Jaime Ibarra’s research while affiliated with Northumbria University and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (6)


Comparison of Cybersecurity Methodologies for the Implementing of a Secure IoT Architecture
  • Chapter

January 2023

·

63 Reads

·

6 Citations

Nicolas Moreta

·

David Aragon

·

Silvana Oña

·

[...]

·

This research presents the collection of data from different cybersecurity methodologies used for securing IoT environments, of which a few were chosen for the validation of parameters. The methodology known as ENISA was used to filter, select and adjust to the needs of the architecture carried out in this project and was compared with the Hardening methodology. To review and validate the parameters of each one, a test bed environment was designed with several sensors and integrated systems (NodeMCU ESP8266 and Raspberry Pi). In addition, tests were carried out in three different scenarios and the validation of its security has been done using the Kali Linux distribution with tools like Nmap, Hydra, Wireshark, etc. The results were presented at the end in comparative tables attached to this document, which enabled the research to validate which methodology provides better resilience along with its applications to other architectures depending on the needs of the users.


Figure 2. Timeline categorization of articles.
Figure 3. Thematic analysis.
Figure 4. Fishbone framework.
Comparative analysis.
Cont.

+1

Enhancing Smart Home Threat Detection with Artificial Intelligence
  • Chapter
  • Full-text available

May 2021

·

156 Reads

·

2 Citations

The chapter focuses on building a theoretical network, which supports the protection of home networks from critical cyberattacks. A framework is proposed which aims to augment a home router with machine learning techniques to identify threats. During the current pandemic, employees have been working from home. So it is reasonable to expect that cyberattacks on households will become more common to leverage access into corporate networks. The model described in this chapter is for a single network; however, the network would be segmented into regions to avoid a wider compromise. Since the deployment of 5G, mobile threats are rising steadily. Therefore, the UK requires a robust plan to identify and mitigate all forms of threats including nation-state, terrorism, hacktivism. Additionally, the model dynamically analyses traffic to identify trends and patterns; therefore, supporting on the building of a resilient cyber defence. The emphasis in this model is to bridge the gap of trust between the government and the public, so that trust and transparency is established by a regulatory framework with security recommendations. At present, there is no authorisation to collect this data at national level, nor is there trust between the public and government regarding data and storage. It is hoped that this model would change human perception on the collection of data and contribute to a safer UK.

Download

Biohacking Capabilities and Threat/Attack Vectors

April 2020

·

181 Reads

·

6 Citations

The Internet of Things is a cutting-edge technology that organisations are adopting them in order to increase their business productivity and speed the operations. It has been involved for homes, companies, industries and now it is present in healthcare. However, due to lack of standardisation and accelerated competition, providers are deploying devices focused on innovation without having the proper balance between security, performance and ease of use. This is leading to new attacking vectors easing attackers to penetrate systems with confidence and without the need to be an expert in hacking thanks to the variety of open source tools available on the Internet e.g. Kali Linux, Github. The increased number of cyber attacks through IoT devices has complicated the performance of forensic investigators, reaching to Chains of Custody (CoC) easy to challenge by defenders and the rejection of investigation cases. Healthcare organisations has become the most attractive targets for cyber crime due to the variety and value of information allocated on Electronic Health Records (EHR).


Cyber Defence in the Age of AI, Smart Societies and Augmented Humanity

January 2020

·

375 Reads

·

15 Citations

This publication highlights the fast-moving technological advancement and infiltration of Artificial Intelligence into society. Concepts of evolution of society through interconnectivity are explored, together with how the fusion of human and technological interaction leading to Augmented Humanity is fast becoming more than just an endemic phase, but a cultural phase shift to digital societies. It aims to balance both the positive progressive outlooks such developments bring with potential issues that may stem from innovation of this kind, such as the invasive procedures of bio hacking or ethical connotations concerning the usage of digital twins. This publication will also give the reader a good level of understanding on fundamental cyber defence principles, interactions with Critical National Infrastructure (CNI) and the Command, Control, Communications and Intelligence (C3I) decision-making framework. A detailed view of the cyber-attack landscape will be garnered; touching on the tactics, techniques and procedures used, red and blue teaming initiatives, cyber resilience and the protection of larger scale systems. The integration of AI, smart societies, the human-centric approach and Augmented Humanity is discernible in the exponential growth, collection and use of [big] data; concepts woven throughout the diversity of topics covered in this publication; which also discusses the privacy and transparency of data ownership, and the potential dangers of exploitation through social media. As humans are become ever more interconnected, with the prolificacy of smart wearable devices and wearable body area networks, the availability of and abundance of user data and metadata derived from individuals has grown exponentially. The notion of data ownership, privacy and situational awareness are now at the forefront in this new age.


Cyber-Physical Attacks and the Value of Healthcare Data: Facing an Era of Cyber Extortion and Organised Crime

April 2019

·

48 Reads

·

21 Citations

Cybercrime has reached to a level that any cyber-attack can cause great levels of extortion. With the support of technology, healthcare organisations have been able to enhance medical treatment assuring better solutions to improve lifestyle of people. Likewise, criminals are attracted to the information allocated within hospital and clinics regardless of physical or digital storage. Electronic Health Records (EHR) are the most important asset in healthcare and criminals are aware of their value in the black market, including the dark web. This paper analyses the impact of cyber-attacks to healthcare organisations including methods used by criminals to enhance their anonymity, and the value of healthcare data nowadays. It studies blockchain, The Onion Router (TOR) and other common tools to ensure security and privacy while navigating through the internet and the reason why cybercriminals take advantage of the dark web to sell stolen information from hospitals in order to get higher financial gain. It also looks at the levels of extortion that is caused to organisations and how people are compromised.


Citations (6)


... It ensures con dentiality, integrity, and availability of digital information. Continuous vigilance and adaptation to evolving threats are crucial in maintaining effective cybersecurity (Moreta et al., 2023). Recognizing the shift towards e-governance and its security implications, policies on cybersecurity are essential for protecting sensitive information, maintaining privacy, and upholding critical services (Sule et al., 2021). ...

Reference:

Cybercrime and Cyber Security in Nigeria: Overview and Rate
Comparison of Cybersecurity Methodologies for the Implementing of a Secure IoT Architecture
  • Citing Chapter
  • January 2023

... The study identified that AI-driven attacks can adapt to defensive measures 3.2 times faster than traditional attacks, making them particularly challenging to mitigate. Furthermore, automated attack systems demonstrated the ability to identify and exploit zero-day vulnerabilities with 43.5% higher efficiency than manual methods [17]. ...

Enhancing Smart Home Threat Detection with Artificial Intelligence

... The involvement of global institutions, public engagement, and advancements in ethical AI underscores the multifaceted approach required to address data privacy challenges effectively. Achieving sustainable and equitable solutions demands collaboration among governments, corporations, academia, and civil society [55]. ...

Cyber-Physical Attacks and the Value of Healthcare Data: Facing an Era of Cyber Extortion and Organised Crime
  • Citing Chapter
  • April 2019

... The biohacking capabilities were highlighted in [64] where the authors presented a Digital Forensic Investigation Process Model along with the considerations of 5G networks due to the massive use of Software Defined Networks and a guideline for forensic investigation on the Internet of Medical Things based on seven processes described on a high-level.. ...

Biohacking Capabilities and Threat/Attack Vectors
  • Citing Chapter
  • April 2020

... The core of the technology lies in imitating brain functionality through repetition and learning from examples. Therefore, a large amount of example data is necessary to achieve accurate results [4]. The more images fed into the network, the more realistic the outcome becomes. ...

Cyber Defence in the Age of AI, Smart Societies and Augmented Humanity
  • Citing Book
  • January 2020

... These aspects include classification, which involves categorizing and labeling different types of ransomware or cyber threats based on their characteristics, behavior, or impact . Another crucial aspect is detection, which encompasses identifying and recognizing malicious activities within a system or network, typically through behavioral analysis, anomaly detection, and signature-based techniques [8,[60][61][62][63][64]. ...

Ransomware Impact to SCADA Systems and its Scope to Critical Infrastructure
  • Citing Conference Paper
  • January 2019