Spelling suggestions: "subject:"1nternet 2security"" "subject:"1nternet bsecurity""
51 |
Pro-active visualization of cyber security on a National Level : a South African case studySwart, Ignatius Petrus January 2015 (has links)
The need for increased national cyber security situational awareness is evident from the growing number of published national cyber security strategies. Governments are progressively seen as responsible for cyber security, but at the same time increasingly constrained by legal, privacy and resource considerations. Infrastructure and services that form part of the national cyber domain are often not under the control of government, necessitating the need for information sharing between governments and commercial partners. While sharing of security information is necessary, it typically requires considerable time to be implemented effectively. In an effort to decrease the time and effort required for cyber security situational awareness, this study considered commercially available data sources relating to a national cyber domain. Open source information is typically used by attackers to gather information with great success. An understanding of the data provided by these sources can also afford decision makers the opportunity to set priorities more effectively. Through the use of an adapted Joint Directors of Laboratories (JDL) fusion model, an experimental system was implemented that visualized the potential that open source intelligence could have on cyber situational awareness. Datasets used in the validation of the model contained information obtained from eight different data sources over a two year period with a focus on the South African .co.za sub domain. Over a million infrastructure devices were examined in this study along with information pertaining to a potential 88 million vulnerabilities on these devices. During the examination of data sources, a severe lack of information regarding the human aspect in cyber security was identified that led to the creation of a novel Personally Identifiable Information detection sensor (PII). The resultant two million records pertaining to PII in the South African domain were incorporated into the data fusion experiment for processing. The results of this processing are discussed in the three case studies. The results offered in this study aim to highlight how data fusion and effective visualization can serve to move national cyber security from a primarily reactive undertaking to a more pro-active model.
|
52 |
Information security in a distributed banking environment, with specific reference to security protocols.Van Buuren, Suzi 22 August 2012 (has links)
M.Comm. / The principal aim of the present dissertation is to determine the nature of an electronicbanking environment, to determine the threats within such an environment and the security functionality needed to ward off these threats. Security solutions for each area at risk will be provided in short. The main focus of the dissertation will fall on the security protocols that can be used as solutions to protect a banking system. In the dissertation, indication will also be given of what the security protocols, in their turn, depend on to provide protection to a banking system. There are several security protocols that can be used to secure a banking system. The problem, however, is to determine which protocol will provide the best security for a bank in a specific application. This dissertation is also aimed at providing a general security framework that banks could use to evaluate various security protocols which could be implemented to secure a banking system. Such framework should indicate which security protocols will provide a bank in a certain banking environment with the best protection against security threats. It should also indicate which protocols could be used in combination with others to provide the best security.
|
53 |
Information security in web-based teleradiology.Psaros, Vasiliki Chrisovalantou 04 June 2008 (has links)
Health care organisations operate in a eld that is driven by patient, business and legislative demands. Now, Information Technology (IT) is starting to exert its powers on this eld. A revolution is taking place in the health care eld, and IT is playing an increasingly important role. This study originated from realising that medical staff were using technology to help them receive patient studies and do a diagnosis. Health care professionals are very dependent on the availability of the computer systems and on the accuracy of the data that is stored. While health care records may contain information that is of utmost sensitivity, this information is only useful if it is shared with the health care providers and the system under which the patient receives his/her care. The latter trend marks an ever-growing need to protect the confidentiality and integrity of health care information, while at the same time ensuring its availability to authorised health care providers. It has to be acknowledged that a complete protection of data is, in practice, infeasible and impossible. Many systems are not secure, making them vulnerable to attacks. Health care facilities have a challenge of keeping up-to-date with the legal requirements that apply to patient records in order to protect the condentiality, integrity and availability of patient data. This study is aimed at examining the information security of the data in a teleradiology system that is used by a health care facility, and to provide recommendations on how the security can be improved. / Prof. S.H. von Solms
|
54 |
Multi-level security in multiagent systemsWagner, Gerd 19 October 2018 (has links)
Whenever agents deal with confidential information, it is important that they comply with a principled security policy. We show how the database concept of multi-level security can be applied to inter-agent communication. This includes the case where an unauthorized agent is misinformed on purpose in order to protect confidential information.
|
55 |
Browser-Based Trust NegotiationMorris, Cameron 21 March 2006 (has links) (PDF)
Trust negotiation allows two parties on the Internet to establish trust in each other according to the digital credentials thateach other possesses. Traditionally, trust negotiation uses certificates as digital credentials. However, certificates make trust negotiation difficult to use since people rarely have certificates available to them, and they must physically possess and secure all needed certificates in order to negotiate. To avoid these problems, this thesis proposes that credential authorities negotiate on behalf of the user. This thesis defines BrowserBased Trust Negotiation (BBTN) as a method for negotiating with credential authorities using the Secure Assertion Markup Language (SAML).
|
56 |
Detection, Triage, and Attribution of PII Phishing SitesRoellke, Dennis January 2022 (has links)
Stolen personally identifiable information (PII) can be abused to perform a multitude of crimes in the victim’s name. For instance, credit card information can be used in drug business, Social Security Numbers and health ID’s can be used in insurance fraud, and passport data can be used for human trafficking or in terrorism. Even Information typically considered publicly available (e.g. name, birthday, phone number, etc.) can be used for unauthorized registration of services and generation of new accounts using the victim’s identity (unauthorized account creation). Accordingly, modern phishing campaigns have outlived the goal of account takeover and are trending towards more sophisticated goals.
While criminal investigations in the real world evolved over centuries, digital forensics is only a few decades into the art. In digital forensics, threat analysts have pioneered the field of enhanced attribution - a study of threat intelligence that aims to find a link between attacks and attackers. Their findings provide valuable information for investigators, ultimately bolster takedown efforts and help determine the proper course of legal action. Despite an overwhelming offer of security solutions today suggesting great threat analysis capabilities, vendors only share attack signatures and additional intelligence remains locked into the vendor’s ecosystem. Victims often hesitate to disclose attacks, fearing reputation damage and the accidental revealing of intellectual property. This phenomenon limits the availability of postmortem analysis from real-world attacks and often forces third-party investigators, like government agencies, to mine their own data.
In the absence of industry data, it can be promising to actively infiltrate fraudsters in an independent sting operation. Intuitively, undercover agents can be used to monitor online markets for illegal offerings and another common industry practice is to trap attackers in monitored sandboxes called honeypots. Using honeypots, investigators lure and deceive an attacker into believing an attack was successful while simultaneously studying the attacker’s behavior. Insights gathered from this process allow investigators to examine the latest attack vectors, methodology, and overall trends. For either approach, investigators crave additional information about the attacker, such that they can know what to look for. In the context of phishing attacks, it has been repeatedly proposed to "shoot tracers into the cloud", by stuffing phishing sites with fake information that can later be recognized in one way or another. However, to the best of our knowledge, no existing solution can keep up with modern phishing campaigns, because they focus on credential stuffing only, while modern campaigns steal more than just user credentials — they increasingly target PII instead.We observe that the use of HTML form input fields is a commonality among both credential stealing and identity stealing phishing sites and we propose to thoroughly evaluate this feature for the detection, triage and attribution of phishing attacks. This process includes extracting the phishing site’s target PII from its HTML <label> tags, investigating how JavaScript code stylometry can be used to fingerprint a phishing site for its detection, and determining commonalities between the threat actor’s personal styles.
Our evaluation shows that <input> tag identifiers, and <label> tags are the most important features for this machine learning classification task, lifting the accuracy from 68% without these features to up to 92% when including them. We show that <input> tag identifiers and code stylometry can also be used to decide if a phishing site uses cloaking. Then we propose to build the first denial-of-phishing engine (DOPE) that handles all phishing; both Credential Stealing and PII theft. DOPE analyzes HTML <label> tags to learn which information to provide, and we craft this information in a believable manner, meaning that it can be expected to pass credibility tests by the phisher.
|
57 |
Innovative Location Based Scheme for Internet Security Protocol. A proposed Location Based Scheme N-Kerberos Security Protocol Using Intelligent Logic of Believes, Particularly by Modified BAN Logic.Abdelmajid, Nabih T. January 2010 (has links)
The importance of the data authentication has resulted in the science of the data protection. Interest in this knowledge has been growing due to the increase in privacy of the user's identity, especially after the widespread use of online transactions. Many security techniques are available to maintain the privacy of the user's identity. These include password, smart card or token and face recognition or finger print. But unfortunately, the possibility to duplicate the identity of a user is still possible. Recently, specialists used the user's physical location as a new factor in order to increase the strength of the verification of the user's identity.
This thesis focused on the authentication-based user's location. It is based on the idea of using the Global Position System in order to verify the user identity. Improving Kerberos protocol using GPS signal is proposed in order to eliminate the effect of replay attack. This proposal does not expect a high performance from the user during the implementation of the security system. Moreover, to give users more confidence to use security protocol, it has to be evaluated before accepting it. Thus, a measurement tool used to validate protocols called BAN logic was described. In this thesis, a new form of BAN logic which aims to raise the efficiency checking process of the protocol protection strength using the GPS signal is proposed.
The proposed form of Kerberos protocol has been analysed using the new form of BAN logic. The new scheme has been tested and compared with the existing techniques to demonstrate its merits and capabilities.
|
58 |
DESIGNING A PROTOTYPE TO PROVIDE SECURE COMMUNICATION BETWEEN PHYSICIANS: A SURVEY TO EXAMINE ACCEPTABILITY AMONG USERSBasu, Runki 10 1900 (has links)
<p><strong>OBJECTIVE: </strong>The aim of this study was to explore an alternative method of secure data exchange of patient information among physicians using their existing email.<strong></strong></p> <p><strong>METHODS: </strong>A four-step framework was designed to effectively conduct the research. It involved designing a prototype of a web-based system called ST-SecRx to simulate secure communication between physicians while exchanging sensitive patient data through email. The simulation achieved through the system was meant to determine and measure response of physicians to the use of secure email or similar communication tools for exchanging patient data. Physicians were invited to use ST-SecRx and subsequently participate in a survey to determine its acceptability and their perceptions about the usefulness of the software. Finally, the data collected from the survey were analyzed.</p> <p><strong>RESULTS:</strong> Data were collected from 22 physicians from various healthcare facilities in the province of Ontario, Canada. Eliminating questionnaires with no response resulted in 19 valid responses. Results revealed that 57.9% used email support provided by their organization for exchanging patient data. Over 70% acknowledged that factors such as: ease of use, not having to use an email different from the one provided by their employer, not having to create and remember new password every three to six months, and data transfer complying with privacy regulations would facilitate their use of ST-SecRx. More than 50% of the physicians felt that the simulated system as demonstrated to them was more secure and easier to use when compared to previously used methods of patient data exchange through email. The majority of the physicians (from 57.9% to 73.7%) agreed with all the six questions on behavioral intention to use ST-SecRx. Overall 42% were willing to pay between $5 and $20 per month for ST-SecRx. Additional analysis of data by age, sex and discipline did not reveal any substantial differences in their enthusiasm to use the system.</p> <p><strong>CONCLUSION: </strong>The current research was successful providing data on what is important to clinicians who want to exchange data on patients with other clinicians. Use of systems similar to the prototype ST-SecRx could be an improvement over conventional email, provided that they would ensure security using encrypted technology under public key infrastructure methods and systems. Overall the physicians were satisfied with ST-SexRx and found it simple, fast, easy to use, and secure, and they indicated that they intended to use it if it were made available and it conformed to privacy and security standards. Also, such a secure system would have the potential to reduce the overall cost of healthcare by reducing duplication of diagnostic tests and making patient- specific information exchange faster. More research needs to be conducted with a larger sample size to validate the findings of this study. The limitations, dissatisfaction, and concerns expressed by the physicians who used ST-SecRx could direct future research. Future studies could include other healthcare professionals in the exchange of sensitive clinical data.</p> / Master of Science (MSc)
|
59 |
Investigating the possible introduction of managed broadband internet security : a pilot studyKruger, Richard Carl 03 1900 (has links)
Thesis (MBA (Business Management))--Stellenbosch University, 2008. / ENGLISH ABSTRACT: Soon after the development of the internet as a network structure connecting computers on a global scale, was the introduction of malicious computer code, which was disseminated through this network. Initially this code was the relegation of pranksters, but evolved quickly to be code causing destruction, intrusion and loss of privacy while on the internet. This code became known as the computer virus and was soon used by fraudsters to infiltrate networks to create deception and fraud for financial gain. It has become of paramount importance for users of the internet to protect themselves and their networks from these attacks, through various ingenious mechanisms of protection. The traditional mainstay for computer virus protection has been the software approach using counter code to protect against any malicious computer code. This protection has had limited success as the very nature of malicious code is constantly changing and evolving, making it sometimes an impossible task for internet users to be protected with the latest anti-virus software for protection. The author of this study introduces a managed anti-virus protection alternative which is delivered by a computer hardware device. This is a new technology and a full description is made of the role of this product as a new product development. The empirical research of this paper focuses around the test for a need for the product described to the point, but excluding commercialization. / AFRIKAANSE OPSOMMING: Kort na die ontwikkeling van die internet as 'n netwerkstruktuur wat rekenaars op 'n globale skaal verbind, was daar die bekendstelling van kwaadwillige rekenaarkodes wat reg deur die netwerk versprei het. Aanvanklik was die kode gemik op die verdrywing van poetsbakkers, maar het spoedig ontwikkel in kodeverdrywing, inmenging en verlies aan privaatheid op die internet. Hierdie kode het bekend geword as die rekenaarvirus, en is spoedig deur bedrieërs gebruik om netwerke te infiltreer om gebruikers te mislei en te bedrieg vir eie finansiële gewin. Dit het vir gebruikers van die internet van uiterste belang geword om hulle en hulle netwerkte teen hierdie aanvalle te beskerm, en wel deur middel van verskeie meganismes. Die bekendste bekermingsmatreël teen die virus is die aanwending van sagteware as teenkode. Hierdie bekermingsmetode het egter tot dusver beperkte sukses behaal, aangesien die aard van kwaadwilligheid voortdurend verander en ontwikkel, sodat dit soms onmoontlik is dat gebruikers deur die nuutste anti-virussagteware beskerm kan word. Die skrywer van hierdie verhandeling stel 'n werkbare, alternatiewe anti-virusbeskermer bekend wat deur rekenaar-hardewareplan daargestel is. Dit het nuwe tegnologie, en 'n volledige beskrywing word gegee van die rol van hierdie produk as 'n nuwe ontwikkeling. Die empiriese navorsing van die verhandeling fokus op die toets vir die noodsaaklikheid van so 'n produk, met die uisluiting van kommersialisering.
|
60 |
A real time, system independent, secure, Internet based auctioning system.Brown, Cuan. January 2000 (has links)
This thesis outlines the creation of a secure, real time, system independent,
Internet based auctioning application. The system has been developed to meet the
needs of today's stringent reqUirements on secure Internet based applications. To
attain this goal, the latest cryptographic algorithms and development platforms
have been used. The result is a JAVA based server and client auctioning application.
The client application is designed to run In any common web browser, and the
server to execute on any JAVA enabled operating system with a web server and
Internet connection. The real time system uses a relatively secure hybrid
cryptosystem for communication. This involves the use of RSA for secure key
exchange, and RC6 and MARS for secure communication. / Thesis (M.Sc.)-University of Natal,Durban, 2000.
|
Page generated in 0.095 seconds