9,796 research outputs found

    Trust Account Fraud and Effective Information Security Management

    Get PDF
    The integrity of lawyers’ trust accounts has come under scrutiny in the last few years. There are strong possibilities of information technology security breaches happening within the firms, either accidental or deliberate. The damage caused by these security breaches could be extreme. For example, a trust account fund in an Australian law firm was misused in a security breach in which Telstra charged A$50,000 for phone usage, mainly for ISD calls to Hong Kong. Our study involved interviewing principals of ten law companies to find out solicitors’ attitudes to computer security and the possibility of breaches of their trust accounts. We simultaneously carried out a survey to see if the trends identified in our case-studies could be backed up with broader quantitative data. We have also conducted in-depth interviews of five trust account regulators from the Law society of South Australia to know their view points on security threats on trust accounts. An overall finding highlights that law firms were not current with technology to combat computer crime, and inadequate access control was a major concern in safeguarding account data. Our conclusions revealed the urgent need for law firms to adopt security controls, implement information security policies and procedures and obtain cooperation from management to communicate these policies to staff

    A Review on Preventing Insider Threats and Stealthy Attacks from Sonet Site

    Get PDF
    Online social networks (OSNs) give another measurement to individuals' lives by bringing forth online social orders. OSNs have upset the human experience, however they have likewise made a stage for gatecrashers to disperse diseases and direct cybercrime. An OSN gives an entrepreneurial assault stage to cybercriminals through which they can spread contaminations at a huge scale. Assailants perform unapproved and malevolent exercises on OSN. Assaults can be an executable document, an expansion, an adventure code, and so on., that behaviors malignant tasks in OSNs with genuine effect on clients. Moreover, Intruders influence OSNs with different intensions, for example, to take basic information and adapt it for monetary profits. Insider dangers have turned into a genuine worry for some associations today. A model for OSN is to introduced to avoid insider danger misuses and to protect the classification. Multilevel security instrument is connected amid the enlistment and login level. At enlistment organize one time randomized alphanumeric watchword will be created and send to the clients by means of email though at login arrange randomized graphical secret word will be connected to counteract non malignant movement

    Threat Modelling for Active Directory

    Get PDF
    This paper analyses the security threats that can arise against an Active Directory server when it is included in a Web application. The approach is based on the STRIDE classification methodology. The paper also provides outline descriptions of countermeasures that can be deployed to protect against the different threats and vulnerabilities identified here

    A comprehensive meta-analysis of cryptographic security mechanisms for cloud computing

    Get PDF
    The file attached to this record is the author's final peer reviewed version. The Publisher's final version can be found by following the DOI link.The concept of cloud computing offers measurable computational or information resources as a service over the Internet. The major motivation behind the cloud setup is economic benefits, because it assures the reduction in expenditure for operational and infrastructural purposes. To transform it into a reality there are some impediments and hurdles which are required to be tackled, most profound of which are security, privacy and reliability issues. As the user data is revealed to the cloud, it departs the protection-sphere of the data owner. However, this brings partly new security and privacy concerns. This work focuses on these issues related to various cloud services and deployment models by spotlighting their major challenges. While the classical cryptography is an ancient discipline, modern cryptography, which has been mostly developed in the last few decades, is the subject of study which needs to be implemented so as to ensure strong security and privacy mechanisms in today’s real-world scenarios. The technological solutions, short and long term research goals of the cloud security will be described and addressed using various classical cryptographic mechanisms as well as modern ones. This work explores the new directions in cloud computing security, while highlighting the correct selection of these fundamental technologies from cryptographic point of view

    Bring your own disclosure : analysing BYOD threats to corporate information

    Get PDF
    Mobile device consumerisation has introduced the Bring-Your-Own-Device (BYOD) trend to the organisational context, allowing employees to work using their personal devices. However, as personal mobile devices are perceived as less secure than those provided by the organisation, BYOD has risen security concerns about corporate information being accessed by mobile devices from inside and outside the corporate perimeter. Moreover, this uncontrolled mobile device activity makes it difficult to differentiate external (outsider) malicious activity from reckless/naive employee (insider) behaviour, preventing effective correlation of unauthorised actions with the perpetrators. In this paper, a STRIDE-based BYOD Threat Model is proposed to analyse BYOD Threat Interactions from inside and outside the corporate perimeter. Our research contributes to a better understanding and awareness about the influence of BYOD Threats on disclosure and contamination of corporate information, encouraging future work in the field of BYOD security and digital forensics in order to protect information and manage an increasing number of evidence sources

    Pressure politics: a politics of collective consumption?

    Get PDF
    The nature of a politics of collective consumption is reviewed in terms of how we can distinguish those actions that pursue a broader public interest. The argument that outsider groups may be influential in terms of setting the political agenda is explored in relation to the politics of obesity and controversies about child access for divorced fathers. Animal rights militancy has proved a difficult issue for government to handle and has wider implications for pressure group activity. Government continues to favour a close relationship with big business but is less interested in reforming trade associations. Increasing cooperation between the National Farmers Union and Farmers for Action suggests that insider groups may be more willing to cooperate with outsider groups as they become more effective. The question of whether pressure group activity is moving in the direction of an ‘uncivil society’ is considered
    • 

    corecore