ArticlePDF Available

Abstract and Figures

Today, due to the modern life style people have joined technology life and using more technology for shopping as well as financial transactions in their cyber space. At the same time, safeguarding of knowledge has become increasingly difficult. In addition, the heavy use and growth of social media, online crime or cybercrime has increased. In the world of information technology, data security plays a significant role. The information security has become one of today’s main challenges. Whenever we think of cyber security, we first of all think of ‘cybercrimes,’ which expand tremendously every day. Different government and businesses take various steps to avoid this form of cybercrime. In addition to numerous cyber protection initiatives, many people are also very worried about it. This paper focuses primarily on cyber security concerns related to the new technology. It also concentrates on the new technologies for cyber security, ethics and developments that impact cyber security.
Content may be subject to copyright.
IOP Conference Series: Materials Science and Engineering
PAPER • OPEN ACCESS
Cyber Security Challenges and its Emerging Trends on Latest
Technologies
To cite this article: K. M Rajasekharaiah et al 2020 IOP Conf. Ser.: Mater. Sci. Eng. 981 022062
View the article online for updates and enhancements.
This content was downloaded from IP address 158.46.145.68 on 19/12/2020 at 12:34
Content from this work may be used under the terms of the Creative Commons Attribution 3.0 licence. Any further distribution
of this work must maintain attribution to the author(s) and the title of the work, journal citation and DOI.
Published under licence by IOP Publishing Ltd
ICRAEM 2020
IOP Conf. Series: Materials Science and Engineering 981 (2020) 022062
IOP Publishing
doi:10.1088/1757-899X/981/2/022062
1
Cyber Security Challenges and its Emerging Trends on Latest
Technologies
Dr.Prof. Rajasekharaiah K.M1, Chhaya S Dule2,Sudarshan E3
1Principal and Professor - CSE, Kshatriya College of Engineering, Armoor
,Nizamabad Dist . Telangana ,India .
2Assistant Professor - CSE, Dayananda Sagar University, Bangalore, Karnataka, India.
3Sumathi Reddy Institute of Technology for Women, Warangal, India.
1drrajcse2014@gmail.com
Abstract:Today, due to the modern life style people have joined technology life and using
more technology for shopping as well as financial transactions in their cyber space. At the
same time , safeguarding of knowledge has become increasingly difficult. In addition, the
heavy use and growth of social media, online crime or cybercrime has increased. In the world
of information technology, data security plays a significant role. The information security has
become one of today's main challenges. Whenever we think of cyber security, we first of all
think of 'cybercrimes,' which expand tremendously every day. Different government and
businesses take various steps to avoid this form of cybercrime. In addition to numerous cyber
protection initiatives, many people are also very worried about it. This paper focuses primarily
on cyber security concerns related to the new technology. It also concentrates on the new
technologies for cyber security, ethics and developments that impact cyber security.
Keywords: Cyber security, cybercrime, android apps Social networks,
1. Introduction
The process of digitization in all aspects of human life, like healthcare, education, business, etc., has
gradually led to the storage of all sorts of information, including sensitive data. Security, is the process
of protecting the digitized information from theft or from physical damage while maintaining the
confidentiality and availability of information but as technology is growing rapidly, the cybercrime
rate also increases both in number and complexity. The reason behind this tremendous growth in
cyber-crime is the usage of inadequate software, expired security tools, design flaws, programming
errors, easily available online hacking tools, lack of awareness in public, high rates of financial returns,
etc. In order to explore the vulnerabilities in the target and thereby to attack the victim, more powerful
attack tools are developed by the technical attackers. With this, new attacks in different variations are
coming which are difficult to detect. Increase in internet dependency in all walks of life, digital nature
of data in huge amounts getting accumulated through online transactions and decentralization of data
repositories, has led to the development of effective security algorithms. The continuously changing
nature of cybercrime also leads to the difficulty of handling and avoiding emerging threats. The task of
securing cyber-space is the most difficult and challenging task as advanced threats play a very active
role. Therefore, it is necessary to get insights into the concepts of security defense mechanisms,
different techniques and trending topics in the area of information security
ICRAEM 2020
IOP Conf. Series: Materials Science and Engineering 981 (2020) 022062
IOP Publishing
doi:10.1088/1757-899X/981/2/022062
2
ICRAEM 2020
IOP Conf. Series: Materials Science and Engineering 981 (2020) 022062
IOP Publishing
doi:10.1088/1757-899X/981/2/022062
3
1.1 Cyber Crime:
Cybercrime is a term for a crime which uses a PC for robbery and crime of commission. The United
States Department of Justice has extended the scope of cybercrime to cover any crime that uses a
device for evidence storage. The increasing list of cybercrimes includes computer crimes, such as the
spread of network intrusions and pc-viruses, as well as the computer-based variant of established
crimes such as theft, stalking, intimidation, and coercion. Often cyber-crimes in common people's
language may also be defined as crimes committed using a PC and the web to steal the identity or sell
an individual to victims of smuggling or stalking or disrupting operations with malicious programme.
As technology has a major role in the lives of an extremely individual day by day, cybercrimes too can
increase alongside technological advancements.
1.2 Cyber Security:
Privacy and information protection can be the primary security behaviour which any company cares
about continually. We prefer to square measurements currently in a highly digital or cyber-specific
environment in which all the data are stored. Social networking sites provide an environment wherever
users feel secure while they function with friends and family, cyber criminals also seek to steal
personal information via social media sites.
1.3 Scope of The Study:
The interactive structure of the financial environment will be a direct impact on one aspect of the
institution's infrastructure and the sensibilities of the financial sector to cybercrimes, in particular
attacks on Denial-of-Services. In order to secure all the confidential information from falling into
wrong hands, the finance sector should continually track and innovate its systems. The banking sector
has always been the leading player in implementing safety systems and behavior and has also been the
leading cyber security investment sector.
2. Literature Review
Julian Jang-Jaccard [1] Improving cyber security and protecting critical information infrastructure is
important for the security and economic well-being of each country. Safer Internet (and protecting
Internet users) have been an important part of the growth of new services and public policy.
Lee, H.; Lee, et al [2]. Various attachment methods have emerged in the past and the key logger is a
representative attack tool, which records all user's keyboard data entries and can be easily obtained
from the Internet.
Mellado, D.; Mouratidis et al,[3]. Protection is an area in the SPL that has not been studied. Most
methods concentrate on implementing safety criteria or properties in the SPL. There were various
approaches to variability management and safety criteria from the early stages of production of the
product line.
Mohsin, M.; Anwar et al, [4] Whether the established techniques of feature models can be
implemented or adapted for cyber security is the challenge in the fields of cyber security. In an
approach is proposed in order to enhance the production and the derivative products of safe software
product lines (SPLs).
VeenooUpadhyay [5] The wizard asks the user to add "labels" of privacy to select friends, and he uses
this feedback to create a classifier using the machine learning pattern, which can be used to allocate
privileges to the other user friends automatically. The insight for the design stems from the observation
that actual users understand their privacy habits and that friend can see which details they use and
reproduce in other friends' settings, based on an implicit set of rules.
Yim, K [6]The main principle of this technique prevents the user from disclosing the actual keyboard
data entrance but detects the keyboard data attack techniques. In particular, by producing the random
keyboard data, the defender calls for a keyboard input event to secure the user 's actual keyboard data
intake by filtering the keyboard data generation.
Nikita TresaCyriacLipsaSadath [7]The paper also discusses the perpetrators of a cyber-attack and
ICRAEM 2020
IOP Conf. Series: Materials Science and Engineering 981 (2020) 022062
IOP Publishing
doi:10.1088/1757-899X/981/2/022062
4
the techniques primarily used to achieve their goal. It sheds light on the overall structure of cyber-
assault and on its phases and its impact on the financial system.
MdLiakat Ali [8]This study presents a brief overview of the cyber security problems raised by
modern developments in technology and innovations; the paper is also focused on the latest cyber
security strategies, trends and other ethics in cyber security.
Kutub Thakur [9]Cyber security was used interchangeably for the security of knowledge, where later
it sees the human's role in the safety process, although formerly finding this an additional dimension.
However, such a debate on cyber safety has major consequences, since it reflects on the ethical part of
the whole society. Various systems and models have been developed to solve the problem of cyber
security.
J.li [10] Evaluated firewalls issues and how the routing tables can be configured in a way that
minimizes the maximized firewall rule set which helps to avoid performance bottlenecks and limit
safety breakthroughs. The problems are NP-full and an heuristic approach has been suggested to
demonstrate the efficacy of algorithms using simulations. Two major contributions have also taken
place.
3. Cyber Security Techniques:
Cyber-attacks on cyberspace can grow by capitalizing on new techniques. Cybercriminals will most
frequently change the current malware signatures to take advantage of new technical faults. In other
instances, they actually search for special features of emerging technology to detect weaknesses in
malware injection. Cyber criminals are taking advantage of emerging Internet technology and millions
and billions of active users to access a huge amount of people easily and effectively using these new
technologies.
3.1 Access Control and Password Security:
Security provided by the means of username and passwordis a simple way of providing security for the
private information to preserve privacy. This means of providing security is one of the most critical
cyber security initiatives.
3.2 Authentication of Data: Until the transmitted information need to be attested that it has come
from a reputable supply that was not changed. These documents are often authenticated using a gift
from the opposing virus software package inside computers. An honestly opposed virus software
package is more essential to protect devices from viruses.
3.3Malware Scanners:
A software system which sometimes scans all files and documents for malicious code or harmful
viruses inside the system. The samples of malicious software systems in this field are generally sorting
and noted as malware by viruses, worms, and the Trojan horses.
3.4Firewall:
Firewall is a software or hardware package which helps separate hackers ,viruses and worms trying to
access your PC through the web .The firewall checks all messages that come in and blocks those that
fail to meet the security requirements compatible with all messages .Firewalls plays a very vital role in
malware detection.
3.5Role of Social Media in Cyber Security:
In recent modern world, there is a need of interactive businesses which needs to find new ways to
secure personal information in more entangled environment. Social media has important role to play in
cyber security and in personal cyber-attacks. Adoption of social media among employees is growing
and threat of attack is therefore increasing since most of them nearly use social media or social
networking sites everyday it is now a massive forum for cyber criminals to hack private information
ICRAEM 2020
IOP Conf. Series: Materials Science and Engineering 981 (2020) 022062
IOP Publishing
doi:10.1088/1757-899X/981/2/022062
5
and steal valued information. In recent days , it’s very easy to share personal information easily and
businesses must make sure that recognise , react in real time and prevent breaches of any kind as
quickly as possible . These social media has easily make people to share their private information and
hackers can use these information .therefore , people have to take reasonable steps to avoid misuse and
loss of their information through these social media.
4. Recent Survey Issues on Cyber Security Trends
Cyber Security concerns the awareness concerning various cyber threats and the implementation of
defense policies (i.e countermeasures) to safeguard confidentiality, credibility and availability of
digital or IT technologies
Fig 4.1 Vulnerabilities and Defense Strategies in existing systems
Many cyber security experts consider Malware is the main option for malicious arms to violate the
cyber protection efforts of cyberspace. Malware is the widespread class of attacks loaded upon a
device, generally without the knowledge of the rightful owner. Like viruses, worms, Trojan horses,
spyware and bot executable, malware infects computers in several ways for example propagating from
infected devices, trick users into opening tactile file or enticing users to visit websites of malware
spreading. Malware could load itself into a USB drive inserted into an infected computer in more
concrete cases of malware infection, and then infect any machine into which the computer is then
inserted. Malware can spread from the embedded systems and computational logic of devices and
equipment. Malware can be introduced in the device life cycle at any time. The victim of malware may
vary from end-users, servers and network devices (e.g. routers, switching, etc.) to process control
systems like the SCADA. The increase in the number of malware and its complexity are today a major
concern in the Internet.
4.1 Phishing Attacks: According to Verizon’s latest data violation survey, 32% of the data violations
confirmed were attributable to phenomena. The purpose of the assaults is to collect confidential
information such as usernames, passwords, the social security numbers and card details by duplicating
the victims into believing they connect with a trustworthy person, by either email or by text, and
increasingly by means of telephone.
4.2 IoTRansomware:
The internet of things contains several devices, i.e. home equipment and service sensors, which are
connected to the network. Climate control devices and refrigerators do not often contain confidential
information through their own devices; they may be kept as hostages and are possible targets for
hackers to access information in backend systems such as those in power supplies and communication
facilities
ICRAEM 2020
IOP Conf. Series: Materials Science and Engineering 981 (2020) 022062
IOP Publishing
doi:10.1088/1757-899X/981/2/022062
6
4.3 Increased Data Privacy Regulation:
The General Data Protection Regulations for Europe(GDPR) was introduced in May 2018 to
strengthen European citizens’ rights of data privacy and to implement compliance with more rigorous
global regulations or severe financial penalties for non-compliance.
4.4 Cyber Attacks on Mobile Devices :
Recent RSA research has concluded that in 2018 “ 80% of fraudulent mobile transactions “ have risen
exponentially with mobile app fraud since 2015 with mobile devices touching each part of our life and
working life ,their risk perceptions also grow higher.
4.5 Increased Investment in Automation :
Automation technology is gaining ground in organisations by allowing underemployed cyber security
teams to focus on more complex problems ,not on routine , often worldly work .According to a recent
Ponemon Institute survey, 79% of respondents use security automation tools and frameworks and 50%
expect to use security automation in their businesses. In these situations, the first approach to data
protection provides an ultimate defense against Cyber-attacks such as database fraud and fitness, and
its profound effect on a business .It may enhance efficiency ,but skills and expertise are still necessary
to minimize cyber security risk.
4.5 Preventive measures to avoid Cybercrimes:
The five latest emerging trends in cyber security
1. Cyber security skills and organizations are also changing.
2. Protection in the cloud is a top priority.
3. Shift your attention from security and prevention
4. Production centers manage the application and data protection.
Next generation safety digital environments can only determine cybercrime through technological
measures; capacity building, organizational structure and global collaboration, along with legislative
steps, were also required
5. Conclusion
This paper concludes that the cyber-crime has significant consequences for national and economic
security. It is pervasive, violent, ubiquitous and increasingly sophisticated. There are significant risks
for many industry agencies, public and private organization’s (especially critical infrastructure) for
companies and governments alike, it will be necessary for future growth, innovation and competitive
advantage to have a cyber-security role in all its components. Every New Year, the security of data,
continues to differ from cybercrime by entirely different methods. The newest and most turbulent
innovations, along with emerging cyber techniques and regular attacks, are difficult organisations that
not only protect their infrastructure but also need new channels and intelligence. However, we do have
to do our hardest to attenuate cybercrime so that we can have a healthy and stable future in cyber-
houses. The technologies of stable Internet and efficient systems of the next century have been
proposed as important research fields for the future. The advancement of global identity management
and monitoring techniques to monitor opponents have also become an important issue in the future
6. Conclusion
The enormous increase in Internet access and the progress of Internet-enabled devices, the rising
numbers of the population and wide spread use of the Internet, frequently showing highly sensitive
personal data with little realization of the implications of information leakage.
We speculate that concerns relating to end user confidentiality will rise in line with the
increasing amount of knowledge accessible on the internet in the future.
Furthermore, usability issues are becoming ever more relevant as a way of intuitively
learning about and using end-user-oriented protection mechanisms without complicating
ICRAEM 2020
IOP Conf. Series: Materials Science and Engineering 981 (2020) 022062
IOP Publishing
doi:10.1088/1757-899X/981/2/022062
7
or profound learning curves to secure the data. Cyber safety practice in the community is
built up with innovative patches that rectify existing security and confidentiality problems
and move on to them.
Some believe that this revolutionary strategy has failed and will be unable to fulfill future
requirements, because the original Internet has been invented in a somewhat different
context from how it is used today. An approach to "thinking beyond" is suggested to make
better use of the increasingly-demands of the future without referring to the existing
computing system and future, but to start again
6. References
[1] Ravi Sharma Study of Latest Emerging Trends on Cyber Security and its challenges to Society
International Journal of Scientific & Engineering Research, Volume 3, Issue 6, June-2012
1ISSN 2229-5518.
[2] Lee, H.; Lee, Y.; Lee, K.; Yim, K. Security Assessment on the Mouse Data using Mouse
Loggers. In Proceedings of the International Conference on Broadband and Wireless
Computing, Communication and Applications, Asan, Korea, 57 November 2016
[3] Mellado, D.; Mouratidis, H.; Fernández-Medina, E. Secure Tropos Framework for Software
Product Lines Requirements Engineering. Comput. Stand. Interfaces 2014, 36, 711722
[4] Mohsin, M.; Anwar, Z.; Zaman, F.; Al-Shaer, E. IoTChecker: A data-driven framework for
security analytics of Internet of Things configurations. Comput.Secur. 2017, 70, 199223
[5] VeenooUpadhyay, SuryakantYadav Study of Cyber Security Challenges Its Emerging Trends:
Current Technologies International Journal of Engineering Research and Management
(IJERM) ISSN: 2349- 2058, Volume-05, Issue-07, July 2018
[6] Yim, K. A new noise mingling approach to protect the authentication password. In Proceedings
of the 2010 International Conference on Complex, Intelligent and Software Intensive
Systems, Seoul, Korea, 30 June2 July 2012
[7] Nikita TresaCyriacLipsaSadath Is Cyber Security Enough- A study on Big Data Security Breaches
in Financial Institutions 2019 4th International Conference on Information Systems and
Computer Networks (ISCON) GLA University, Mathura, UP, India. Nov 21-22, 2019
[8] MdLiakat Ali Kutub Thakur Beatrice Atobatele Challenges of Cyber Security and the Emerging
Trends BSCI’19, July 8, 2019, Auckland, New Zealand
[9] Kutub Thakur1, Meikang Qiu2, Keke Gai3, MdLiakat Ali4 An Investigation on Cyber Security
Threats and Security Models 2015 IEEE 2nd International Conference on Cyber Security
and Cloud Computing 978-1-4673-9300-3/15
[10] J. Li. The research and application of multi-firewall technology in enterprise network security.
Int’l J. of Security and Its Applications, 9(5):153162, 2015
... Cloud computing breaches have affected even some of the largest organizations, exposing millions of sensitive records due to misconfigurations and poor security practices [14], [15]. The following case studies as shown in table-2 highlight significant cybersecurity breaches in cloud environments and the key lessons learned from these incidents. ...
Article
As cloud computing becomes increasingly integral to modern infrastructures, the need for robust cybersecurity measures has grown significantly. This paper examines emerging cybersecurity threats in cloud computing, focusing on advanced attacks like data breaches, virtualization vulnerabilities, insider threats, Distributed Denial of Service (DDoS) attacks, and Advanced Persistent Threats (APTs). It explores mathematical models for assessing threat probabilities, evaluating encryption efficiency, and quantifying risk. The study also investigates key security strategies, such as encryption, identity management, and incident response, to mitigate these risks. Additionally, compliance with global standards such as ISO 27001, NIST, and GDPR is analyzed to understand the challenges of maintaining secure multi-cloud environments. Through case studies of recent cloud security incidents, this research highlights critical lessons and provides actionable insights for strengthening cloud security frameworks. The paper concludes by discussing future trends, including artificial intelligence, machine learning, and quantum computing, and their potential impacts on cloud cybersecurity. By addressing these emerging threats and trends, the study aims to provide comprehensive guidance for enhancing cloud security.
... Worse, an organization may have introduced knowledge management before. However, for whatever reason, the journey failed and had poor ramifications among staff (Remenyi, 2015)considering the current times marked by a world pandemic (Bratianu, 2020) and the cybersecurity war (Rajasekharaiah, 2020). ...
Conference Paper
Although many studies have been carried out in the knowledge management domain, organizational knowledge risks is still a less explored field, difficult to analyze, and full of challenges, with areas of high interest, especially in the current transition and unpredictable changes. This paper aims to study the correlations in the knowledge management domain with the knowledge risk, focusing on the known and unknown knowledge risks and the challenges in these times of transitions and change in which uncertainties are more frequent than they seem at first sight and risks become more challenging to anticipate, to calculate and evaluate them. Organizations are pressured to constantly develop new methods to ensure the sound management of knowledge risks and have less time to deal with all the uncertainties, particularly with unknown risks. Knowledge risks and known knowledge risks have been examined from various angles; unknown knowledge risks have only been examined in a few papers. The analysis of unknown risks will help enforce the management of any organization because of the unprecedented access to information improvements in academic research; the current landscape of knowledge risks management represents a key point for managers in any organization, and if it is not given the necessary attention, sooner or later the system will fail. Thanks to text mining and scientific mapping analysis with VOSviewer software version 1.6.19, we could identify important insights about the evolution of the concept of knowledge risks. This has been accomplished using a database generated from the core collection of Web of Science. The term co-occurrence analysis-based text mining helped to provide a deeper insight into current and future workspace dynamics in the knowledge management of known and unknown risks.
Article
In today's rapidly evolving digital landscape, cybersecurity and information security are crucial for safeguarding critical assets across organizations and individuals. Cybersecurity focuses on protecting internet-connected systems, including hardware, software, and data, from cyber-attacks. In contrast, information security ensures the confidentiality, integrity, and availability of information, regardless of its digital or physical form. Although these terms are sometimes used interchangeably, they represent distinct concepts and methodologies, addressing specific threats and risks within the digital ecosystem. This review examines the differences and overlaps between cybersecurity and information security, highlighting their intersection in creating comprehensive protection strategies. While cybersecurity addresses external threats such as malware, phishing, and hacking, information security focuses on policies and procedures to prevent breaches—whether accidental or intentional. Recent trends, regulatory requirements, and the increasing complexity of cyber threats underscore the importance of adopting robust security measures. This article also explores the impact of cyber-attacks, including financial losses, reputational damage, and legal consequences stemming from noncompliance with data protection regulations. Additionally, the role of emerging technologies, such as artificial intelligence, machine learning, and blockchain, in enhancing the security landscape is discussed. The conclusion emphasizes the importance of a unified approach integrating cybersecurity and information security to mitigate risks effectively and ensure the long-term protection of sensitive data.
Chapter
In today's digital age, ethical issues are a principal concern during responsible data research which requires thoughtful consideration and approaches for managing them. As technological advances materialize to increase the standard of living for people across the world, ethics must be prioritized by cybersecurity professionals to ensure these technologies are not being misused or inflicting harm to the general population, especially to underrepresented and underprivileged communities. Cybersecurity subject matter experts must develop awareness regarding ethical ramifications of their research endeavors to ensure security is balanced with moral standards. Observance of and adherence to ethical based policies, principles, and security best practices will delineate cybersecurity professionals from threat actors.
Article
Full-text available
Modern organizations have migrated from localized physical offices to work-from-home environments. This surge in remote work culture has exponentially increased the demand for and usage of Virtual Private Networks (VPNs), which permit remote employees to access corporate offices effectively. However, the technology raises concerns, including security threats, latency, throughput, and scalability, among others. These newer-generation threats are more complex and frequent, which makes the legacy approach to security ineffective. This research paper gives an overview of contemporary technologies used across enterprises, including the VPNs, Zero Trust Network Access (ZTNA), proxy servers, Secure Shell (SSH) tunnels, the software-defined wide area network (SD-WAN), and Secure Access Service Edge (SASE). This paper also presents a comprehensive cybersecurity framework named Zero Trust VPN (ZT-VPN), which is a VPN solution based on Zero Trust principles. The proposed framework aims to enhance IT security and privacy for modern enterprises in remote work environments and address concerns of latency, throughput, scalability, and security. Finally, this paper demonstrates the effectiveness of the proposed framework in various enterprise scenarios, highlighting its ability to prevent data leaks, manage access permissions, and provide seamless security transitions. The findings underscore the importance of adopting ZT-VPN to fortify cybersecurity frameworks, offering an effective protection tool against contemporary cyber threats. This research serves as a valuable reference for organizations aiming to enhance their security posture in an increasingly hostile threat landscape.
Article
The advent of the Internet of Things (IoT) has revolutionized networks by transforming legacy dumb devices into smart connected ‘things’; observing, interacting and impacting the environment with minimal human intervention. These features, while promising a variety of innovative solutions and business benefits, are vulnerable to a host of new threat vectors and security risks. A typical IoT network comprises of thousands of IoT devices using heterogeneous protocols, having varying resources, complex interdependencies and diverse networking and security requirements. The configuration data of IoT systems is mostly unstructured, lacking machine interpretable semantics and thus, traditional analysis techniques cannot tackle the IoT-specific configuration challenges of scalability, interoperability and security. In this paper, we present IoTChecker, a novel data-driven framework to semantically model IoT configurations and then employ that model to automatically arrest security configuration anomalies and analyze IoT-specific threat vectors. The approach leverages a combination of newly constructed as well as extended and aligned versions of existing ontologies. Configuration analytics are performed automatically by describing the context of complex IoT interactions and dependencies through rules-supported reasoning and queries. The evaluation involves ontology-based security classification of 954 real-world IoT products and security analysis of their practically-deployed system configurations. Our automated approach has proven to be scalable, easily manageable, formally verifiable and free from errors induced by tedious manual configurations.
Conference Paper
Cyber security has been used interchangeably for information security, where later considers the role of the human in the security process while former consider this as an additional dimension and also, focus person has a potential target. However, such discussion on cyber security has important implication as it focuses on the ethical part of the society as a whole. To address the issue of cyber security, various frameworks and models have been developed. It also introduces the concepts of cyber security in terms of its framework, workforces and information related to protecting personal information in the computer. This paper reviews these models along with their limitations and review the past techniques used to mitigate these threats. Furthermore, the report also provides recommendations for future research.
Article
A firewall's complexity is known to increase with the size of its rule set. Empirical studies show that as the rule set grows larger, the number of configuration errors on a firewall increases sharply, while the performance of the firewall degrades. When designing a security-sensitive network, it is critical to construct the network topology and its routing structure carefully in order to reduce the multi-firewall rule sets, which helps lower the chance of security loopholes and prevent performance bottleneck. This paper studies the problems of how to place the firewalls in a topology during network design and how to construct the routing Tables during operation such that the maximum firewall rule set can be minimized. We have two major contributions. First, we prove that the problems are NP-complete. Second, we propose a heuristic solution and demonstrate the effectiveness of the algorithm by simulations. The results show that the proposed algorithm reduces the maximum multi-firewall rule set when comparing with other algorithms.
Article
Cyber Security plays an important role in the development of information technology as well as Internet services. Our attenti on is usually drawn on "Cyber Security" when we hear about "Cyber Crimes". Our first thought on "National Cyber Security" therefore starts on how good is our infrastructure for handling "Cyber Crimes" [1]. This paper focus on cyber security emerging trends while adopting new technologies such as mobile computing, cloud computing, e-commerce, and social networking. The paper also describes the challenges due to lack of coordination between Security agencies and the Critical IT Infrastructure.
Conference Paper
This paper proposes effective countermeasures to hardware vulnerability of the keyboard controller. Through the vulnerability, some possible attacker is able to snoop the password string from the keyboard even when keyboard protection software is running. However, it will be impossible for attackers to gather the exact password if the proposed policy is applied though they can sniff the keyboard hardware protocol.
Security Assessment on the Mouse Data using Mouse Loggers
  • H Lee
  • Y Lee
  • K Lee
  • K Yim
Lee, H.; Lee, Y.; Lee, K.; Yim, K. Security Assessment on the Mouse Data using Mouse Loggers. In Proceedings of the International Conference on Broadband and Wireless Computing, Communication and Applications, Asan, Korea, 5-7 November 2016
Secure Tropos Framework for Software Product Lines Requirements Engineering
  • D Mellado
  • H Mouratidis
  • E Fernández-Medina
Mellado, D.; Mouratidis, H.; Fernández-Medina, E. Secure Tropos Framework for Software Product Lines Requirements Engineering. Comput. Stand. Interfaces 2014, 36, 711-722
SuryakantYadav Study of Cyber Security Challenges Its Emerging Trends
  • Veenooupadhyay
VeenooUpadhyay, SuryakantYadav Study of Cyber Security Challenges Its Emerging Trends: Current Technologies International Journal of Engineering Research and Management (IJERM) ISSN: 2349-2058, Volume-05, Issue-07, July 2018
Study of Cyber Security Challenges Its Emerging Trends: Current Technologies International
  • Upadhyay
Secure Tropos Framework for Software Product Lines Requirements Engineering
  • Mellado