5 research outputs found

    The Architectural Dynamics of Encapsulated Botnet Detection (EDM)

    Full text link
    Botnet is one of the numerous attacks ravaging the networking environment. Its approach is said to be brutal and dangerous to network infrastructures as well as client systems. Since the introduction of botnet, different design methods have been employed to solve the divergent approach but the method of taking over servers and client systems is unabated. To solve this, we first identify Mpack, ICEpack and Fiesta as enhanced IRC tool. The analysis of its role in data exchange using OSI model was carried out. This further gave the needed proposal to the development of a High level architecture representing the structural mechanism and the defensive mechanism within network server so as to control the botnet trend. Finally, the architecture was designed to respond in a proactive state when scanning and synergizing the double data verification modules in an encapsulation manner within server system

    Birds of a feather flock together: The Nigerian cyber fraudsters (yahoo boys) and hip hop artists.

    Get PDF
    This study sets out to examine the ways Nigerian cyber-fraudsters (Yahoo-Boys) are represented in hip-hop music. The empirical basis of this article is lyrics from 18 hip-hop artists, which were subjected to a directed approach to qualitative content analysis and coded based on the moral disengagement mechanisms proposed by Bandura (1999). While results revealed that the ethics of Yahoo-Boys, as expressed by musicians, embody a range of moral disengagement mechanisms, they also shed light on the motives for the Nigerian cybercriminals' actions. Further analysis revealed additional findings: “glamorization/de-glamorization of cyber-fraud” and “sex-roles-and-cultures”. Having operated within the constraint of what is currently available (a small sample size), this article has drawn attention to the notion that Yahoo-Boys and some musicians may be “birds of a feather.” Secondly, it has exposed a “hunter-and-antelope-relationship” between Yahoo-Boys and their victims. Thirdly, it has also highlighted that some ethos of law-abiding citizens is central to Yahoo-Boys’ moral enterprise. Yahoo-Boys, therefore, represent reflections of society. Arguably, given that Yahoo-Boys and singers are connected, and the oratory messages of singers may attract more followers than questioners, this study illuminates the cultural dimensions of cyber-fraud that emanate from Nigeria. In particular, insights from this study suggest that cyber-fraud researchers might look beyond traditional data sources (e.g., cyber-fraud statistics) for the empirical traces of “culture in action” that render fraudulently practices acceptable career paths for some Nigerian youths

    Social engineering: psychology applied to Information Security

    Get PDF
    Psychology and computer science are two scientific disciplines that focus on identifying the particular characteristics of information processing. The first in the human being and the second in the construction of a technical tool that seeks to emulate the brain: the computer. That is why psychology is strongly tied to the moment for people to choose their passwords. Deceptive advertising often compensates (through money, products and free services or other self-esteem tests) to influence a product or service to appear on your social network. In order to increase its consumption among its followers and also to take personal information without your consent. Due to the increase of the use of social networks, our social engineering strategy can efficiently and effectively show that security is subjective and that a significant percentage of users are vulnerable to deceptive advertisement through the internet. This project is based on the need to prevent attacks of information subtraction by obtaining/decrypting the keys of access or in the worst case obtain directly their passwords to the different web services, bank accounts, credit cards of individuals, based on the information that people exposed or share on their social networks. This paper also examines how attackers could obtain/decipher their passwords based on personal information obtained from deceptive advertisements implemented through a social network. The advantage of this approach also shows the user password composition providing a better vision of how hackers use the psychology applied to information security.MaestrĂ­

    Determinants of Fear of Cybercrime Victimisation: A study of Credit/Debit card Fraud among students of the university of Saskatchewan

    Get PDF
    Fear of crime studies is an enduring theme in criminological research. The focus of such research, however, has been on conventional physical or place-based crimes. This study was aimed at investigating the fear of Cybercrime (credit/debit card fraud) victimisation among University of Saskatchewan students. This was achieved by asking questions about: 1. students’ knowledge/perceptions of cybercrime; 2. exploring their experiences of victimisation; 3. examining students’ internet use patterns and frequency; 4. behavioural responses and finally; 5. demography. The study was informed by the framework of Beck’s theory of a Risk Society. Beck’s view is that given the various unintended consequences of the numerous techno-scientific innovations, risks and hazards have become a permanent feature of the modern time (Beck, 1992). Data was obtained from an online survey of students. Binary Logistic Regression and Cross tabulation were used to predict both fear and risk of cybercrime victimisation. The findings of the study indicate that prior experience of victimisation and internet use behaviours are both positively associated with students’ fear and their risk of becoming victims of credit/debit card fraud. On the other hand, socio-demographic factors and knowledge of cybercrime were both found to be non-significant predictors of students fear and risk of becoming victims of credit/debit card fraud. Based on the findings, the study argues for the need to rethink risks and to further examine reflexivity, as people negotiate the challenge of remaining in the threshold of risk and actual victimisation. The findings from the study demonstrate that the risk society theory has explanatory power and greatly enhanced our understanding of risk in the contemporary technology driven era. The study concludes with a number of recommendations for further studies
    corecore