Explore chapters and articles related to this topic
Theorizing technology and its role in crime and law enforcement
Published in M. R. McGuire, Thomas J. Holt, The Routledge Handbook of Technology, Crime and Justice, 2017
Artifacts for escaping punishment include the following: Artifacts for preventing, altering, destroying, concealing or falsifying physical evidence (fingerprints, tire tracks, bodies, DNA, camera images, physical evidence of break-in, etc.): gloves, masks, cleaning products, disposable phones, data-erasing software, encryption software, web anonymizers, artifacts that are used to manufacture or constitute false evidence (e.g. fabricated DNA evidence, false Internet alibis, a murder weapon planted on a victim to suggest suicide), etc.Artifacts for a secure escape from a crime scene or from a police pursuit: fast cars, weapons, bullet-proof vests, mobile phones, door reinforcements (in hideouts), alarm systems, false digital trails, etc.
Design of a Secure Infrastructure for Cognitive IoT Platforms and Applications
Published in Pethuru Raj, Anupama C. Raman, Harihara Subramanian, Cognitive Internet of Things, 2022
Pethuru Raj, Anupama C. Raman, Harihara Subramanian
It is the process of converting data into a format which cannot be interpreted easily and directly by unauthorized users. It is very important to ensure that data which is stored in the IoT infrastructure and the data which is transmitted via the networks are in encrypted form. This is very helpful to prevent unauthorized deception of data by third-party agents. the process of converting the data back to its original form is called decryption. Several encryption software are available in the market.
Network Management
Published in Sharon Yull, BTEC National for IT Practitioners: Systems units, 2010
Encryption software scrambles message transmissions. When a message is encrypted a secret numerical code, the ‘encryption key’, is applied, and the message can be transmitted or stored in indecipherable characters. The message can only be read after it has been reconstructed through the use of a ‘matching key’.
Perceptions of Cybersecurity Readiness among Workgroup IT Managers
Published in Journal of Computer Information Systems, 2021
Thomas A. Chapman, Brian J. Reithel
These two events, and many more like them, clearly demonstrate that cyber and ransomware attacks are increasingly common in the public domain. Furthermore, it is clear that such attacks are increasing in frequency, scope, and severity. This trend is driven by the relative ease with which hackers can now launch world-wide cyber attacks – a trend that has been made possible by the confluence of new and widely-available tools that have combined to make cyber and ransomware attacks both easy and profitable. The advent of digital currencies like Bitcoin, together with the proliferation of new and powerful encryption software, has made it easy for would-be thieves to wage cyber and ransom warfare. For instance, the WannaCry attack, which swept across more than 150 countries before it was stopped, exploited a Microsoft Windows vulnerability that was first discovered by the National Security Agency (NSA) of the United States.2 Microsoft Windows is the operating system of choice for approximately 80% of the world’s desktop computers. Even though Microsoft had been warned by the NSA prior to May 2017 that the exploit had been exposed, and Microsoft had in turn released a security patch to close the exploit, enough computers were left exposed that the WannaCry ransomware was able to encrypt the computers of more than 70,000 organizations before it was stopped.2
An empirical study examining the perceptions and behaviours of security-conscious users of mobile authentication
Published in Behaviour & Information Technology, 2018
Flynn Wolf, Ravi Kuber, Adam J Aviv
Shoulder surfing is frequently cited as a motivating factor for more secure forms of usable interaction in studies dealing with mobile authentication. Worries relating to third parties viewing and recreating passcodes have resulted in researchers investigating this area. Studies have aimed to characterise the real-world prevalence of shoulder surfing (Harbach et al. 2014), which was found to be rarely perceived by mobile users. Studies have also tested novel interaction schemes that might deter observer attacks, such as gesture recognition and tactile cues for distraction gestures (De Luca, von Zezschwitz, and Hussman 2009; De Luca et al. 2012; Hang, De Luca, and Hussmann 2015). Also, the interaction of usability and security in the passcode entry phase of authentication has been identified as a key relationship and studied (Yee 2002; Aviv and Fichter 2014; Wiese and Roth 2015; Mare, Baker, and Gummeson 2016), including lab-based comparisons of shoulder surfing susceptibility between different types of virtual keyboards (Schaub, Deyhle, and Weber 2012), field studies of grid and PIN passcode entry (von Zezschwitz, Dunphy, and de Luca 2013), as well as cognitive walkthrough studies of encryption software usability (Whitten and Tygar 1999; Warshaw, Taft, and Woodruff 2016). More broadly, research has examined password management habits (Schaub, Deyhle, and Weber 2012; Stobert and Biddle 2014; Melicher et al. 2016, July, Ur et al. 2016; Wash et al. 2016).
An integrated DEMATEL-MMDE-ISM based approach for analysing the barriers of IoT implementation in the manufacturing industry
Published in International Journal of Production Research, 2019
The multilevel occurrence of security issues make them inherently fundamental in nature. To make sure that the data, service and the entire system as a whole remains secure, multi-faceted approach is required. This constitutes ensuring proper functioning of a number of characteristics including confidentiality, authentication, integrity, authorisation, non-repudiation, availability, etc. (Borgia 2014). The challenge visibly multiplies on the face of a large number of devices connected. Moreover, the data gathered by IoT devices have a wide variety. It can be personal or professional in nature, and can be from innumerable fields in which IoT finds applications namely healthcare, social, industrial, transportation, etc. This vast amount of data requires encryption, software protection, and authorisation. All these factors make these devices extremely vulnerable to external security threats (Haddud et al. 2017; Lee and Lee 2015). Owing to the dissimilarity of the data types traditional security mechanisms would fail. Different security constraints have been analysed involving IoT (Alaba et al. 2017). With regard to hardware deployed, constraints include memory, Computational and energy constraint, Tamper resistant packaging. While those with respect to software include dynamic security patch and embedded software constraint. The major constraints are based on networking which includes mobility, scalability, multiplicity of devices, and multiplicity of communication medium, multi-protocol networking, and dynamic network topology. At the physical level, requirements such as authorisation, integrity authentication, confidentiality, exception handling, self-organisation, resiliency, and anonymity have to be provided (Ferrag et al. 2017). As far as networking is concerned, it has to be made sure that the data sensed and transmitted remains confidential, remains intact and is accessed by the authorised devices. Various security frameworks and protocols like IPSec (Raza et al. 2014), DTLS (Kothmayr et al. 2013), etc. have been proposed but they need to be further developed to suit IoT framework.