Explore chapters and articles related to this topic
Fog-Based Framework for Improving IoT/IoV Security and Privacy
Published in Sudhir Kumar Sharma, Bharat Bhushan, Bhuvan Unhelkar, Security and Trust Issues in Internet of Things, 2020
M. Nahri, A. Boulmakoul, L. Karim
The variety, openness, and accessibility of IoV technologies make them more exposed to malicious attacks. Moreover, the complexity of IoV architectures enhances the complexity of security measures to be adopted. Furthermore, the security for IoV seems to be uncontrollable regarding the high velocity aspects of connected devices. IoV is likely to undergo all IoT attacks types and others with much more dangers. For instance, devices and networks are exposed to attacks such as DOS and channel inference, sybil, blackhole and wormhole, GPS deception, tampering, illusion, eavesdropping, replay, routing, and other (Sun et al. 2016). In general, the IoT architecture consists of three layers: perception/hardware layer, a network/communication layer, and a layer of interfaces/services. The attack vectors listed in the Open Web Application Security OWASP relate to these three layers. Therefore, the implementation of IoT security mitigation should encompass the security architecture of all IoT layers (Noor, Binti, and Hassan 2019). In the literature, authentication, encryption, trust management, secure routing, and other kinds of security measures, such as those based on blockchain technology, are considered for facing malicious attacks. However, any security solution must take into account the reality of IoV devices constrained by the computational power along with energy. Moreover, it must be more suitable for IoV architectures. Especially, the choice of the authentication mechanism and the cryptography algorithm presents a challenge.
Reconnaissance
Published in Nicholas Kolokotronis, Stavros Shiaeles, Cyber-Security Threats, Actors, and Dynamic Mitigation, 2021
Christos-Minas Mathas, Costas Vassilakis
In the following paragraphs, six widely used vulnerability scanning tools are presented; these are OpenVAS, Nessus, Nikto, Arachni, w3af, and Vega. The list is non-exhaustive: again, the emphasis is placed on open source and free access tools. A multitude of non-open source and commercial products also exists, notably including Netsparker25, Acunetix26, Intruder27, Probely28, AppTrana29, and ManageEngine Vulnerability Manager Plus30. For web application vulnerability scanners, in particular, Open Web Application Security Project (OWASP) maintains a list of prominent tools [45].
Digital Marketing and Analysis Techniques: Transforming Internet Usage
Published in Gulshan Shrivastava, Sheng-Lung Peng, Himani Bansal, Kavita Sharma, Meenakshi Sharma, New Age Analytics, 2020
Meenakshi Sharma, Nidhika Chauhan, Himani Bansal, Loredana Stanciu
These days, web applications are the prime target for security attackers. Utilizing explicit security systems can anticipate or identify a security assault on a web application, yet it is not possible to discover the criminal who has committed the security assault not being able to follow back an assault, encourage others to dispatch new assaults on a similar framework. Web application forensics intends to follow back and attribute a web application security assault to its originator. This may altogether diminish the security assaults focusing on a web application consistently, thus improving its security (Chen et al., 2013).
On the scale of Cyberspace and Cybersecurity
Published in International Journal of Computers and Applications, 2022
If we look deep into the overall field of Cybersecurity, it can have various aspects and directions like [5]: Network security;Information security;Application security;Business continuity planning/disaster recovery;Leadership commitment;Operational security; andEnd-user education.Our understanding is that Cybersecurity is not just a one-time measure. But rather, it is a continuous process of security awareness, strategic planning, implementation, monitoring, and evaluation. The hackers are not sitting idle – as we try to find more effective defense mechanisms, so are they spending their time finding crafty methods to breach the security. As the scale of Cyberspace increases, Cybersecurity would remain a wide field in the IT environment, which would range from human behaviors to the technological procedures that would directly or indirectly impact the security of valuable resources stored and connected to the apparently scale-less, ever-expanding network environment.
Digital Transformation Security Challenges
Published in Journal of Computer Information Systems, 2023
Digitization requires a “security by design” approach that minimizes vulnerable coding errors and vulnerabilities. To achieve this, software engineers were provided with security guidelines, including the Open Web Application Security Project”s (OWASP) Top 10 White Paper, the Groupe Spéciale Mobile Association”s (GSMA) “GSMA IoT Security Guidelines & Assessment,” the IoT Security Foundation”s ‘Secure Design Best Practice Guides’ and the Cloud Security Alliance’s ‘Future Proofing the Connected World: 13 Step to Developing Secure IoT Products.’
Security test MOODLE: a penetration testing case study
Published in International Journal of Computers and Applications, 2020
Akalanka Karunarathne Mudiyanselage, Lei Pan
Our security-testing framework for testing Moodle or any other PHP-based web application allows businesses to test their Moodle or PHP-based web application security in a comprehensive manner by conducting source code analysis in conjunction with a web application penetration testing.