860 research outputs found

    Emerging Technologies, Law Enforcement Responses, and National Security

    Get PDF

    Adversarial behaviours knowledge area

    Full text link
    The technological advancements witnessed by our society in recent decades have brought improvements in our quality of life, but they have also created a number of opportunities for attackers to cause harm. Before the Internet revolution, most crime and malicious activity generally required a victim and a perpetrator to come into physical contact, and this limited the reach that malicious parties had. Technology has removed the need for physical contact to perform many types of crime, and now attackers can reach victims anywhere in the world, as long as they are connected to the Internet. This has revolutionised the characteristics of crime and warfare, allowing operations that would not have been possible before. In this document, we provide an overview of the malicious operations that are happening on the Internet today. We first provide a taxonomy of malicious activities based on the attacker’s motivations and capabilities, and then move on to the technological and human elements that adversaries require to run a successful operation. We then discuss a number of frameworks that have been proposed to model malicious operations. Since adversarial behaviours are not a purely technical topic, we draw from research in a number of fields (computer science, criminology, war studies). While doing this, we discuss how these frameworks can be used by researchers and practitioners to develop effective mitigations against malicious online operations.Published versio

    Literature based Cyber Security Topics: Handbook

    Get PDF
    Cyber security is the practice of protecting systems, networks, and programs from digital attacks. These cyber attacks are usually aimed at accessing, changing, or destroying sensitive information; extorting money from users; or interrupting normal business processes. Cloud computing has emerged from the legacy data centres. Consequently, threats applicable in legacy system are equally applicable to cloud computing along with emerging new threats that plague only the cloud systems. Traditionally the data centres were hosted on-premises. Hence, control over the data was comparatively easier than handling a cloud system which is borderless and ubiquitous. Threats due to multi-tenancy, access from anywhere, control of cloud, etc. are some examples of why cloud security becomes important. Considering the significance of cloud security, this work is an attempt to understand the existing cloud service and deployment models, and the major threat factors to cloud security that may be critical in cloud environment. It also highlights various methods employed by the attackers to cause the damage. Cyber-attacks are highlighted as well. This work will be profoundly helpful to the industry and researchers in understanding the various cloud specific cyber-attack and enable them to evolve the strategy to counter them more effectively

    Strengthening Smart Contracts: An AI-Driven Security Exploration

    Get PDF
    Smart contracts are automated agreements in which the conditions between the purchaser and the vendor are encoded directly into lines of code allowing them to execute automatically Smart contracts have emerged as a ground-breaking technology facilitating the decentralized and trustless execution of agreements on blockchain platforms However the widespread adoption of smart contracts exposes them to various security threats leading to substantial financial losses and reputational harm Artificial Intelligence has the capability to aid in the detection and reduction of vulnerabilities thereby enhancing the overall strength and resilience of smart contracts This integration can create highly secure and transparent systems that reduce the risk of fraud corruption and other malicious activities thereby increasing trust and confidence in these systems and improving overall security This research paper delves into the innovative applications of Artificial Intelligence techniques to enhance the security of smart contracts Investigating the potential of AI in detecting vulnerabilities identifying potential attacks and offering automated solutions for safer smart contracts will significantly contribute to the development and flawless execution of this emerging technolog

    Evaluating Security in Cryptocurrency Wallets

    Get PDF
    The number of users who are interested in trading Cryptocurrency is tremendously increasing, however, some users of cryptocurrency wallets do not know how to protect themselves or how to use a wallet with high protection. The objective of this paper is to propose a framework to enable users to evaluate the security and privacy of cryptocurrencies wallets. This framework will provide users with a list of attributes that define the degree of user protection in cryptocurrency wallets. This work aims to improve security and privacy in cryptocurrency wallets and enable users of these platforms to interact safely

    The Future of Cybercrime: AI and Emerging Technologies Are Creating a Cybercrime Tsunami

    Get PDF
    This paper reviews the impact of AI and emerging technologies on the future of cybercrime and the necessary strategies to combat it effectively. Society faces a pressing challenge as cybercrime proliferates through AI and emerging technologies. At the same time, law enforcement and regulators struggle to keep it up. Our primary challenge is raising awareness as cybercrime operates within a distinct criminal ecosystem. We explore the hijacking of emerging technologies by criminals (CrimeTech) and their use in illicit activities, along with the tools and processes (InfoSec) to protect against future cybercrime. We also explore the role of AI and emerging technologies (DeepTech) in supporting law enforcement, regulation, and legal services (LawTech)
    • …
    corecore