This paper discusses the development of new hardware and software for protecting access to HMI/SCADA systems via Unprotected Internet Networks (UPN), mainly when working remotely with confidential information. Based on the analysis... more
This paper discusses the development of new hardware and software for protecting access to HMI/SCADA systems via Unprotected Internet Networks (UPN), mainly when working remotely with confidential information. Based on the analysis carried out, it is shown that the existing vulnerabilities can be exploited by cybercriminals to steal passwords and user authentication logins. Modern protection technologies based on the OTP method have been investigated. Moreover, a new concept of information security for user authentication in UPNs when working with information remotely is proposed. The structure of the electronic key and the connection diagram based on the selected hardware modules have been developed. In addition, the two-level user identification algorithms and the firmware program code for the ATmega32U4 microcontroller are considered. Finally, to show the reliability and stability of the of the developed electronic user authentication key against any unexpected software hacking, ...
The ever-increasing growth of the Internet is leading to its widespread use for various purposes. Research shows that, due to low publication barrier to content uploader, anonymity of uploader, exposure to millions of users and a... more
The ever-increasing growth of the Internet is leading to its widespread use for various purposes. Research shows that, due to low publication barrier to content uploader, anonymity of uploader, exposure to millions of users and a potential of a very quick and widespread diffusion of message, various Internet platforms like blogs have become one of most important parts to promote our ideologies in a sophisticated manner. This, together with growing popularity of online blogs, calls blog service provider for providing the relevant and quality information to the web user against their query. We experiment here approaches to rank technical users on blogs with the help of Naïve Bayes classification algorithm and Google page rank algorithm. Evaluation on real-world data from online web blogs is done to determine which algorithm is performing best. The result shows that the performance obtained by the Google page rank algorithm is better than that achieved by Naïve Bayes classification alg...
Behavior in using inappropriate technology and low level of individual awareness causes a high risk of cybercrime. This study aims to see the behavior and awareness of information security among users of the Zoom application, especially... more
Behavior in using inappropriate technology and low level of individual awareness causes a high risk of cybercrime. This study aims to see the behavior and awareness of information security among users of the Zoom application, especially in the COVID-19 era in Indonesia. The measurement scales used in this study were RBS (Risky Behavior Scale), CBS (Conservative Behavior Scale), EOS (Exposure Offence Scale), and RPS (Risk Perception Scale). This research used an online questionnaire to collect data with 400 respondents. Data analysis techniques used the Independent Sample T-Test, Mann Whitney, One Way Anova, Krusskal Wallis, Tukey, Pairwise Comparison, and Spearman Rank, which were processed using the SPSS program. The results showed significant differences between demographics on behavior and information security awareness. Daily Internet usage time influenced behavior and awareness of information security. Security behavior and awareness of information security are essential to det...
En los últimos veinte años se ha desarrollado un movimiento de (Bio)hacking, observando variadas prácticas y formas: en algunos países más definidas y comunitarias, y en otras más desagregadas e individualistas. Este fenómeno, inserto en... more
En los últimos veinte años se ha desarrollado un movimiento de (Bio)hacking, observando variadas prácticas y formas: en algunos países más definidas y comunitarias, y en otras más desagregadas e individualistas. Este fenómeno, inserto en un contexto de capitalismo informacional y Cognitivo, nace de la cultura maker y es heredero de los valores del movimiento hacker, del acceso abierto y el software libre. Este artículo se propone realizar un recorrido bibliográfico que permita dar cuenta de su origen y relación con los valores tradicionalmente asociados a la comunidad científica junto a otros movimientos culturales para, posteriormente, analizar la relación entre producción de conocimiento en espacios de ciencia abierta dedicados al biohacking y propiedad intelectual.
Some of the fast-expanding areas of concern in the realm of cybersecurity are cybercrime-as-a-service (CaaS) and AI-enabled threats. CaaS refers to the usage of online markets or platforms where people or organizations can buy or rent the... more
Some of the fast-expanding areas of concern in the realm of cybersecurity are cybercrime-as-a-service (CaaS) and AI-enabled threats. CaaS refers to the usage of online markets or platforms where people or organizations can buy or rent the equipment and services required to commit cybercrimes. Artificial intelligence-enabled threats are those that leverage machine learning and artificial intelligence to conduct cyberattacks. This article offers an overview of these two topics and suggests a way to deal with them. The suggested approach entails actions like recognizing and keeping an eye on online marketplaces and platforms that are used to buy or rent hacking tools and services, creating and implementing new security tools and technologies that can recognize and counter AI-enabled threats, regularly training staff and users in security awareness, updating and patching systems and software, and working with law enforcement to find a perpetrator.
The 4IR or the digital revolution refers to a collective term for a value chain organizational concepts and technologies that together build the Internet of Things, Internet of people, Cyber-Physical Systems (CPS), Internet of Services... more
The 4IR or the digital revolution refers to a collective term for a value chain organizational concepts and technologies that together build the Internet of Things, Internet of people, Cyber-Physical Systems (CPS), Internet of Services and the Internet of Energy. While this digital revolution has helped the construction industry to prevent cost and time overruns and enable efficiency and good work’s quality, it also has disadvantages and risks such as cyberattacks and loss of jobs. This study set out to determine the risks associated with data management (cyberattacks) on construction projects in the fourth industrial revolution era. The research study will address the questions of “what are the cyberattacks risk attributed to construction data management in the fourth revolution era?” and “What are the differences in the opinion of respondents concerning the identified cyberattacks?”. This research work used a quantitative method and gathered information from different construction...
Propolis has been shown to exibit in vitro antimicrobial activity against periodontal pathogens. The aim of this study was to evaluate the efficacy of Brazilian Green Propolis Gel (BGPG) for the treatment of patients diagnosed with... more
Propolis has been shown to exibit in vitro antimicrobial activity against periodontal pathogens. The aim of this study was to evaluate the efficacy of Brazilian Green Propolis Gel (BGPG) for the treatment of patients diagnosed with gingivitis and Chronic Periodontitis ...
This study aims to identify the needs analysis of a company in involving ethical hackers to achieve the desired goals. This research focuses on accounting information systems which are vital systems in business processes. The... more
This study aims to identify the needs analysis of a company in involving ethical hackers to achieve the desired goals. This research focuses on accounting information systems which are vital systems in business processes. The company's goals will be translated into a need analysis using the PIECES framework (Performance, Information, Economy, Control, Efficiency, and Service). The research method used is a quantitative descriptive method and uses documentation techniques in collecting data. This study uses secondary data in the form of a literature review of 80 journal articles published in 2018-2023. Only ISSN indexed journals are used as data sources to ensure the quality of research output remains relevant. The results of this study are that the information aspect holds the highest urgency at 31.25% and the control aspect ranks second with a score of 25.00%. While the aspect with the lowest urgency is the economic aspect with an achievement of only 6.25%. Comparison of the sc...
Threats are nuisance to the information technology world. Today we have different kind of threats which includes, hacking, viruses and sniffing. However most threats in information technology systems come within, whereby threats come... more
Threats are nuisance to the information technology world. Today we have different kind of threats which includes, hacking, viruses and sniffing. However most threats in information technology systems come within, whereby threats come within the internal network. These internal ...
This paper discusses the development of new hardware and software for protecting access to HMI/SCADA systems via Unprotected Internet Networks (UPN), mainly when working remotely with confidential information. Based on the analysis... more
This paper discusses the development of new hardware and software for protecting access to HMI/SCADA systems via Unprotected Internet Networks (UPN), mainly when working remotely with confidential information. Based on the analysis carried out, it is shown that the existing vulnerabilities can be exploited by cybercriminals to steal passwords and user authentication logins. Modern protection technologies based on the OTP method have been investigated. Moreover, a new concept of information security for user authentication in UPNs when working with information remotely is proposed. The structure of the electronic key and the connection diagram based on the selected hardware modules have been developed. In addition, the two-level user identification algorithms and the firmware program code for the ATmega32U4 microcontroller are considered. Finally, to show the reliability and stability of the of the developed electronic user authentication key against any unexpected software hacking, ...
As educational institutions embrace digital transformation, the integration of technology in educational management has introduced both opportunities and challenges. One of the most pressing challenges is ensuring cyber security. This... more
As educational institutions embrace digital transformation, the integration of technology in educational management has introduced both opportunities and challenges. One of the most pressing challenges is ensuring cyber security. This research paper explores the implications of cyber security in educational management amidst the era of digitalization. The paper discusses the various cyber threats faced by educational institutions, the impact of these threats on educational management, the strategies that can be employed to enhance cyber security and other best practices to mitigate risks.
Internet security is a big problem. Several approaches have been suggested to deal with the problem, ranging from technological, to law-based, to economics-based solutions. One approach emerging is the notion of self-help – using... more
Internet security is a big problem. Several approaches have been suggested to deal with the problem, ranging from technological, to law-based, to economics-based solutions. One approach emerging is the notion of self-help – using reasonable force in self-defense against hackers. Hitherto, the law has not taken a clear position on whether or not counterstrike should be allowed in cyberspace. Here, we try to understand the optimality of hackback and articulate what the law on self-defense in cyberspace ought to be. In particular, we seek to answer the following questions: Should society permit hackback? How should the law on self-defense in cyberspace be designed? Which among the tools of combating cybercrimes – law enforcement, court litigation, hacking back the hacker – should be used to most effectively address cybercrimes? What optimal mix of these alternatives should be used to combat cyber-attacks? What role does technology play? One major argument for hackback is that tradition...
Vì sao bà bầu bị chảy máu mũi, mẹ nên làm gì khi bị chảy máu mũi,… là điều nhiều mẹ đặc biệt quan tâm bởi chảy máu mũi khi mang thai là tình trạng khá phổ biến trong thai kỳ.
Amaç: İnternet ve diğer dijital teknolojileri kullanarak işlenen yasa dışı faaliyetler, siber suç olarak adlandırılmaktadır. Siber suçlar, kullanıcıların gizli verilerine yetkisiz erişim, DOS saldırıları, virüs yayma, çevrimiçi... more
Amaç: İnternet ve diğer dijital teknolojileri kullanarak işlenen yasa dışı faaliyetler, siber suç olarak adlandırılmaktadır. Siber suçlar, kullanıcıların gizli verilerine yetkisiz erişim, DOS saldırıları, virüs yayma, çevrimiçi dolandırıcılık ve bilgisayar korsanlığı gibi çeşitli çevrimiçi suçları içermektedir. Siber saldırıların şirketlere olan maliyetleriyle ilgili önemli araştırmalar yapılmış olsa da, bir şirketin hissedarlarına doğrudan maliyeti, yani siber suçun bir şirketin hisse senedi fiyatı üzerindeki etkisini ele alan çok az araştırma yapılmıştır. Bu araştırma siber suç tehdidinin halka açık şirketlerin hisse senedi fiyatları üzerindeki etkisini incelemeyi araştırmaktadır. Araştırmada 2012-2020 döneminde yurtiçi ve yurt dışında siber saldırılara maruz kalan 17 halka açık şirket hakkındaki siber saldırı duyurularının hisse senedi fiyatları üzerindeki etkisi araştırılmış ve siber suç haberlerinin halka açık şirketlerin hisse senedi fiyatları üzerinde istatistiksel olarak öne...
Chị em khi mang thai cần nắm được cách chống chuột rút cho bà bầu nhanh chóng và hiệu quả nhằm giảm đau nhanh chóng từ đó giúp mẹ khỏe và bé yêu được phát triển khỏe mạnh.
With the increasing significance of startups recently, practitioners and academicians have considered the growth hacking strategies by which these firms obtain competitive performance gains and bring into the world economy. So far,... more
With the increasing significance of startups recently, practitioners and academicians have considered the growth hacking strategies by which these firms obtain competitive performance gains and bring into the world economy. So far, studies have mostly focused on the technical dimensions of these companies, while the business promotions they require and how they should be leveraged strategically have remained neglected. Thus, the current study attempts to present a qualitative study that could be helpful for explaining growth hacking strategies. We employed a multiple case study approach in this paper and investigated the growth strategies of 13 Iranian startups via semi-structured interviews with their founders. The deductive analyses with above 90% inter-rater reliability of the coders concluded in five groups of growth hacking strategies along the growth hacking funnel of acquisition, activation, revenue, retention, and referral. This study developed a deeper understanding of the ...
Several security tools have been described in recent times to assist security teams; however, the effectiveness and success remain limited to specific devices. Phishing is a type of cyberattack that uses fraudulent emails and websites to... more
Several security tools have been described in recent times to assist security teams; however, the effectiveness and success remain limited to specific devices. Phishing is a type of cyberattack that uses fraudulent emails and websites to obtain personal information from unsuspecting users, such as passwords and credit card numbers. Hackers can gain access to your information through a variety of methods, and the most common of which are king, phishing, spear phishing, social engineering, and dictionary attacks. Each of these techniques is unique, but they all have the same goal: to obtain your personal information. Nevertheless, there is the potential to exploit this problem in terms of security. In this paper, we used the Bash Bunny (BB), a new tool designed to assist military, law enforcement, and penetration tester teams with their work to conduct exfiltration without privilege escalation through T1200, T1052, and T1052.001 techniques in air-gapped networks with effectiveness/suc...
Security of data is the major concern in today’s scenario. Transferring of data from one source point to a destination point is referred as data transfer. Encryption is one of the methods which is widely used for transfer of information... more
Security of data is the major concern in today’s scenario. Transferring of data from one source point to a destination point is referred as data transfer. Encryption is one of the methods which is widely used for transfer of information over secured communication channel. Through security of various encryption techniques, we can make our data safe from hackers. Confidential data can be secured by various proposed methodologies and algorithms. Survey has been performed taking into consideration various image encryption techniques and algorithms as well as procedures in this paper and reference ideas about various cryptography techniques and discussed about the challenges faced in the image encryption.
The primary purpose of social media was to facilitate communication between long-lost acquaintances and enable the exchange of personal thoughts, ideas, and insights. On the contrary, with the proliferation of social media users, a... more
The primary purpose of social media was to facilitate communication between long-lost acquaintances and enable the exchange of personal thoughts, ideas, and insights. On the contrary, with the proliferation of social media users, a marginal alteration has occurred in the focus of the engaged audience on these platforms, transitioning from content sharing to data disclosures. The proliferation of Online Social Networks (OSNs) has facilitated global communication and interaction between individuals and organizations. Harassment of both individuals and businesses and infringements of intellectual property rights, identity theft, defamation, data privacy, and the transmission of personal information and viruses are all potential occurrences on social networking sites such as Facebook, Twitter, and LinkedIn. At the moment, there is a lack of publicly accessible business standards that are specifically designed for the computer forensic procedure of examining criminal activity on social networking platforms. The legal and computer forensic ramifications of obtaining digital evidence through social networking applications and programs are examined in this article. Additionally, the article proposes effective and comprehensive approaches to improving youth awareness regarding the detrimental consequences of cybercrime.
Over the last few years, there is tremendous use of online social networking sites. It’s also providing opportunities for hackers to enter easily in network and do their unauthorized activities. There are many notable social networking... more
Over the last few years, there is tremendous use of online social networking sites. It’s also providing opportunities for hackers to enter easily in network and do their unauthorized activities. There are many notable social networking websites like Twitter, Facebook and Google+ etc. These are popularly practiced by numerous people to become linked up with each other and partake their daily happenings through it. Here we focus on twitter for an experiment which is more popular for micro-blogging and its community interact through publishing text-based posts of 140 characters known as tweets. By considering this popularity of tweeter hacker’s use of short Uniform Resource Locator (URL), as a result it disseminates viruses on user accounts. Our study is based on examining the malicious content or their short URLs and protect the user from unauthorized activities. We introduce such a system which provides the security to multiple users of twitter. Besides, they get some alert mails. Ou...
The idea and perception of good cyber security protection remains at the forefront of many organizations’ information and communication technology strategy and investment. However, delving deeper into the details of its implementation... more
The idea and perception of good cyber security protection remains at the forefront of many organizations’ information and communication technology strategy and investment. However, delving deeper into the details of its implementation reveals that organizations’ human capital cyber security knowledge bases are very low. In particular, the lack of social engineering awareness is a concern in the context of human cyber security risks. This study highlights pitfalls and ongoing issues that organizations encounter in the process of developing the human knowledge to protect from social engineering attacks. A detailed literature review is provided to support these arguments with analysis of contemporary approaches. The findings show that despite state-of-the-art cyber security preparations and trained personnel, hackers are still successful in their malicious acts of stealing sensitive information that is crucial to organizations. The factors influencing users’ proficiency in threat detec...
Theo chia sẻ của các mẹ bầu đi trước uống nước dừa trong thai kỳ mang lại nhiều lời ích về sức khỏe cho mẹ và em bé. Tuy nhiên nhiều chị em băn khoăn giai đoạn nào uống nước dừa tốt nhất, thai 20 tuần uống nước dừa được chưa?
Seit mehr als zwei Jahrzehnten beschäftigt sich der Berliner Medien-und Konzeptkünstler Aram Bartholl mit den gesellschaftlichen Folgen von Digitalisierung und Internet. Dabei hat er sich nie auf ein Medium festlegen lassen: Mit Drucken,... more
Seit mehr als zwei Jahrzehnten beschäftigt sich der Berliner Medien-und Konzeptkünstler Aram Bartholl mit den gesellschaftlichen Folgen von Digitalisierung und Internet. Dabei hat er sich nie auf ein Medium festlegen lassen: Mit Drucken, Skulpturen, Videos und Installationen, aber auch mit Interventionen im öffentlichen Raum und mit Workshops und Aktionen, die das Publikum einbeziehen, untersucht er die Beziehungen zwischen der digitalen und physischen Welt und behandelt Themen wie Vernetzung, Privatsphäre und Überwachung. Anlässlich seiner spektakulären Einzelausstellung im Kunstverein Osnabrück spricht er über seine Entwicklung als Künstler und über die Prinzipien von Open Source, Hacking und DIY als Inspiration für seine Arbeit. Tilman Baumgärtel: Noch bis Ende Februar haben Sie in der Kunsthalle Osnabrück eine Ausstellung mit dem Titel Ihr Paket ist abholbereit. Dafür haben Sie in die ehemalige Klosterkirche, in der sich die Kunsthalle befindet, unter anderem jede Menge Elektroschrott und eine DHL-Packstation gebracht. Was steckt dahinter? Aram Bartholl: In der Kunsthalle sind jetzt über 25 Tonnen Elektroschrott, die durch das ganze Kirchenschiff in einem Parcours aus Metallkörben sortiert sind. Darüber hängen drei große Kronleuchter aus alten Flachbild-Fernsehern als Skulpturen von der Decke. Und an den Wänden sind fünf große QR-Codes in der Form einer Flamme auftapeziert, die jeweils mit unterschiedlichen Links und Funktionen hinterlegt wurden. Im Zentrum der Ausstellung ist
Smart phone usage and various computer applications has become part and parcel of daily life of millions of individuals in India and across the globe.These apps help in doing day to day tasks in an efficient manner,it saves time and they... more
Smart phone usage and various computer applications has become part and parcel of daily life of millions of individuals in India and across the globe.These apps help in doing day to day tasks in an efficient manner,it saves time and they are very user friendly. Be it financial transactions, online shopping, online education and so on, users find them extremely useful. Going forward, we can expect more and more people adopting smart phones and start using different types of applications. But, using apps also brings in considerable amount of risk for the users.If the users are not aware of such risks, they are exposed to considerable amount of risk and may become victims of financial frauds, hacking, privacy issues and other cyber security crimes.This research is conducted to understand the users' perception towards using applications and cyber security risks.The study is based on primary data and analysis is done with regards to Aarogya Setu app.This app was made mandatory by the...