26,953 research outputs found
Deceptive Practices 2.0: Legal and Policy Responses
Reviews recent online misinformation campaigns and "cyberfraud" to suppress voting and skew elections, mainly in minority communities. Examines whether federal and state laws can sufficiently deter and punish perpetrators. Makes policy recommendations
Network attack detection at flow level
In this paper, we propose a new method for detecting unauthorized network
intrusions, based on a traffic flow model and Cisco NetFlow protocol
application. The method developed allows us not only to detect the most common
types of network attack (DDoS and port scanning), but also to make a list of
trespassers' IP-addresses. Therefore, this method can be applied in intrusion
detection systems, and in those systems which lock these IP-addresses
Security Risk Management - Approaches and Methodology
In today’s economic context, organizations are looking for ways to improve their business, to keep head of the competition and grow revenue. To stay competitive and consolidate their position on the market, the companies must use all the information they have and process their information for better support of their missions. For this reason managers have to take into consideration risks that can affect the organization and they have to minimize their impact on the organization. Risk management helps managers to better control the business practices and improve the business process.Risk Management, Security, Methodology
Considerations Regarding the Security and Protection of E-Banking Services Consumers’ Interests
A significant number of breaches in the security of electronic banking (e-Banking) system is reported each year, drawing attention to the need to protect and inform customers about the risk of exposure to malicious actions initiated by cyber-criminals. Financial institutions and consumers recognize the fact that attacks and financial frauds are becoming more complex and are perpetrated by a different class of criminal. This class is increasingly sophisticated and uses technology as part of their strategy. Furthermore, the specialists forecast that the current global recession is likely to increase the frequency of internal fraud and security breaches. The present research tries: (1) to analyze the potential dangers threatening the security of e- Banking services through a comprehensive investigation of the relevant literature; (2) to identify the tools and methods that can ensure the consumers’ protection in E-Banking, (3) to present the results of a pilot study regarding the Romanian consumer perception on the protection and security related to E-Banking servicesE-Banking services, security, consumer protection, cyber-attack
A Survey on Wireless Security: Technical Challenges, Recent Advances and Future Trends
This paper examines the security vulnerabilities and threats imposed by the
inherent open nature of wireless communications and to devise efficient defense
mechanisms for improving the wireless network security. We first summarize the
security requirements of wireless networks, including their authenticity,
confidentiality, integrity and availability issues. Next, a comprehensive
overview of security attacks encountered in wireless networks is presented in
view of the network protocol architecture, where the potential security threats
are discussed at each protocol layer. We also provide a survey of the existing
security protocols and algorithms that are adopted in the existing wireless
network standards, such as the Bluetooth, Wi-Fi, WiMAX, and the long-term
evolution (LTE) systems. Then, we discuss the state-of-the-art in
physical-layer security, which is an emerging technique of securing the open
communications environment against eavesdropping attacks at the physical layer.
We also introduce the family of various jamming attacks and their
counter-measures, including the constant jammer, intermittent jammer, reactive
jammer, adaptive jammer and intelligent jammer. Additionally, we discuss the
integration of physical-layer security into existing authentication and
cryptography mechanisms for further securing wireless networks. Finally, some
technical challenges which remain unresolved at the time of writing are
summarized and the future trends in wireless security are discussed.Comment: 36 pages. Accepted to Appear in Proceedings of the IEEE, 201
Legal aspects of electronic commerce
The emergence of new communication methods that allow transfer of information in real time and with great precision resulted in their use and trade. Expanding market - which has become an international - did these modern means of communication to be included in trade, by increasing their speed of termination lawful business. Thus, the establishment of commercial relations by computer or other modern means of communication has become in recent decades, and our country. These are very diverse media: telex and fax - which can transmit at a distance and soon words and pictures, and information storage means and acts done by traders - tapes, microfilm, compact discs, which can be used at any time, occupying a small space. Most information that may have a role in resolving trade disputes are not written on paper, but are stored in computer systems or computer available in different forms.lawful business, e-commerce, cyberspace, business, Commercial Code
The fusion of law and information technology
In information society, legal norm communications have been never established in certain fields for a long time. That is, a few legal norms have never obeyed in the fields. Above all, legal norms which relate to data protection, information contents and information security, would often infringed. Most violation would be conducted by using information technologies. Information technologies would often be used in these infringing incidents. It can be said that these infringing incidents would have never been conducted without information technology. These infringing incidents include hacking actions, personal data abuse, personal information disclosure, unauthorized access, infringing copyrights, infringing privacy rights, and so on. A way of preventing those infringements is to raise the level of punishment against the violators. But, it will prove to be disappointing. Furthermore, it would be an ex post facto measure to the last. It would be needed to invent an ex ante measure, if it is possible. As the ex ante measure, the author proposes a fusion of law and information technology. An information technology will lead people to a lawful deed when they conduct actions in using computers and networks. They say that information technology cures information technology. After all, the fusion will aim at realizing laws, and it will contribute to recover a social justice
- …