Explore chapters and articles related to this topic
Computer and Internet Crime
Published in G. K. Awari, Sarvesh V. Warjurkar, Ethics in Information Technology, 2022
G. K. Awari, Sarvesh V. Warjurkar
An exploit is a computer attack on a system that takes advantage of a flaw in the system. Poor system design or implementations are frequently the cause of this attack. When a security flaw is found, software engineers work rapidly to produce and distribute a “fix,” or patch, to remedy the problem. The patch, which can usually be downloaded from the Internet, is the responsibility of the system or application’s users. Any time a patch is not installed, the user risks a security breach. The daily pace at which software vulnerabilities are found by companies across the globe is estimated to be between 7 and 382 per day. All of these bugs and potential vulnerabilities put developers who are in charge of security fixes under a lot of pressure. Keeping up with all of the required patches can be difficult. A zero-day intrusion occurs until the security industry or app developers are aware of the flaw or are ready to fix it. Although zero-day vulnerabilities can cause significant harm, few such attacks have been reported as of this writing.
System Threats
Published in Nicholas Kolokotronis, Stavros Shiaeles, Cyber-Security Threats, Actors, and Dynamic Mitigation, 2021
Konstantinos-Panagiotis Grammatikakis, Nicholas Kolokotronis
Vulnerabilities are flaws present in a system's hardware or software that can allow an adversary to perform actions or use the system in an unintended way. Exploits are programs or code created and used to take advantage of a vulnerability [35]. Undisclosed vulnerabilities, unknown to the designer or the vulnerable system, are referred to as zero-day or 0-day vulnerabilities. In the context of malware attacks, vulnerability exploitation involves the use of exploits to achieve execution of arbitrary code—that is, either the payload or a later stage of the malware. Worms: A category of self-contained malicious software that propagates autonomously through a computer network. As is also the case with viruses, they may have to be initially triggered by user interaction. They can propagate either: (a) by exploiting vulnerabilities present in a system or (b) by taking advantage of other readily available communications options (email messages, connecting to misconfigured systems, etc.).
Security: Basics and Security Analytics
Published in Rakesh M. Verma, David J. Marchette, Cybersecurity Analytics, 2019
Rakesh M. Verma, David J. Marchette
attack!intrusion Very broadly defined, an intrusion is an attack on any of the security goals of a system. However, typically we use the term intrusion in the digital world to refer to an unauthorized access of a system or a network. One of the most popular ways of gaining access to a system has been by cracking the password of a legitimate user of the system or network. In older Unix systems, the password file was publicly accessible. Of course, the raw passwords were not saved in the file, but a hash of the password was stored together with the salt bits used as input to the cryptographic hash function. Another method for intrusions is finding and attacking vulnerable services running on a system with open ports. Vulnerabilities that have been exploited include buffer overflow attacks, integer overflow attacks, format string attacks, and command injection attacks such as SQL injection or script injection.
Cloud Disruption Impacts Business IT Role Requirements
Published in Journal of Computer Information Systems, 2022
Brian Cusack, Adekemi Adedokun
Further literature analysis delivered insight into how generic roles in organizations have changed to accept and exploit the Cloud service opportunity (Table 2). The cloud has simplified BIS operations and many former roles are unnecessary. It has also introduced new roles that were not in traditional settings. These roles generally require new capabilities, and involve supporting the integration process, developing Cloud applications, maintaining, and supporting Cloud infrastructure, and collaborating with Cloud vendors to understand the shared IT supply model. The new roles are disruptive to the old as often the scope of role descriptions has changed, and there is uncertainty around the requirements for the new models, such as the Cloud transaction model and the Cloud security model.
Cyber Diversity Index for Sustainable Self-Control of Machines
Published in Cybernetics and Systems, 2022
Unknown attacks, also known as zero-day attacks, target unknown or publicly undisclosed software vulnerabilities. zero-day refers to how many days the software vendor has known about its vulnerability (Ablon and Bogart 2017). However, having unpatched software and security controls that have not been updated for some time, inadvertently make us defend against unknown-to-us attacks, which have the same impact as a zero-day attack to the defender. Additionally, when new patches are provided by software vendors, attackers can potentially reverse engineer the patch, identify exploitable vulnerabilities and develop an 1-day exploit (Paganini 2019). For the purpose of term consistency throughout this paper, the term zero-day, due to its impact, will be used to cover cyber attacks that successfully exploit vulnerabilities. The only plausible defensive solution against these cyber attacks would be to use an anomaly-based security control.
The effect of prevailing wages on building costs, bid competition, and bidder behaviour: evidence from Ohio school construction
Published in Construction Management and Economics, 2020
Lameck Onsarigo, Kevin Duncan, Alan Atalah
Research that exploit detailed project-level data and statistical software address the shortcoming of the wage differential method by examining the effect of PWLs on total construction costs. This broader cost measure captures the changes in input utilisation and productivity that construction managers and contractors make when prevailing wages are required. While researchers have examined the impact of PWLs on a variety of different construction projects, the research has focussed on school construction because taxpayers are particularly sensitive to policies that affect the cost of education (Duncan and Ormiston 2019). In addition, school construction is relatively homogenous with project-level data that is relatively easy to obtain. Unless indicated otherwise, the studies reviewed below are based on the regression analysis of project bid-prices since information on change orders that determine final (total) project costs are typically unavailable (see Duncan 2015). While model specifications vary between studies, the standard practice is to include other detailed project-level information such as measures of project size (square feet and number of stories), project complexity (distinguished by elementary, middle, and high schools), whether the project is new or an addition, and the stage of the business cycle, etc. This information allows for the measurement of the cost impact of the prevailing wage policy taking into consideration other project features that also influence construction costs.