Figure 7 - uploaded by Mircea Constantin Scheau
Content may be subject to copyright.
Banking -ATM Connectivity (Net2Edge, 2020)

Banking -ATM Connectivity (Net2Edge, 2020)

Source publication
Article
Full-text available
Abstract: Billions of people have access to the online environment through which runs financial transfers or personal data. The boundaries of cybercrime are particularly diffuse. The critical areas are in the focus of the offenders. The balance of profits and losses can be seriously prejudiced if the directions of international bodies are ignored....

Context in source publication

Context 1
... order to be able to run the commands for which it was designed, in addition to safe-deposit box, as can be seen in figure 6, the operation of the ATM requires a computer system with peripherals, operating system, user interface etc. The first step for an attack to be successful is to understand the operation and communication of the concerned/respective devices, the connectivity chain being presented in figure 7. For some of the ATMs, analogue communications or V.35, data encryption is still in operation by using the 3DES algorithm, at a speed between 256 kb/s and 512kb / s. ...

Similar publications

Chapter
Full-text available
Cloud Infrastructure as a Service (IaaS) is vulnerable to malware due to its exposure to external adversaries, making it a lucrative attack vector for malicious actors. A datacenter infected with malware can cause data loss and/or major disruptions to service for its users. This paper analyzes and compares various Convolutional Neural Networks (CNN...
Article
Full-text available
Encryption, which is essential for the protection of sensitive information can also encrypt any malicious content which can then reside in any network, undetected. Encryption of malicious payload is used by malware authors to mask their code, however,the objective of hiding of malicious code can be further improved by techniques of re-randomization...
Conference Paper
Full-text available
Domain generation algorithm (DGA) is the foundation of malware families because of the very fact that DGA generates huge variety of pseudorandom domain names to associate to a command and control (C2C) infrastructures. This paper focuses in handling classification of class in a imbalanced data. Cost-sensitive long short-term memory (CS-LSTM) approa...
Chapter
Full-text available
Domain generation algorithm (DGA) is the foundation of malware families because of the very fact that DGA generates huge variety of pseudorandom domain names to associate to a command and control (C2C) infrastructures. This paper focuses in handling classification of class in a imbalanced data. Cost-sensitive long short-term memory (CS-LSTM) approa...
Article
Full-text available
5G is about to open Pandora’s box of security threats to the Internet of Things (IoT). Key technologies, such as network function virtualization and edge computing introduced by the 5G network, bring new security threats and risks to the Internet infrastructure. Therefore, higher detection and defense against malware are required. Nowadays, deep le...

Citations

... Whereas these availability aspects are important, confidentiality and integrity principles should also be analyzed. A step in this direction has been made in the literature concerning evolution of IT solutions, including in 2020, when Șcheau et al. described and developed an analytical framework for secure IT evolution [21]. Prevention and control methods are analyzed, while highlighting the role of IT infrastructures in the context of technological development. ...
Article
Full-text available
Drones have been used in recent years more and more in various economic sectors (e.g., military, agriculture, retail, transport), but also for personal use and entertainment. The current legislative framework and cyber security standards do not fully address the identification of liable stakeholders in the drone ecosystem for cyber-incidents and the requirement to implement preventive cyber-security measures. The aim of this paper is to investigate how the usage of drones fits in the context of the digital economy. For this purpose, we use a complex questionnaire which was sent to a total of 233 respondents from May to July 2021. The responses are analyzed from a qualitative and quantitative perspective. Our results highlight the areas of improvement in the existing legislation and find the following: (1) respondents are willing to pay additional direct and indirect costs related to cyber security to benefit from more secure drones, (2) the entire ecosystem involved in drone production, distribution, and usage is responsible for ensuring the prevention of security breaches, and (3) respondents perceive a shared liability of stakeholders for certain types of cyber-attacks depending on the role of the stakeholders in the drone ecosystem and the type of vulnerability exploited by the cyber-attack. The details on the specific cyber-attack use cases detail each of the above for each type of cyber-attack. Finally, we make proposals to accommodate the new types of use cases brought by the use of drones in various economic contexts. The results of this research paper assist policy makers in terms of improvement to existing legislation in terms of the drone ecosystem. In addition, they increase visibility for stakeholders in the drone ecosystem in terms of aspects to focus on in order to increase the trust of clients in drone usage.