94 research outputs found

    The Importance of Transparency and Willingness to Share Personal Information

    Get PDF
    This study investigates the extent to which individuals are willing to share their sensitive personal information with companies. The study examines whether skepticism can influence willingness to share information. Additionally, it seeks to determine whether transparency can moderate the relationship between skepticism and willingness to share and whether 1) companies perceived motives, 2) individual’s prior privacy violations, 3) individuals’ propensity to take risks, and 4) individuals self-efficacy act as antecedents of skepticism. Partial Least Squares (PLS) regression is used to examine the relationships between all the factors. The findings indicate that skepticism does have a negative impact on willingness to share personal information and that transparency can reduce skepticis

    A review of cyber security attack trends in Kenya

    Get PDF
    The COVID 19 pandemic led to a situation where Kenyan institutions were forced to embrace remote learning, remote working and e-commerce services. These basically led to an upsurge in financial cyber activity and with it came an upsurge in cybercrime. This paper conducted a review of available secondary data on cyber attacks in Kenya with the aim of identifying the most popular trends embraced by attackers while perpetrating cyber-attacks on financial institutions and their clients. The paper was also able to obtain a ranking of the most popular trends associated with attacks within the Kenyan cyber space. Keywords: Cybersecurity, cyber-attacks, cybercrime, malware, phishing DOI: 10.7176/JIEA/11-2-09 Publication date: November 30th 202

    Diseño de un instrumento gerencial para la evaluación de la vulnerabilidad informática en empresas pequeñas de la ciudad de Neiva

    Get PDF
    Diseñar un instrumento gerencial para la evaluación de la vulnerabilidad informática en empresas pequeñas en la ciudad de Neiva. Recopilar y analizar la información acerca de vulnerabilidad informática. Establecer los principales factores que permitan identificar la existencia de vulnerabilidad en empresas pequeñas. Diseñar el instrumento gerencial para valorar la existencia de vulnerabilidad en seguridad informática.Design a managerial instrument for the evaluation of computer vulnerability in small businesses in the city of Neiva. Collect and analyze information about computer vulnerability. Establish the main factors that allow identifying the existence of vulnerability in small companies. Design the managerial instrument to assess the existence of vulnerability in computer security.1. Problemática. -- 1.2. Pregunta de investigación. -- 2. Justificación. -- 3. Objetivos. -- 3.1. Objetivo general. -- 3.2. Objetivos específicos. -- 4. Marco conceptual. -- 4.2. La vulnerabilidad. -- 4.2.1. Análisis de vulnerabilidad. -- 4.2.2. Estimación de la probabilidad de ocurrencia de eventos. -- 4.2.3. Valoración de las consecuencias económicas. -- 4.2.4. Valoración de las consecuencias operacionales. -- 4.2.5. Valoración de las consecuencias para la imagen de la empresa. -- 4.2.6. Valoración de recursos para controlar emergencias informáticas. -- 4.2.7. Relaciones de análisis de vulnerabilidad. -- 4.3. Protección informática en empresas pequeñas. -- 4.3.1. Malware. -- 4.3.2. Medidas básicas de protección. -- 5. Diseño metodológico. -- 5.1. Descripción. -- 5.1.1 etapa i. -- 5.1.2 etapa ii. 5.1.3 etapa iii. 5.2. Tipo de investigación. -- 5.3. Área de estudio. -- 5.4. Universo y muestra. -- 6. Desarrollo del proyecto. -- 6.1. Resultados. -- 6.1.1. Información general. -- 6.1.2. Evaluación general. -- 6.1.3. Evaluación de vulnerabilidad. -- 6.1.4. Instrumento gerencial. -- 7. Normatividad de seguridad informática en Colombia. -- 8. Presupuesto del proyecto. -- 9. Cronograma de actividades. -- 10. Conclusiones. -- 11. Bibliografía

    The Glabal Phenomenon of Teleinformantics: An Introduction

    Get PDF

    On Computer Communication Network Security Maintenance Measures

    Get PDF
    With the rapid development of China’s science and technology, today’s Internet communication technology has also followed the ever-changing, but there is still a certain network communication information security problems, and this problem is not to be underestimated. Network communication security has a close relationship with national important documents and information protection confidentiality, social security and stability, national development, social and economic development. The use of Internet technology to commit crimes generally does not leave traces of the crime, which increases the chances of using the network to commit crimes

    A Fuzzy Classifier-Based Penetration Testing for Web Applications

    Get PDF
    The biggest challenge of Web application is the inestimable losses arising from security flaws. Two approaches were advanced by a number of scholars to provide security to Web space. One of such approach is vulnerability assessment, which is a conscious effort to isolate, identify and recognize potentials vulnerabilities exploited by attackers. The second being the estimation and determination of level of risks/threats posed to Web applications by vul- nerabilities obvious to the developer (or tester); this is generally referred to as penetration testing. Recently, there is Vulnerability Assessment and Penetration Testing (VAPT) that combined these two schemes to improve safety and effec- tively combat the menace of attackers on Web applications. This paper proposed Fuzzy Classifier-based Vulnerability and Assessment Testing (FCVAPT) model to provide security for sensitive data/information in Web applications. Cross Site Scripting (XSS) and Structured Query Language (SQL) injections were selected for evaluation of proposed FCVAPT model. FCVAPT model’s classification performance for MSE, MAPE and RMSE were 33.33, 14.81% and 5.77% respectively. FCVAPT is considerably effective for detecting vulnerability and ascertaining the nature of threats/risks available to Web applications

    The Challenges of Network Security Remediation at a Regional University.

    Get PDF
    This thesis describes challenges encountered during a year-long effort to improve the security of the 3,300 node administrative computer network at East Tennessee State University. The key remediation strategies used included employing the vulnerability scanner Nessus to profile the network, analyzing the scan results, and attempting to remove the most critical vulnerabilities found. The project succeeded in decreasing known “high” criticality vulnerabilities on campus by 26.1%, and confirmed four standard observations about the challenges of network administration: Vulnerability scanning is a lengthy task best performed in parallel and supported by automated data analysis.Securing a network is like trying to hit a moving target, due to an ever-increasing proliferation of networked hosts, services enabled by default install and lists of vulnerabilities to address.Failures of common sense are still among the primary threats to network security.Failing to retain management support for the security hardening process can jeopardize the project
    corecore