1,407 research outputs found

    Ransomware in High-Risk Environments

    Get PDF
    In today’s modern world, cybercrime is skyrocketing globally, which impacts a variety of organizations and endpoint users. Hackers are using a multitude of approaches and tools, including ransomware threats, to take over targeted systems. These acts of cybercrime lead to huge damages in areas of business, healthcare systems, industry sectors, and other fields. Ransomware is considered as a high risk threat, which is designed to hijack the data. This paper is demonstrating the ransomware types, and how they are evolved from the malware and trojan codes, which is used to attack previous incidents, and explains the most common encryption algorithms such as AES, and RSA, ransomware uses them during infection process in order to produce complex threats. The practical approach for data encryption uses python programming language to show the efficiency of those algorithms in real attacks by executing this section on Ubuntu virtual machine. Furthermore, this paper analyzes programming languages, which is used to build ransomware. An example of ransomware code is being demonstrated in this paper, which is written specifically in C sharp language, and it has been tested out on windows operating system using MS visual studio. So, it is very important to recognize the system vulnerability, which can be very useful to prevent the ransomware. In contrast, this threat might sneak into the system easily, allowing for a ransom to be demanded. Therefore, understanding ransomware anatomy can help us to find a better solution in different situations. Consequently, this paper shows a number of outstanding removal techniques to get rid from ransomware attacks in the system

    Ransomware in High-Risk Environments

    Get PDF
    In today’s modern world, cybercrime is skyrocketing globally, which impacts a variety of organizations and endpoint users. Hackers are using a multitude of approaches and tools, including ransomware threats, to take over targeted systems. These acts of cybercrime lead to huge damages in areas of business, healthcare systems, industry sectors, and other fields. Ransomware is considered as a high risk threat, which is designed to hijack the data. This paper is demonstrating the ransomware types, and how they are evolved from the malware and trojan codes, which is used to attack previous incidents, and explains the most common encryption algorithms such as AES, and RSA, ransomware uses them during infection process in order to produce complex threats. The practical approach for data encryption uses python programming language to show the efficiency of those algorithms in real attacks by executing this section on Ubuntu virtual machine. Furthermore, this paper analyzes programming languages, which is used to build ransomware. An example of ransomware code is being demonstrated in this paper, which is written specifically in C sharp language, and it has been tested out on windows operating system using MS visual studio. So, it is very important to recognize the system vulnerability, which can be very useful to prevent the ransomware. In contrast, this threat might sneak into the system easily, allowing for a ransom to be demanded. Therefore, understanding ransomware anatomy can help us to find a better solution in different situations. Consequently, this paper shows a number of outstanding removal techniques to get rid from ransomware attacks in the system

    Report of the committee on a commercially developed space facility

    Get PDF
    Major facilities that could support significant microgravity research and applications activity are discussed. The ground-based facilities include drop towers, aircraft flying parabolic trajectories, and sounding rockets. Facilities that are intrinsically tied to the Space Shuttle range from Get-Away-Special canisters to Spacelab long modules. There are also orbital facilities which include recoverable capsules launched on expendable launch vehicles, free-flying spacecraft, and space stations. Some of these existing, planned, and proposed facilities are non-U.S. in origin, but potentially available to U.S. investigators. In addition, some are governmentally developed and operated whereas others are planned to be privately developed and/or operated. Tables are provided to show the facility, developer, duration, estimated gravity level, crew interaction, flight frequency, year available, power to payload, payload volume, and maximum payload mass. The potential of direct and indirect benefits of manufacturing in space are presented

    Mixing quantitative and qualitative methods for sustainable transportation in Smart Cities

    Get PDF
    L'abstract è presente nell'allegato / the abstract is in the attachmen

    Stanley in Cyberspace: Why the Privacy Protection of the First Amendment Should Be More Like That of the Fourth

    Get PDF
    The 1969 case Stanley v. Georgia forbade the government from restricting the books that an individual may read or the films he may watch “in the privacy of his own home.” Since that time, the Supreme Court has repeatedly emphasized that Stanley’s protection applies solely within the physical boundaries of the home: While obscene books or films are protected inside of the home, they are not protected en route to it—whether in a package sent by mail, in a suitcase one is carrying to one’s house, or in a stream of data obtained through the Internet. However adequate this narrow reading of Stanley may have been in the four decades since the case was decided, it is ill-suited to the twenty-first century, where the in-home cultural life protected by the Court in Stanley inevitably spills over into, or connects with, electronic realms beyond it. Individuals increasingly watch films not, as the defendant in Stanley did, by bringing an eight millimeter film or other physical copy of the film into their house, but by streaming it through the Internet. Especially as eReaders, such as the Kindle, and tablets, such as the iPad, proliferate, individuals read books by downloading digital copies of them. They store their own artistic and written work not in a desk drawer or in a safe, but in the “cloud” of data storage offered to them on far-away servers. Thus, I argue that courts should revisit and revise their understanding of Stanley v. Georgia in the same way that Katz v. United States revised Fourth Amendment law in 1967—by holding that the privacy it protected is not limited to the physical boundaries of the home (as United States v. Olmstead had held in 1928) but covers wire-line communications and other electronic environments in which individuals have an expectation of privacy. This is not to say that the Court’s understanding of Stanley v. Georgia should be revised in precisely the same way. However, Stanley v. Georgia should, at a minimum, be extended to protect web-based interactions, where use of an electronic resource outside of the home, such as the Internet, is an integral component of the act of possessing, viewing, or reading cultural material

    User acceptance of autonomous delivery vehicles – an empirical study in Germany

    Get PDF
    The inevitable need to develop new delivery practices in last-mile delivery arises from the enormously growing business to consumer (B2C) e-commerce and the associated challenges for logistics service providers. Autonomous delivery vehicles (ADVs) will potentially revolutionise last-mile delivery with regard to efficiency, sustainability and customer orientation. However, if not widely accepted by end-consumers, the introduction of ADVs as a delivery option can be a substantial waste of resources. At present, the research on consumers’ receptivity of innovations in last-mile delivery, such as ADVs, is limited. This study is the first that investigates user acceptance of ADVs in Germany by utilising a theoretically extended and modified version of the Unified Theory of Acceptance and Use of Technology (UTAUT2) in the specific context of last-mile delivery. Quantitative data was collected through an online survey approach (n = 501) and structural equation modelling was undertaken. The results indicate that overall trust in technology is the strongest predictor of behavioural intention (i.e., user acceptance), followed by price sensitivity, performance expectancy, innovativeness, hedonic motivation, social influence and overall perceived risk; whereas no effect could be found for effort expectancy and facilitating conditions. Additionally, street performance and parcel drop-off performance significantly influence overall trust in technology. The same is true for the effect of perceived performance risk during parcel drop-off and perceived safety risk when driving autonomously on overall perceived risk. Moreover, it has been found that overall trust in technology negatively influences overall perceived risk. Collectively, the Autonomous Delivery Vehicle Acceptance Model was able to explain 80 percent of the variance in behavioural intention to use ADVs. These findings have not only important theoretical contributions but also managerial implications in the areas of technology acceptance and last-mile delivery innovations, which will support the long-term success of ADVs as a last-mile delivery option in Germany
    • …
    corecore