3,412 research outputs found

    10341 Abstracts Collection -- Insider Threats: Strategies for Prevention, Mitigation, and Response

    Get PDF
    From August 22 to 26, 2010, the Dagstuhl Seminar 10341 ``Insider Threats: Strategies for Prevention, Mitigation, and Response\u27\u27 was held in Schloss Dagstuhl~--~Leibniz Center for Informatics. During the seminar, several participants presented their current research, and ongoing work and open problems were discussed. Abstracts of the presentations given during the seminar as well as abstracts of seminar results and ideas are put together in this paper. The first section describes the seminar topics and goals in general. Links to extended abstracts or full papers are provided, if available

    Cyber Threat Reports 16 May - 05 June 2017

    Get PDF
    Army Cyber Institute Cyber Threat Report Tech Trends: Stories and Highlights The Cost of IoT Hacks: 13% of revenue for smaller firms. Massive security breach at prominent Los Angeles clinic puts thousands at risk. The WannaCry Effect: Users Abandon Windows XP En-Masse. OneLogin Affected by Data Breach, Attacker May have Decrypted Data. How Terrorists Slip Beheading Videos Past YouTube\u27s Censors

    Investigation of Attributes that Influence the Insider Trust

    Get PDF
    A study of cyber-attack incidents emanating from insiders identifies some characteristic of the malicious user including trust, attack on hardware, software and network, and vulnerabilities of threat. Among the research that has been conducted, insider trust is identified as a critical characteristic where trust of insider is categorized as a major potential to attack system information either high, medium or low risk to access the sensitive document. Trust characteristics is hard to be analyzed due to the different human behaviour. Thus, a survey was conducted that includes hypothesis to support the investigation of insider threat characteristic. To obtain the result of finding prominent insider trust criteria, a regression analysis is used to get the actual value. A survey has been distributed to multiple user roles of three systems namely e-Plantation System (ePS), eCampus System (eCampus) and Human Resources Management System (eHRMS). The outcome of this study demonstrates that skill and experience are two prominent factors that mainly influence the characteristic of insider trust

    THE ROLE OF TECHNOLOGY IN COMBATTING BANK FRAUDS: PERSPECTIVES AND PROSPECTS

    Get PDF
    Banks are the engines that drive the operations in the financialsector, money markets and growth of an economy. With the rapidly growingbanking industry in India, frauds in banks are also increasing very fast, andfraudsters have started using innovative methods. As part of the study, a questionnaire-basedsurvey was conducted in 2013-14 among 345 bank employees to know theirperception towards bank frauds and evaluate the factors that influence thedegree of their compliance level. This study provides a frank discussion of theattitudes, strategies and technology that specialists will need to combatfrauds in banks. In the modern era, there is “no silver bullet for fraudprotection; the double-edged sword of technology is getting sharper,day-in-day-out.” The use of neural network-based behavior models in real-timehas changed the face of fraud management all over the world. Banks that canleverage advances in technology and analytics to improve fraud prevention willreduce their fraud losses. Recently, forensic accounting has come into limelightdue to rapid increase in financial frauds or white-collar crimes

    An innovative custom cyber security solution for protecting enterprises and corporates’ assets

    Get PDF
    Anti-virus software has been the main defense against malicious application and will remain so in the future. However the strength of an anti-virus product will depend on having an updated virus signature and the heuristic engine to detect future and unknown virus. The time gap between an exploit appearing on the internet and the user receiving an update for their anti-virus signature database on their machine is very crucial. Having a diverse multi-Engine anti-virus scanner in the infrastructure with the capability for custom signature definition as part of a defence in-depth strategy will help to close that gap. This paper presents a technique of deploying more than one anti-virus solution at different layers and using custom anti-virus signature which is deployed in a custom proxy solution as part of a defence in-depth strategy

    Communication Strategies to Address Vaccine Hesitancy in Healthcare Settings and on Social Media

    Get PDF
    Abstract Vaccine hesitancy is now recognized as a threat to global health. Its causes are complex, and it is defined by a resistance to or questioning of immunization. It is important to address vaccine hesitancy directly before people who are hesitant become vaccine refusers or anti-vaccine. Fortunately, with evidence-based information delivered with a compassionate communication style many of those who are hesitant to vaccinate can be persuaded to ultimately vaccinate. This paper aims to explain successful communication strategies used to address vaccine hesitancy in healthcare settings and on social media. Vaccine hesitant parents frequently list their child’s healthcare provider as a trusted source of information on vaccine issues. Research has shown that using presumptive language for vaccine introduction, followed by a compassionate and direct response to any concerns is an effective form of communication with vaccine hesitant parents. This paper teaches the C.A.S.E. Model as a way to formulate that communication. Although many people trust their providers, we cannot ignore the influence of the Internet, specifically social media, as a source of vaccine information for patients and parents. Although there is much pro-vaccine messaging on the Internet, the anti-vaccine messaging is frequently simpler, more emotionally appealing, and easily sharable. Since vaccine hesitant people tend to be silent observers of the vaccine debate online, it is important for pro-vaccine sources to communicate effectively in this arena. We describe our experience and lessons learned with this form of communication through the pro-immunization parent advocacy group, Immunize Texas

    Advancing understanding of pinch-points and crime prevention in the food supply chain

    Get PDF
    From a crime prevention perspective, food crime remains a challenge. Whilst opportunity for crime can be reduced by implementing certain measures; and addressing the potential perpetrators, their possible actions and criminal behaviour, the trade-offs which occur in the food supply chain that motivate such activity, still remains complex. These heuristic factors have led, in this study, to the consideration of ‘pinch-points’ where crime could occur as a result of capability, opportunity, motivation, rationalisation and supply chain pressure. Pinch-points can be addressed using the Food Crime Countermeasures Framework (FCCF) conceptualised in this paper. We argue that conventional anti-fraud measures: detection, deterrence and prevention are essential to support food fraud risk assessments, as are continuous interventions and response strategies. The implementation of countermeasures that initially drive prevention and deterrence and where required, detection, intervention and response form the basis of our approach. This paper focuses on the United Kingdom (UK) however it should recognised that food crime is a global issue
    • 

    corecore