Spelling suggestions: "subject:"4digital security"" "subject:"deigital security""
1 |
Security analysis of bytecode interpreters using AlloyReynolds, Mark Clifford January 2012 (has links)
Thesis (Ph.D.)--Boston University / Security of programming languages, particularly programming languages used for network applications, is a major issue at this time. Despite the best efforts of language designers and implementers, serious security vulnerabilities continue to be discovered at an alarming rate. Thus, development of analysis tools that can be used to uncover insecure or malicious code is an important area of research. This thesis focuses on the use of the lightweight formal method tool Alloy to perform static analysis on binary code, Byte-compiled languages that run on virtual machines are of particular interest because of their relatively small instruction sets, and also because they are well represented on the Internet. This thesis describes a static analysis methodology in which desired security properties of a language are expressed as constraints in Alloy, while the actual bytes being analyzed are expressed as Alloy model initializers. The combination of these two components yields a complete Alloy model in which any model counterexample represents a constraint violation, and hence a security vulnerability. The general method of expressing security requirements as constraints is studied, and results are presented for Java bytecodes running on the Java Virtual Machine, as well as for Adobe Flash SWF files containing ActionScript bytecodes running on the Action Script Virtual Machine. It is demonstrated that many examples of malware are detected by this technique. In addition, analysis of benign software is shown to not produce any counterexamples. This represents a significant departure from standard methods based on signatures or anomaly detection.
|
2 |
Bangladeshi Political Cartoons as Visual Rhetoric in the Context of Anti-Free Speech LawsTarannum, Aanila Kishwar 12 June 2023 (has links)
Guided by Sonja Foss' (2005) theory of visual rhetoric, this thesis is an exploration of political cartoons from Bangladesh, published between October 2016 - October 2020. The study is framed by the Digital Security Act (DSA), an anti-freedom of speech law enacted by the ruling Awami League government in October 2018. The cartoons analyzed in this study are divided into two sets – 16 published in a two-year period prior to the enactment of the DSA, and 16 published within two years after the enactment of the law. A criterion-based sampling technique was used to select cartoons published online by two Bangladeshi cartoonists' – Mehedi Haque and Sadatuddin Ahmed Amil. A thematic analysis of the cartoons revealed that corruption and threats to freedom of expression are recurring themes in both sets of data, while cartoons published pre-DSA also contain commentary on the prime minister and the government's feelings of contentment. Declining democratic practices is a major theme in cartoons published post-DSA. By utilizing the method of visual rhetorical analysis on six cartoons, the study delved deeper into the cartoons' construction of visual arguments for each theme. Finally, a comparative analysis of the themes and visual arguments in cartoons from each data set revealed that cartoons published after October 2018 are differentiated by disappearing characters and storylines, the use of indirect language, and implicit visual arguments, as well as increased usage of metaphors. Cartoons published post-DSA also have a sharper focus on specific news events as indicators of national issues. This study contributes to a growing body of research on the DSA, highlights how a specific medium of expression can be affected by anti-freedom of speech laws, and provides implications for media industries facing legal challenges. / MACOM / Bangladesh, a country in South Asia, is currently following a democratic parliamentary system where Prime Minister (PM) Sheikh Hasina is the leader of the government. Her party, Awami League (AL) has been in power since 2008. Since AL's enactment of the draconian Digital Security Act (DSA) in October 2018, a culture of fear has persisted within the country's media industry as well as the public, as the law's vague wording allows people to be charged for the mildest criticism of the government and the PM. Guided by the theory of visual rhetoric (Foss, 2005), this study is framed by the DSA in its analysis of editorial cartoons published online by cartoonists Mehedi Haque and Sadatuddin Ahmed Amil between October 2016 – October 2020. A thematic analysis of cartoons published before and after the enactment of the law shows the major topics that emerge from Bangladeshi political cartoons, such as corruption, threats to freedom of expression, contentment of the government, and declining democratic practices. Visual rhetorical analysis performed on one cartoon that best represents each theme explains in detail how the cartoons use visual arguments to convey their message. Finally, a comparison between the pre- and post-DSA data sets shows that cartoons published after October 2018 are marked by disappearing characters and storylines, the use of indirect language, and implicit visual arguments, as well as increased usage of metaphors. Cartoons published post-DSA also have a sharper focus on specific news events as indicators of national issues. This study adds to developing scholarship on the DSA, highlights how editorial cartoons are affected by anti-free speech laws, and offers insights on the media sector encountering legal challenges.
|
3 |
Mapeamento de incidentes com identidades digitais e estratégias de controle em ambientes virtuaisGOMES, Anselmo Lacerda 31 August 2015 (has links)
Submitted by Fabio Sobreira Campos da Costa (fabio.sobreira@ufpe.br) on 2016-04-07T13:22:15Z
No. of bitstreams: 2
license_rdf: 1232 bytes, checksum: 66e71c371cc565284e70f40736c94386 (MD5)
AnselmoLacerdaGomesCInMsc (19-11-2015).pdf: 2341760 bytes, checksum: 06c1abb20d748a6921088b434a7b7cb3 (MD5) / Made available in DSpace on 2016-04-07T13:22:15Z (GMT). No. of bitstreams: 2
license_rdf: 1232 bytes, checksum: 66e71c371cc565284e70f40736c94386 (MD5)
AnselmoLacerdaGomesCInMsc (19-11-2015).pdf: 2341760 bytes, checksum: 06c1abb20d748a6921088b434a7b7cb3 (MD5)
Previous issue date: 2015-08-31 / O Roubo de Identidade Digital (RID) é o roubo de informações que resulta na possibilidade de alguém assumir a identidade da vítima. Em decorrência disso, credenciais de acesso e dados dispostos em qualquer meio eletrônico ficam vulneráveis, como em computadores e em dispositivos móveis. Ultimamente, esses dispositivos têm sido bastante visados pelos atacantes, devido à sensibilidade e pessoalidade dos dados nele armazenados. Senhas, informações bancárias, financeiras e de geolocalização são apenas alguns exemplos de dados expostos a essa vulnerabilidade moderna. O RID é uma prática que pode resultar no êxito de diversos outros crimes associados, por exemplo, estelionato, espionagem, ciberterrorismo e ciberguerra. Suas implicações são sérias, já que o atacante pode assumir o controle de instalações industriais, centros militares, governos e organizações inteiras, sendo imprevisíveis os danos à ordem pública e aos cidadãos. Neste trabalho foi utilizada a metodologia de mapeamento sistemático para identificar quais são os principais incidentes de segurança associados ao RID. Relações e relativizações foram realizadas a fim de mapear as suas principais causas e consequências. A principal contribuição desta dissertação é o mapeamento sistemático de RID. Finalmente, esta dissertação de mestrado objetivou delinear o conhecimento sobre o assunto, de forma atualizada, indicando diretrizes para a minimização ou completa prevenção de incidentes dessa natureza. / The Digital Identity Theft (DIT) is the stealing of information that allows the attacker to take the victim’s identity, somehow. This promotes the access to credentials and data disposed in computers, mobile devices or any electronic environment, making them vulnerable. Recently, mobile devices are being very targeted because of the sensibility and personality of the data found there. Passwords, bank, financial and geolocation information are just some examples of data being exposed by this modern vulnerability. DIT is a practice that may result in the success of many other associated crimes, like embezzlement, espionage, cyberterrorism and cyberwar. Its implications are serious because the attacker can assume the control of industrial facilities, military centres, government and entire organizations, damaging the public order and the people to an unpredictable extent. This work used the systematic mapping methodology to identify which are the main security incidents related to DIT. Relations and relativizations were performed to map its main causes and consequences. Finally, this dissertation aimed to delineate the knowledge on the subject, indicating guidelines to minimize or avoid entirely incidents with this nature.
|
4 |
Vem skyddar vi källan från? : En kvalitativ studie om digital säkerhet och källskydd bland svenska journalisterLundberg, Emelie, Sadikovic, Adrian January 2017 (has links)
In the digital era, journalists’ source protection is facing new challenges. A big part of the communication between the journalists and their sources is now taking place online, thus exposing it to surveillance, national security interests and erosion of source protection laws. How engaged and interested are swedish journalists regarding these challenges? And what methods do they use to protect their sources in this new era? This study examines the knowledge and interest among swedish journalists regarding digital security and source protection issues, and which methods they use for source protection in the digital age. It also gives a brief introduction to the current laws and legislative proposals that may impact source protection in Sweden. This is done through interviews with journalists from four swedish media editors. Uppdrag granskning, Dagens Nyheter, HD/Sydsvenskan and P4 Västerbotten. Our study shows that the majority of our respondents are interested and engaged in issues regarding digital security and source protection, but the level of actual knowledge varies. Some journalists are so engaged that it affects how they live their private lives outside the newsroom, while others have little or no knowledge regarding the security of their own editorial office. It is also clear that there is a need for journalists to be educated in new secure methods so that they can, in turn, educate their own sources.
|
5 |
‘As a journalist I should not be fearful’ : How democracy’s watchdogs use digital tools to mitigate threatsOrebäck, Johan January 2022 (has links)
Journalism is an ever-changing profession that is right now getting increasingly impacted by advancements in technology. These advancements make it easier, faster, and possibly safer to conduct journalism. At the same time, journalists are subjected to threats, and while some level of safety comes with digital advancements, they might also provide opportunities for reaching and threatening journalists that were not possible just a few years ago. This requires journalists to stay up to date on technological advancements in order to mitigate threats. This thesis is based on interviews with five journalists whose work put them in or near danger and utilizes an inductive approach to iteratively study the data and analyze it using existing frameworks to categorize tactics used by journalists. This study identifies three larger categories of threats that journalists are subjected to, and the measures taken to defend against these threats with a special focus on the digital technologies at their disposal. It finds that the tactics vary depending on the source of the threats and range from being non-violent, to legitimate threats on journalists’ lives. In response, journalists use tactics to remain under the radar of danger, or to find safety using low-tech tools and to even use digital tools as an opportunity to conduct journalism that would otherwise be out of their reach. The study concludes that rather than categorizing journalists, it is better to categorize their actions in order to see them as changeable and possible to be used as reactions to threats.
|
6 |
Digitaliserade Evenemang : En fallstudie av Twebcasts digitaliseringsarbete under COVID-19-pandemin, samt hur den digitala omvandlingen påverkat Twebcasts genomförande av digitaliserade evenemang. / Digitalized Events : A case study of Twebcast's digitalization efforts during the COVID-19 pandemic, and how the digital transformation has impacted Twebcast's execution of digitalized events.Dahlström, Inez January 2024 (has links)
Syftet med studien är att undersöka företaget Twebcasts digitaliseringsarbete till följd av COVID-19-restriktionerna, samt hur deras digitala arbete har påverkats av företeelsen. För att uppnå uppsatsens syfte har en fallstudie med kvalitativa intervjuer genomförts, med tre personer involverade i fenomenet Twebcast. Insamlade primärdata analyserades med hjälp av en tematisk analys, som resulterade i ett fåtal övergripande kategorier. Utefter analys och diskussion av studiens resultat drogs slutsatsen att Twebcast till följd av COVID-19-pandemin, utvecklades från att primärt vara en digital plattform vid fysiska evenemang, till ett verktyg för digitala evenemang. Digitaliseringsarbetet utvecklades utefter de succesivt högre kraven på interaktivitet och säkerhet vid digitala evenemang. Vidare drogs slutsatsen att Twebcast nutida digitala arbete påverkats av pandemin, då den har ökat användningen och lyft potentialen med digitala och hybrida evenemangsformer. Genomförandet av evenemangsformerna har ökat markant i Twebcasts arbete, jämfört med innan COVID-19-pandemin. Slutsatsen dras även att utvecklingen av säkerhetsåtgärder vid digitala evenemang har påskyndats och påverkats av en rådande osäkerhet under pandemin. Twebcasts nya digitala tillvägagångssätt och säkerhetsåtgärder indikeras å andra sidan inte uppnå förväntad användning i nutid. / The purpose of this study is to further investigate the company Twebcast’s digitalization efforts as a result of COVID-19 restrictions, and how their digital work has been affected by the phenomenon. To fulfill the purpose, a case study with qualitative interviews have been conducted, involving three individuals associated with Twebcast. The result of the interviews was analyzed using thematic analysis, resulting in a few overarching categories. Following analysis and discussion of the study’s findings, the conclusion was drawn that due to the COVID-19 pandemic, Twebcast evolved from primarily being a digital platform used in physical events to a tool for digital events. The digitalization efforts progressed in response to increasing demands for interactivity and security in digital events Furthermore, it was concluded that Twebcast’s current digital work has been influenced by the pandemic, as it has increased usage and highlighted the potential of digital and hybrid event formats. Implementation of these event formats has significantly increased in Twebcast’s work, compared to before the COVID-19-pandemic. It was also concluded that the development of security measures for digital events has been accelerated and affected by the prevailing uncertainty during the pandemic. On the other hand, Twbecast’s new digital approaches and security measures are not indicated to have achieved expected usage in the present.
|
7 |
Secure Reprogramming of a Network Connected Device : Securing programmable logic controllersTesfaye, Mussie January 2012 (has links)
This is a master’s thesis project entitled “Secure reprogramming of network connected devices”. The thesis begins by providing some background information to enable the reader to understand the current vulnerabilities of network-connected devices, specifically with regard to cyber security and data integrity. Today supervisory control and data acquisition systems utilizing network connected programmable logic controllers are widely used in many industries and critical infrastructures. These network-attached devices have been under increasing attack for some time by malicious attackers (including in some cases possibly government supported efforts). This thesis evaluates currently available solutions to mitigate these attacks. Based upon this evaluation a new solution based on the Trusted Computing Group (TCG’s) Trusted Platform Modules (TPM) specification is proposed. This solution utilizes a lightweight version of TPM and TCG’s Reliable Computing Machine (RCM) to achieve the desired security. The security of the proposed solution is evaluated both theoretically and using a prototype. This evaluation shows that the proposed solution helps to a great extent to mitigate the previously observed vulnerabilities when reprogramming network connected devices. The main result of this thesis project is a secure way of reprogramming these network attached devices so that only a valid user can successfully reprogram the device and no one else can reprogram the device (either to return it to an earlier state, perhaps with a known attack vector, or even worse prevent a valid user from programming the device). / Avhandlingen börjar med att ge lite bakgrundsinformation för att läsaren att förstå de nuvarande sårbarheten i nätverksanslutna enheter, särskilt när det gäller IT-säkerhet och dataintegritet. Idag övervakande kontroll och datainsamlingssystem använder nätverksanslutna programmerbara styrsystem används allmänt i många branscher och kritisk infrastruktur. Dessa nätverk anslutna enheter har under ökande attacker under en tid av illvilliga angripare (inklusive i vissa fall eventuellt regeringen stöds insatser). Denna avhandling utvärderar för närvarande tillgängliga lösningar för att minska dessa attacker. Baserat på denna utvärdering en ny lösning baserad på Trusted Computing Group (TCG) Trusted Platform Modules (TPM) specifikation föreslås. Denna lösning använder en lätt version av TPM och TCG:s pålitliga dator (RCM) för att uppnå önskad säkerhet. Säkerheten i den föreslagna lösningen utvärderas både teoretiskt och med hjälp av en prototyp. Utvärderingen visar att den föreslagna lösningen bidrar i stor utsträckning för att minska de tidigare observerade sårbarheter när omprogrammering nätverksanslutna enheter. Huvudresultatet av denna avhandling projektet är ett säkert sätt omprogrammering dessa nätverksanslutna enheter så att endast ett giltigt användarnamn framgångsrikt kan omprogrammera enheten och ingen annan kan programmera enheten (antingen att återställa den till ett tidigare tillstånd, kanske med en känd attack vector, eller ännu värre förhindra en giltig användare från programmering av enheten).
|
Page generated in 0.0564 seconds