Explore chapters and articles related to this topic
Preventing Security Breach in Social Media: Threats and Prevention Techniques
Published in Lavanya Sharma, Mukesh Carpenter, Computer Vision and Internet of Things, 2022
The usage of social media websites is increasing to a great extent and on average a person spends more time on social media than any of the other online activities. So, privacy is a big concern and the only way to resolve the privacy and security issues is to make the audience aware of gathering details about how someone can be easily tricked through these applications. We have recommended ten solutions and precautions which can be taken care of while using social networks. We also request users to educate the surroundings regarding online threats. Users must be careful while sharing stuff, adding a new friend on social media as there is no way to identify the other user’s real identity. A great way of preventing these threats is keeping your systems clean—having no malware or virus (use antivirus) and software up to date. As far as future research is concerned social networks and other organizations are coming up with applications having an improved version of security features. In the end, our security is in our hands only; nevertheless having the state-of-the-art security solution could only help if we pay attention. Thus while using the social network correct precautions need to be taken by the user to preserve his security.
A Framework for Emergency Remote Care and Monitoring Using Internet of Things
Published in Sourav Banerjee, Chinmay Chakraborty, Kousik Dasgupta, Green Computing and Predictive Analytics for Healthcare, 2020
While a system is being developed for the wellbeing of mankind, there remain some security issues that might disrupt the usual working of the system. Generally, data storage and user security are the two most important parts of the system being proposed here, but after discussion it is evident that there will be security-related problems that need addressing [5]. Unfortunately, the majority of the applications developed through IoT-based healthcare system generally fail to prevent intrusions and other types of security threats. A few such threats are as follows [6]: malicious threat, system or network failure, human error, etc. Other than these, cyber-attacks on the system could be classified as: session medjacking, ransomware, denial of service attack (DoS), which, if not taken care of, can disrupt the service temporarily or permanently. Hence the proposed framework must include the handling of these problems so that the user can freely use, interact with and store their current log as well as their case history for further use and prediction. As future work, we advocate developing a resilient security model to support patient safety, data security and connected medical devices within critical healthcare infrastructure.
Naming Services in the Internet of Things
Published in B.K. Tripathy, J. Anuradha, Internet of Things (IoT), 2017
T.R. Sooraj, R.K. Mohanty, B.K. Tripathy
ONS will constitute a service highly exposed to attacks from the Internet, if only due to its necessary widespread accessibility. A particular threat is denial of service (DoS), which abuses system and network resources to make the service unavailable or unusably slow for legitimate users. This could include DDoS attacks overwhelming a particular server or its network connection by issuing countless and intense queries, e.g., by the use of zombie networks, Botnets or the so-called Puppetnets, i.e., hosts controlled by browser-based malware. DoS attacks can also use more sophisticated methods, e.g., targeted exploits that shut down the DNS server software or the operating system. Though distributed, DNS suffers from limited redundancy in practical implementations. Authoritative name servers for any given zone should be redundant according to RFC 1034. Recent studies on real implementations, however, show that for a non-insignificant part of the global name-space this requirement does not hold. Name servers storing the same information for a given zone are often few and not redundantly placed with respect to geographical location and IP subnets, and often reside inside of the same autonomous system (AS). There are many servers that have single distinct routing bottlenecks on paths to reach them—from every place in the world.
Exploration and Exploitation in Organizational Cybersecurity
Published in Journal of Computer Information Systems, 2022
Response to cybersecurity threats is a fundamental component of organizational risk management process, which addresses how organizations intend to contain, assess, respond and monitor cybersecurity threats. Cybersecurity threat refers to the likelihood of malicious attempts to disrupt a computer network or system, and has the potential to disrupt information confidentiality, integrity, and availability, and also damage to information systems resources.22 Jouini et al.23 portrayed threats such as destruction of information, corruption of information, theft, loss of information, illegal usage, disclosure of information, denial of use, and elevation of privilege. Paoli et al.24 described illegal access to IT systems, cyber espionage, data or system interference, cyber extortion, and internet fraud. Gerić and Hutinski4 described a variety of cybersecurity threats such as privacy intrusion, loss of infrastructure support, and unauthorized access. Such threats can adversely impact organizational operations, assets and resources, and require organizations to develop cybersecurity responses that can offer protection against cybersecurity threats.
Blockchain technology in the future of business cyber security and accounting
Published in Journal of Management Analytics, 2020
Sebahattin Demirkan, Irem Demirkan, Andrew McKee
Cyber criminals could gain profit from getting into the company network and system in many different ways depending on what type of entry or what type of information they are attempting to get out of a person or the company. Blackstratus, a company in the industry of cybersecurity, broke down the top 5 cybersecurity threats that people are facing today. The threats go on as Malware, Phishing, Ransomware, Fileless Attacks, and Human Error (Carfagno, 2019). We look into detail this top five cybersecurity there. First one is Malware that represents a huge part of the cyber scam population. These types of viruses enter and then aim to disrupt and disable a computer system. 90% of malware is delivered via email and is usually hidden as something else when an employee is opening it. The average cost of malware attacks to companies is $2.4 Million (Statistics, 2019). Second one is Phishing which is another top ranked threat faced by organizations. Advanced phishing schemes mirror the layout and communications of trusted businesses and common businesses you interact with. They are aimed to collect extra sensitive data from your organization. Average cost of lost or stolen data, due to data breach or phishing to companies is $150 per record (IBM, 2019).