Science topic
IT Security - Science topic
Explore the latest questions and answers in IT Security, and find IT Security experts.
Questions related to IT Security
These days VAS are playing important roles in mobile networks, so without their security nobody can rely on them. In these instances cryptography plays an important role in securing these issues. I want to know the best way to apply cryptography VAS. Also any references would be appreciated.
Non-repudiation is a legal term defined as protection against an individual falsely denying having performed a particular action. It provides the capability to determine whether a given individual took a specific action, such as created information, approved information or sent or received a message.
Social media platforms such as WhatsApp have a function which allows one to send a message to an individual or a group and DELETE the message from all the recipients leaving them with no evidence of what has been sent. This allows the sender to deny having sent such a message. Read-once messages which get destroyed upon being read can also be a breach of non-repudiation on Social Media platforms.
What is your view of these functions on social media platforms? Legally are they acceptable?
Does the development and implementation of new information technologies for banking affect the processes of improving the security of online banking systems?
Improvement of online banking security systems can currently be significantly determined, among others, by the implementation of new information technologies for banking.
Are the processes of improving internet banking security systems currently determined by the implementation of new information technologies, i.e. by implementing banking data processing technologies in Big Data database systems, Business Intelligence based analytics, implementation of Blockchain technology and artificial intelligence.
Do you think that the processes of improving internet banking security systems are currently determined by the implementation of new information technologies for banking?
Please reply
Best wishes

In my opinion, the information posted on social media portals are not 100 percent. safe.
There have been cases of hacking and stealing information from thousands of records, user profiles of these portals.
In addition, there are developed techniques for building programs that read information from commentators entered into thousands of profiles of social media portals.
Then this information is a research material for the sentiment analyzes carried out, i.e. analyzes of opinions prevailing among users of these portals on specific companies, brands, products and services.
Do you agree with my opinion?
Please reply
Best wishes

Assume that I have a directory with a lot of research papers in PDF form with only meaningless filenames. Is there a tool that will automatically rename these papers with the correct title and maybe conference?
In my opinion, sensitive personal data concerning individual users who set up profiles, collected on social media portals, are not fully secure. This is confirmed by the occurrence of data leaks, data theft by cybercriminals.
In connection with the above, the issue of information security on the Internet is becoming an increasingly global problem and therefore, in the global approach, institutions and security systems for the transfer of information on the Internet should be developed. The security of information on the Internet can refer to many aspects of data security both at the level of central state institutions and international organizations as well as the security of personal data of individual citizens, sensitive data of citizens collected on various websites, including social media portals.
The improvement of risk management and information security systems at the supranational level is also a key issue. Technological companies managing social media portals on the one hand try to improve data security systems about users setting up accounts on social media portals. On the other hand, it is also important to cooperate with key, central data security institutions on the Internet that operate transnational. This is important from the point of view of improving information security systems on the Internet in order to limit the possibility of using social media portals by cybercriminals operating transnational, using various social engineering techniques.
Please, answer, comments.
I invite you to the discussion.
Best wishes

In some countries, rumors of cybercriminals with Ransomware are reportedly again being reported again. These viruses spread via e-mails, which automatically send themselves out from infected e-mail accounts and send out infected e-mails to all e-mail contacts of a virus mailbox infected with the virus. The virus is very dangerous because after opening a fake e-mail, the virus installs deeply into the computer and encrypts access to the disks by blocking access to the contents of the disks. I wrote scientific publications on this subject.
In view of the above, I am asking you the following question: Are cybercriminals now attacking personal and corporate computers using Ransomware viruses again?
Please reply. I invite you to the discussion

What kind of scientific research dominate in the field of Cybercrime and the security of online banking?
Please, provide your suggestions for a question, problem or research thesis in the issues: Cybercrime and the security of online banking.
Please reply.
I invite you to the discussion
Best wishes

In connection with the development of cybercrime, should the surveillance of citizens by national security services be developed, expanded, increased?
To what extent can the developed range of citizens' surveillance be improved as part of the improvement of national cyber security systems?
As part of the improvement of cyber security systems, should the services for combating cybercrime be able to surveillance the entire activity of citizens on the Internet?
Are legal norms regulating the issues of cyber security, services for combating cybercrime and data security gathered in Big Data database systems of large online technology companies fully adapted to the rapidly growing ICT and Internet technology?
Please reply
Best wishes

What currently dominate and are the standards and instruments for ensuring the security of data transfer and analysis in Big Data database systems developed?
Please reply
Best wishes

Is the security of information collected in social media portals databases currently one of the key determinants of the development of new online media?
Security of social media portals is currently one of the most important topics of social media portals and other new internet media and information services. Therefore, scientists at various universities are involved in researching this issue. Therefore, security tools for information collected in social media portals databases and data security systems on the Internet are being developed. In companies and key public institutions, systems for risk management of information systems and information transfer on the Internet are also developed.
Do you agree with me on the above matter?
In the context of the above issues, the following question is valid:
Is the security of information collected in social media portals databases currently one of the key determinants of the development of new online media?
Please reply
I invite you to the discussion
Thank you very much
I also conduct research in this matter. I am researching the security of social media portals in connection with Big Data database technology. Below are links to my publications:
I invite you to discussion and cooperation.
Thank you very much
Best wishes

Considering the specifics of the increasingly common IT systems and computerized advanced data processing in Internet information systems, connected to the internet database systems, data processing in the cloud, the increasingly common use of the Internet of Things etc., the following question arises:
What do you think about the security of information processing in Big Data database systems?
Please reply
Best wishes

Are fishing, malware (spyware, trojans, ransomware, keyloggers, ...) sending cybercriminals false e-mails with links to fake websites or viruses reading passwords for online banking accounts or other techniques used by cybercriminals as the most dangerous?
Please reply
Best wishes

Hello everybody.
Is gns3 simulator support internet of things? if I want do architectural protocols, energy consumption, security?
thanks
What do you think about the following questions:
Please kindly share your ideas.
Thank you.
- How will Japan train displaced workers for a new type of society?
- How will Society 5.0 provide care for an aging population?
- How will Japan get people to completely rethink the meaning of work?
- How will Japan create a framework for Big Data sharing and security?
- What are the pros and cons of Smart contracts?
- What are the latest technologies and tools?
- What do you like and/or dislike about smart contracts?
It's an open discussion to help improve our understand of future technologies. You are welcome to share your opinions and experience.
This title might not be very clear, let me elaborate :
Let's say, you're a computer scientist on your browser. You innocently browse the web, looking for a new book about procrastination (or anything else). Suddenly, a click lead you to the homepage of EvilCorpWorld, a (fictional) company incarnating the opposite of your ethical views.
EvilCorpWorld isn't a "common evildoer", they blatantly make the world a worst place. According to your ethical views, they could be enslaving children, selling weapons to warlords, practicing tax fraud at country scale, they support network promoting racism and sexism...
On the homepage of EvilCorpWorld, you inadvertently notice a big security flaw. Something like "click here for rootshell (Admin only!)". For the sake of simplicity, let's say it's an actual flaw, not a honeypot or anything else.
Now you have three possibility :
- to tell : email EvilCorpWorld to warn them about the huge flaw.
- to poke : like with a stick, poke the flaw, trying to see how far you can get. Poking does not mix with wrongdoing on purpose or for benefit. It's more a playful activity.
- to delegate : unsure of what to do, asking someone more versed in infosec what they think
What would be the most ethical-wise thing to do (maybe something other than three options)?
Will the use of Blockchain technology improve the security of information transfer on the Internet? Will the development of Blockchain technologies reduce the scale of cybercrime on the Internet?
Please, answer, comments.
I invite you to the discussion.
Best wishes

I try to connect a Bluetooth device to several android apps. I want to use the same long term key(LTK) for all apps (AES256) and derive session keys from that LTK in each app to establish a secure communication tunnel. I use shared preference in private mode which allows the apps with the same bundle ID to access the same data, but unfortunately, the shared preference is not secure enough and the data is also available for other root access level requests. I am using the Android Keystore to storing the LTK, but I need to improve the solution for two scenarios: 1. Apps with the same bundle ID. and 2. Apps with the different bundle IDs using the same SDK.
I am looking for a secure way to store the LTK in the android device which is accessible by those specific apps.
Is there a solution similar to the Apple keychain available for Android now? (I think the Android key chain works differently. I prefer a solution like the Apple key chain to transfer the security trustworthy and challenges to the OS level.) OR, should I use shared preference and secure it by myself? In this regard, if I should use Android Keystore to generate and store that LTK, is the Android Keystore allow me to access the same key from different apps with different bundle IDs? please describe the different options and limitations.
Currently, various data security tools are used in Big Data database systems. The basic principle is the parallel use of several types of IT security and compliance with specific procedures for analyzing and securing systems against potential materialization of operational risks, including technical risks associated with used computer hardware and specific database technologies and personnel risks associated with employees who support these systems.
The key issue is also whether built database systems are directly connected to the Internet online or are not permanently connected to the Internet and certain data from the Internet are added from time to time to Big Data databases after their analysis by anti-virus software, detecting malware worms, such as keyloggers and other malicious software created by cybercriminals and used to steal information from database systems of data warehouses and Big Data.
In a situation when Big Data database systems or other systems where important information is collected are connected to the Internet online, then the information sent should be encrypted, and system gateways connecting the Big Data database with the Internet should be equipped with a good firewall and other filtering security incoming information. If the employees operating the Big Data database system use certain e-mailboxes, they should be only company mailboxes and verified from the security side of data transfer on the Internet. The company should have strict security procedures for using e-mail boxes, because in recent years via e-mails cybercriminals have sent ransomware programs hidden in e-mail attachments, used to encrypt hard disks used in company and server databases.
Do you agree with me on the above matter?
In the context of the above issues, I am asking you the following question:
How should Big Data database systems be protected against the activities of cybercriminals? What types of programs and systems for securing Big Data databases against cybercrime are currently used? What other types of security instruments for Big Data database systems are currently used?
Please reply
I invite you to the discussion
Thank you very much
Best wishes

In my opinion, interesting questions and research thesis may concern the following issues:
Are fishing, malware (spyware, trojans, ransomware, keyloggers, ...) sending cybercriminals false e-mails with links to fake websites or viruses reading passwords for online banking accounts or other techniques used by cybercriminals as the most dangerous?
Some users use antivirus software, farewall, precautionary methods in using e-mail, etc., but this has not prevented, for example, attacks from cybercriminals using ransomware that encrypt and block access to disks on the computer.
In connection with the above, the techniques of data transfer security at the Interenet are constantly improved.
IT tools are being developed and improved, including antivirus software to protect a computer, laptop, tablet or smartphone against cybercrime and viruses sent, for example, in e-mails by hackers?
In view of the above, I am asking you the following question:
What are the new trends in research on cybercrime?
Please reply
Best wishes

If I have an alghoritm that outputs pseudorandom bits, is possible to distinguish strings computed with different seeds?
In connection with the development of cybercrime on the Internet, the security systems for transfer and processing of data, financial transactions, electronic banking, etc. carried out on the Internet are improved. In addition to electronic banking, the key information security in the internal IT systems of central state institutions is protected. Cybercriminal attacks on cyber-banking systems and hacker attacks aimed at companies to extort ransom for decrypting data encrypted by computer viruses on disks (cybercriminal ransomware attacks) and hack attacks from abroad on key central institutions, ministries and other institutions of the public administration sector and enterprises of strategic branches of the national economy.
In connection with the above, I am asking you:
Do you think, for security reasons, everything that happens on the Internet should be analyzed by the public security services?
Please answer
Best wishes

Hi,
As per the definition of logic obfuscation, obfuscated circuit stays in obfuscated mode upon global reset (i.e. initial state) and generates incorrect output; upon receiving correct initialization sequence it enters into functional mode and generates intended outputs.
This is fine with respect to the design that does not connected with any further critical systems. If at all, the obfuscated logic needs to be connected to further safety critical systems, won't incorrect value generated in obfuscated mode affects the critical systems??
In such case, how to apply logic obfuscation??
Thanks in advance.
The employment of machine learning in security field is higly emarged in the current era. But, yet, did the researchers in security field utilize from it in 100% detection or protection from one or multiple kind of malwares ? Or do you forsee that malwares ( or specific malware type, like ransomware or trojan or ... ) will be obsolete due to the successful analysis of their behavior (Dynamic or static ?) by machine learning algorithims ?
Excited to read your views.
(Resources that support your opinions will be much supportive!)
Unfortunately, despite the assurances of companies that run social media portals, the information contained on these websites is not always fully secured against the activities of cybercriminals.
In addition, the issue of downloading data from social media portals by large companies to Big Data database systems should be added in order to process them for marketing purposes.
The issue of privacy in social media is very important and is related to the security of personal information. Privacy is at risk in terms of information posted on social media portals.
Please reply. I invite you to the discussion
Dear Friends and Colleagues of RG
The problems of the analysis of information contained on social media portals for marketing purposes are described in the publication:
I invite you to discussion and cooperation.
Best wishes

Antivirus programs signal this, but are the new attacks appearing, or maybe the companies that produce antivirus software use this kind of alerts mainly to stimulate consumers to buy these applications?
Is the information about the growing threat from the activities of cybercriminals also partly a result of marketing activities of antivirus software vendors?
Cybercriminal attacks involving various types of viruses occur on a daily basis in various places around the globe.
However, large-scale attacks on the global scale and publicized in the media are probably much rarer.
An example was the type of cybercriminals, which was carried out on a large scale in mid-2017, which was mainly targeted at large public and financial institutions and corporations operating in Ukraine, but quickly spread over the world through capital and business links between companies.
Then ransomware viruses known only often in the environments of security specialists, among computer scientists analyzing cybercriminal attacks, has been publicized in the media in many countries and has become a global and public problem.
In this situation, sales revenues and profits of companies producing antivirus software are growing significantly.
Recently, some of these antivirus programs inform that the threat of cybercriminal attacks involving ransomware is growing.
Is it a real increase in the risk of cybercrime or a new form of marketing for companies that produce antivirus software?
Or both?
Please, answer, comments. I invite you to the discussion.
"Completely Automated Public Turing test to tell Computers and Humans Apart" (CAPTCHA) [1][2] are used e.g. to prevent bots from utilizing special web based services for spam and unwanted access. To circumvent this, botmasters take profit from human intelligence by paying people from developing countries for solving CAPTCHAs [3], in order to reach the target service.
Considering this, do you think that it is still reasonable to improve and use CAPTCHAs?
[1] U.S. Patent 6,195,698. Method for selectively restricting access to computer systems. Filed on Apr 13, 1998 and granted on Feb 27, 2001. Available at http://www.google.com/patents/US6195698 .
[2] Ahn, Luis von; Blum, Manuel; Hopper, Nicholas J.; Langford, John (2003). "CAPTCHA: Using Hard AI Problems for Security". Advances in Cryptology — EUROCRYPT 2003. Lecture Notes in Computer Science 2656. pp. 294–311.
Security is a main concern of WSN, and there are high chances of getting heterogeneous sensor nodes in a network, is maximum security achievable in heterogeneous sensor network? Because, each heterogeneous node has its own security technique.
Does anyone have experience with FIREMAN toolkit. I need to know how to install it, and how to use it to analyse the efficiency of my firewall?
Or, what tools you using to analyse and test the efficiency of your Firewall?
assume for example a crypto system aim to generate a cipher message with exactly the same size of its plain text and also be stateless to be able to decrypt out of order received packets. Of course this crypto system expose some information about the message attributes however if we sacrifice this level of security but not more, is any crypto system that address such issue?
There are various algorithm to generate the keys in Public Cryptosystem, e.g., Diffie-Hellman Key Exchange is very popular algorithm to generate and distribute the shared secret keys between two parties. However, I am interested to generate the shared key with the involvement session ID or number by Diffie-Hellman Key Exchange. What are different mechanism to perform these things.
Any alternative are also most welcome.
As an example, is the method getActualCPUtime() used to determine the response time for a VM?
security gaps in IOV?
future research in IOV regarding security?
previous research in IOV regarding security?
I am interested in the period of 1980s-1985....
1. how were crime scenes secured
2. what search patterns were used
3. how evidence was collected
Hi everyone. I want to know the current research issues (areas) in Security in WSNs. I am specifically looking at DOS attack at the various layers of WSNs or Intrution Detection in WSNs. All suggestions are welcomed.
Thank you.
I’m planning to provide a dual security for data stored on the cloud. I read about various methods for encrypting and decryption algorithm but i can't get conclude which one is better for cloud security I would like some advice about recommended techniques. I’m really looking to find out what you’d consider to be the most efficient method as cost and time are limiting factors.
In healthcare, doctors can not decide on what appropriate information (EHRs) is really needed for treatment of a patient case. The amount of information needed by healthcare providers to complete their tasks may vary greatly. The number of medical records a healthcare provider needs to access over a certain period of time depends on many factors, including the number of patients he/she serves, the case he/she working on, and so on. Also, such factors vary among healthcare providers and may change from time to time. It is thus very hard to determine how much risk we should tolerate for a healthcare provider, if a healthcare provider believes knowing more information that is relevant to her patient's conditions enables her to make better decisions. Here, The problems of insiders such as abuse or misuse of privileges granted by authorization services are increased and would be hard to detect .
If we say that, medical records classification is infeasible and requires a great deal of effort and skills to accomplish. How can we assess the risk if the medical records are not classified and we do not know who should access what? ???
Research trends within Enhancement Security of Cognitive radio network
Threat modeling is an important activity to identify threats at the design phase. Are there any other methods to identify threats in the design phase?
How to evaluate the security of a computer system ? Is there a framework that is currently used as a standard for measuring computer security ?
What are the current security threats and vulnerabilities cloud users such as organizations and companies are facing? could you suggest me research papers, reports or documents related with the question?
I would like permission to post a survey questionnaire on this group. My survey is based on my Project Dissertation "The security implication of Mobile devices to organisations". My research will require me to do a survey in regards to security and organisations and I hoping this platform will give me access to IT professionals like you and their views concerning BYOD and IT security. I believe that my survey results will also be beneficial to everyone in this group as well. https://strathsci.qualtrics.com/SE/?SID=SV_9ZXJ4zjGI2tkHEF
Am trying to get another tool that I can use to test for Security and Vulnerability issues in Mobile Cloud Computing so i could verify the data I already have ?
ECC ( Elliptic Curve Cryptography) can be implemented in different methods, it is more complex than RSA. In addition, its discrete logarithm problem is more difficult to break than the factorization. The researchers have tried to attack ECC, but it is infeasible using the computational resources.
In present, the security strength of ECC is stronger than other public key cryptosystems.
Any help will be the great appreciation. Thanks.
Specifically on physical layer and MAC layer attacks.
Although the location of eavedropper is random, in my work assumed the direct link between the sourse and the eavesdropper unavailable , if you are the reviewer of this paper, are you agree with this simplify system model?
I'm doing some research on the explosive characteristic of fountain codes,which means the original symbols can be decoded suddenly when the receiver gets some key symbols. I do think this feature can be used in the problem of physical layer security, in which the legitimate user can get enough encoded symbols before eavesdroppers,and finishes decoding firstly. I'm now focusing on how to enhance the explosive characteristic. I will really appreciate it that someone can give me some suggestions.
How much power does the encrypted packet consume comparing to unencrypted packet?
I know it depends on the encryption algorithm, but you may mention the type of encryption alongside with the power consumption. What I would like to know is both the power consumed by an unencrypted packet and an encrypted packet. so I can make comparison.
I went through many papers to figure this out, but they just mention the power consumed by encryption without mentioning how much the unencrypted packet consume ?
I need to know weather the encryption add significant overhead to the overall consumption, either symmetric or asymmetric , and might the only way is to compare the power consumed with and without encryption in numbers.
Thank you so much guys for your cooperation in advance.
Sometimes it is necessary to use tools for hack (testing) or discover vulnerabilities and resolving security vulnerabilities in the system of institutions by using attacker tools :
- Kali Linux
- Backtrack
- Pentoo
- Nodezero
- Network Security Toolkit (NST)
- Parrot Security
- BackBox Linux
- GnackTrack
- Bugtraq
etc..
I have come up with idea of implementing Data hiding in panorama videos in order to gain more data hiding capacity and security while maintaining a sufficient quality of videos. Are there any challenges related to this proposed idea and where to find background information on this topic.
Regards,
Satwinder Singh
Hello,
I am trying to find different case studies that could be used for learnng different information security and privacy (IS&P) concepts, issues, approaches to deal with different IS&P threats. Although I am more interested in case studies focused on human element in information security, however, case studies focusing other aspects of IS&P are also of interest.
In some cases, "scenarios" and "case-based learning" are also used for this kind of teaching or learning.
I myself am searching but if someone already is aware of some resources, it will be really helpful.
Thanks,
Ali
Generally, the notion of military leadership is connected with leading people in a battle and therefore belongs to the moral component of fighting power. Or, as Liddell Hart says "a commander should have a profound understanding of human nature, the knack of smoothing out troubles, the power of winning affection while communicating energy, and the capacity for ruthless determination when required by circumstances. He needs to generate an electrifying current, and keep a cool head in applying it." On the other hand, security environment has changed (more complex, uncertain) and the military integrates more with other governmental ministries and agencies in order to provide security. The imperative for the military organization is to be more agile, responsive, adaptable and innovative. In that sense it seems that (the highest) military leadership's qualities needs to be expanded to encompass ability to transform the organization (even the culture). How does it fit in the developmental theory? (ref. Susanne Cook-Greuter, WIlliam Torbert, Ken WIlber)
I am a teacher of the network security,and a engineer of a network and Information system manager, I am afraid that I cannot solve all the security of my work, and want to build a wall of guard of network and system, and want to study the security theory , and want to study the data mining,but I don't know how I start. Can you help me? Thank you.
Otherwise ,my English is poor,
I'm looking for a place to potentially host an online discussion space for 40-50 users, would need to be secure and ideally professional looking. Does anyone know of literature for this type of data collection, also? Thanks
What are the problems that are being caused by computer systems?
I would like to start a simulation between two nodes using different types of encryption, and I am confused between Omnet++, Castalia and NS3. I don't know which one of them support encryption and other security features required by WSNs. Could you please share your experience in this mattaer.
Many thanx.
I have proposed a forensic model, i want to get a rough idea how i can do the following:
1. Prove the correctness
2. check the correctness
3. Evaluate the model processes
I am working in the field of designing and obtaining the best security algorithm for particular environment. It would be very helpful for me if I can get access to some data set or source from where I can retrieve security algorithm details. The detail I require is different Cryptography algorithm prevents which attacks.
Symmetric and Asymmetric both with conventional and hybrid algorithms. I am working on cloud storage as a service part, so need to secure the database, interaction with database and customer environment to build customer trust in cloud.
From where can I get data related to attacks prevented by major Cryptography algorithms? Is their any data set available?
Hi,
I need a privacy meter to secure personal data. For this I need to find threshold value,so that I can find all the entities which are below threshold are safe. Other entities which are above threshold values are unsafe.
Can anyone provide some formulas and methods to find how to mitigate privacy risk for a large amount of personal data.
Planning to work on project on VANET Security or something familiar, what should I include. Actually looking for an idea to work on. Need suggestions. Thanks
What are the current threats that occur in organizations using hadoop? If there are threats, what are they?