Science topic

Cyber Security - Science topic

Explore the latest questions and answers in Cyber Security, and find Cyber Security experts.
Questions related to Cyber Security
  • asked a question related to Cyber Security
Question
5 answers
Recently, I have started teaching Information Security aka Cybersecurity course at my university. I'm covering most the contents from the following books:
[1] Charles P., Shari P., Jonathon M., Security in Computing, 5th Edition.
[2] William Stallings, Cryptography and Network Security: Principles and Practice, 7th Edition.
However, these books are focused on academic perspective. I'm searching such a book which has covered academy as well as research, mentioned recent advancement in Cybersecurity. You can also tell about courses or websites contain good resources. Thanks in advanced.
Regard-
Md. Sabir Hossain
Faculty Member, Dept. of CSE, CUET
Initiator, Be Researcher BD (BRBD)
Relevant answer
Answer
  • asked a question related to Cyber Security
Question
9 answers
please guide me about my MS research?how i work start from start
Relevant answer
Answer
Top 5 Cyber Security Master Thesis Topics
Honeypots in Cybersecurity.
Private Information Storage.
Behavioral and Cognitive Theory in Cybersecurity.
Security, Privacy and Usability.
Language based Cybersecurity.
Regards,
Shafagat
  • asked a question related to Cyber Security
Question
3 answers
Does anyone know about some good journal that will publish e-banking and cyberthreat related papers?
Relevant answer
Answer
Dear Hasibul Islam,
You may want to review the following sources:
Cybersecurity eBook: Attacker Economics in Financial Services
What financial services institutions need to know about cyberattack cost vs. value
_____
Imperva Data Security Fabric
Imperva® Data Security Fabric is the first data-centric solution that enables security and compliance teams to quickly and easily secure sensitive data no matter where it resides with an integrated, proactive approach to visibility and predictive analytics.
_____
Reimagined Enterprise Data Protection for Insider Risk
_____
Electronic Banking: Impact, Risk and Security Issues
  • asked a question related to Cyber Security
Question
11 answers
Please suggest to me a good topic for my PhD relevant to Cyber security
Relevant answer
Answer
Dear Nipuna Sankalpa , I feel like this your question is not precise enough.
Cybersecurity is a vast field. Asking for a phd research topic in cybersecurity without further details is not ideal.
What you need to know is that the research project that feats you the most depends on your background, on the expertise of your phd advisor on the topic or he willingness to work on the topic, and also on the environment in which you study. So I recommend you write down a list of potential advisors, contact each supervisor with a description of yourself and your background, and with a summary of what you would like to work on with him. So you somehow choose the eventual topics to work on depending on the expertise of the potential advisors you are going to contact, then depending on wether they are interested in your profile or in the topic you suggested, they will accept, suggest another topic or reject your request.
Notice that in general, people do not post project that believe can be easily solved, if not they would solve them themselves. Some May do, but then I believe they are very few. So take care to not choose something that may be unsolvable.
Finally, my advice: choose a specific branch of cybersecurity which feats your background, read about it, identify some reachable potential advisors actively working in that branch, read some of their works, contact them saying you have read their work, asking some questions you may have, and telling them your are currently looking for a phd position or topic …, they will probably respond to you.
Good luck.
  • asked a question related to Cyber Security
Question
3 answers
Hi all,
I am looking for well analyzed case studies of cyber security incidents within the transportation sector. It can include rail, aeronautical or even motor vehicles.
Thank you,
Cobus Pool
Relevant answer
Answer
Dear Mr. Pool!
I found for YOU the following resources:
1) Török, Á., Szalay, Z., Uti, G. et al. Modelling the effects of certain cyber-attack methods on urban autonomous transport systems, case study of Budapest. J Ambient Intell Human Comput 11, 1629–1643 (2020). https://doi.org/10.1007/s12652-019-01264-8 Open access:
2) Ben Farah, M.A.; Ukwandu, E.; Hindy, H.; Brosset, D.; Bures, M.; Andonovic, I.; Bellekens, X. Cyber Security in the Maritime Industry: A Systematic Survey of Recent Advances and Future Trends. Information 2022, 13, 22. https://doi.org/10.3390/info13010022, Open access:
Yours sincerely, Bulcsu Szekely
  • asked a question related to Cyber Security
Question
3 answers
Hello, I am a student of MSc Cyber Security. I need to select a project for my dissertation. I am a bit confused to generate ideas but my initial plan is to do a project based on a cyber security management pathway. Such as regarding policy procedures, incident management framework, ransomware attacks, etc. I am not so interested to do coding stuff but for the project purpose, it's okay. My strength:
1. Policy procedure
2. International framework
3. Payment card security, like PCI DSS.
Please, try to help me with some good ideas.
Relevant answer
Answer
Cyber Security Awareness, and Behavior: A Study
  • asked a question related to Cyber Security
Question
10 answers
I am currently undertaking a computer science with cyber security MSc and have been trying to find topics of study for the independent research project which would be interesting to me and I am struggling and am looking for a pointer in the right direction.
I would like to undertake something that is in some way practical in nature to keep it interesting, and the topic has to include some elements of security.
My interests through work are mainly developing serverless applications on AWS and event driven applications and cloud computing but I am really struggling to find something that is both interesting and isn't purely research based and theoretical.
Any pointers would be gratefully received, I still have another four months until I need to write the project proposal but I have already been trying to find something that sparks my interest for the last month or two with little success.
Relevant answer
Answer
Dear Paul Ockleford,
I propose the following topic for the master's thesis on cybersecurity issues: Applications of blockchain and machine learning technologies and other Industry 4.0 technologies as part of improving the cybersecurity risk management of IT systems operating in computing cloud computing environments, in systems based on the Internet of Things, Big Data, and smart technology solutions etc. The research topic may also concern the improvement of techniques and risk management of cybersecurity of information systems used in internet banking and mobile banking.
Best regards,
Dariusz
  • asked a question related to Cyber Security
Question
3 answers
Dear Researchers,
I'm a student on Ph.D. studies at the University of Ljubljana, and I work on research for detecting APT attacks, but in the early stages of the attack, when attackers mostly use social engineering methods and human vector attacks to infiltrate in some system. Our focus is the Cloud environment and detecting the attacks in the Cloud environment. One of the essential parts of this research is aggregating data from logs and cloud metrics in daily format and data in the form used to detect the attacks.
The problem with this approach is that it requires logs and Cloud metrics collected during a more extended period (at least one year). Still, all publicly available datasets contain data collected in 10 to 15 days.
To you know, how could I find a Cloud project (real project or project in a sandbox environment) from which I could retrieve logs and metrics of hosts deployed on the system (virtual machines, containers, serverless functions, ...), network logs and metrics, and logs of IAM?
Thank you in advance for your time and consideration.
Yours Respectfully,
  • asked a question related to Cyber Security
Question
3 answers
According to IBM Security X-Force (2021), server access was the third most common attack type in 2020. Nearly 36% of the server access attacks X-Force Incident Response observed in 2020 targeted the finance and insurance sector, with business services (14%), manufacturing (7%), and healthcare (7%) also getting hard hit.
The threats of server access attacks do not seem to go away or rather slow down, BUT they seem to get more complicated.
Are the current mitigation techniques for preventing server access attacks well-designed?
Besides that, Do you think adopting the Zero Trust security strategy will prevent this phenomenon? According to your experience. What are your thoughts on the matter?
Relevant answer
Answer
Zero trust strategy, or policy, or concept, or architecture are already published and actively discussed. However, the reliably secure practical implementations require more variety of secure, usable, and cheap Identity and Access Management (IAM) technologies, which are a backbone of the Zero Trust approach to security.
  • asked a question related to Cyber Security
Question
7 answers
COVID-19 has had a significant impact on the educational sector, resulting in a shift from face-to-face to a decentralized learning environment, creating a unique opportunity for network-based academic dishonesty. Prior research has shown that during the COVID-19 pandemic, students engaged in network-based academic dishonesty as a consequence of the breach of weak and legacy software programs that monitor network-based academic dishonesty.
Are the current mitigation techniques for preventing network-based academic dishonesty well-designed? What are your thoughts on the matter?
Relevant answer
Answer
Len Leonid Mizrah that's a wonderful response and I second you. Atiff Abdalla Mahmoud the issue of academic dishonesty in decentralised learning is an emerging and growing trend. The consequences associated with this trend are also relatively new. This sparks a revision of preventive measures which are currently being used to match the trend. without new inventive and resilient techniques, the issues will only grow to unacceptable proportions of which if this happens the value of education will completely be eroded. My take is that the current measures are not anywhere near enough.
  • asked a question related to Cyber Security
Question
8 answers
Can you explain it there is any future of cyber security?
Relevant answer
Answer
Cybersecurity researchers and analysts are rightly worried that a new type of computer, based on quantum physics rather than more standard electronics, could break most modern cryptography. ... The quantum computers that exist today are not capable of breaking any commonly used encryption methods.
  • asked a question related to Cyber Security
Question
22 answers
Distributed denial of service attacks(DDoS)
Relevant answer
Answer
None, russian hackers are free to wreak havoc in the west.
  • asked a question related to Cyber Security
Question
12 answers
According to a survey conducted by Sophos, 2020 was a tough year for education, with the sector experiencing the highest level of ransomware attacks of all industries. Ransomware attacks have been on the top list of dangerous threats to information systems for over a decade. The threats of ransomware attack do not seem to go away or rather slow down BUT seems to get more complicated.
Are the current mitigation techniques well designed to prevent the attacks? What are your thoughts?
Relevant answer
Very interesting question! I completely agree and support the opinion of dear colleagues Ljubomir Jacić, Doherty Odueko Funmilayo. Thank you!
  • asked a question related to Cyber Security
Question
9 answers
Will cybercrime in the coming years affect hacker attacks aimed at technology devices of the Internet of Things?
Will cybercrime in the future mainly concern the technology of the Internet of Things?
Will the improvement of the risk management process of the Internet information transfer in the future concern mobile devices and Internet of Things technology?
Is the online mobile banking currently offered mainly on smartphones also extended to other devices functioning as part of the Internet of Things technology?
Please reply
I invite you to discussion and scientific cooperation
Dear Friends and Colleagues of RG
I described the problem of cybercrime in publications:
I invite you to discussion and cooperation.
Best wishes
Relevant answer
Answer
Dear Md. Abdur Rashid,
Thanks for the answer. I also believe that in the coming years there will be an increase in the importance of cybercrime and the improvement of cybercrime risk management and the improvement of cybersecurity systems in the field of information systems used in devices equipped with the Internet of Things technologies. The importance of this issue is also growing due to the development of e-logistics systems developed as part of computerized systems of international supply and procurement logistics equipped with ICT and Industry 4.0.
Best wishes,
Dariusz
  • asked a question related to Cyber Security
Question
6 answers
I want suggestions for a master's thesis in cyber security, I'm Interested in the security of cloud computing and also in detecting ransomware using machine learning, but I want more suggestions or som related to them
Relevant answer
Answer
Both appear to be intriguing. Cloud security may be a touch too broad. Ransomware detection, on the other hand, is more specific. Anyway you'd like to look at some related projects first.
  • asked a question related to Cyber Security
Question
3 answers
Kindly give inputs and guide me . Thank you , Respected RG members .
Relevant answer
Answer
I propose the following research topic: Analysis of the determinants of the development of cybercrime techniques and instruments and the improvement of IT systems, improvement of cybersecurity of data transfer posted on online platforms, databases and Big Data systems, social media portals, data processing platforms in the computing cloud, etc. in the open sorce formula.
Best regards,
Dariusz Prokopowicz
  • asked a question related to Cyber Security
Question
4 answers
I am looking for research topic for my Phd which should be a combination of Cyber Security and ( Machine learning OR Deep Learning). Kindly assist with possible topic and objectives.
Thank you
Relevant answer
Answer
Dear Hamza Mouncif,
Artificial Intelligence (AI), including different forms of machine learning, form the basis for the development of various Digital Twins (DTs).Through the use of DTs, the two worlds - the real world and the virtual world - grow closer and closer together. Various security problems are of enormous importance.
My literature sources should justify this more precisely.
General idea of DTs illustrate my figures at the address:
Best regards and much success
Anatol Badach
Matthias Eckhart, Andreas Ekelhart: „Digital Twins for Cyber-Physical Systems Security: State of the Art and Outlook“; In book: Security and Quality in Cyber-Physical Systems Engineering, Nov 2019
Sadeq Almeaibed, Saba Al-Rubaye, Antonios Tsourdos, Nicolas P. Avdelidis: Digital Twin Analysis to Promote Safety and Security in Autonomous Vehicles; IEEE Communications Standards Magazine, Vol. 5, Issue 1, Mar 2021; DOI: 10.1109/MCOMSTD.011.2100004
Christian Gehrmann, Martin Gunnarsson: A Digital Twin Based Industrial Automation and Control System Security Architecture; IEEE Transactions on Industrial Informatics, Vol. 16, Issue 1, Jan 2020; DOI: 10.1109/TII.2019.2938885
Abhishek Pokhrel, Vikash Katta, Ricardo Colomo-Palacios: „Digital Twin for Cybersecurity Incident Prediction: A Multivocal Literature Review“; ICSEW'20: Proceedings of the IEEE/ACM 42nd International Conference on Software Engineering; Jun 2020, DOI: 10.1145/3387940.3392199
  • asked a question related to Cyber Security
Question
54 answers
Which Q1 and Q2 research journal of computer science and cybersecurity area journal are most suitable for speedy review and publication process preferably not the paid journal?
Relevant answer
Answer
Check this list.
Deleted research item The research item mentioned here has been deleted
  • asked a question related to Cyber Security
Question
18 answers
Appropriate datasets for cyber security.
Relevant answer
Answer
  • asked a question related to Cyber Security
Question
20 answers
In my opinion, the information posted on social media portals are not 100 percent. safe.
There have been cases of hacking and stealing information from thousands of records, user profiles of these portals.
In addition, there are developed techniques for building programs that read information from commentators entered into thousands of profiles of social media portals.
Then this information is a research material for the sentiment analyzes carried out, i.e. analyzes of opinions prevailing among users of these portals on specific companies, brands, products and services.
Do you agree with my opinion?
Please reply
Best wishes
Relevant answer
Answer
The level of cybersecurity of data collected on social media is constantly being raised. However, there is still no full 100 percent. cybersecurity on this issue.
I invite you to the discussion,
Regards,
Dariusz Prokopowicz
  • asked a question related to Cyber Security
Question
10 answers
Hello!
I’m Jonathan, an MSc student studying Cyber Security at Edge Hill University. As part of my project thesis, I’m conducting a short questionnaire on small and medium enterprise cyber security and, in particular, the opinions of professional individuals on the topic of vulnerability assessment and penetration testing as a way of securing IT infrastructure. The survey also details some features of the project, including the active design and development of an autonomous VAPT tool for SMEs.
Your help on providing answers and opinions is greatly appreciated and will deliver a fundamental basis for my research. Permission is also granted if you wish to notify others that may be interested in the project.
If you wish to contribute, you can do so using this link: https://vaptian.com/go/survey. The survey is hosted by Qualtrics.
The survey is entirely optional, and all data collected is anonymous. You can terminate your participation at any time for any reason.
Thank you in advance.
Relevant answer
Answer
Dr. MOHAMMAD FAISAL currently working at the department of computer science and IT, University of Malakand Pakistan, received his M.S. degree in information security management from SZABIST, Pakistan, in 2012, and the Ph.D. degree in network security from the Department of Computer Science and Information Technology, University of Malakand in 2018. His research interests include ML and security of wireless ad hoc networks MANETs, VANETs, IoT, Cloud, Fog, Edge, Blockchain and digital forensics.
  • asked a question related to Cyber Security
Question
26 answers
The increasing energy demand and the necessity to reduce CO2 emissions are worldwide problems. This motivates the increasingly "green" choices, in order to reduce the anthropogenic environmental impact, made by companies and governments of many countries in the world. Nonetheless, among the clean energy options currently available on the world market, only nuclear power can provide constant energy, regardless of weather or geological conditions, making nuclear one of the most promising low-carbon energy options. However, the nuclear fission reactors are characterized by the formation of radioactive waste, and this problem can be partially solved through the spent fuel reprocessing.
"In its 2020 edition of Energy, Electricity and Nuclear Power Estimates for the Period up to 2050, the International Atomic Energy Agency's (IAEA's) high case projection has global nuclear generating capacity increasing from 392 GWe in 2019 to 475 GWe by 2030, 622 by 2040 and 715 by 2050".
The main points that can then be discussed:
- total installation costs and the time to build a nuclear power plant;
- long-term profitability and maintenance costs;
- storage of the last waste ;
- research on spent fuel recycling optimization and next-generation reactors;
- industrial and cyber security;
- deep prejudices in many countries due to singular accidents;
- nuclear fusion possibility.
Relevant answer
Answer
Dear Mr Karmakar,
I think we all agree with you. The problem is when will this be possible?
"Research on controlled nuclear fusion began towards the end of World War II in the United States and the USSR. Steady progress has been made since and culminated in the 1990s with the demonstration in the United States and England of nuclear fusion power generation. However, these experiments achieved amplification rates of less than 1 (record set at 0.76), i.e. the energy produced was less than that injected into the plasma ....
After ITER, the European roadmap for the development of fusion provides for the commissioning of a demonstration reactor (simply called ... DEMO) producing electricity (of the order of 500MW), in the 2050s".
  • asked a question related to Cyber Security
Question
1 answer
We are conducting a short survey (< 10 minutes) to get a better understanding of the #cybersecurity implications due to the automation and digitalization of the Architecture, Engineering, Construction, and Operations
#AECO) industry.
Please participate here: https://lnkd.in/gJ4BJBh
Thanking you in advance for your time and consideration.
#aecindustry
#cybersecurity
#digitalconstruction
#BIM
#constructionautomation
#constructiontechnology
Relevant answer
Answer
ok
  • asked a question related to Cyber Security
Question
6 answers
Faculty of Computing Should have what are the following departments or suggest anyone you like?
Computer Science
Information Systems / Information Technology
Software Engineering
Computer Engineering
Data Science
Cyber Security
Bioinformatics
Robotics
Relevant answer
Answer
I am not sure what your question is. I think you want to subdivide your faculty in a number of departments and your question is how that should be done. How many staff is there? My experience is that you should burn the candle from two sides. What kind of expertises do you have today? What are your strong positions? The other side is: where do you want to be in say the next 5 to 10 years? It should fit in the strategic plans of the faculty. This strategy depends on funding opportunities and relationships with industry and so on. I hope this
helps you some how.
  • asked a question related to Cyber Security
Question
15 answers
The analysis of banking Trojans consists in researching methods of cybercrime in the field of infecting the bank's information systems, both those which are intra-bank and those that serve bank customers as part of online mobile banking. Analysis of attacks by cybercriminals, for example, viruses popular in recent years, trojans of the ransomware type, which after encrypting computers encrypt data disks. In addition, other types of Trojan horses are used to steal sensitive data, personal customers or embezzlement of money from clients' bank accounts, extorting loans, etc. After analyzing methods used by cybercriminals, banks strengthen security systems, protect banking systems against these attacks, improve security and authorization tools online banking clients. In addition, the next step is to improve the risk management process of IT systems. I described these issues, among others, in the following publications:
In addition, cybercriminal attacks on electronic banking systems are probably much more than official statistics provide, because banks do not boast of these events if they do not have to.
This is because many of these cybercrime attacks are ineffective or have relatively low costs, and the identified gaps in the e-banking system are quickly repaired.
however, if the bank customers knew all these events of cyber-criminals, this could reduce the level of confidence in banks.
Then, bank customers could start to withdraw bank deposits from banks and dopiers on a massive scale, then a serious problem for banks would appear associated with a sharp increase in the level of liquidity risk.
In view of the above, the current question is: What would be the consequences for banks to fully inform banks' clients about cybercrime attacks on electronic online banking systems?
I invite you to discussion.
greetings
Dear Friends and Colleagues of RG
I described the problem of cybercrime in publications:
I invite you to discussion and cooperation.
Thank you very much
Best wishes
Relevant answer
Answer
Dear Shadreck,
I don't have a WhatsApp profile. When I create a profile on this portal, I will contact you.
Thank you,
Have a nice day, Stay healthy! Best wishes,
Dariusz Prokopowicz
  • asked a question related to Cyber Security
Question
6 answers
I was wondering if you have collected/crossed any labelled dataset in the following context for cyber-security threats:
  • Web requests
  • HTTP requests
  • (proxy) Web server logs
Any updates will be highly appreciated.
  • asked a question related to Cyber Security
Question
10 answers
I am looking for a research topic for my thesis relevant to Digital twin & Cybersecurity, Please give me your suggestions
Relevant answer
Answer
  • asked a question related to Cyber Security
Question
8 answers
In my opinion, sensitive personal data concerning individual users who set up profiles, collected on social media portals, are not fully secure. This is confirmed by the occurrence of data leaks, data theft by cybercriminals.
In connection with the above, the issue of information security on the Internet is becoming an increasingly global problem and therefore, in the global approach, institutions and security systems for the transfer of information on the Internet should be developed. The security of information on the Internet can refer to many aspects of data security both at the level of central state institutions and international organizations as well as the security of personal data of individual citizens, sensitive data of citizens collected on various websites, including social media portals.
The improvement of risk management and information security systems at the supranational level is also a key issue. Technological companies managing social media portals on the one hand try to improve data security systems about users setting up accounts on social media portals. On the other hand, it is also important to cooperate with key, central data security institutions on the Internet that operate transnational. This is important from the point of view of improving information security systems on the Internet in order to limit the possibility of using social media portals by cybercriminals operating transnational, using various social engineering techniques.
Please, answer, comments.
I invite you to the discussion.
Best wishes
Relevant answer
Answer
In recent months, there have been cybercriminal attacks on public institutions and large enterprises as well as technology companies based on data stolen by cybercriminals from social networks and by sending fake e-mails containing malware and hidden ransomware viruses.
Regards,
Dariusz Prokopowicz
  • asked a question related to Cyber Security
Question
28 answers
In some countries, rumors of cybercriminals with Ransomware are reportedly again being reported again. These viruses spread via e-mails, which automatically send themselves out from infected e-mail accounts and send out infected e-mails to all e-mail contacts of a virus mailbox infected with the virus. The virus is very dangerous because after opening a fake e-mail, the virus installs deeply into the computer and encrypts access to the disks by blocking access to the contents of the disks. I wrote scientific publications on this subject.
In view of the above, I am asking you the following question: Are cybercriminals now attacking personal and corporate computers using Ransomware viruses again?
Please reply. I invite you to the discussion
Relevant answer
Answer
Yes, in recent months there have been new, spectacular and effective cybercriminal attacks targeting selected large technology companies, companies from the energy sector, fuel sector, food production and other companies operating in strategic sectors of the economy as well as public institutions, including selected local government institutions and central public administration institutions countries. Cybercriminal attacks were carried out on the basis of cybercriminal techniques and solutions that have been known for years, i.e. through spamming containing malware, infecting computers with ransomware viruses encrypting access to disks containing important company data, through various variants of the cybercriminal technique known as phishing, by hijacking data to log in to specific accounts of various websites, to log in to e-mail, data downloaded from social networks and other places where Internet users enter personal and sensitive data and do not maintain high cybersecurity standards.
Greetings,
Dariusz Prokopowicz
  • asked a question related to Cyber Security
Question
28 answers
What kind of scientific research dominate in the field of Cybercrime and the security of online banking?
Please, provide your suggestions for a question, problem or research thesis in the issues: Cybercrime and the security of online banking.
Please reply.
I invite you to the discussion
Best wishes
Relevant answer
Answer
In the area of ​​cybersecurity of online banking, I propose the following research topic: Analysis of the use of Industry 4.0 technology in the field of improving cybersecurity of online banking, including mobile banking. This topic may also take into account the scale of application of cybersecurity rules and recommendations by bank customers and the level of cybersecurity of operating systems used by bank customers, web browsers and other Internet applications installed on laptops and smartphones, through which bank customers use online banking.
Best regards,
Dariusz Prokopowicz
  • asked a question related to Cyber Security
Question
5 answers
In connection with the development of cybercrime, should the surveillance of citizens by national security services be developed, expanded, increased?
To what extent can the developed range of citizens' surveillance be improved as part of the improvement of national cyber security systems?
As part of the improvement of cyber security systems, should the services for combating cybercrime be able to surveillance the entire activity of citizens on the Internet?
Are legal norms regulating the issues of cyber security, services for combating cybercrime and data security gathered in Big Data database systems of large online technology companies fully adapted to the rapidly growing ICT and Internet technology?
Please reply
Best wishes
Relevant answer
Answer
Most citizens are unaware of how much information about Internet users is possessed by Internet technology companies that offer certain information services on the Internet.
Best regards,
Dariusz Prokopowicz
  • asked a question related to Cyber Security
Question
13 answers
What currently dominate and are the standards and instruments for ensuring the security of data transfer and analysis in Big Data database systems developed?
Please reply
Best wishes
Relevant answer
Answer
Since Big Data and / or Data Science resources in the databases of many Internet technology companies are constantly growing, is the importance of cyber security of the information systems of these companies and the data stored in these databases growing analogically?
Thank you, Regards,
Dariusz Prokopowicz
  • asked a question related to Cyber Security
Question
17 answers
Relevant answer
Answer
If sentiment analysis carried out on information and data downloaded from online information, industry and social portals and processed on Big Data Analytics platforms help to identify the dominant trends of changing opinions of Internet users on specific topics, dominant issues in public debates, dominant answers to specific questions, then Can sentiment analysis also help to diagnose key cybersecurity problems about which discussions are held in the form of discussions etc. on the Internet?
Regards,
Dariusz Prokopowicz
  • asked a question related to Cyber Security
Question
4 answers
Cyber Liability Insurance Cover is done by various criteria in different countries. I would like to know more on this. Could you give a brief introduction and explain with an appropriate illustration if feasible?
Relevant answer
Answer
cyber security, a vulnerability is a weakness which can be exploited by a cyber attack to gain unauthorized access to and perform unauthorized action done by any one either he or she, young or old on a personal computer system. Vulnerabilities can allow attackers to run code, access a system's memory, install malware, and steal, destroy or modify sensitive data
  • asked a question related to Cyber Security
Question
3 answers
A researcher is currently collecting data for a research on cyber security. please use this link to participate in the survey. you can also share it on other groups. Thank you. https://docs.google.com/forms/d/e/1FAIpQLSc1nK7mE72AjAGEOxIDUIQHdA2NQsOWa3pHvs2OtvYk6-9VSQ/viewform
Relevant answer
Answer
Yeah I am also not from Nigeria, but as a person that works in IT I am only afraid of what my parents/other people in the house download and let the infection in that way.
The last time I got scammed was never and the last virus I had was before I even knew what a virus was 12 years ago.
  • asked a question related to Cyber Security
Question
3 answers
Hello , I have a questionnaire available
"A Cyber-Security Adoption Framework for organizations"
It needs arbitration approved by specialists in universities or who possess an academic degree in the field of specialization. The questionnaire is required to be arbitrated by (10) specialists, with the importance of the arbitrators ’contact information being correct and legal, with the necessity of having the names of the arbitrators to be able to communicate with them.
Thank you ..
Regards
Relevant answer
Answer
I am interested for your research. I have already done this types of research. Can you please send me details for the purpose.
  • asked a question related to Cyber Security
Question
19 answers
The field of research and business applications in the field of obtaining, archiving, analyzing and processing data in Big Data database systems has been developing strongly for several years.
There were hacking theft of personal, sensitive and secret data regarding users of social networks.
Are the results of research known, or are you familiar with publications describing risk management processes in the area of obtaining, archiving, analyzing and processing data in Big Data systems run by technological internet companies such as Google, Facebook, etc.
Technological internet companies such as Google, Facebook, etc. have the ability to obtain classified, sensitive and personal data from the Internet about the users of websites, including search engines and social media portals, who use these information services.
For the needs of these considerations, the issue of the security of classified data stored in Big Data database systems run by internet technology companies managing social media portals should be added.
There have been frequent thefts made by cybercriminals who, from these Big Data systems, stole classified and sensitive information about hundreds of thousands or millions of users of particular social media portals.
The development of social media portals therefore generates an increased risk of theft of data on users of social media portals.
Therefore, technological internet companies that run social media portals but also other companies that collect large amounts of data about users of specific, information services should continually develop and improve risk management systems for potential data loss from Big Data information resources.
Due to the above, in many companies, especially in large corporations, integrated risk management systems are built and improved.
Integrated risk management systems combine risk management processes in various areas of a company, institution or other organization.
One of the areas of risk management, the importance of which in many companies is growing, is risk management in the area of obtaining, archiving, analyzing and processing data in Big Data database systems.
In view of the above, I am asking you: Is the risk of cybercriminal attacks on Big Data database systems that contain personal data of social media portal users growing?
Please, answer, comments. I invite you to the discussion.
Relevant answer
Answer
Yes it is actually on the upward trend as pointed out by Dariusz Prokopowicz
  • asked a question related to Cyber Security
Question
3 answers
while running CICflowmeter soft from canadian institute of cyber security for capturing live network packets, i m getting this error
ValueError: Unknown pypcap network interface 'wlan0'
anyone have guide pls
Relevant answer
Answer
Seems like your pcap driver isn't installed or configured properly...
  • asked a question related to Cyber Security
Question
28 answers
Hi I looking for cyber security Dataset.
Please Fill this feedback from and circulate in your University and group.
Relevant answer
Answer
Done
  • asked a question related to Cyber Security
Question
2 answers
I have a key interest in OSINT and I'm trying to work out how I can combine that technology with cyber security to solve some kind of problem that I can use to carry through for my final year research project. Would anyone have any recommendations. I'm currently looking at tools such as Maltego and I'm trying to consider a potential back-end framework that utilizes some type of machine learning to populate the project.
What could be some fun, inspiring and interesting projects I could look into.
Relevant answer
Answer
Threat intelligence sharing is a brilliant idea. However, current OSINT models are isolated and provide minimal analytical value. You can refer to
" Reading the Tea leaves: A Comparative Analysis of Threat Intelligence" https://www.usenix.org/conference/usenixsecurity19/presentation/li.
I think researchers should provide more robust and semantically rich models.
  • asked a question related to Cyber Security
Question
4 answers
  • In order to implement a few immediate measures to effect positive changes, what recommendations should cyber security design principles follow?
  • How can cyber security design principles encourage change by engaging in which longer-term initiatives?
  • How have we confirmed that we are in compliance with regulatory requirements for our industry?
Relevant answer
Answer
Good questions: you need to classify the system, identify operation and threat, and design access and info flow in it, it can be done based on areas and technologies of security: end-point, network, web, data privacy, etc. There is no one single menu, but there should be a way we analyze systems carefully and propose solutions.
One aspect is monitoring and meta monitoring as part of the system (avoidance, prevention, detection, mitigation are principles) Meta-monitoring is the area of constant improvement. In security this is a must, you have to evolve as concrete threat involve. SO monitoring your incidents, system vulnerabilities, technology advance, other incidents outside your org, etc. should be taken into account in the plan to protect your organization: (It is an ongoing process if you are serious, since potential attackers evolve). An organized process for reviews and updates is a must!
  • asked a question related to Cyber Security
Question
13 answers
There is consensus on the principle that cybersecurity can better be achieved through transnational cooperation rather every country or block on its own. Yet, the work undertaken under the auspices of the United Nations, namely under the General Assembly, is progressing at a very slow pace. I recently published a research article on that ongoing work at the UN in the field of cybersecurity, available at : . It confirms that progress is slow, so this raises a few questions. What is needed to improve multilateral cooperation on cybersecurity? Are there some specific topics of cybersecurity that should be prioritized in the multilateral arenas? What format (binding, non-binding, information sharing, confidence-building) should the expected deliverables have?
Relevant answer
Answer
thanks for your valuable question
  • asked a question related to Cyber Security
Question
4 answers
looking for attacks dataset, intrusion, binaries or anything related to Cyber attacks. It would be appreciated if any body share it. Thankx
Relevant answer
Answer
Thanks for the quick response
  • asked a question related to Cyber Security
Question
1 answer
I am trying to study the network traffic detection, and someone suggests me to choose CTU-13 dataset as ML model training and testing dataset. I have downloaded the CTU-13 pcap files, but I do not know how to check their packets label. The label file is named apture20110XXX.pcap.netflow.labeled file, I cannot open it. Someone can help me to figure out this problem. Thanks!
Relevant answer
Answer
You could ask the manufacturing company which prepared the main files
  • asked a question related to Cyber Security
Question
15 answers
Is the security of information collected in social media portals databases currently one of the key determinants of the development of new online media?
Security of social media portals is currently one of the most important topics of social media portals and other new internet media and information services. Therefore, scientists at various universities are involved in researching this issue. Therefore, security tools for information collected in social media portals databases and data security systems on the Internet are being developed. In companies and key public institutions, systems for risk management of information systems and information transfer on the Internet are also developed.
Do you agree with me on the above matter?
In the context of the above issues, the following question is valid:
Is the security of information collected in social media portals databases currently one of the key determinants of the development of new online media?
Please reply
I invite you to the discussion
Thank you very much
I also conduct research in this matter. I am researching the security of social media portals in connection with Big Data database technology. Below are links to my publications:
I invite you to discussion and cooperation.
Thank you very much
Best wishes
Relevant answer
Answer
Social media, in recent times, has with eased an explosion of data with so many social media platforms available to interact and express opinions freely. This has led to easy access to the privacy of social media users which raise broader security concerns … Sharma, S., & Jain, A. (2020). Role of sentiment analysis in social media security and analytics. Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery, e1366.
  • asked a question related to Cyber Security
Question
7 answers
I'm in my final year, about to start my capstone project, I would like to do my project around the issues of fake media, misinformation, biased information and propaganda, from a cyber security stand point, but I'm struggling to refine it down to something more useable. Was wondering if anyone had any ideas?
Relevant answer
Answer
In today's world it's very difficult to validate a news, as so many times, reputable news outlets, such as CNN, Washington Post, New York Times have to retract their stories. You can base your project on phishing, spam, which are more tangible to detect.
  • asked a question related to Cyber Security
Question
8 answers
Hy everyone;
My name is Waqas Ahmed and I am a PhD Cyber Security Scholar of Air University Pakistan. I am working on IoT Forensics. Please guide me regarding this area and latest research challenges in this area. Thank You!
Regards
Relevant answer
Answer
Blockchain based IoT
SD based IoT
Anomaly based IoT
malicious fraudulent Using IoT
  • asked a question related to Cyber Security
Question
7 answers
Please can anybody help me by providing some good low impact non paid journal for article related to "smart grid cyber security".
Thanks
Relevant answer
  • asked a question related to Cyber Security
Question
6 answers
Which research journal of computer science and cyber security area journal is most suitable for speedy review and publication process?
Relevant answer
Answer
In which field?
If computer and engineering, please go through JATIT it takes about 30-40 days .
Regards
  • asked a question related to Cyber Security
Question
29 answers
Currently l am thinking of perusing research computing, ideal area cybersecurity problems and IoT, so far proposed research title "security risk assessment in IoT systems: Data privacy and security" any suggestions please experts
Relevant answer
DOI: 10.1109/ACCESS.2019.2946400
  • asked a question related to Cyber Security
Question
12 answers
Cyber Security in Banking Domain : Both "cyber security" and "Banking" are broader terms, and I need to narrow my research topic and prepare research proposal accordingly.
How can I add a new element in this research domain. Any suggestions are welcome!
Relevant answer
Answer
I think you can do something on secure Fund Transfer. Perhaps, you can research on the usefulness of blockchain or Artificial Intelligence in providing secure bank transactions.
  • asked a question related to Cyber Security
Question
14 answers
Are fishing, malware (spyware, trojans, ransomware, keyloggers, ...) sending cybercriminals false e-mails with links to fake websites or viruses reading passwords for online banking accounts or other techniques used by cybercriminals as the most dangerous?
Please reply
Best wishes
Relevant answer
At times like this, where a large part of the population is isolated, the use of digital means of payment is increasing, and therefore, the risk of being scammed as well. Therefore, in times of pandemic, I consider this as a fundamental question, on which the population should be informed in order to seek to prevent these types of fraud.
Strategies should be sought to prevent people from committing economic crimes such as theft or corruption, as described in the following manuscript
  • asked a question related to Cyber Security
Question
10 answers
Many organizations encourage their users to create complicated passwords that are usually hard to remember (and easy to brute-force). Has there been a study to show that passphrases have a definitive advantage over passwords or vice versa?
Relevant answer
Answer
Passphrase guessing is exponentially higher than that of passwords.
Passphrase generally longer for added security. Most of humans are bad at creating randomness, and face difficulties at remembering things, so they prefer easy words. This kinds of password would be attacked easily by the hackers. Finally, "Security at the expense of usability comes at the expense of security".
  • asked a question related to Cyber Security
Question
11 answers
recent hot area of research in the field of cyber forensics
Relevant answer
Answer
Below I briefly described the issues related to cybercrime and cybersecurity, which I researched and described in scientific publications that are available on the Research Gate portal. Over the past few years, the scale of cybercrime attacks on the IT systems of various institutions, including government institutions, on the databases of social media portals, on the ICT systems of banks, on electronic banking systems has been growing. Cybercriminals are increasingly attacking mobile online banking systems made available to Internet users and bank customers through mobile devices, mainly via smartphones. Research shows that the scale of cybercrime attacks on the IT systems of banks, institutions, etc. using social engineering combined with perfidiously created malicious software such as ransomware, i.e. encrypting access to data on disks or redirecting users to fake websites of banks and institutions on the Internet to phishing personal data, access passwords to electronic banking accounts and, as a result, to steal money. For several years, many mailbox users have appeared strange emails of unknown origin, which are sent as spam from private other email accounts or others with false information. Attachments containing false information are attached to many of these suspicious emails, usually sent by cybercriminals and hackers. Attachments are usually of the WORD * .doc document type, the Acrobat Reader * .pdf format, image files or other formats, and often contain Ransomware-type viruses. These are very dangerous viruses that encrypt access to a computer's disk. In addition, cyber criminals are increasingly using mailboxes set up on the e-mail portal to send infected e-mails to subsequent Internet users by generating fake emails so that they look like a specific user of the mailbox would send e-mails prepared by cybercriminals to their friends. These types of cybercrime techniques are becoming more common. Why are Internet technology companies that dominate the market and offer e-mail services do not improve the security of e-mail communication systems using e-mail boxes to significantly reduce cybercriminals' activity harmful to citizens? This question is still valid. On the other hand, internet banks and technology internet companies, technology fintechs are constantly improving cyber security techniques. The development of Business Intelligence business intelligence, Blockchain technology, data analysis in Big Data database systems, artificial intelligence to track movements and attacks made by cybercriminals, for prognostic analyzes, etc. can be helpful in the process of improving IT systems risk management. Therefore, the skilful and efficient use of data science technology can be helpful in combating cybercrime, but it all depends on how these technologies will be used and, as a consequence, who will win in the following years in this IT, information "arms race". I conduct research in this area. Conclusions from the research I published in scientific publications that are available on the Research Gate website. I invite you to scientific cooperation.
Greetings,
Dariusz Prokopowicz
  • asked a question related to Cyber Security
Question
3 answers
In my master's Degree I proposed a way to extend the existing privacy enhancing technologies used in Instant messaging in order for the users to be able to publish user-driven services:
This MSc Thesis I want to continue it over into a PhD as a step to implement it. From my point of view it requires lots of research that may also have scientific value as well.
The research I am interested to do it via a MEXT Scholarchip in Japan. But so far what I found only few researchers that either are qualified in cryptography or in cyber security:
But still I have hard time to look over univercities that do a complete research in Privacy Enhancing technologies or in Cybersecurity in Japan. Therefore, I want to ask:
- Which Universities in Japan do research in a related field (Cryptography, Cyber security, Internet Privacy) and which ones would you reccomend and why?
- Should I keep looking for professors-only and create a database with contact info or it is reccomend to look for univercities as well?
Relevant answer
Answer
The Japan government is keen to attract more international students, and has set a target of having 300,000 foreign students in the country by 2020 (it reached the 100,000 mark in 2003). As a result, universities are focusing on making life easier for foreign students, from the application process all the way through to finding a job after graduation.
  • asked a question related to Cyber Security
Question
6 answers
Dear colleagues, I would appreciate that you share your experience in the area of cyber security applied to industrial communicating systems
do you have experience concerning smart sensors and actuators vulnerabilities?
Relevant answer
Answer
With pleasure Dr. Niemann
thank you a lot for your precious contribution
  • asked a question related to Cyber Security
Question
5 answers
Now with data theft shifting from Cardholders to data in transit, what are the best paradigm to guide against this?
Relevant answer
Answer
If only we'd stop trying to be happy, we could have a pretty good time.
- Edith Wharton
  • asked a question related to Cyber Security
Question
2 answers
I am researching about how the personality characteristic of each internet user impact their mindset and decision in facing cyber security threats e.g.: phishing. Please guide me how to defines/classify the points scores vs big 5 characters groups? I know it is based on reverse points, but not sure how to match it and do not have the scores board formula. Thank you very much in advance.
Relevant answer
Answer
Each dimension should have a score. With tests it is always vital and god practice to consult the admin.scoring instructions. Also, to look at how other researchers have used the test.
  • asked a question related to Cyber Security
Question
3 answers
Dear Researchers,
Let's prepare a list of URLs which provides Cyber Security Guidelines from Genuine sources. To initiate the discussion, I would like to share following URL which provides Cyber Safety Tips Booklet for the Students and Parents. For your information, CyberCrime.Gov.in is the National Cyber Crime Reporting Portal of Govt. of India.
You may add such useful URLs to this discussion.
Thanking you,
Relevant answer
  • asked a question related to Cyber Security
Question
9 answers
I have a 4 months project module in my course "Cyber Risk for Business" . I should design the value proposition canvas and abstract of my idea along with. The project should show a substantial benefit in the real world in terms of managing cyber risk. The topics I would be interested in or a combination of :
1. IS Risk Control and Auditing
2. IS Governance
3. Ethical Hacking
4. Breach Management andRecovery
5. Analytics and AI in Cyber Security
Thank you.
Relevant answer
Answer
Forgive me for writing back so late. The events I wrote about are not something anyone would like to brag about. You can look for reports published by companies offering backup solutions and data recovery services, but approach these reports with great caution.
1 / - they are based on incomplete data, usually collected from some part of the market that does not have to be representative of the whole,
2 / - many of these reports are contaminated by marketing purposes of the publication.
I don't keep statistics myself. Solving specific problems is more interesting to me than examining the scale of their occurrence :) It is also difficult for me to recommend any publications. Topics about device failures and human errors are probably not worthy of being interested in Science by the capital "S".
As for the use of hacker scripts - I'd suggest that you agree with the organization you plan to test. The script itself is a tool and it is primarily how it can be used that is ethical or not.
I can't help much with cooperation with audit and programming companies. When it comes to audit companies - I think they may be interested in analyzing risk areas that are rarely mentioned. In addition to the threats and risks typical of the area of ​​cyber security, a good audit firm should also pay attention to the possibility of occurrence of such events as e.g. fire, flooding, natural disasters, terrorist acts. At the moment, no organization can say that there is no risk - it can only say that it is too small to protect against it in a special way.
  • asked a question related to Cyber Security
Question
30 answers
What are the research directions in Cyber-security for Mobile Service Robots?
Relevant answer
Answer
I agree with Muhammad Ali
  • asked a question related to Cyber Security
Question
5 answers
Hi!
Looking for some assistance in pinpointing a topic for a literature review focusing on contemporary issues in business.
I am currently looking at topics within the Cyber Security sector, but most papers/research I have conducted so far is largely focused on a computing / technical view. I am looking for ideas on topic within Cyber Security from a business perspective but having some difficulty.
I was thinking along the lines of the risks to businesses that Cyber Security issues pose, possibly a review on cost/benefit analysis of SMEs implementing cybersecurity procedures.
As you can probably tell, I am lost for focus on this topic. I have a keen interest in Cyber Security, however, making this fit a Busines Management Lit Review is proving difficult. If anyone has any ideas, or pointers to narrow down and define a question/topic, it would be much appreciated.
Thanks!
Relevant answer
Answer
Hi Steven
It might be your lucky day. I happen to be an accountant, but I am also a computer scientist specialising in Cyber Security, so I can certainly give you a few pointers.
Start by looking at the business architecture of companies, which comprises a combination of People, Process and Technology. As you have seen, there is a great deal of research being carried out on the technical issues. However, we can make a general statement that people are the weakest link. Processes also have their weaknesses, but processes are not an area that has had much in the way of creative attacks happening. Mostly they centre around technical weaknesses, or the age old attackers' favourite - people. There are still technical challenges to consider, especially if cloud is involves, and particularly if there is ANY element of IoT in the picture. Mobile computing and BYOD schemes involving the people of an organisation provides a lethal combination.
Looking at business organisational levels, there is a need to consider cyber risk, compliance with legislation, regulation and standards, especially in today's aggressive regulatory environment (check out BA, Marriott Hotels and the EU GDPR and the UK regulator who recently found her teeth). You also need to consider cyber-readiness of organisations,because the cost of getting ir wrong can be horrendous.
Check out my papers, you will find plenty that could help put you in the direction you are looking to go. Also, you should talk to Professor Karen Renaud at Abertay as we have done some work on one of her favourite areas - the weakness of people.
If you have any questions, just write to me.
Best regards
Bob
  • asked a question related to Cyber Security
Question
15 answers
Hey guys,
I am a MSc student who is looking for a cyber security project for my dissertation.
I am really trying to find a practical concept related to penetration testing or ethical hacking but I do not know a lot about the filed and I'm struggling to find an idea. My goal would be to learn more about pen testing while doing this project.
Our university has suggested penetration testing on IoT devices but other people have chosen this project already.
Has anybody got any other ideas?
Thank you all.
Relevant answer
Answer
Dhiraj Nage I think you are refering to Abertay University (Dundee) who do a Ethical Hacking degree which has a very good reputation
  • asked a question related to Cyber Security
Question
14 answers
Hello Everyone,
I am looking for suggestions on research topics for my TFG, my area of interest is cyber security, any leads would be appreciated.
Thank you In advance
Relevant answer
Answer
ISACA is the leading global resource: www.isaca.org
  • asked a question related to Cyber Security
Question
3 answers
cybersecurity is still a real concern for developing nations on the control measures.
i need to study on the recent risks and strategies used in controlling cybersecurity in developing nations
Relevant answer
Answer
You are right, cyber security is a real concern, but not only for developing nations. We can see every day that even the most developed nations have big problems with cyber crime. Countries develop strategies, policies, methodologies and implement them in practice, but nevertheless there is a huge cyber security concern. It is very important that countries collaborate and try to fight cyber crime together, because it is a global issue.
  • asked a question related to Cyber Security
Question
4 answers
.i need urgent answer please share link or few of SCI indexed research papers
Relevant answer
Answer
Use this link:
Regards
  • asked a question related to Cyber Security
Question
3 answers
I am currently trying to obtain data from Cyber Security Malaysia and it hasn't been an easy one. Do you have any advice?
Relevant answer
Answer
Interesting..
  • asked a question related to Cyber Security
Question
6 answers
Most of the datasets that I found were labeled just by the attack type, and maybe no one used also the tool used to generate the attack as another way of labeling.
I am searching for an intrusion detection dataset labeled by both attack type and the tool used to generate this attack, any help ?
Thanks in advance !!
Relevant answer
Answer
ARe you looking for network intrusion dataset?
There is one in kaggle, you can check that out if you are looking such dataset.