Science topic

Information Systems Security - Science topic

Explore the latest questions and answers in Information Systems Security, and find Information Systems Security experts.
Questions related to Information Systems Security
  • asked a question related to Information Systems Security
Question
1 answer
会议征稿:2024年计算机与信息安全国际会议 (WCCIS 2024)
Call for papers: Organized by Universiti Malaya, 2024 World Conference of Computer and Information Security(WCCIS 2024) will be held on 20-22 September 2024 in Malaysia.
Conference website(English):https://ais.cn/u/JnMNfa
重要信息
大会官网(投稿网址):https://ais.cn/u/JnMNfa
大会时间:2024年9月20-22日
大会地点:吉隆坡,马来西亚 | 中国郑州 双会场
收录类型:EI Compendex、Scopus
主办单位:马来亚大学、郑州大学公共安全研究院
会议详情
由马来亚大学主办,2024年计算机与信息安全国际会议 (WCCIS 2024) 将于2024年9月20-22日召开。会议将设置中国/马来西亚双会场。中国会场将在郑州举行;马来西亚会场将在吉隆坡召开。会议旨在为从事计算机与信息安全的专家学者、工程技术人员、技术研发人员提供一个共享科研成果和前沿技术,了解学术发展趋势,拓宽研究思路,加强学术研究和探讨,促进学术成果产业化合作的平台。
会议征稿主题(包括但不限于)
网络
访问控制
信息系统安全与管理
社交网络安全、隐私和信任
计算机网络与通信
信号和图像处理
信息安全算法与协议
嵌入式系统安全
通信工程
卫星通信
云与边缘计算安全
区块链安全与隐私
身份访问管理
网络物理系统安全
知识产权保护
智能信息处理技术
数据挖掘
数据可视化
图像处理
语音识别
信息技术在企业的应用
信号处理
智能通信与计算
数学与信息网络
数字媒体信息处理
卫星通信
无线通信
系统模型设计与信息管理
生物识别技术
嵌入式系统和软件
物联网信息安全
社交网络
物联网信息分析处理
......
出版信息
本会议投稿经过2-3位组委会专家严格审核之后,最终所录用的论文将由全球知名的科技出版社380220803174252410.png斯普林格旗下的Springer-LNICST(Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering), ISSN: 1867-822X 出版,出版后提交至EI Compendex,Scopus检索。
参会报名
1、投稿作者参会:投稿全文经审稿后文章被录用且完成注册,每篇文章由一名作者代表参会,在会议现场进行口头报告或海报展示。
2、报告者参会(无投稿):在会议上进行口头报告展示,口头报告摘要不提交出版。
3、海报参会(无投稿):在会议上进行论文海报展示,A1尺寸,彩色打印(具体要求咨询会议负责老师)。
4、听众参会(无投稿):出席并参加这次会议, 并可全程旁听会议所有展示与报告。
*参会报名方式:https://ais.cn/u/JnMNfa
Relevant answer
Answer
me bridaria mas infiormacion por favor
  • asked a question related to Information Systems Security
Question
11 answers
Please provide information which area will be good for doing Ph.D research in cyber security. Thanks
Relevant answer
Answer
As machine learning technology and generative artificial intelligence are increasingly being used by cyber criminals to improve cybercrime techniques, create new more effective types of viruses, malware to take control of smartphones, laptops, computers, etc. individuals, companies, enterprises, financial and/or public institutions targeted by cybercrime attacks then a good topic for a doctoral dissertation in the field of cyber security is to explore the current and potential possibilities of applying the now rapidly developing technology of machine learning, deep learning using multi-layer artificial neural networks and generative artificial intelligence to detect cybercrime attacks, situations of attempts to infect IT equipment, smartphones, etc. with malware, ransomware viruses, phishing techniques used, fake emails sent out by cyber criminals containing computer viruses created using artificial intelligence technology.
Perhaps in formulating a good, interesting, up-to-date, future-oriented topic for a dissertation, it may also help to read my article, in which I described the key issues of opportunities and threats to the development of artificial intelligence technology:
OPPORTUNITIES AND THREATS TO THE DEVELOPMENT OF ARTIFICIAL INTELLIGENCE APPLICATIONS AND THE NEED FOR NORMATIVE REGULATION OF THIS DEVELOPMENT
I invite you to join me in scientific cooperation on this issue,
Regards,
Dariusz Prokopowicz
  • asked a question related to Information Systems Security
Question
8 answers
COVID-19 has had a significant impact on the educational sector, resulting in a shift from face-to-face to a decentralized learning environment, creating a unique opportunity for network-based academic dishonesty. Prior research has shown that during the COVID-19 pandemic, students engaged in network-based academic dishonesty as a consequence of the breach of weak and legacy software programs that monitor network-based academic dishonesty.
Are the current mitigation techniques for preventing network-based academic dishonesty well-designed? What are your thoughts on the matter?
Relevant answer
Answer
Students' formal certification and graduation in cases of utilizing online learning fraud are obvious economic and moral crimes. Countries' laws should be corrected to take into consideration of this upcoming global trend. Yet, it's a sort of a fraud utilizing cybercrime methods, leading to criminalization of the entire educational process. That should be suppressed by all possible, available technical means.
  • asked a question related to Information Systems Security
Question
26 answers
According to a survey conducted by Sophos, 2020 was a tough year for education, with the sector experiencing the highest level of ransomware attacks of all industries. Ransomware attacks have been on the top list of dangerous threats to information systems for over a decade. The threats of ransomware attack do not seem to go away or rather slow down BUT seems to get more complicated.
Are the current mitigation techniques well designed to prevent the attacks? What are your thoughts?
Relevant answer
Very interesting question! I completely agree and support the opinion of dear colleagues Ljubomir Jacić, Doherty Odueko Funmilayo. Thank you!
  • asked a question related to Information Systems Security
Question
4 answers
SQL injections attacks have been on the number one list of dangerous threats to information systems for over a decade. The threats of an injection attack do not seem to go away or rather slow down BUT seems to get more complicated and more dangerous every time one is launched successfully.
Are the current mitigation techniques well crafted to halt the attacks or its high time new methods of protecting data in-situ are designed?
What do you think?
Relevant answer
Answer
What is the primary method of mitigating SQL injection attacks?
Option 1: Use of Prepared Statements (with Parameterized Queries) Option 2: Use of Stored Procedures. Option 3: Allow-list Input Validation. Option 4: Escaping All User Supplied Input.
SQL Injection attacks are unfortunately very common, and this is due to two factors:
  1. the significant prevalence of SQL Injection vulnerabilities, and
  2. the attractiveness of the target (i.e., the database typically contains all the interesting/critical data for your application).
It's somewhat shameful that there are so many successful SQL Injection attacks occurring, because it is EXTREMELY simple to avoid SQL Injection vulnerabilities in your code.
SQL Injection flaws are introduced when software developers create dynamic database queries that include user supplied input. To avoid SQL injection flaws is simple. Developers need to either: a) stop writing dynamic queries; and/or b) prevent user supplied input which contains malicious SQL from affecting the logic of the executed query.
Primary Defenses:
  • Option 1: Use of Prepared Statements (with Parameterized Queries)
  • Option 2: Use of Stored Procedures
  • Option 3: Allow-list Input Validation
  • Option 4: Escaping All User Supplied Input
Additional Defenses:
  • Also: Enforcing Least Privilege
  • Also: Performing Allow-list Input Validation as a Secondary Defense
  • asked a question related to Information Systems Security
Question
20 answers
Teresa,
I am very interested in your research. Can you tell me what aspect(s) of cyber security your research is addressing? Some that come to mind are: log monitoring, malware analysis and mitigation, incident, threat and mitigation sharing, attribution, heuristic based analysis, identifying anomalous behavior in people and software...
Sincerely,
Sandy Vaughan
Relevant answer
Answer
I am working on an access control model (authorization model) to facilitate healthcare information access management  in context of team collaboration,, towards "cross-border healthcare collaboration"
  • asked a question related to Information Systems Security
Question
8 answers
Concept implementation 
Relevant answer
Answer
Dear Manoharan,
The following thesis is dedicated to monitoring attackers who attack computer systems. The main tools used for the monitoring are high-interaction honeypots which are deployed within the network of Masaryk University.
  • asked a question related to Information Systems Security
Question
3 answers
Security risks that occur when storing petabytes of data into one cluster and how Hadoop ecosystem handles the threats from attackers.
Relevant answer
Answer
There are three areas to implement security in Hadoop via Authentication, Authorisation and Encryption
Authentication ensures only genuine user, service accesses cluster. Tools currently used are MIT Kerberos, AD, OpenLDAP etc.
Authorisation ensures what user and application can do with data. Tools currently used are Apache Sentry.
Encryption ensures data protection which comprises the protection of data from unauthorised access, at rest and in transit. Tools used for encryption at rest are Navigator Encrypt etc and for in transit can be implemented by enabling TLS/SSL
For more information on security architecture in Hadoop ecosystem visit the link [1].
Please note: Security tools used may be different based on the Hadoop distribution provider. I have given information based on latest CDH (Cloudera Distributed Hadoop)
Also, Hadoop Security by Ben Spivey & Joey Echeverria is a good read.
Good Luck!
Salim Hussain
Customer Operations Engineer, Cloudera
  • asked a question related to Information Systems Security
Question
1 answer
Suggest some algorithms/reference links
Relevant answer
Answer
Probably you would want to look up work of R K Shyamasundar, IIT Bombay/TIFR
  • asked a question related to Information Systems Security
Question
11 answers
Hey all
I am providing the scope of ISMS for an organization who has contract with us. We are going to test the feasibility before implementing ISMS. Does anyone have any idea about such an issue?
Thank you so much.
Relevant answer
Answer
Thanks so much Elisa and Nils.
Hope to be able to use your testsuite as soon as possible.
  • asked a question related to Information Systems Security
Question
3 answers
Suppose our TCP SYN packet goes directly to the attacker. Can he generate fake response (TCP SYN-ACK) packet and send it back to us?
Relevant answer
Answer
TCP itself does not authenticate the receiver in any way. If the attacker replies on your TCP SYN-SENT faster than the intended socket for connection, the connection will be established with the attacker instead. That is basically the way some sort of Man-In-The-Middle attacks work. If you remember the Yahoo-highjacking by NSA last year - this worked alike (in that case according to the press even with full TSL Auth.: looking for request to Yahoo, changing some DNS servers to impose to be the receiver (the fake server was physically nearer to the sender and thus faster responding), issue a flasificated TLS Cert making sure the false Cert was verified faster than an original one (as above), and highjacking the connecting therefore.)
From wikipedia:
TCP-Handshake
1. SYN-SENT → <SEQ=100><CTL=SYN> → SYN-RECEIVED
2. SYN/ACK-RECEIVED ← <SEQ=300><ACK=101><CTL=SYN,ACK> ← SYN/ACK-SENT
3. ACK-SENT → <SEQ=101><ACK=301><CTL=ACK> → ESTABLISHED
  • asked a question related to Information Systems Security
Question
2 answers
Until now, I reviewed many papers which talked about the security of chaos based ciphers, but until now I could not find the commercial use for chaotic based ciphers. Maybe it is currently still being researched?
Relevant answer
I am not aware whether Chaotic Security has been introduced in Commercial Applications.Probably it is introduced in Defence Applications. Vide item 1.
The application of it in Communication and Image Transmission are widely reported.
The following references, to mention a few are illustrative of its use.
Secure Image Ciphering based on the Mathematics of Chaos
Multi-Sensor Exploitation Branch
Information and Intelligence Exploitation Division
Information Directorate
Air Force Research Laboratory
Investigators; � Dr. Jiri Fridrich, Principal Investigator, SUNY Binghamton
� Mr. Richard Simard,Multi-Sensor Exploitation Branch, AFRL
Secure Image Ciphering based on the Mathematics of Chaos. Need for Secure and Efficient Use of Available Transmission Media Between Fixed and Deployed Locations to Transfer Time-Sensitive Data for Military & Commercial Applications.
Security Analysis of A Chaos-based Image Encryption Algorithm
Shiguo Lian, Jinsheng Sun, Zhiquan Wang
Department of Automation, Nanjing University of Science and Technology
Nanjing, Jiangsu 210094, P.R China
Information Security using Genetic Algorithm and Chaos
Anil Kumar, M. K. Ghose
Sikkim Manipal Institute of Technology, Sikkim (INDIA)
In this paper the Authors have proposed a new approach of genetic algorithms (GA) with pseudorandom sequence to encrypt data stream.
The feature of such an approach includes high data security and high feasibility for easy integration with commercial multimedia transmission applications. The experimental results of the proposed technique confirm that high throughput rate needed for real time data protection is achieved.
This total way of transferring secret information is highly safe and reliable. The simulation results have indicated that the encryption results are completely chaotic by the sense of sight,very sensitive to the parameter fluctuation.
In the future work, they are planning to design a sophisticated hardware based on this technique which will be targeted to use in highly secure multimedia data transmission applications.
P.S.
  • asked a question related to Information Systems Security
Question
5 answers
I need some recent A grade journal papers to start work in this field, please give me a reliable suggestion.
Relevant answer
Answer
i would propose one of my papers for you (the last recent one) check and we may find some idea to work together;
Am interested in public key cryptography and designing an effiecient Co-Processors for cryptographic algorithms (FPGA Design)
Check my papers on cryptography, am offering them here in my profile of Research Gate