Science topic
Cyber Security - Science topic
Explore the latest questions and answers in Cyber Security, and find Cyber Security experts.
Questions related to Cyber Security
Recently, I have started teaching Information Security aka Cybersecurity course at my university. I'm covering most the contents from the following books:
[1] Charles P., Shari P., Jonathon M., Security in Computing, 5th Edition.
[2] William Stallings, Cryptography and Network Security: Principles and Practice, 7th Edition.
However, these books are focused on academic perspective. I'm searching such a book which has covered academy as well as research, mentioned recent advancement in Cybersecurity. You can also tell about courses or websites contain good resources. Thanks in advanced.
Regard-
Md. Sabir Hossain
Faculty Member, Dept. of CSE, CUET
Initiator, Be Researcher BD (BRBD)
please guide me about my MS research?how i work start from start
Does anyone know about some good journal that will publish e-banking and cyberthreat related papers?
Please suggest to me a good topic for my PhD relevant to Cyber security
Hi all,
I am looking for well analyzed case studies of cyber security incidents within the transportation sector. It can include rail, aeronautical or even motor vehicles.
Thank you,
Cobus Pool
Hello, I am a student of MSc Cyber Security. I need to select a project for my dissertation. I am a bit confused to generate ideas but my initial plan is to do a project based on a cyber security management pathway. Such as regarding policy procedures, incident management framework, ransomware attacks, etc. I am not so interested to do coding stuff but for the project purpose, it's okay. My strength:
1. Policy procedure
2. International framework
3. Payment card security, like PCI DSS.
Please, try to help me with some good ideas.
I am currently undertaking a computer science with cyber security MSc and have been trying to find topics of study for the independent research project which would be interesting to me and I am struggling and am looking for a pointer in the right direction.
I would like to undertake something that is in some way practical in nature to keep it interesting, and the topic has to include some elements of security.
My interests through work are mainly developing serverless applications on AWS and event driven applications and cloud computing but I am really struggling to find something that is both interesting and isn't purely research based and theoretical.
Any pointers would be gratefully received, I still have another four months until I need to write the project proposal but I have already been trying to find something that sparks my interest for the last month or two with little success.
Dear Researchers,
I'm a student on Ph.D. studies at the University of Ljubljana, and I work on research for detecting APT attacks, but in the early stages of the attack, when attackers mostly use social engineering methods and human vector attacks to infiltrate in some system. Our focus is the Cloud environment and detecting the attacks in the Cloud environment. One of the essential parts of this research is aggregating data from logs and cloud metrics in daily format and data in the form used to detect the attacks.
The problem with this approach is that it requires logs and Cloud metrics collected during a more extended period (at least one year). Still, all publicly available datasets contain data collected in 10 to 15 days.
To you know, how could I find a Cloud project (real project or project in a sandbox environment) from which I could retrieve logs and metrics of hosts deployed on the system (virtual machines, containers, serverless functions, ...), network logs and metrics, and logs of IAM?
Thank you in advance for your time and consideration.
Yours Respectfully,
According to IBM Security X-Force (2021), server access was the third most common attack type in 2020. Nearly 36% of the server access attacks X-Force Incident Response observed in 2020 targeted the finance and insurance sector, with business services (14%), manufacturing (7%), and healthcare (7%) also getting hard hit.
The threats of server access attacks do not seem to go away or rather slow down, BUT they seem to get more complicated.
Are the current mitigation techniques for preventing server access attacks well-designed?
Besides that, Do you think adopting the Zero Trust security strategy will prevent this phenomenon? According to your experience. What are your thoughts on the matter?
COVID-19 has had a significant impact on the educational sector, resulting in a shift from face-to-face to a decentralized learning environment, creating a unique opportunity for network-based academic dishonesty. Prior research has shown that during the COVID-19 pandemic, students engaged in network-based academic dishonesty as a consequence of the breach of weak and legacy software programs that monitor network-based academic dishonesty.
Are the current mitigation techniques for preventing network-based academic dishonesty well-designed? What are your thoughts on the matter?
Can you explain it there is any future of cyber security?
Distributed denial of service attacks(DDoS)
According to a survey conducted by Sophos, 2020 was a tough year for education, with the sector experiencing the highest level of ransomware attacks of all industries. Ransomware attacks have been on the top list of dangerous threats to information systems for over a decade. The threats of ransomware attack do not seem to go away or rather slow down BUT seems to get more complicated.
Are the current mitigation techniques well designed to prevent the attacks? What are your thoughts?
Will cybercrime in the coming years affect hacker attacks aimed at technology devices of the Internet of Things?
Will cybercrime in the future mainly concern the technology of the Internet of Things?
Will the improvement of the risk management process of the Internet information transfer in the future concern mobile devices and Internet of Things technology?
Is the online mobile banking currently offered mainly on smartphones also extended to other devices functioning as part of the Internet of Things technology?
Please reply
I invite you to discussion and scientific cooperation
Dear Friends and Colleagues of RG
I described the problem of cybercrime in publications:
I invite you to discussion and cooperation.
Best wishes
I want suggestions for a master's thesis in cyber security, I'm Interested in the security of cloud computing and also in detecting ransomware using machine learning, but I want more suggestions or som related to them
Kindly give inputs and guide me . Thank you , Respected RG members .
I am looking for research topic for my Phd which should be a combination of Cyber Security and ( Machine learning OR Deep Learning). Kindly assist with possible topic and objectives.
Thank you
Which Q1 and Q2 research journal of computer science and cybersecurity area journal are most suitable for speedy review and publication process preferably not the paid journal?
Appropriate datasets for cyber security.
In my opinion, the information posted on social media portals are not 100 percent. safe.
There have been cases of hacking and stealing information from thousands of records, user profiles of these portals.
In addition, there are developed techniques for building programs that read information from commentators entered into thousands of profiles of social media portals.
Then this information is a research material for the sentiment analyzes carried out, i.e. analyzes of opinions prevailing among users of these portals on specific companies, brands, products and services.
Do you agree with my opinion?
Please reply
Best wishes
Hello!
I’m Jonathan, an MSc student studying Cyber Security at Edge Hill University. As part of my project thesis, I’m conducting a short questionnaire on small and medium enterprise cyber security and, in particular, the opinions of professional individuals on the topic of vulnerability assessment and penetration testing as a way of securing IT infrastructure. The survey also details some features of the project, including the active design and development of an autonomous VAPT tool for SMEs.
Your help on providing answers and opinions is greatly appreciated and will deliver a fundamental basis for my research. Permission is also granted if you wish to notify others that may be interested in the project.
If you wish to contribute, you can do so using this link: https://vaptian.com/go/survey. The survey is hosted by Qualtrics.
The survey is entirely optional, and all data collected is anonymous. You can terminate your participation at any time for any reason.
Thank you in advance.
The increasing energy demand and the necessity to reduce CO2 emissions are worldwide problems. This motivates the increasingly "green" choices, in order to reduce the anthropogenic environmental impact, made by companies and governments of many countries in the world. Nonetheless, among the clean energy options currently available on the world market, only nuclear power can provide constant energy, regardless of weather or geological conditions, making nuclear one of the most promising low-carbon energy options. However, the nuclear fission reactors are characterized by the formation of radioactive waste, and this problem can be partially solved through the spent fuel reprocessing.
"In its 2020 edition of Energy, Electricity and Nuclear Power Estimates for the Period up to 2050, the International Atomic Energy Agency's (IAEA's) high case projection has global nuclear generating capacity increasing from 392 GWe in 2019 to 475 GWe by 2030, 622 by 2040 and 715 by 2050".
The main points that can then be discussed:
- total installation costs and the time to build a nuclear power plant;
- long-term profitability and maintenance costs;
- storage of the last waste ;
- research on spent fuel recycling optimization and next-generation reactors;
- industrial and cyber security;
- deep prejudices in many countries due to singular accidents;
- nuclear fusion possibility.
We are conducting a short survey (< 10 minutes) to get a better understanding of the #cybersecurity implications due to the automation and digitalization of the Architecture, Engineering, Construction, and Operations
#AECO) industry.
Please participate here: https://lnkd.in/gJ4BJBh
Thanking you in advance for your time and consideration.
#aecindustry
#cybersecurity
#digitalconstruction
#BIM
#constructionautomation
#constructiontechnology
Faculty of Computing Should have what are the following departments or suggest anyone you like?
Computer Science
Information Systems / Information Technology
Software Engineering
Computer Engineering
Data Science
Cyber Security
Bioinformatics
Robotics
The analysis of banking Trojans consists in researching methods of cybercrime in the field of infecting the bank's information systems, both those which are intra-bank and those that serve bank customers as part of online mobile banking. Analysis of attacks by cybercriminals, for example, viruses popular in recent years, trojans of the ransomware type, which after encrypting computers encrypt data disks. In addition, other types of Trojan horses are used to steal sensitive data, personal customers or embezzlement of money from clients' bank accounts, extorting loans, etc. After analyzing methods used by cybercriminals, banks strengthen security systems, protect banking systems against these attacks, improve security and authorization tools online banking clients. In addition, the next step is to improve the risk management process of IT systems. I described these issues, among others, in the following publications:
In addition, cybercriminal attacks on electronic banking systems are probably much more than official statistics provide, because banks do not boast of these events if they do not have to.
This is because many of these cybercrime attacks are ineffective or have relatively low costs, and the identified gaps in the e-banking system are quickly repaired.
however, if the bank customers knew all these events of cyber-criminals, this could reduce the level of confidence in banks.
Then, bank customers could start to withdraw bank deposits from banks and dopiers on a massive scale, then a serious problem for banks would appear associated with a sharp increase in the level of liquidity risk.
In view of the above, the current question is: What would be the consequences for banks to fully inform banks' clients about cybercrime attacks on electronic online banking systems?
I invite you to discussion.
greetings
Dear Friends and Colleagues of RG
I described the problem of cybercrime in publications:
I invite you to discussion and cooperation.
Thank you very much
Best wishes
I was wondering if you have collected/crossed any labelled dataset in the following context for cyber-security threats:
- Web requests
- HTTP requests
- (proxy) Web server logs
Any updates will be highly appreciated.
I am looking for a research topic for my thesis relevant to Digital twin & Cybersecurity, Please give me your suggestions
In my opinion, sensitive personal data concerning individual users who set up profiles, collected on social media portals, are not fully secure. This is confirmed by the occurrence of data leaks, data theft by cybercriminals.
In connection with the above, the issue of information security on the Internet is becoming an increasingly global problem and therefore, in the global approach, institutions and security systems for the transfer of information on the Internet should be developed. The security of information on the Internet can refer to many aspects of data security both at the level of central state institutions and international organizations as well as the security of personal data of individual citizens, sensitive data of citizens collected on various websites, including social media portals.
The improvement of risk management and information security systems at the supranational level is also a key issue. Technological companies managing social media portals on the one hand try to improve data security systems about users setting up accounts on social media portals. On the other hand, it is also important to cooperate with key, central data security institutions on the Internet that operate transnational. This is important from the point of view of improving information security systems on the Internet in order to limit the possibility of using social media portals by cybercriminals operating transnational, using various social engineering techniques.
Please, answer, comments.
I invite you to the discussion.
Best wishes
In some countries, rumors of cybercriminals with Ransomware are reportedly again being reported again. These viruses spread via e-mails, which automatically send themselves out from infected e-mail accounts and send out infected e-mails to all e-mail contacts of a virus mailbox infected with the virus. The virus is very dangerous because after opening a fake e-mail, the virus installs deeply into the computer and encrypts access to the disks by blocking access to the contents of the disks. I wrote scientific publications on this subject.
In view of the above, I am asking you the following question: Are cybercriminals now attacking personal and corporate computers using Ransomware viruses again?
Please reply. I invite you to the discussion
What kind of scientific research dominate in the field of Cybercrime and the security of online banking?
Please, provide your suggestions for a question, problem or research thesis in the issues: Cybercrime and the security of online banking.
Please reply.
I invite you to the discussion
Best wishes
In connection with the development of cybercrime, should the surveillance of citizens by national security services be developed, expanded, increased?
To what extent can the developed range of citizens' surveillance be improved as part of the improvement of national cyber security systems?
As part of the improvement of cyber security systems, should the services for combating cybercrime be able to surveillance the entire activity of citizens on the Internet?
Are legal norms regulating the issues of cyber security, services for combating cybercrime and data security gathered in Big Data database systems of large online technology companies fully adapted to the rapidly growing ICT and Internet technology?
Please reply
Best wishes
What currently dominate and are the standards and instruments for ensuring the security of data transfer and analysis in Big Data database systems developed?
Please reply
Best wishes
Will the sentiment analysis conducted on the data downloaded from the Internet and processed in Big Data database systems become a tool for combating cybercrime?
Please reply.
I invite you to the discussion
Dear Friends and Colleagues of RG
I described the problem of cybercrime in publications:
I invite you to discussion and cooperation.
Thank you very much
Best wishes
Cyber Liability Insurance Cover is done by various criteria in different countries. I would like to know more on this. Could you give a brief introduction and explain with an appropriate illustration if feasible?
A researcher is currently collecting data for a research on cyber security. please use this link to participate in the survey. you can also share it on other groups. Thank you. https://docs.google.com/forms/d/e/1FAIpQLSc1nK7mE72AjAGEOxIDUIQHdA2NQsOWa3pHvs2OtvYk6-9VSQ/viewform
Hello , I have a questionnaire available
"A Cyber-Security Adoption Framework for organizations"
It needs arbitration approved by specialists in universities or who possess an academic degree in the field of specialization. The questionnaire is required to be arbitrated by (10) specialists, with the importance of the arbitrators ’contact information being correct and legal, with the necessity of having the names of the arbitrators to be able to communicate with them.
Thank you ..
Regards
The field of research and business applications in the field of obtaining, archiving, analyzing and processing data in Big Data database systems has been developing strongly for several years.
There were hacking theft of personal, sensitive and secret data regarding users of social networks.
Are the results of research known, or are you familiar with publications describing risk management processes in the area of obtaining, archiving, analyzing and processing data in Big Data systems run by technological internet companies such as Google, Facebook, etc.
Technological internet companies such as Google, Facebook, etc. have the ability to obtain classified, sensitive and personal data from the Internet about the users of websites, including search engines and social media portals, who use these information services.
For the needs of these considerations, the issue of the security of classified data stored in Big Data database systems run by internet technology companies managing social media portals should be added.
There have been frequent thefts made by cybercriminals who, from these Big Data systems, stole classified and sensitive information about hundreds of thousands or millions of users of particular social media portals.
The development of social media portals therefore generates an increased risk of theft of data on users of social media portals.
Therefore, technological internet companies that run social media portals but also other companies that collect large amounts of data about users of specific, information services should continually develop and improve risk management systems for potential data loss from Big Data information resources.
Due to the above, in many companies, especially in large corporations, integrated risk management systems are built and improved.
Integrated risk management systems combine risk management processes in various areas of a company, institution or other organization.
One of the areas of risk management, the importance of which in many companies is growing, is risk management in the area of obtaining, archiving, analyzing and processing data in Big Data database systems.
In view of the above, I am asking you: Is the risk of cybercriminal attacks on Big Data database systems that contain personal data of social media portal users growing?
Please, answer, comments. I invite you to the discussion.
while running CICflowmeter soft from canadian institute of cyber security for capturing live network packets, i m getting this error
ValueError: Unknown pypcap network interface 'wlan0'
anyone have guide pls
Hi I looking for cyber security Dataset.
Please Fill this feedback from and circulate in your University and group.
I have a key interest in OSINT and I'm trying to work out how I can combine that technology with cyber security to solve some kind of problem that I can use to carry through for my final year research project. Would anyone have any recommendations. I'm currently looking at tools such as Maltego and I'm trying to consider a potential back-end framework that utilizes some type of machine learning to populate the project.
What could be some fun, inspiring and interesting projects I could look into.
- In order to implement a few immediate measures to effect positive changes, what recommendations should cyber security design principles follow?
- How can cyber security design principles encourage change by engaging in which longer-term initiatives?
- How have we confirmed that we are in compliance with regulatory requirements for our industry?
There is consensus on the principle that cybersecurity can better be achieved through transnational cooperation rather every country or block on its own. Yet, the work undertaken under the auspices of the United Nations, namely under the General Assembly, is progressing at a very slow pace. I recently published a research article on that ongoing work at the UN in the field of cybersecurity, available at : . It confirms that progress is slow, so this raises a few questions. What is needed to improve multilateral cooperation on cybersecurity? Are there some specific topics of cybersecurity that should be prioritized in the multilateral arenas? What format (binding, non-binding, information sharing, confidence-building) should the expected deliverables have?
looking for attacks dataset, intrusion, binaries or anything related to Cyber attacks. It would be appreciated if any body share it. Thankx
I am trying to study the network traffic detection, and someone suggests me to choose CTU-13 dataset as ML model training and testing dataset. I have downloaded the CTU-13 pcap files, but I do not know how to check their packets label. The label file is named apture20110XXX.pcap.netflow.labeled file, I cannot open it. Someone can help me to figure out this problem. Thanks!
Is the security of information collected in social media portals databases currently one of the key determinants of the development of new online media?
Security of social media portals is currently one of the most important topics of social media portals and other new internet media and information services. Therefore, scientists at various universities are involved in researching this issue. Therefore, security tools for information collected in social media portals databases and data security systems on the Internet are being developed. In companies and key public institutions, systems for risk management of information systems and information transfer on the Internet are also developed.
Do you agree with me on the above matter?
In the context of the above issues, the following question is valid:
Is the security of information collected in social media portals databases currently one of the key determinants of the development of new online media?
Please reply
I invite you to the discussion
Thank you very much
I also conduct research in this matter. I am researching the security of social media portals in connection with Big Data database technology. Below are links to my publications:
I invite you to discussion and cooperation.
Thank you very much
Best wishes
I'm in my final year, about to start my capstone project, I would like to do my project around the issues of fake media, misinformation, biased information and propaganda, from a cyber security stand point, but I'm struggling to refine it down to something more useable. Was wondering if anyone had any ideas?
Hy everyone;
My name is Waqas Ahmed and I am a PhD Cyber Security Scholar of Air University Pakistan. I am working on IoT Forensics. Please guide me regarding this area and latest research challenges in this area. Thank You!
Regards
Please can anybody help me by providing some good low impact non paid journal for article related to "smart grid cyber security".
Thanks
Which research journal of computer science and cyber security area journal is most suitable for speedy review and publication process?
Currently l am thinking of perusing research computing, ideal area cybersecurity problems and IoT, so far proposed research title "security risk assessment in IoT systems: Data privacy and security" any suggestions please experts
Cyber Security in Banking Domain : Both "cyber security" and "Banking" are broader terms, and I need to narrow my research topic and prepare research proposal accordingly.
How can I add a new element in this research domain. Any suggestions are welcome!
Are fishing, malware (spyware, trojans, ransomware, keyloggers, ...) sending cybercriminals false e-mails with links to fake websites or viruses reading passwords for online banking accounts or other techniques used by cybercriminals as the most dangerous?
Please reply
Best wishes
Many organizations encourage their users to create complicated passwords that are usually hard to remember (and easy to brute-force). Has there been a study to show that passphrases have a definitive advantage over passwords or vice versa?
recent hot area of research in the field of cyber forensics
In my master's Degree I proposed a way to extend the existing privacy enhancing technologies used in Instant messaging in order for the users to be able to publish user-driven services:
This MSc Thesis I want to continue it over into a PhD as a step to implement it. From my point of view it requires lots of research that may also have scientific value as well.
The research I am interested to do it via a MEXT Scholarchip in Japan. But so far what I found only few researchers that either are qualified in cryptography or in cyber security:
But still I have hard time to look over univercities that do a complete research in Privacy Enhancing technologies or in Cybersecurity in Japan. Therefore, I want to ask:
- Which Universities in Japan do research in a related field (Cryptography, Cyber security, Internet Privacy) and which ones would you reccomend and why?
- Should I keep looking for professors-only and create a database with contact info or it is reccomend to look for univercities as well?
Dear colleagues, I would appreciate that you share your experience in the area of cyber security applied to industrial communicating systems
do you have experience concerning smart sensors and actuators vulnerabilities?
Now with data theft shifting from Cardholders to data in transit, what are the best paradigm to guide against this?
I am researching about how the personality characteristic of each internet user impact their mindset and decision in facing cyber security threats e.g.: phishing. Please guide me how to defines/classify the points scores vs big 5 characters groups? I know it is based on reverse points, but not sure how to match it and do not have the scores board formula. Thank you very much in advance.
Dear Researchers,
Let's prepare a list of URLs which provides Cyber Security Guidelines from Genuine sources. To initiate the discussion, I would like to share following URL which provides Cyber Safety Tips Booklet for the Students and Parents. For your information, CyberCrime.Gov.in is the National Cyber Crime Reporting Portal of Govt. of India.
You may add such useful URLs to this discussion.
Thanking you,
I have a 4 months project module in my course "Cyber Risk for Business" . I should design the value proposition canvas and abstract of my idea along with. The project should show a substantial benefit in the real world in terms of managing cyber risk. The topics I would be interested in or a combination of :
1. IS Risk Control and Auditing
2. IS Governance
3. Ethical Hacking
4. Breach Management andRecovery
5. Analytics and AI in Cyber Security
Thank you.
What are the research directions in Cyber-security for Mobile Service Robots?
Hi!
Looking for some assistance in pinpointing a topic for a literature review focusing on contemporary issues in business.
I am currently looking at topics within the Cyber Security sector, but most papers/research I have conducted so far is largely focused on a computing / technical view. I am looking for ideas on topic within Cyber Security from a business perspective but having some difficulty.
I was thinking along the lines of the risks to businesses that Cyber Security issues pose, possibly a review on cost/benefit analysis of SMEs implementing cybersecurity procedures.
As you can probably tell, I am lost for focus on this topic. I have a keen interest in Cyber Security, however, making this fit a Busines Management Lit Review is proving difficult. If anyone has any ideas, or pointers to narrow down and define a question/topic, it would be much appreciated.
Thanks!
Hey guys,
I am a MSc student who is looking for a cyber security project for my dissertation.
I am really trying to find a practical concept related to penetration testing or ethical hacking but I do not know a lot about the filed and I'm struggling to find an idea. My goal would be to learn more about pen testing while doing this project.
Our university has suggested penetration testing on IoT devices but other people have chosen this project already.
Has anybody got any other ideas?
Thank you all.
Hello Everyone,
I am looking for suggestions on research topics for my TFG, my area of interest is cyber security, any leads would be appreciated.
Thank you In advance
cybersecurity is still a real concern for developing nations on the control measures.
i need to study on the recent risks and strategies used in controlling cybersecurity in developing nations
.i need urgent answer please share link or few of SCI indexed research papers
I am currently trying to obtain data from Cyber Security Malaysia and it hasn't been an easy one. Do you have any advice?
Most of the datasets that I found were labeled just by the attack type, and maybe no one used also the tool used to generate the attack as another way of labeling.
I am searching for an intrusion detection dataset labeled by both attack type and the tool used to generate this attack, any help ?
Thanks in advance !!