作中,我们利用奇异值分解技术进行特征降维。我们进一步通过约简特征和选择的特征向量重构特征。利用重构损失来确定给定网络特征的入侵类别。对于该样本,接受重构损失最小的入侵类作为网络中的入侵类。该系统在KDD Cup ' 99数据集上的准确率为97.90%。我们还对系统进行了单独的入侵分类分析。这种分析建议使用一个由多个分类器集成的系统;因此,我们还创建了一个随机森林分类器。随机森林分类器的性能明显优于基于SVD的系统。在相同的训练和测试数据集上,随机森林分类器的入侵检测准确率达到99.99%。
{"title":"Comparing the Area of Data Mining Algorithms in Network Intrusion Detection","authors":"Yasamin Alagrash, A. Drebee, Nedda Zirjawi","doi":"10.4236/jis.2020.111001","DOIUrl":"https://doi.org/10.4236/jis.2020.111001","url":null,"abstract":"The network-based intrusion detection has become common to evaluate machine learning algorithms. Although the KDD Cup’99 Dataset has class imbalance over different intrusion classes, still it plays a significant role to evaluate machine learning algorithms. In this work, we utilize the singular valued decomposition technique for feature dimension reduction. We further reconstruct the features form reduced features and the selected eigenvectors. The reconstruction loss is used to decide the intrusion class for a given network feature. The intrusion class having the smallest reconstruction loss is accepted as the intrusion class in the network for that sample. The proposed system yield 97.90% accuracy on KDD Cup’99 dataset for the stated task. We have also analyzed the system with individual intrusion categories separately. This analysis suggests having a system with the ensemble of multiple classifiers; therefore we also created a random forest classifier. The random forest classifier performs significantly better than the SVD based system. The random forest classifier achieves 99.99% accuracy for intrusion detection on the same training and testing data set.","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70334668","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Security Operations Center: A Framework for Automated Triage, Containment and Escalation 安全运营中心:自动分类、遏制和升级的框架
Pub Date : 2020-01-01 DOI: 10.4236/jis.2020.114015
P. Danquah
There have been a lot of research exertions and studies to improve the safety of critical infrastructures using the Security Operations Center (SOC). As part of efforts, the purpose of this research is to propose a framework to automate the SOC’s performance of triage, containment and escalation. The research leveraged on qualitative desk review to collect data for analysis, deduced strengths and weaknesses for the current SOC implementations and used that as a basis for proposing the framework. In view of the constant evolution of SOC operations and capabilities coupled with the huge volumes of data collected for analysis, an efficient framework for SOC operations is proposed. The qualitative analysis is used to deduce strengths and weaknesses for the current SOC implementations as a premise for proposing the framework. It consists of eight interactive stages that further leverage on a proposed algorithm for baselining, remediation and escalation. The result of this research is a proposed framework that serves as a unique contribution to enhancing the SOC’s ability to automatically perform triage, containment and escalation. Supplementary to similar and earlier work reviewed, the framework is proposed as the way forward to automatically enable SOC setups with the capacity to efficiently perform triage of security threats, vulnerabilities and incidents, effectively contain identified breaches and appropriately escalate for prompt and accurate solutions.
利用安全运营中心(SOC)来提高关键基础设施的安全性已经有了大量的研究工作和研究。作为努力的一部分,本研究的目的是提出一个框架,使SOC的分类、遏制和升级性能自动化。该研究利用定性办公桌审查来收集数据进行分析,推断出当前SOC实现的优势和劣势,并将其作为提出框架的基础。针对SOC作战和能力的不断发展,以及需要收集的海量数据进行分析,提出了一种高效的SOC作战框架。定性分析用于推断当前SOC实现的优势和劣势,作为提出框架的前提。它由八个交互阶段组成,这些阶段进一步利用提议的基线、补救和升级算法。这项研究的结果是提出了一个框架,为提高SOC自动执行分类、遏制和升级的能力做出了独特的贡献。作为对类似和早期工作的补充,该框架被提议作为自动启用SOC设置的前进方向,使其能够有效地执行安全威胁、漏洞和事件的分类,有效地包含已识别的漏洞,并适当地升级,以获得及时准确的解决方案。
{"title":"Security Operations Center: A Framework for Automated Triage, Containment and Escalation","authors":"P. Danquah","doi":"10.4236/jis.2020.114015","DOIUrl":"https://doi.org/10.4236/jis.2020.114015","url":null,"abstract":"There have been a lot of research exertions and studies to improve the safety of critical infrastructures using the Security Operations Center (SOC). As part of efforts, the purpose of this research is to propose a framework to automate the SOC’s performance of triage, containment and escalation. The research leveraged on qualitative desk review to collect data for analysis, deduced strengths and weaknesses for the current SOC implementations and used that as a basis for proposing the framework. In view of the constant evolution of SOC operations and capabilities coupled with the huge volumes of data collected for analysis, an efficient framework for SOC operations is proposed. The qualitative analysis is used to deduce strengths and weaknesses for the current SOC implementations as a premise for proposing the framework. It consists of eight interactive stages that further leverage on a proposed algorithm for baselining, remediation and escalation. The result of this research is a proposed framework that serves as a unique contribution to enhancing the SOC’s ability to automatically perform triage, containment and escalation. Supplementary to similar and earlier work reviewed, the framework is proposed as the way forward to automatically enable SOC setups with the capacity to efficiently perform triage of security threats, vulnerabilities and incidents, effectively contain identified breaches and appropriately escalate for prompt and accurate solutions.","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70334877","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Public Key Infrastructure: An Enhanced Validation Framework 公钥基础设施:一个增强的验证框架
Pub Date : 2020-01-01 DOI: 10.4236/jis.2020.114016
P. Danquah, Henoch Kwabena-Adade
Public Key Infrastructure (PKI) is a comprehensive information security framework for providing secure information and communication over the internet. Its need and use has grown over the years and continually grows. This research work examines the current PKI framework’s validation process as operated by vendors and subscribers to identify the drawbacks and propose enhanced approaches to its validation mechanism. Using an approach of reviewing secondary data, critical weaknesses of integrity, proof of trust and single point-of-failure were identified with the current PKI framework. This study therefore advances proposed solutions to address the identified weaknesses by specifically introducing multiple Certificate Authorities, storage, visibility and searchability of subscriber information in public repository. A comprehensive detail of its implementation is proposed to address the identified weaknesses of uncertain integrity, trust for certificate authorities and prevent a single point of failure. Furthermore, the proposed enhancements are validated with the protection motivation theory and a framework for empirically testing the enhancements is suggested. Further research would be required to factor in multi-factor authentication without compromising performance.
公开密码匙基础建设(PKI)是一个全面的资讯保安架构,可在互联网上提供安全的资讯和通讯。多年来,它的需求和使用一直在增长,而且还在不断增长。本研究工作检查了当前PKI框架的验证过程,由供应商和订阅者操作,以确定其缺陷并提出增强其验证机制的方法。使用审查辅助数据的方法,在当前的PKI框架中确定了完整性、信任证明和单点故障的关键弱点。因此,本研究提出了解决方案,通过在公共存储库中引入多个证书颁发机构、存储、可见性和可搜索性来解决已确定的弱点。提出了其实现的全面细节,以解决已确定的不确定完整性、对证书颁发机构的信任和防止单点故障的弱点。此外,利用保护动机理论对所提出的改进进行了验证,并提出了一个实证检验改进的框架。需要进一步的研究,在不影响性能的情况下考虑多因素身份验证。
{"title":"Public Key Infrastructure: An Enhanced Validation Framework","authors":"P. Danquah, Henoch Kwabena-Adade","doi":"10.4236/jis.2020.114016","DOIUrl":"https://doi.org/10.4236/jis.2020.114016","url":null,"abstract":"Public Key Infrastructure (PKI) is a comprehensive information security framework for providing secure information and communication over the internet. Its need and use has grown over the years and continually grows. This research work examines the current PKI framework’s validation process as operated by vendors and subscribers to identify the drawbacks and propose enhanced approaches to its validation mechanism. Using an approach of reviewing secondary data, critical weaknesses of integrity, proof of trust and single point-of-failure were identified with the current PKI framework. This study therefore advances proposed solutions to address the identified weaknesses by specifically introducing multiple Certificate Authorities, storage, visibility and searchability of subscriber information in public repository. A comprehensive detail of its implementation is proposed to address the identified weaknesses of uncertain integrity, trust for certificate authorities and prevent a single point of failure. Furthermore, the proposed enhancements are validated with the protection motivation theory and a framework for empirically testing the enhancements is suggested. Further research would be required to factor in multi-factor authentication without compromising performance.","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70334885","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Using Linear Regression Analysis and Defense in Depth to Protect Networks during the Global Corona Pandemic 利用线性回归分析和深度防御在全球冠状病毒大流行期间保护网络
Pub Date : 2020-01-01 DOI: 10.4236/jis.2020.114017
R. Alexander
The purpose of this research was to determine whether the Linear Regression Analysis can be effectively applied to the prioritization of defense-in-depth security tools and procedures to reduce cyber threats during the Global Corona Virus Pandemic. The way this was determined or methods used in this study consisted of scanning 20 peer reviewed Cybersecurity Articles from prominent Cybersecurity Journals for a list of defense in depth measures (tools and procedures) and the threats that those measures were designed to reduce. The methods further involved using the Likert Scale Model to create an ordinal ranking of the measures and threats. The defense in depth tools and procedures were then compared to see whether the Likert scale and Linear Regression Analysis could be effectively applied to prioritize and combine the measures to reduce pandemic related cyber threats. The results of this research reject the H0 null hypothesis that Linear Regression Analysis does not affect the relationship between the prioritization and combining of defense in depth tools and procedures (independent variables) and pandemic related cyber threats (dependent variables).
本研究的目的是确定线性回归分析是否可以有效地应用于深度防御安全工具和程序的优先级,以减少全球冠状病毒大流行期间的网络威胁。确定方法或本研究中使用的方法包括扫描来自著名网络安全期刊的20篇同行评审的网络安全文章,以获取深度防御措施(工具和程序)列表以及这些措施旨在减少的威胁。这些方法进一步涉及使用李克特量表模型来创建措施和威胁的有序排序。然后比较深度防御工具和程序,看看是否可以有效地应用李克特量表和线性回归分析来确定优先级和组合措施,以减少与大流行相关的网络威胁。本研究的结果拒绝了H0零假设,即线性回归分析不影响纵深防御工具和程序(自变量)的优先级和组合与大流行相关的网络威胁(因变量)之间的关系。
{"title":"Using Linear Regression Analysis and Defense in Depth to Protect Networks during the Global Corona Pandemic","authors":"R. Alexander","doi":"10.4236/jis.2020.114017","DOIUrl":"https://doi.org/10.4236/jis.2020.114017","url":null,"abstract":"The purpose of this research was to determine whether the Linear Regression Analysis can be effectively applied to the prioritization of defense-in-depth security tools and procedures to reduce cyber threats during the Global Corona Virus Pandemic. The way this was determined or methods used in this study consisted of scanning 20 peer reviewed Cybersecurity Articles from prominent Cybersecurity Journals for a list of defense in depth measures (tools and procedures) and the threats that those measures were designed to reduce. The methods further involved using the Likert Scale Model to create an ordinal ranking of the measures and threats. The defense in depth tools and procedures were then compared to see whether the Likert scale and Linear Regression Analysis could be effectively applied to prioritize and combine the measures to reduce pandemic related cyber threats. The results of this research reject the H0 null hypothesis that Linear Regression Analysis does not affect the relationship between the prioritization and combining of defense in depth tools and procedures (independent variables) and pandemic related cyber threats (dependent variables).","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70334891","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Concepts of Safety Critical Systems Unification Approach & Security Assurance Process 安全关键系统统一方法与安全保证过程的概念
Pub Date : 2020-01-01 DOI: 10.4236/jis.2020.114018
Faisal Nabi, J. Yong, Xiaohui Tao, Muhammad Saqib Malhi, Umar Mahmood, Usman Iqbal
The security assurance of computer-based systems that rely on safety and security assurance, such as consistency, durability, efficiency and accessibility, require or need resources. This targets the System-of-Systems (SoS) problems with the exception of difficulties and concerns that apply similarly to subsystem interactions on a single system and system-as-component interactions on a large information system. This research addresses security and information assurance for safety-critical systems, where security and safety are addressed before going to actual implementation/development phase for component-based systems. For this purpose, require a conceptual idea or strategy that deals with the application logic security assurance issues. This may explore the vulnerability in single component or a reuse of specification in existing logic in component-based system. Keeping in view this situation, we have defined seven concepts of security assurance and security assurance design strategy for safety-critical systems.
计算机系统的安全保障依赖于安全保障,如一致性、耐久性、效率和可访问性,需要或需要资源。这针对的是系统的系统(so)问题,除了类似于单个系统上的子系统交互和大型信息系统上的系统即组件交互的困难和关注点。本研究解决了安全关键系统的安全和信息保障问题,在进入基于组件的系统的实际实现/开发阶段之前解决了安全和安全问题。为此,需要一个概念性的想法或策略来处理应用程序逻辑安全保证问题。这可以探索单个组件中的漏洞或基于组件的系统中现有逻辑中规范的重用。考虑到这种情况,我们定义了安全保障的七个概念和安全关键系统的安全保障设计策略。
{"title":"Concepts of Safety Critical Systems Unification Approach & Security Assurance Process","authors":"Faisal Nabi, J. Yong, Xiaohui Tao, Muhammad Saqib Malhi, Umar Mahmood, Usman Iqbal","doi":"10.4236/jis.2020.114018","DOIUrl":"https://doi.org/10.4236/jis.2020.114018","url":null,"abstract":"The security assurance of computer-based systems that rely on safety and security assurance, such as consistency, durability, efficiency and accessibility, require or need resources. This targets the System-of-Systems (SoS) problems with the exception of difficulties and concerns that apply similarly to subsystem interactions on a single system and system-as-component interactions on a large information system. This research addresses security and information assurance for safety-critical systems, where security and safety are addressed before going to actual implementation/development phase for component-based systems. For this purpose, require a conceptual idea or strategy that deals with the application logic security assurance issues. This may explore the vulnerability in single component or a reuse of specification in existing logic in component-based system. Keeping in view this situation, we have defined seven concepts of security assurance and security assurance design strategy for safety-critical systems.","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70334932","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Cloud Computing Security Assessment Framework for Small and Medium Enterprises 中小企业云计算安全评估框架
Pub Date : 2020-01-01 DOI: 10.4236/jis.2020.114014
S. Rupra, Amos O. Omamo
Cloud computing plays a very important role in the development of business and competitive edge for many organisations including SMEs (Small and Medium Enterprises). Every cloud user continues to expect maximum service, and a critical aspect to this is cloud security which is one among other specific challenges hindering adoption of the cloud technologies. The absence of appropriate, standardised and self-assessing security frameworks of the cloud world for SMEs becomes an endless problem in developing countries and can expose the cloud computing model to major security risks which threaten its potential success within the country. This research presents a security framework for assessing security in the cloud environment based on the Goal Question Metrics methodology. The developed framework produces a security index that describes the security level accomplished by an evaluated cloud computing environment thereby providing the first line of defence. This research has concluded with an eight-step framework that could be employed by SMEs to assess the information security in the cloud. The most important feature of the developed security framework is to devise a mechanism through which SMEs can have a path of improvement along with understanding of the current security level and defining desired state in terms of security metric value.
云计算在包括中小企业在内的许多组织的业务发展和竞争优势中起着非常重要的作用。每个云用户都希望获得最大限度的服务,其中一个关键方面是云安全,这是阻碍采用云技术的其他具体挑战之一。中小型企业缺乏适当的、标准化的和自我评估的云世界安全框架,这在发展中国家成为一个没完没了的问题,并可能使云计算模式面临重大安全风险,威胁其在国内的潜在成功。本研究提出了一个基于目标问题度量方法的安全框架,用于评估云环境中的安全性。开发的框架生成了一个安全指数,该指数描述了经评估的云计算环境所达到的安全级别,从而提供了第一道防线。这项研究总结了一个八步框架,可以被中小企业用来评估云中的信息安全。所开发的安全框架的最重要特征是设计一种机制,通过该机制,中小企业可以了解当前的安全级别并根据安全度量值定义期望的状态,从而获得改进的路径。
{"title":"A Cloud Computing Security Assessment Framework for Small and Medium Enterprises","authors":"S. Rupra, Amos O. Omamo","doi":"10.4236/jis.2020.114014","DOIUrl":"https://doi.org/10.4236/jis.2020.114014","url":null,"abstract":"Cloud computing plays a very important role in the development of business and competitive edge for many organisations including SMEs (Small and Medium Enterprises). Every cloud user continues to expect maximum service, and a critical aspect to this is cloud security which is one among other specific challenges hindering adoption of the cloud technologies. The absence of appropriate, standardised and self-assessing security frameworks of the cloud world for SMEs becomes an endless problem in developing countries and can expose the cloud computing model to major security risks which threaten its potential success within the country. This research presents a security framework for assessing security in the cloud environment based on the Goal Question Metrics methodology. The developed framework produces a security index that describes the security level accomplished by an evaluated cloud computing environment thereby providing the first line of defence. This research has concluded with an eight-step framework that could be employed by SMEs to assess the information security in the cloud. The most important feature of the developed security framework is to devise a mechanism through which SMEs can have a path of improvement along with understanding of the current security level and defining desired state in terms of security metric value.","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70334837","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
The Guidelines to Adopt an Applicable SIEM Solution 采用适用SIEM解决方案的指南
Pub Date : 2019-12-13 DOI: 10.4236/jis.2020.111003
Hassan Mokalled, Rosario Catelli, V. Casola, Daniele Debertol, Ermete Meda, R. Zunino
The need for SIEM (Security Information and even Management) systems increased in the last years. Many companies seek to reinforce their security capabilities to better safeguard against cybersecurity threats, so they adopt multi-layered security strategies that include using a SIEM solution. However, implementing a SIEM solution is not just an installation phase that fits any scenario within any organization; the best SIEM system for an organization may not be suitable at all for another one. An organization should consider other factors along with the technical side when evaluating a SIEM solution. This paper proposes an approach to aid enterprises, in selecting an applicable SIEM. It starts by suggesting the requirements that should be addressed in a SIEM using a systematic way, and then proposes a methodology for evaluating SIEM solutions that measures the compliance and applicability of any SIEM solution. This approach aims to support companies that are seeking to adopt SIEM systems into their environments, suggesting suitable answers to preferred requirements that are believed to be valuable prerequisites an SIEM system should have; and to suggest criteria to judge SIEM systems using an evaluation process composed of quantitative and qualitative methods. This approach, unlike others, is customer driven which means that customer needs are taken into account when following the whole approach, specifically when defining the requirements and then evaluating the suppliers’ solutions.
对SIEM(安全信息甚至管理)系统的需求在过去几年中有所增加。许多公司寻求加强其安全能力,以更好地防范网络安全威胁,因此他们采用多层安全策略,包括使用SIEM解决方案。然而,实现SIEM解决方案不仅仅是适合任何组织中的任何场景的安装阶段;适合一个组织的最佳SIEM系统可能根本不适合另一个组织。在评估SIEM解决方案时,组织应该考虑技术方面的其他因素。本文提出了一种帮助企业选择适用的SIEM的方法。本文首先建议应该使用系统的方式在SIEM中处理的需求,然后提出用于评估SIEM解决方案的方法,该方法测量任何SIEM解决方案的遵从性和适用性。该方法旨在支持那些寻求将SIEM系统引入其环境的公司,并对被认为是SIEM系统应该具备的有价值的先决条件的首选需求提出合适的答案;并建议使用定量和定性方法组成的评估过程来判断SIEM系统的标准。与其他方法不同,这种方法是客户驱动的,这意味着在遵循整个方法时,特别是在定义需求然后评估供应商的解决方案时,要考虑客户的需求。
{"title":"The Guidelines to Adopt an Applicable SIEM Solution","authors":"Hassan Mokalled, Rosario Catelli, V. Casola, Daniele Debertol, Ermete Meda, R. Zunino","doi":"10.4236/jis.2020.111003","DOIUrl":"https://doi.org/10.4236/jis.2020.111003","url":null,"abstract":"The need for SIEM (Security Information and even Management) systems increased in the last years. Many companies seek to reinforce their security capabilities to better safeguard against cybersecurity threats, so they adopt multi-layered security strategies that include using a SIEM solution. However, implementing a SIEM solution is not just an installation phase that fits any scenario within any organization; the best SIEM system for an organization may not be suitable at all for another one. An organization should consider other factors along with the technical side when evaluating a SIEM solution. This paper proposes an approach to aid enterprises, in selecting an applicable SIEM. It starts by suggesting the requirements that should be addressed in a SIEM using a systematic way, and then proposes a methodology for evaluating SIEM solutions that measures the compliance and applicability of any SIEM solution. This approach aims to support companies that are seeking to adopt SIEM systems into their environments, suggesting suitable answers to preferred requirements that are believed to be valuable prerequisites an SIEM system should have; and to suggest criteria to judge SIEM systems using an evaluation process composed of quantitative and qualitative methods. This approach, unlike others, is customer driven which means that customer needs are taken into account when following the whole approach, specifically when defining the requirements and then evaluating the suppliers’ solutions.","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42285179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Research on University’s Cyber Threat Intelligence Sharing Platform Based on New Types of STIX and TAXII Standards 基于新型STIX和TAXII标准的高校网络威胁情报共享平台研究
Pub Date : 2019-10-29 DOI: 10.4236/jis.2019.104015
Gang Wang, Yuan-Zhi Huo, Z. Ma
With the systematization of cyber threats, the variety of intrusion tools and intrusion methods has greatly reduced the cost of attackers’ threats to network security. Due to a large number of colleges and universities, teachers and students are highly educated and the Internet access rate is nearly 100%. The social status makes the university network become the main target of threat. The traditional defense method cannot cope with the current complex network attacks. In order to solve this problem, the threat intelligence sharing platform based on various threat intelligence sharing standards is established, which STIX and TAXII It is a widely used sharing standard in various sharing platforms. This paper analyzes the existing standards of STIX and TAXII, improves the STIX and TAXII standards based on the analysis results, and proposes a new type of STIX and TAXII based on the improved results. The standard design scheme of threat intelligence sharing platform suitable for college network environment features. The experimental results show that the threat intelligence sharing platform designed in this paper can be effectively applied to the network environment of colleges and universities.
随着网络威胁的系统化,入侵工具和入侵方法的多样化大大降低了攻击者威胁网络安全的成本。由于高校众多,教师和学生受教育程度高,互联网接入率接近100%。社会地位使高校网络成为威胁的主要对象。传统的防御方法无法应对当前复杂的网络攻击。为了解决这一问题,建立了基于各种威胁情报共享标准的威胁情报共享平台,其中STIX和TAXII是各种共享平台中广泛使用的共享标准。本文对现有的STIX和TAXII标准进行了分析,根据分析结果对STIX和TAXII标准进行了改进,并根据改进结果提出了一种新型的STIX和TAXII标准。提出了适合高校网络环境特点的威胁情报共享平台标准设计方案。实验结果表明,本文设计的威胁情报共享平台能够有效地应用于高校网络环境。
{"title":"Research on University’s Cyber Threat Intelligence Sharing Platform Based on New Types of STIX and TAXII Standards","authors":"Gang Wang, Yuan-Zhi Huo, Z. Ma","doi":"10.4236/jis.2019.104015","DOIUrl":"https://doi.org/10.4236/jis.2019.104015","url":null,"abstract":"With the systematization of cyber threats, the variety of intrusion tools and intrusion methods has greatly reduced the cost of attackers’ threats to network security. Due to a large number of colleges and universities, teachers and students are highly educated and the Internet access rate is nearly 100%. The social status makes the university network become the main target of threat. The traditional defense method cannot cope with the current complex network attacks. In order to solve this problem, the threat intelligence sharing platform based on various threat intelligence sharing standards is established, which STIX and TAXII It is a widely used sharing standard in various sharing platforms. This paper analyzes the existing standards of STIX and TAXII, improves the STIX and TAXII standards based on the analysis results, and proposes a new type of STIX and TAXII based on the improved results. The standard design scheme of threat intelligence sharing platform suitable for college network environment features. The experimental results show that the threat intelligence sharing platform designed in this paper can be effectively applied to the network environment of colleges and universities.","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41493273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
信息安全(英文)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1