Science topic
Internet Security - Science topic
Explore the latest questions and answers in Internet Security, and find Internet Security experts.
Questions related to Internet Security
While Linux has its own bits of share in other things of daily life including software development, internet security, server and data analytics; why does it lags behind in academics and research especially in biological sciences despite of having financial advantage?
Does the development and implementation of new information technologies for banking affect the processes of improving the security of online banking systems?
Improvement of online banking security systems can currently be significantly determined, among others, by the implementation of new information technologies for banking.
Are the processes of improving internet banking security systems currently determined by the implementation of new information technologies, i.e. by implementing banking data processing technologies in Big Data database systems, Business Intelligence based analytics, implementation of Blockchain technology and artificial intelligence.
Do you think that the processes of improving internet banking security systems are currently determined by the implementation of new information technologies for banking?
Please reply
Best wishes
I found AVISPA (Automated Validation of Internet Security Protocols and Applications) http://www.avispa-project.org/ for the analysis of Internet security-sensitive protocols. However, it is not recently updated (2007). Could please tell me the name of the free tools for testing security-sensitive protocols?
I want to apply a privacy-preserving algorithm in MQTT for IoT devices. Which tool do you suggest to simulate this algorithm? I want to measure the performance on the IoT battery device? Actually, I found many ways such as Matlab, Netsim, MIMIC MQTT, python, and Contiki cooja, but I'm not sure which simulation software is best suited for this? Could you give me a suggestion about the best environment?
I am attempting to gather information regarding my project for my Internet Security class which is "How to take down a TOR website without the owners permission"? Most of the information that I have come across leads to DDOS. Can you please lend your assistance if possible?
What is the best solution at Gateway between the Internet (Public) and the Intranet (Vast LAN/VLAN (Private)) for the intruder detection, drop or deny, stopping spam emails and viruses/malwares, protect from exploiting vulnerabilities, flood a targets in application and communication protocol etc. and a best monitoring, evaluation and analysis tool for the better safeguard. Normally we intend to implement either a software or hardware firewall which enforces a set security policies that needs to be fine-tuned according to the recent advancement and race.
We can take all possible measures for the security of databases servers, web servers, systems servers with a set of inbuilt security mechanism and secure travel of transactions over the net based on encryption & VPN as choices are available.
ACeS 2019 respectfully asks scholars and experts in Cybersecurity and related areas to consider being a member of the Technical Program Committee. If you are interested or if you have someone to recommend, please send CV to aces@usm.my with the Subject "TPC Member". We will have each CV reviewed and select most suitable ones for ACeS 2019.
TPC member’s name, affiliation and country will be shown on the conference site (aces.usm.my) and in the proceedings for ACeS 2019 as well.
In connection with the development of cybercrime on the Internet, the security systems for transfer and processing of data, financial transactions, electronic banking, etc. carried out on the Internet are improved. In addition to electronic banking, the key information security in the internal IT systems of central state institutions is protected. Cybercriminal attacks on cyber-banking systems and hacker attacks aimed at companies to extort ransom for decrypting data encrypted by computer viruses on disks (cybercriminal ransomware attacks) and hack attacks from abroad on key central institutions, ministries and other institutions of the public administration sector and enterprises of strategic branches of the national economy.
In connection with the above, I am asking you:
Do you think, for security reasons, everything that happens on the Internet should be analyzed by the public security services?
Please answer
Best wishes
I want to compare age wise cyber crime between USA and Japan. However, I could not find similar data for both countries. I got data from US related to number and loss due to cyber crime age wise. For Japan, I got the data (survey) about internet security (such as financial loss, virus infection etc).
Is there any method or software that can analyse these two data?
Botnets are some of the most serious threats to Internet security?
Can anyone suggest some link, which provides all the details regarding AVISPA( Automated Validation of Internet Security Protocols and Applications) tool and its generated outputs?
There are various algorithm to generate the keys in Public Cryptosystem, e.g., Diffie-Hellman Key Exchange is very popular algorithm to generate and distribute the shared secret keys between two parties. However, I am interested to generate the shared key with the involvement session ID or number by Diffie-Hellman Key Exchange. What are different mechanism to perform these things.
Any alternative are also most welcome.
PKI guarantees that a machine is who it says it is through 3 party system? What about processes on the same machine. I want to validate that a signed or encrypted message came from a specific process.
Cloud users, corporations have their own security policy but it is very difficult to have an effective security policy, so what are the challenges cloud users faces in defining an effective security policy model? And what are the existing solutions to handle the challenges?
is there any idea of internet of things security to work with it as a paper?
After reading some papers, I found many papers skip the detail of making IDS, instead, directly go to evaluation part.
Can anyone give me some hints about how to build a host based light weight IDS for detecting VM escape? Good references?
Thank you very much!
How can organization monitor their CSP and provide assurance to relevant stake holders that privacy requirement are met when their PII( personally identifiable information) in the cloud?
How privacy issues can be addressed in the context of cloud computing policy?
Suppose I have made a IDS (Intrusion Detection System), For example using KDD CUP99 I have made a system and I have done the test and evaluation and the result is acceptable. Now, I want to evaluate my proposed system on real online traffic . I can capture the packet using PCAP, I can extract the features and detect is it normal and anomaly. BTW, my problem is how can evaluate the output, because there is no ground file for that traffic. How can evaluate my system on real traffic? may be during the testing all the traffic in normal how can evaluate the performance of system on abnormal traffic? I think I have to make some abnormal traffic and test the system using my own abnormal traffic, Does this idea is correct and how should I make abnormal traffic?
I have downloaded some tools from these links: http://www.acunetix.com/download-8991-2/
but I'm not able to generate reports from these free trial tools.
user can request for any website and phishing page then direclty move on orignal page
latest cloud computing security issues to do my resaerch
I am developing a security features for a system, there i have to prevent port knocking from other machine and allow only the authenticated users in my machine...?. Is it possible....
Dear researchers,
Can I use the version academic for simulate my new IDS?
For an almost finished book I'm always looking for computer crime cases in the Netherlands and Flanders. Since I have to do with poor statistics from government and software vendors I prefer real cases and people telling about they were stonewalled or helped by the authorities.
What are the importance of image steganography as data security on the internet?
I am seeking help from anyone to suggest me any experts in internet security and intrusion detection in internet traffic for reference.
If it is on internet it is not private!!!
I am using KDD cup 99 dataset in classifying network intrusions and normal data. So, I am just wondering is my system considered anomaly-based IDS or signature-based IDS?
If possible, suggest me the web site names which have daily updates about cloud security.