159 research outputs found

    Literature based Cyber Security Topics: Handbook

    Get PDF
    Cyber security is the practice of protecting systems, networks, and programs from digital attacks. These cyber attacks are usually aimed at accessing, changing, or destroying sensitive information; extorting money from users; or interrupting normal business processes. Cloud computing has emerged from the legacy data centres. Consequently, threats applicable in legacy system are equally applicable to cloud computing along with emerging new threats that plague only the cloud systems. Traditionally the data centres were hosted on-premises. Hence, control over the data was comparatively easier than handling a cloud system which is borderless and ubiquitous. Threats due to multi-tenancy, access from anywhere, control of cloud, etc. are some examples of why cloud security becomes important. Considering the significance of cloud security, this work is an attempt to understand the existing cloud service and deployment models, and the major threat factors to cloud security that may be critical in cloud environment. It also highlights various methods employed by the attackers to cause the damage. Cyber-attacks are highlighted as well. This work will be profoundly helpful to the industry and researchers in understanding the various cloud specific cyber-attack and enable them to evolve the strategy to counter them more effectively

    Artificial Intelligence based Anomaly Detection of Energy Consumption in Buildings: A Review, Current Trends and New Perspectives

    Get PDF
    Enormous amounts of data are being produced everyday by sub-meters and smart sensors installed in residential buildings. If leveraged properly, that data could assist end-users, energy producers and utility companies in detecting anomalous power consumption and understanding the causes of each anomaly. Therefore, anomaly detection could stop a minor problem becoming overwhelming. Moreover, it will aid in better decision-making to reduce wasted energy and promote sustainable and energy efficient behavior. In this regard, this paper is an in-depth review of existing anomaly detection frameworks for building energy consumption based on artificial intelligence. Specifically, an extensive survey is presented, in which a comprehensive taxonomy is introduced to classify existing algorithms based on different modules and parameters adopted, such as machine learning algorithms, feature extraction approaches, anomaly detection levels, computing platforms and application scenarios. To the best of the authors' knowledge, this is the first review article that discusses anomaly detection in building energy consumption. Moving forward, important findings along with domain-specific problems, difficulties and challenges that remain unresolved are thoroughly discussed, including the absence of: (i) precise definitions of anomalous power consumption, (ii) annotated datasets, (iii) unified metrics to assess the performance of existing solutions, (iv) platforms for reproducibility and (v) privacy-preservation. Following, insights about current research trends are discussed to widen the applications and effectiveness of the anomaly detection technology before deriving future directions attracting significant attention. This article serves as a comprehensive reference to understand the current technological progress in anomaly detection of energy consumption based on artificial intelligence.Comment: 11 Figures, 3 Table

    Overcoming Data Breaches and Human Factors in Minimizing Threats to Cyber-Security Ecosystems

    Get PDF
    This mixed-methods study focused on the internal human factors responsible for data breaches that could cause adverse impacts on organizations. Based on the Swiss cheese theory, the study was designed to examine preventative measures that managers could implement to minimize potential data breaches resulting from internal employees\u27 behaviors. The purpose of this study was to provide insight to managers about developing strategies that could prevent data breaches from cyber-threats by focusing on the specific internal human factors responsible for data breaches, the root causes, and the preventive measures that could minimize threats from internal employees. Data were collected from 10 managers and 12 employees from the business sector, and 5 government managers in Ivory Coast, Africa. The mixed methodology focused on the why and who using the phenomenological approach, consisting of a survey, face-to-face interviews using open-ended questions, and a questionnaire to extract the experiences and perceptions of the participants about preventing the adverse consequences from cyber-threats. The results indicated the importance of top managers to be committed to a coordinated, continuous effort throughout the organization to ensure cyber security awareness, training, and compliance of security policies and procedures, as well as implementing and upgrading software designed to detect and prevent data breaches both internally and externally. The findings of this study could contribute to social change by educating managers about preventing data breaches who in turn may implement information accessibility without retribution. Protecting confidential data is a major concern because one data breach could impact many people as well as jeopardize the viability of the entire organization

    Organised crime in Australia 2015

    Get PDF
    Provides the context in which organised crime operates in Australia and gives an overview of each of the key illicit markets and the activities which fundamentally enable serious and organised crime. Summary The Organised Crime in Australia 2015 report provides the most comprehensive contemporary profile of serious and organised crime in Australia. The report provides the context in which organised crime operates in Australia and gives an overview of each of the key illicit markets and the activities which fundamentally enable serious and organised crime. The report provides government, industry and the public with information they need to better respond to the threat of organised crime, now and into the future. Organised Crime in Australia is an unclassified version of the Australian Crime Commission’s Organised Crime Threat Assessment (OCTA) which is part of the Picture of Criminality in Australia suite of products. The OCTA is a classified assessment of the level of risk posed by various organised crime threats, categorised by activity, market and enabler

    Enforceability of electronic contracts in Australia

    Get PDF
    Electronic contracts must be legally enforceable and certain like traditional contracts, to establish a similar legal framework in an electronic environment. The Electronic Transaction Legislation of Australia has made an attempt to strengthen legal certainty of electronic framework while ensuring law keeps pace with technological development. Despite this, the enforceability of electronic contracts is not as certain and predictable as those of traditional paper-based contracts. These problems arise due to regulatory deficiencies. Different approaches to address this issue have been adopted by jurisdictions such as the United States (US) and the United Kingdom (UK); however, the issue has not been adequately resolved in these jurisdictions. At the international level, various organisations such as the United Nations Commission on International Trade Law (UNCITRAL), the Organisation for Economic Co-operation and Development (OECD), the International Chamber of Commerce (ICC) and are working in close cooperation to resolve uncertainty surrounding electronic contracts. International developments also present the same deficiencies as are present at the national level. This thesis examines the current laws and reviews how international norms emerged and continue to resolve the issues

    An Approach to Guide Users Towards Less Revealing Internet Browsers

    Get PDF
    When browsing the Internet, HTTP headers enable both clients and servers send extra data in their requests or responses such as the User-Agent string. This string contains information related to the sender’s device, browser, and operating system. Previous research has shown that there are numerous privacy and security risks result from exposing sensitive information in the User-Agent string. For example, it enables device and browser fingerprinting and user tracking and identification. Our large analysis of thousands of User-Agent strings shows that browsers differ tremendously in the amount of information they include in their User-Agent strings. As such, our work aims at guiding users towards using less exposing browsers. In doing so, we propose to assign an exposure score to browsers based on the information they expose and vulnerability records. Thus, our contribution in this work is as follows: first, provide a full implementation that is ready to be deployed and used by users. Second, conduct a user study to identify the effectiveness and limitations of our proposed approach. Our implementation is based on using more than 52 thousand unique browsers. Our performance and validation analysis show that our solution is accurate and efficient. The source code and data set are publicly available and the solution has been deployed

    Cybercrimes and the Rule of Law in West-Africa: The Republic of Cote d’Ivoire as a Case-Study.

    Get PDF
    Since becoming independent nations in the 60s, West-African countries have enacted laws and regulations with the goals of ensuring peace and justice within their respective borders. On the paper, there was no difference between the justice systems of those newly independent nations and the justice systems of their former masters. Unfortunately, the rule of law in West-African nations since gaining independence, has not always been followed for a myriad of social, cultural, political, and economic reasons. Most justice systems in West-Africa including in Cote d’Ivoire are deeply corrupted, thus rendering the goal of a peaceful society through a fair justice system mute. With the emergence of a new type of crimes taking place in cyberspace, there has been a logical need to enact new laws to protect the public using the added information and communication technologies (ICT). Over the past few years, multiple cyber-legislations have sprung-up all over Africa including in Cote d’Ivoire. The fundamental question is to ask whether the enforcement of cybercrimes laws is more successful than the enforcement of traditional laws. The problem of the enforceability of these cybercrime legislations is compounded by the very nature of cyberspace which is “borderless.” Faced with the complexity of those computer crimes taking place in the virtual space, do West-African countries in general and specifically Cote d’Ivoire have the infrastructure, the knowledge, and the workforce to efficiently investigate and prosecute cybercrimes? This research tries to investigate, expose the theoretical inadequation between cybercrimes legislations and the enforcement capabilities of the Ivorian state, based on the deficiencies of enforcement of traditional laws and the need to stem the tide of corruption in general and specifically in the justice system. This research uses the case-study method because case studies are in-depth investigations of a single person, group, event, or community. Our findings have confirmed our assumptions that the enforcement of cybercrime laws is flawed due to the lack of proper equipment, skills of law enforcement personnel, even though the country has put in place many agencies to fight against cybercrimes. The social, cultural, political, and economical determinants that have always inhibited the fair and just enforcement of traditional laws is exerting the same kind of pressure on the capabilities of Law enforcement when it comes to the investigation and prosecution of cybercrimes in Cote d’Ivoire. This research, far from being exhaustive, needs a follow-up research in the future when the country retrieves its past stability and social peace which will allow a more open cooperation between researchers and the different authorities leading the fight against cybercrimes

    Selected Computing Research Papers Volume 2 June 2013

    Get PDF
    An Evaluation of Current Innovations for Solving Hard Disk Drive Vibration Problems (Isiaq Adeola) ........................................................................................................ 1 A Critical Evaluation of the Current User Interface Systems Used By the Blind and Visually Impaired (Amneet Ahluwalia) ................................................................................ 7 Current Research Aimed At Improving Bot Detection In Massive Multiplayer Online Games (Jamie Burnip) ........................................................................................................ 13 Evaluation Of Methods For Improving Network Security Against SIP Based DoS Attacks On VoIP Network Infrastructures (David Carney) ................................................ 21 An Evaluation of Current Database Encryption Security Research (Ohale Chidiebere) .... 29 A Critical Appreciation of Current SQL Injection Detection Methods (Lee David Glynn) .............................................................................................................. 37 An Analysis of Current Research into Music Piracy Prevention (Steven Hodgson) .......... 43 Real Time On-line Analytical Processing: Applicability Of Parallel Processing Techniques (Kushatha Kelebeng) ....................................................................................... 49 Evaluating Authentication And Authorisation Method Implementations To Create A More Secure System Within Cloud Computing Technologies (Josh Mallery) ................... 55 A Detailed Analysis Of Current Computing Research Aimed At Improving Facial Recognition Systems (Gary Adam Morrissey) ................................................................... 61 A Critical Analysis Of Current Research Into Stock Market Forecasting Using Artificial Neural Networks (Chris Olsen) ........................................................................... 69 Evaluation of User Authentication Schemes (Sukhdev Singh) .......................................... 77 An Evaluation of Biometric Security Methods for Use on Mobile Devices (Joe van de Bilt) .................................................................................................................. 8

    Digital Platform Services Inquiry (Interim Report) (2020)

    Get PDF
    • 

    corecore