Explore chapters and articles related to this topic
Research and implementation of automatic evaluation method for operating system security
Published in Amir Hussain, Mirjana Ivanovic, Electronics, Communications and Networks IV, 2015
Haifeng Liu, Hongliang Liang, Xiaomei Zhang, Qian Zhao, Lei Wang
*Corresponding author: [email protected] 1985 (TCSEC 1985 ), which focussed on the confidentiality requirements for information systems. Later, a series of relative criteria, such as Trusted Database Illustration (TDI), Trusted Network Illustration (TNI), were established. TCSEC put forward the regulatory requirements for user log-in, authorization management, access control, audit trail, covert channel analysis, trusted path setup, security evaluation, life circle guarantee, documents writing, etc. Four classes and seven levels were proposed to evaluate a system, based on the system's security policies and security functions.
Development of a Scale to Measure Cybercrime-Awareness on Social Media
Published in Journal of Computer Information Systems, 2023
The history of cybercrimes over the decades can be seen in Table 1. The history of cybercrime is important to understand how crimes have been evaluated over the years. For example, phone phreaking began in the 1950s.10 Phone phreaks were hijacking the protocols in phone systems to make free calls for long distances. The phone phreaking can be considered as the first cybercrime in the digital world. The computer vulnerabilities and hacking term emerged in the 1960s.10 The foundation of cybersecurity began in the early 1970s with the project called “Advanced Research Projects Agency Network” (ARPANET).10 This was the first packet-switched network before the Internet. The first virus was created in 1971 in ARPANET’s network, and famous hacker Kevin Mitnick was arrested for the first cybercriminal behavior in 1979.10 In the 1980s, numerous computer-related attacks have occurred.11 In 1985, the USA (United States of America) Department of Defense (DoD) created computer security guidelines, called as Trusted Computer System Evaluation Criteria (TCSEC). The TCSEC was later named as “Orange Book.”11 In the 1990s, initially computer viruses and later computer worms became very popular. In the 2000s, the Internet has grown fast. The first organized hacker group emerged in the beginning of the 2000s. In this area, just opening the website was enough to get infected with a virus. In the 2010s, cybercriminals discovered several security breaches in computer network protocols as well as in software applications. Between 2010 and 2020, ransomware-related attacks became very popular. LockerGoga Ransomware blocked the infected systems and caused millions of dollars in damage.12 In 2020, CovidLock Ransomware affected several Android devices by encrypting the data on devices which resulted in denying data access for legitimate users.13