Science topic
IT Security - Science topic
Explore the latest questions and answers in IT Security, and find IT Security experts.
Questions related to IT Security
Ensuring the safety and security of AI systems is a critical concern as these technologies become more integrated into essential infrastructure and decision-making processes. AI systems are vulnerable to various threats, including adversarial attacks, data poisoning, and model inversion attacks. These threats can compromise the integrity, confidentiality, and availability of AI systems, leading to potentially severe consequences.
How to reduce the risk of leakage of sensitive data of companies, enterprises and institutions that previously employees of these entities enter into ChatGPT?
How to reduce the risk of leakage of sensitive data of companies, enterprises and institutions, which previously employees of these entities enter into ChatGPT or other intelligent chatbots equipped with generative artificial intelligence technology in an attempt to facilitate their work?
Despite the training and updating of internal rules and regulations in many companies and enterprises regarding the proper use of intelligent chatbots, i.e., for example, the ChatGPT made available online by OpenAI and other similar intelligent applications that more technology companies are making available on the Internet, there are still situations where reckless employees enter sensitive data of the companies and enterprises where they are employed into these online tools. In such a situation, there is a high risk that the data and information entered into ChatGPT, Copilot or any other such chatbot may subsequently appear in a reply, an edited report, essay, article, etc. by this application on the smartphone, laptop, computer, etc. of another user of the said chatbot. In this way, another Internet user may accidentally or through a deliberate action of searching for specific data come into possession of particularly important, key, sensitive data for a business entity, public institution or financial institution, which may concern, for example, confidential strategic plans, i.e., information of great value to competitors or intelligence organizations of other countries. This kind of situation has already happened and occurred in some companies characterized by highly recognizable brands in specific markets for the sale of products or services. Such situations clearly indicate that it is necessary to improve internal procedures for data and information protection, improve issues of efficiency of data protection systems, early warning systems informing about the growing risk of loss of key company data, and improve systems for managing the risk of potential leakage of sensitive data and possible cybercriminal attack on internal company information systems. In addition, in parallel to improving the aforementioned systems that ensure a certain level of data and information security, internal regulations should be updated on an ongoing basis according to the scale of the risk, the development of new technologies and their implementation in the business entity, with regard to the issue of correct use by employees of chatbots available on the Internet. In parallel, training should be conducted, during which employees learn about both new opportunities and risks arising from the use of new applications and tools based on generative artificial intelligence technology made available on the Internet. Another solution to this problem may be to order the company to completely ban employees from using smart chatbots made available on the Internet. In such a situation, the company will be forced to create its own, operating as internal such applications and intelligent chatbots, which are not connected to the Internet and operate solely as integral modules of the company's internal information systems. This type of solution will probably involve the company incurring significant financial expenses as a result of creating its own such IT solutions. The costs can be significant and many small companies' financial barrier can be high. However, on the other hand, if the construction of internal IT systems equipped with their own intelligent chatbot solutions becomes an important element of competitive advantage over key direct competitors, the mentioned financial expenses will probably be considered in the category of financial resources allocated to investment and development projects that are important for the future of the company.
The key issues of opportunities and threats to the development of artificial intelligence technology are described in my article below:
OPPORTUNITIES AND THREATS TO THE DEVELOPMENT OF ARTIFICIAL INTELLIGENCE APPLICATIONS AND THE NEED FOR NORMATIVE REGULATION OF THIS DEVELOPMENT
In view of the above, I address the following question to the esteemed community of scientists and researchers:
How to reduce the risk of leakage of sensitive data of companies, enterprises and institutions, which employees of these entities previously input into ChatGPT or other intelligent chatbots equipped with generative artificial intelligence technology in an attempt to facilitate their work?
How do you mitigate the risk of leakage of sensitive data of companies, enterprises and institutions that previously employees of these entities enter into ChatGPT?
What do you think about this topic?
What is your opinion on this issue?
Please answer,
I invite everyone to join the discussion,
Thank you very much,
Best regards,
Dariusz Prokopowicz
The above text is entirely my own work written by me on the basis of my research.
In writing this text I did not use other sources or automatic text generation systems.
Copyright by Dariusz Prokopowicz

Why don't the companies running social networking sites that make money from ads posted on their social media bear full responsibility for the content of the ads posted and for the financial, social, moral and other damages caused by ads that are not properly verified?
In today's most popular online social media, there have recently been many untrustworthy advertisements for various products and services, including misleading ads presenting false, unreliable, fraudulent offers of pseudo financial services. Often beginners or experienced influencers and youtubers play the role of presenting certain offers. Sometimes the people presenting certain untrustworthy offers of products or services are seemingly random people who, seemingly as mere citizens of the Internet who want to share their experiences of using various offers, presenting mainly or exclusively positive aspects of using certain presented products and services in reality are paid by the companies whose offers they present. Sometimes influencers and youtubers are given ownership of a specific advertised product for free as a form of gratification. In addition, artificial intelligence technology is increasingly being used to create advertising spots broadcast on social media. Individuals and companies using generative artificial intelligence technology, including applications based on AI technology available for free on the Internet to create advertising spots are taking advantage of legal loopholes, i.e. the lack of legal regulations that would normalize this sphere of the use of AI technology and limit the scale of misinformation, generation of fejknews, untrustworthy advertisements presenting various product and service offers using misleading content to the public that is inconsistent with facts, unverified using reliable, objective expert knowledge, scientific research conducted, etc. In addition, in AI-generated spots, animations and advertising videos, more and more often, instead of human influencers and youtubers, there are replacing them with a kind of avatars, digitally generated people who do not exist in reality. It happens that digitally generated images of real existing public figures of politicians, athletes, showbiz people, actors, singers, etc. are used in unreliably generated spots, animations and advertising videos, into whose mouths are put statements, texts, words that in reality they have never spoken. Recently, more and more often in the online social media, in which there are certain segments, generations of Internet users, citizens, there are many unreliable, taking advantage of the low level of knowledge in the field, offers of pseudo financial services, offers of supposedly super easy and highly profitable investments in cryptocurrencies, in miraculous investment strategies in Bitcoin requiring virtually no knowledge of finance, extra unique investment offers in precious metals, in contracts on selected securities, shares of dynamically growing startups basing their development on artificial intelligence technology, conducting innovative research projects with the aim of creating a miracle cure for cancer or other difficult-to-treat or incurable diseases. Public organizations and institutions representing the interests of consumer citizens, dealing with the issue of consumer protection and competition, investigating the problem of unreliable and misleading citizens presented in social media spots, animations, advertising videos, NGOs and socially active organizations are trying to warn citizens against such unreliable, fraudulent, false content ads. However, the main role in protecting citizens acting as consumers of information should be played by the technology companies running the aforementioned online social media. Leading online technology companies running popular social media sites are developing new technologies and are most equipped with modern ICT, Industry 4.0/5.0 technologies, and are therefore most predisposed to create reliably effective systems for verifying the content used in advertising campaigns run on their social media. This is because there is a lack of legal regulations in the legal normatives that would oblige the companies running social networks earning money from the advertisements posted to verify the content used in the advertisements, to check the issue of compliance of the content of the advertisements with the facts, with the generally applicable expert knowledge, with the results of scientific research conducted, and to make the said technology companies fully responsible for the content of the advertisements posted in their social media and for the financial, social, moral and other damages caused by the advertisements not properly verified. Besides, in addition to the necessary legal regulations, there should be a system of mandatory insurance fund financed by the said technology companies, from which compensation would be paid for all the negative effects caused by the broadcast on social media of fake news, misleading product and service offers, unreliable influencers, youtubers, advertising companies, etc. An additional solution that should be introduced is the possibility of legal enforcement of financial claims on the aforementioned insurance funds from unreliable influencers, youtubers, advertising companies, etc.
I have described the key issues of the determinants of the development of social media with attention to the issue of cyber security and the technologies used Industry 4.0 in my article below:
The postpandemic reality and the security of information technologies ICT, Big Data, Industry 4.0, social media portals and the Internet
I described the key issues of opportunities and threats to the development of artificial intelligence technologies in my article below:
OPPORTUNITIES AND THREATS TO THE DEVELOPMENT OF ARTIFICIAL INTELLIGENCE APPLICATIONS AND THE NEED FOR NORMATIVE REGULATION OF THIS DEVELOPMENT
In view of the above, I address the following question to the esteemed community of scientists and researchers:
Why don't the companies running social networks that make money from the ads posted on their social media bear full responsibility for the content of the ads posted and for the financial, social, moral and other damages caused by ads that are not properly verified?
Why don't the companies running social media sites bear full responsibility for the content of unreliable ads posted?
What do you think about this topic?
What is your opinion on this issue?
Please answer,
I invite everyone to join the discussion,
Thank you very much,
Best wishes,
Dariusz Prokopowicz
The above text is entirely my own work written by me on the basis of my research.
In writing this text I did not use other sources or automatic text generation systems.
Copyright by Dariusz Prokopowicz

These days VAS are playing important roles in mobile networks, so without their security nobody can rely on them. In these instances cryptography plays an important role in securing these issues. I want to know the best way to apply cryptography VAS. Also any references would be appreciated.
Non-repudiation is a legal term defined as protection against an individual falsely denying having performed a particular action. It provides the capability to determine whether a given individual took a specific action, such as created information, approved information or sent or received a message.
Social media platforms such as WhatsApp have a function which allows one to send a message to an individual or a group and DELETE the message from all the recipients leaving them with no evidence of what has been sent. This allows the sender to deny having sent such a message. Read-once messages which get destroyed upon being read can also be a breach of non-repudiation on Social Media platforms.
What is your view of these functions on social media platforms? Legally are they acceptable?
Does the development and implementation of new information technologies for banking affect the processes of improving the security of online banking systems?
Improvement of online banking security systems can currently be significantly determined, among others, by the implementation of new information technologies for banking.
Are the processes of improving internet banking security systems currently determined by the implementation of new information technologies, i.e. by implementing banking data processing technologies in Big Data database systems, Business Intelligence based analytics, implementation of Blockchain technology and artificial intelligence.
Do you think that the processes of improving internet banking security systems are currently determined by the implementation of new information technologies for banking?
Please reply
Best wishes

In my opinion, the information posted on social media portals are not 100 percent. safe.
There have been cases of hacking and stealing information from thousands of records, user profiles of these portals.
In addition, there are developed techniques for building programs that read information from commentators entered into thousands of profiles of social media portals.
Then this information is a research material for the sentiment analyzes carried out, i.e. analyzes of opinions prevailing among users of these portals on specific companies, brands, products and services.
Do you agree with my opinion?
Please reply
Best wishes

Assume that I have a directory with a lot of research papers in PDF form with only meaningless filenames. Is there a tool that will automatically rename these papers with the correct title and maybe conference?
In my opinion, sensitive personal data concerning individual users who set up profiles, collected on social media portals, are not fully secure. This is confirmed by the occurrence of data leaks, data theft by cybercriminals.
In connection with the above, the issue of information security on the Internet is becoming an increasingly global problem and therefore, in the global approach, institutions and security systems for the transfer of information on the Internet should be developed. The security of information on the Internet can refer to many aspects of data security both at the level of central state institutions and international organizations as well as the security of personal data of individual citizens, sensitive data of citizens collected on various websites, including social media portals.
The improvement of risk management and information security systems at the supranational level is also a key issue. Technological companies managing social media portals on the one hand try to improve data security systems about users setting up accounts on social media portals. On the other hand, it is also important to cooperate with key, central data security institutions on the Internet that operate transnational. This is important from the point of view of improving information security systems on the Internet in order to limit the possibility of using social media portals by cybercriminals operating transnational, using various social engineering techniques.
Please, answer, comments.
I invite you to the discussion.
Best wishes

In some countries, rumors of cybercriminals with Ransomware are reportedly again being reported again. These viruses spread via e-mails, which automatically send themselves out from infected e-mail accounts and send out infected e-mails to all e-mail contacts of a virus mailbox infected with the virus. The virus is very dangerous because after opening a fake e-mail, the virus installs deeply into the computer and encrypts access to the disks by blocking access to the contents of the disks. I wrote scientific publications on this subject.
In view of the above, I am asking you the following question: Are cybercriminals now attacking personal and corporate computers using Ransomware viruses again?
Please reply. I invite you to the discussion

What kind of scientific research dominate in the field of Cybercrime and the security of online banking?
Please, provide your suggestions for a question, problem or research thesis in the issues: Cybercrime and the security of online banking.
Please reply.
I invite you to the discussion
Best wishes

In connection with the development of cybercrime, should the surveillance of citizens by national security services be developed, expanded, increased?
To what extent can the developed range of citizens' surveillance be improved as part of the improvement of national cyber security systems?
As part of the improvement of cyber security systems, should the services for combating cybercrime be able to surveillance the entire activity of citizens on the Internet?
Are legal norms regulating the issues of cyber security, services for combating cybercrime and data security gathered in Big Data database systems of large online technology companies fully adapted to the rapidly growing ICT and Internet technology?
Please reply
Best wishes

What currently dominate and are the standards and instruments for ensuring the security of data transfer and analysis in Big Data database systems developed?
Please reply
Best wishes

Is the security of information collected in social media portals databases currently one of the key determinants of the development of new online media?
Security of social media portals is currently one of the most important topics of social media portals and other new internet media and information services. Therefore, scientists at various universities are involved in researching this issue. Therefore, security tools for information collected in social media portals databases and data security systems on the Internet are being developed. In companies and key public institutions, systems for risk management of information systems and information transfer on the Internet are also developed.
Do you agree with me on the above matter?
In the context of the above issues, the following question is valid:
Is the security of information collected in social media portals databases currently one of the key determinants of the development of new online media?
Please reply
I invite you to the discussion
Thank you very much
I also conduct research in this matter. I am researching the security of social media portals in connection with Big Data database technology. Below are links to my publications:
I invite you to discussion and cooperation.
Thank you very much
Best wishes

Considering the specifics of the increasingly common IT systems and computerized advanced data processing in Internet information systems, connected to the internet database systems, data processing in the cloud, the increasingly common use of the Internet of Things etc., the following question arises:
What do you think about the security of information processing in Big Data database systems?
Please reply
Best wishes

Hello everybody.
Is gns3 simulator support internet of things? if I want do architectural protocols, energy consumption, security?
thanks
What do you think about the following questions:
Please kindly share your ideas.
Thank you.
- How will Japan train displaced workers for a new type of society?
- How will Society 5.0 provide care for an aging population?
- How will Japan get people to completely rethink the meaning of work?
- How will Japan create a framework for Big Data sharing and security?
- What are the pros and cons of Smart contracts?
- What are the latest technologies and tools?
- What do you like and/or dislike about smart contracts?
It's an open discussion to help improve our understand of future technologies. You are welcome to share your opinions and experience.
This title might not be very clear, let me elaborate :
Let's say, you're a computer scientist on your browser. You innocently browse the web, looking for a new book about procrastination (or anything else). Suddenly, a click lead you to the homepage of EvilCorpWorld, a (fictional) company incarnating the opposite of your ethical views.
EvilCorpWorld isn't a "common evildoer", they blatantly make the world a worst place. According to your ethical views, they could be enslaving children, selling weapons to warlords, practicing tax fraud at country scale, they support network promoting racism and sexism...
On the homepage of EvilCorpWorld, you inadvertently notice a big security flaw. Something like "click here for rootshell (Admin only!)". For the sake of simplicity, let's say it's an actual flaw, not a honeypot or anything else.
Now you have three possibility :
- to tell : email EvilCorpWorld to warn them about the huge flaw.
- to poke : like with a stick, poke the flaw, trying to see how far you can get. Poking does not mix with wrongdoing on purpose or for benefit. It's more a playful activity.
- to delegate : unsure of what to do, asking someone more versed in infosec what they think
What would be the most ethical-wise thing to do (maybe something other than three options)?
Will the use of Blockchain technology improve the security of information transfer on the Internet? Will the development of Blockchain technologies reduce the scale of cybercrime on the Internet?
Please, answer, comments.
I invite you to the discussion.
Best wishes

I try to connect a Bluetooth device to several android apps. I want to use the same long term key(LTK) for all apps (AES256) and derive session keys from that LTK in each app to establish a secure communication tunnel. I use shared preference in private mode which allows the apps with the same bundle ID to access the same data, but unfortunately, the shared preference is not secure enough and the data is also available for other root access level requests. I am using the Android Keystore to storing the LTK, but I need to improve the solution for two scenarios: 1. Apps with the same bundle ID. and 2. Apps with the different bundle IDs using the same SDK.
I am looking for a secure way to store the LTK in the android device which is accessible by those specific apps.
Is there a solution similar to the Apple keychain available for Android now? (I think the Android key chain works differently. I prefer a solution like the Apple key chain to transfer the security trustworthy and challenges to the OS level.) OR, should I use shared preference and secure it by myself? In this regard, if I should use Android Keystore to generate and store that LTK, is the Android Keystore allow me to access the same key from different apps with different bundle IDs? please describe the different options and limitations.
Currently, various data security tools are used in Big Data database systems. The basic principle is the parallel use of several types of IT security and compliance with specific procedures for analyzing and securing systems against potential materialization of operational risks, including technical risks associated with used computer hardware and specific database technologies and personnel risks associated with employees who support these systems.
The key issue is also whether built database systems are directly connected to the Internet online or are not permanently connected to the Internet and certain data from the Internet are added from time to time to Big Data databases after their analysis by anti-virus software, detecting malware worms, such as keyloggers and other malicious software created by cybercriminals and used to steal information from database systems of data warehouses and Big Data.
In a situation when Big Data database systems or other systems where important information is collected are connected to the Internet online, then the information sent should be encrypted, and system gateways connecting the Big Data database with the Internet should be equipped with a good firewall and other filtering security incoming information. If the employees operating the Big Data database system use certain e-mailboxes, they should be only company mailboxes and verified from the security side of data transfer on the Internet. The company should have strict security procedures for using e-mail boxes, because in recent years via e-mails cybercriminals have sent ransomware programs hidden in e-mail attachments, used to encrypt hard disks used in company and server databases.
Do you agree with me on the above matter?
In the context of the above issues, I am asking you the following question:
How should Big Data database systems be protected against the activities of cybercriminals? What types of programs and systems for securing Big Data databases against cybercrime are currently used? What other types of security instruments for Big Data database systems are currently used?
Please reply
I invite you to the discussion
Thank you very much
Best wishes

In my opinion, interesting questions and research thesis may concern the following issues:
Are fishing, malware (spyware, trojans, ransomware, keyloggers, ...) sending cybercriminals false e-mails with links to fake websites or viruses reading passwords for online banking accounts or other techniques used by cybercriminals as the most dangerous?
Some users use antivirus software, farewall, precautionary methods in using e-mail, etc., but this has not prevented, for example, attacks from cybercriminals using ransomware that encrypt and block access to disks on the computer.
In connection with the above, the techniques of data transfer security at the Interenet are constantly improved.
IT tools are being developed and improved, including antivirus software to protect a computer, laptop, tablet or smartphone against cybercrime and viruses sent, for example, in e-mails by hackers?
In view of the above, I am asking you the following question:
What are the new trends in research on cybercrime?
Please reply
Best wishes

If I have an alghoritm that outputs pseudorandom bits, is possible to distinguish strings computed with different seeds?
Are fishing, malware (spyware, trojans, ransomware, keyloggers, ...) sending cybercriminals false e-mails with links to fake websites or viruses reading passwords for online banking accounts or other techniques used by cybercriminals as the most dangerous?
Please reply
Best wishes

In connection with the development of cybercrime on the Internet, the security systems for transfer and processing of data, financial transactions, electronic banking, etc. carried out on the Internet are improved. In addition to electronic banking, the key information security in the internal IT systems of central state institutions is protected. Cybercriminal attacks on cyber-banking systems and hacker attacks aimed at companies to extort ransom for decrypting data encrypted by computer viruses on disks (cybercriminal ransomware attacks) and hack attacks from abroad on key central institutions, ministries and other institutions of the public administration sector and enterprises of strategic branches of the national economy.
In connection with the above, I am asking you:
Do you think, for security reasons, everything that happens on the Internet should be analyzed by the public security services?
Please answer
Best wishes

Hi,
As per the definition of logic obfuscation, obfuscated circuit stays in obfuscated mode upon global reset (i.e. initial state) and generates incorrect output; upon receiving correct initialization sequence it enters into functional mode and generates intended outputs.
This is fine with respect to the design that does not connected with any further critical systems. If at all, the obfuscated logic needs to be connected to further safety critical systems, won't incorrect value generated in obfuscated mode affects the critical systems??
In such case, how to apply logic obfuscation??
Thanks in advance.
The employment of machine learning in security field is higly emarged in the current era. But, yet, did the researchers in security field utilize from it in 100% detection or protection from one or multiple kind of malwares ? Or do you forsee that malwares ( or specific malware type, like ransomware or trojan or ... ) will be obsolete due to the successful analysis of their behavior (Dynamic or static ?) by machine learning algorithims ?
Excited to read your views.
(Resources that support your opinions will be much supportive!)
Unfortunately, despite the assurances of companies that run social media portals, the information contained on these websites is not always fully secured against the activities of cybercriminals.
In addition, the issue of downloading data from social media portals by large companies to Big Data database systems should be added in order to process them for marketing purposes.
The issue of privacy in social media is very important and is related to the security of personal information. Privacy is at risk in terms of information posted on social media portals.
Please reply. I invite you to the discussion
Dear Friends and Colleagues of RG
The problems of the analysis of information contained on social media portals for marketing purposes are described in the publication:
I invite you to discussion and cooperation.
Best wishes

Antivirus programs signal this, but are the new attacks appearing, or maybe the companies that produce antivirus software use this kind of alerts mainly to stimulate consumers to buy these applications?
Is the information about the growing threat from the activities of cybercriminals also partly a result of marketing activities of antivirus software vendors?
Cybercriminal attacks involving various types of viruses occur on a daily basis in various places around the globe.
However, large-scale attacks on the global scale and publicized in the media are probably much rarer.
An example was the type of cybercriminals, which was carried out on a large scale in mid-2017, which was mainly targeted at large public and financial institutions and corporations operating in Ukraine, but quickly spread over the world through capital and business links between companies.
Then ransomware viruses known only often in the environments of security specialists, among computer scientists analyzing cybercriminal attacks, has been publicized in the media in many countries and has become a global and public problem.
In this situation, sales revenues and profits of companies producing antivirus software are growing significantly.
Recently, some of these antivirus programs inform that the threat of cybercriminal attacks involving ransomware is growing.
Is it a real increase in the risk of cybercrime or a new form of marketing for companies that produce antivirus software?
Or both?
Please, answer, comments. I invite you to the discussion.
"Completely Automated Public Turing test to tell Computers and Humans Apart" (CAPTCHA) [1][2] are used e.g. to prevent bots from utilizing special web based services for spam and unwanted access. To circumvent this, botmasters take profit from human intelligence by paying people from developing countries for solving CAPTCHAs [3], in order to reach the target service.
Considering this, do you think that it is still reasonable to improve and use CAPTCHAs?
[1] U.S. Patent 6,195,698. Method for selectively restricting access to computer systems. Filed on Apr 13, 1998 and granted on Feb 27, 2001. Available at http://www.google.com/patents/US6195698 .
[2] Ahn, Luis von; Blum, Manuel; Hopper, Nicholas J.; Langford, John (2003). "CAPTCHA: Using Hard AI Problems for Security". Advances in Cryptology — EUROCRYPT 2003. Lecture Notes in Computer Science 2656. pp. 294–311.
Security is a main concern of WSN, and there are high chances of getting heterogeneous sensor nodes in a network, is maximum security achievable in heterogeneous sensor network? Because, each heterogeneous node has its own security technique.
Does anyone have experience with FIREMAN toolkit. I need to know how to install it, and how to use it to analyse the efficiency of my firewall?
Or, what tools you using to analyse and test the efficiency of your Firewall?
assume for example a crypto system aim to generate a cipher message with exactly the same size of its plain text and also be stateless to be able to decrypt out of order received packets. Of course this crypto system expose some information about the message attributes however if we sacrifice this level of security but not more, is any crypto system that address such issue?
There are various algorithm to generate the keys in Public Cryptosystem, e.g., Diffie-Hellman Key Exchange is very popular algorithm to generate and distribute the shared secret keys between two parties. However, I am interested to generate the shared key with the involvement session ID or number by Diffie-Hellman Key Exchange. What are different mechanism to perform these things.
Any alternative are also most welcome.
As an example, is the method getActualCPUtime() used to determine the response time for a VM?
security gaps in IOV?
future research in IOV regarding security?
previous research in IOV regarding security?
I am interested in the period of 1980s-1985....
1. how were crime scenes secured
2. what search patterns were used
3. how evidence was collected
Hi everyone. I want to know the current research issues (areas) in Security in WSNs. I am specifically looking at DOS attack at the various layers of WSNs or Intrution Detection in WSNs. All suggestions are welcomed.
Thank you.
I’m planning to provide a dual security for data stored on the cloud. I read about various methods for encrypting and decryption algorithm but i can't get conclude which one is better for cloud security I would like some advice about recommended techniques. I’m really looking to find out what you’d consider to be the most efficient method as cost and time are limiting factors.
In healthcare, doctors can not decide on what appropriate information (EHRs) is really needed for treatment of a patient case. The amount of information needed by healthcare providers to complete their tasks may vary greatly. The number of medical records a healthcare provider needs to access over a certain period of time depends on many factors, including the number of patients he/she serves, the case he/she working on, and so on. Also, such factors vary among healthcare providers and may change from time to time. It is thus very hard to determine how much risk we should tolerate for a healthcare provider, if a healthcare provider believes knowing more information that is relevant to her patient's conditions enables her to make better decisions. Here, The problems of insiders such as abuse or misuse of privileges granted by authorization services are increased and would be hard to detect .
If we say that, medical records classification is infeasible and requires a great deal of effort and skills to accomplish. How can we assess the risk if the medical records are not classified and we do not know who should access what? ???
Research trends within Enhancement Security of Cognitive radio network
Threat modeling is an important activity to identify threats at the design phase. Are there any other methods to identify threats in the design phase?
How to evaluate the security of a computer system ? Is there a framework that is currently used as a standard for measuring computer security ?
What are the current security threats and vulnerabilities cloud users such as organizations and companies are facing? could you suggest me research papers, reports or documents related with the question?
I would like permission to post a survey questionnaire on this group. My survey is based on my Project Dissertation "The security implication of Mobile devices to organisations". My research will require me to do a survey in regards to security and organisations and I hoping this platform will give me access to IT professionals like you and their views concerning BYOD and IT security. I believe that my survey results will also be beneficial to everyone in this group as well. https://strathsci.qualtrics.com/SE/?SID=SV_9ZXJ4zjGI2tkHEF
Am trying to get another tool that I can use to test for Security and Vulnerability issues in Mobile Cloud Computing so i could verify the data I already have ?
ECC ( Elliptic Curve Cryptography) can be implemented in different methods, it is more complex than RSA. In addition, its discrete logarithm problem is more difficult to break than the factorization. The researchers have tried to attack ECC, but it is infeasible using the computational resources.
In present, the security strength of ECC is stronger than other public key cryptosystems.
Any help will be the great appreciation. Thanks.
Specifically on physical layer and MAC layer attacks.
Although the location of eavedropper is random, in my work assumed the direct link between the sourse and the eavesdropper unavailable , if you are the reviewer of this paper, are you agree with this simplify system model?
I'm doing some research on the explosive characteristic of fountain codes,which means the original symbols can be decoded suddenly when the receiver gets some key symbols. I do think this feature can be used in the problem of physical layer security, in which the legitimate user can get enough encoded symbols before eavesdroppers,and finishes decoding firstly. I'm now focusing on how to enhance the explosive characteristic. I will really appreciate it that someone can give me some suggestions.
How much power does the encrypted packet consume comparing to unencrypted packet?
I know it depends on the encryption algorithm, but you may mention the type of encryption alongside with the power consumption. What I would like to know is both the power consumed by an unencrypted packet and an encrypted packet. so I can make comparison.
I went through many papers to figure this out, but they just mention the power consumed by encryption without mentioning how much the unencrypted packet consume ?
I need to know weather the encryption add significant overhead to the overall consumption, either symmetric or asymmetric , and might the only way is to compare the power consumed with and without encryption in numbers.
Thank you so much guys for your cooperation in advance.
Sometimes it is necessary to use tools for hack (testing) or discover vulnerabilities and resolving security vulnerabilities in the system of institutions by using attacker tools :
- Kali Linux
- Backtrack
- Pentoo
- Nodezero
- Network Security Toolkit (NST)
- Parrot Security
- BackBox Linux
- GnackTrack
- Bugtraq
etc..
I have come up with idea of implementing Data hiding in panorama videos in order to gain more data hiding capacity and security while maintaining a sufficient quality of videos. Are there any challenges related to this proposed idea and where to find background information on this topic.
Regards,
Satwinder Singh
Hello,
I am trying to find different case studies that could be used for learnng different information security and privacy (IS&P) concepts, issues, approaches to deal with different IS&P threats. Although I am more interested in case studies focused on human element in information security, however, case studies focusing other aspects of IS&P are also of interest.
In some cases, "scenarios" and "case-based learning" are also used for this kind of teaching or learning.
I myself am searching but if someone already is aware of some resources, it will be really helpful.
Thanks,
Ali
Generally, the notion of military leadership is connected with leading people in a battle and therefore belongs to the moral component of fighting power. Or, as Liddell Hart says "a commander should have a profound understanding of human nature, the knack of smoothing out troubles, the power of winning affection while communicating energy, and the capacity for ruthless determination when required by circumstances. He needs to generate an electrifying current, and keep a cool head in applying it." On the other hand, security environment has changed (more complex, uncertain) and the military integrates more with other governmental ministries and agencies in order to provide security. The imperative for the military organization is to be more agile, responsive, adaptable and innovative. In that sense it seems that (the highest) military leadership's qualities needs to be expanded to encompass ability to transform the organization (even the culture). How does it fit in the developmental theory? (ref. Susanne Cook-Greuter, WIlliam Torbert, Ken WIlber)
I am a teacher of the network security,and a engineer of a network and Information system manager, I am afraid that I cannot solve all the security of my work, and want to build a wall of guard of network and system, and want to study the security theory , and want to study the data mining,but I don't know how I start. Can you help me? Thank you.
Otherwise ,my English is poor,
I'm looking for a place to potentially host an online discussion space for 40-50 users, would need to be secure and ideally professional looking. Does anyone know of literature for this type of data collection, also? Thanks
What are the problems that are being caused by computer systems?
I would like to start a simulation between two nodes using different types of encryption, and I am confused between Omnet++, Castalia and NS3. I don't know which one of them support encryption and other security features required by WSNs. Could you please share your experience in this mattaer.
Many thanx.
I have proposed a forensic model, i want to get a rough idea how i can do the following:
1. Prove the correctness
2. check the correctness
3. Evaluate the model processes
I am working in the field of designing and obtaining the best security algorithm for particular environment. It would be very helpful for me if I can get access to some data set or source from where I can retrieve security algorithm details. The detail I require is different Cryptography algorithm prevents which attacks.
Symmetric and Asymmetric both with conventional and hybrid algorithms. I am working on cloud storage as a service part, so need to secure the database, interaction with database and customer environment to build customer trust in cloud.
From where can I get data related to attacks prevented by major Cryptography algorithms? Is their any data set available?
Hi,
I need a privacy meter to secure personal data. For this I need to find threshold value,so that I can find all the entities which are below threshold are safe. Other entities which are above threshold values are unsafe.
Can anyone provide some formulas and methods to find how to mitigate privacy risk for a large amount of personal data.
Planning to work on project on VANET Security or something familiar, what should I include. Actually looking for an idea to work on. Need suggestions. Thanks
What are the current threats that occur in organizations using hadoop? If there are threats, what are they?
Dear sir, i am also working secure data sharing between cloud users, providers and TTP, but i could not able to initiate the implementation or experimentation part. I have some queries in my mind like as follows
1. Do we need actual cloud setup to implement the cryptography schema to cloud data security or simulation tools ????
2. If actual actual cloud is needed, then how to make the experiments on the on actual cloud???
3. If we use the simulation tools, then how to provide cryptographic scheme on the actual data between users, cloud service provider and some trusted third party in the simulation tools????
4. Can we really experiment the our schema in simulation tools like cloudsim or ns2, n3 and all.....????
I kindly request you to advise and suggest to carryout my research work further which helps me lot.
I need to know a powerful tool for testing the security of a developed Java application. Also, I need to know whether these kind of tools produces an accurate measure of the security of software?
is there any idea of internet of things security to work with it as a paper?
Presently, I am trying to develop a fuzzy logic based cloud service trustworthiness model and listing a set of parameters for that purpose like security, availability, scalability etc.
hello people ,
the end to end security (communication security ) in IoT will cover the cryptography by default ??
how to achieve the end to end security in IoT (any reference will help )
is there any overlapping between privacy and Identity management term ? i saw them as a different security requirements.
thank u in advance
I am working on secure data sharing in multi cloud between CSU and CSP. So please share your experience which will help me to gain experience
Can i get thesis on security issues related to WBAN or get source code for security issues in WBAN?
I find this area the most confusing. Should there be an umbrella term that describes the unwanted effects of mobile apps that deliver psycho social interventions? for example "the safety profile (side effects, privacy and security)". Or should these be described separately. Currently available literature focuses on privacy and security, but when we think of psycho-social interventions we also think of side effect...
Thank you Mr. Ed. As I mentioned above, my requirement is to integrate my code which sends data to cloud whether the data are encrypted or not into any one of the cloud sim examples. How can it be done?
State of the art of Security Solution for Data Transmission and Storage Management in Cloud Computing
I need to know what are the security issues related with HPC, and any proposed solutions are there?
Hi..
Good Day to all...
I read few articles presenting security threads associated with JTAG enabled PCB such as read-out secret data, modify state of authentic part, etc. I want to understand in-depth about any such attacks.
To understand the practicality of such attacks, i need a feedback from digital designers.
Please discuss any other kind of JTAG attacks and post relevant articles.
Thank you in advance.
What are the security issues possible in Multi Cloud based Disaster Recovery Service Model?
How can I validate/test Security as a Service (SECaaS) provider service to find vulnerabilities?
I would like to secure a particular host or system in WSNs to secure using IDSs.
Hello people,
how can i evaluate the security on IoT
Any suggestion, resource or comment will help
Thank you!
Augmented Reality technologies promise to enhance our perception of and interaction with the real world but what are some problems that might arise from these technologies?
I have used Boneh Shaw's concatenated scheme, but because of replication factor the code length is too long. So what can I do to minimize the length?
Botnets are fast becoming the next generation of Cyber-Terrorism...
Just pondering. What are some of the similarities and differences exhibited between these two types of networks?
I plan on publishing a review article on this discussion in a couple weeks time. So I'm looking for just 2 (two) collaborators / co-authors with research interest in this or related area to work with me on this research. Kindly indicate your interest here and we can begin work soonest.
Contributions and Answers to the question are however open for everyone. They would all go a long way in adding value to the research...
Thanks!
What are the recent advances in this area?
I am researching in the Australian Context
i am new in ns2. I want to implemnt Security in Routing for AODV in ns2. so plz suggest me how i perform it.?
I am pondering about the criticallity of the transaction BD87 as a singular transaction. In combination with WE19 you have the possibility to reprocess and resend successfull IDOCs, enabling fraud risk of false invoices. But what about using the BD87 alone. What security risks could arise?
The security seems to be a main defending point of RDBMS.
I am working on a symmetric key algorithm based program. I want to generate a key (e.g. AES) with a keyGenerator and store in a file (then put file into a folder). Then retrieve it from a client and a server programs.
This is not a real life scenario. In real life symmetric is exchanged between two parties and there is no third party to hold the key. But for my programming convenience, I want to run this in my host computer where I have set up two programs as client and server for demonstration purposes.
Can somebody give me a link or reference or can write a short reference program for this?