Search results

1 – 10 of over 43000
Article
Publication date: 21 October 2020

Vijaya Geeta Dharmavaram

Today, online shopping and online business has become a new norm especially in the current pandemic scenario. With more businesses running online, cyber criminals are coming up…

Abstract

Purpose

Today, online shopping and online business has become a new norm especially in the current pandemic scenario. With more businesses running online, cyber criminals are coming up with different tactics to steal identity and sensitive information such as credit card and banking credentials either for personal monetary gain or to sell in the dark Web. One form of such attack that is seen in the recent times is formjacking attack. This paper aims to review the current scenario of formjacking attack and its modus operandi. The paper also provides certain counter measures that can be adopted by the users and website owners.

Design/methodology/approach

The paper mainly focuses on the modus operandi of formjacking attack to understand the severity of the problem. Based on the way the attack is carried out, some guidelines to be followed are provided. Later, a brief review of machine learning techniques is furnished to understand how it may help as secure defense mechanism.

Findings

Formjacking attacks are on a rise in the past two years, especially during the holiday season. Cyber criminals have been using smart tactics to carry out these attacks which are very difficult to detect. Machine learning techniques may prove to be effective in combating these attacks.

Originality/value

Formjacking attack is not just a concern of the customers who may lose their sensitive data, but the onus also lies on the companies itself to ensure they protect their customer’s data from theft. Not much research is found regarding formjacking attack, as it is relatively a new form of attack. The paper reviews this attack and provides some measure that can be followed. It also provides few guidelines which can be used for further research in devising a security tool to mitigate this problem.

Details

Journal of Financial Crime, vol. 28 no. 2
Type: Research Article
ISSN: 1359-0790

Keywords

Article
Publication date: 26 January 2024

Merly Thomas and Meshram B.B.

Denial-of-service (DoS) attacks develop unauthorized entry to various network services and user information by building traffic that creates multiple requests simultaneously…

Abstract

Purpose

Denial-of-service (DoS) attacks develop unauthorized entry to various network services and user information by building traffic that creates multiple requests simultaneously making the system unavailable to users. Protection of internet services requires effective DoS attack detection to keep an eye on traffic passing across protected networks, freeing the protected internet servers from surveillance threats and ensuring they can focus on offering high-quality services with the fewest response times possible.

Design/methodology/approach

This paper aims to develop a hybrid optimization-based deep learning model to precisely detect DoS attacks.

Findings

The designed Aquila deer hunting optimization-enabled deep belief network technique achieved improved performance with an accuracy of 92.8%, a true positive rate of 92.8% and a true negative rate of 93.6.

Originality/value

The introduced detection approach effectively detects DoS attacks available on the internet.

Details

International Journal of Web Information Systems, vol. 20 no. 1
Type: Research Article
ISSN: 1744-0084

Keywords

Book part
Publication date: 24 October 2003

Brent K. Marshall, J.Steven Picou and Duane A. Gill

The purpose of this article is to apply what social scientists have learned from decades of research on natural and technological disasters to better understand the short-term and…

Abstract

The purpose of this article is to apply what social scientists have learned from decades of research on natural and technological disasters to better understand the short-term and potential long-term human impacts of the 9/11 attacks. The short-term response to the 9/11 attacks was similar to how people and communities typically respond to natural disasters. One year after the attacks, news reports suggest that factors identified in technological disaster research as causing collective trauma, rather than recovery, are beginning to surface. We identify three patterns typically present in (but not restricted to) the aftermath of technological disasters that contribute to slow recovery and ongoing collective trauma and evaluate the likelihood that these factors will impact the recovery process for those impacted by the 9/11 attacks. We conclude that due to perceptions of governmental failure, the likelihood of protracted litigation, and uncertainty regarding the mental and physical health of victims, the social and psychological impacts of the 9/11 attacks will likely be severe and long-term. As such, the concluding section recommends the implementation of a long-term clinical intervention program for mitigating these potential chronic impacts and facilitating the timely recovery of survivors.

Details

Terrorism and Disaster: New Threats, New Ideas
Type: Book
ISBN: 978-1-84950-227-6

Book part
Publication date: 15 September 2022

Caner Asbaş and Şule Tuzlukaya

A cyberattack is an attempt by cybercriminals as individuals or organizations with unauthorized access using one or more computers and computer systems to steal, expose, change…

Abstract

A cyberattack is an attempt by cybercriminals as individuals or organizations with unauthorized access using one or more computers and computer systems to steal, expose, change, disable or eliminate information, or to breach computer information systems, computer networks, and computer infrastructures. Cyberattackers gain a benefit from victims, which may be criminal such as stealing data or money, or political or personal such as revenge. In cyberattacks, various targets are possible. Some potential targets for businesses include business and customer financial data, customer lists, trade secrets, and login credentials.

Cyberattackers use a variety of methods to gain access to data, including malware such as viruses, worms, and spyware and phishing methods, man-in-the-middle attacks, denial-of-service attacks, SQL injection, zero-day exploit, and DNS tunneling.

Related to cyberattack, the term cyberwarfare is gaining popularity nowadays. Cyberwarfare is the use of cyberattacks by a state or an organization to cause harm as in warfare against another state's or organization's computer information systems, networks, and infrastructures.

Military, civil, and ideological motivations, or hacktivism can be used to launch a cyberwarfare. For these reasons, cyberwarfare may be used to conduct espionage, sabotage, propaganda, and economic disruption.

Considering highly digitalized business processes such as e-mails, digital banking, online conference, and digital manufacturing methods, damage of cyberwarfare to businesses and countries are unavoidable. As a result, developing strategies for defending against cyberattacks and cyberwarfare is critical for businesses. The concepts of cyberattack and cyberwarfare, as well as business strategies to be protected against them will be discussed in this chapter.

Details

Conflict Management in Digital Business
Type: Book
ISBN: 978-1-80262-773-2

Keywords

Book part
Publication date: 21 June 2014

Peter Phillips

This chapter explains how economic analysis can contribute to the delineation of the lone wolf’s opportunities and choices in a manner that allows operationally relevant advice to…

Abstract

Purpose

This chapter explains how economic analysis can contribute to the delineation of the lone wolf’s opportunities and choices in a manner that allows operationally relevant advice to be contributed to the investigative process.

Approach

Using a risk-reward analytical framework we examine the lone wolf’s attack method opportunities and choices and identify those attack methods that would be chosen by lone wolves with different levels of risk aversion. We also use prospect theory as an alternative methodology for the determination of the lone wolf’s preference orderings over the available attack methods in a context where he references his actions against those of a predecessor whom he wishes to emulate.

Findings

We find that lone wolf terrorists with different levels of risk aversion can be expected to choose different attack methods or combinations of attack methods. More risk averse lone wolf terrorists will choose attack methods such as assassination. Less risk averse lone wolf terrorists will choose attack methods such as bombing, hostage-taking and unconventional attacks. Also, we find that lone wolf terrorists who reference their actions against ‘predecessor’ lone wolf terrorists will choose differently from among the available attack methods depending on which predecessor lone wolf is being referenced.

Limitations

The analysis provides two different perspectives on terrorist choice but by no means exhausts the analytical alternatives. The analysis focuses on the fatalities and injuries inflicted whereas other perspectives might include different ‘payoffs’ series, including news or media coverage.

Originality

The chapter contributes an analysis of the order in which lone wolf terrorists with particular characteristics will choose from a set of available attack methods. During the course of our discussion we point out the consistency between the ‘rise’ of the lone wolf terrorist and the diseconomies to scale that are evident within the terrorism context. This presents the opportunity for new debates.

Book part
Publication date: 11 September 2015

Jason Manning

In this chapter, I apply theories of conflict and social control derived from the work of Donald Black to explain when suicide attacks will occur and who will carry them out.

Abstract

Purpose

In this chapter, I apply theories of conflict and social control derived from the work of Donald Black to explain when suicide attacks will occur and who will carry them out.

Methodology/approach

Drawing on the published literature on suicide, suicide terrorism, and social control, I present a structural analysis of suicide attacks that specifies which configurations of social space and social time are most likely to produce them.

Findings

I propose that suicide attacks can be explained by structural patterns such as social distance, status inferiority, organization, and large movements of social time. Furthermore, sacrifice is greater among those who are socially marginal individuals whose locations are otherwise conducive to both partisanship and self-destruction.

Originality/value

I highlight structural similarities between suicide attacks and other forms of violence, social control, and suicide, thus contributing to the systemization of structural theories of human behavior and suggesting avenues for further study.

Details

Terrorism and Counterterrorism Today
Type: Book
ISBN: 978-1-78560-191-0

Keywords

Abstract

Details

Addressing Xenophobia in South Africa: Drivers, Responses and Lessons from the Durban Untold Stories
Type: Book
ISBN: 978-1-80262-480-9

Book part
Publication date: 18 April 2017

Stephen C. Poulson

This study investigates patterns of violence employed by insurgents killing civilians living in small ethnic enclaves located in Ninewa Province, Iraq from 2003 to 2009. The…

Abstract

This study investigates patterns of violence employed by insurgents killing civilians living in small ethnic enclaves located in Ninewa Province, Iraq from 2003 to 2009. The ethnic minorities in these communities include: (1) Yazidis in Sinjar District, (2) Chaldo-Assyrian Christians in the Ninewa Plains and, (3) the Turkmen enclave of Tal Afar. To date, there has been little investigation into violence directed toward small ethnic enclaves during civil war, though some have suggested that ethnic enclaves might insulate civilians from violence (Kaufmann, 1996). Using fatality data from the Iraq Body Count, this study compares the patterns of insurgent violence directed toward these enclave communities to co-ethnic and mixed-ethnic communities. The experiences of the enclaves were varied – some were largely insulated from attacks – but when attacked, the average number killed was greater and more indiscriminate as compared to communities with significant Arab populations. One possible explanation for these differences is that insurgents did not regard these citizens as being “convertible,” which caused them to employ violence in a more indiscriminate manner. When insurgents did act to secure control of enclave communities, they used indiscriminate forms of violence against civilians, as compared to more selective forms of violence employed when controlling co-ethnic communities.

Details

Non-State Violent Actors and Social Movement Organizations
Type: Book
ISBN: 978-1-78714-190-2

Keywords

Book part
Publication date: 29 May 2023

Divya Nair and Neeta Mhavan

A zero-day vulnerability is a complimentary ticket to the attackers for gaining entry into the network. Thus, there is necessity to device appropriate threat detection systems and…

Abstract

A zero-day vulnerability is a complimentary ticket to the attackers for gaining entry into the network. Thus, there is necessity to device appropriate threat detection systems and establish an innovative and safe solution that prevents unauthorised intrusions for defending various components of cybersecurity. We present a survey of recent Intrusion Detection Systems (IDS) in detecting zero-day vulnerabilities based on the following dimensions: types of cyber-attacks, datasets used and kinds of network detection systems.

Purpose: The study focuses on presenting an exhaustive review on the effectiveness of the recent IDS with respect to zero-day vulnerabilities.

Methodology: Systematic exploration was done at the IEEE, Elsevier, Springer, RAID, ESCORICS, Google Scholar, and other relevant platforms of studies published in English between 2015 and 2021 using keywords and combinations of relevant terms.

Findings: It is possible to train IDS for zero-day attacks. The existing IDS have strengths that make them capable of effective detection against zero-day attacks. However, they display certain limitations that reduce their credibility. Novel strategies like deep learning, machine learning, fuzzing technique, runtime verification technique, and Hidden Markov Models can be used to design IDS to detect malicious traffic.

Implication: This paper explored and highlighted the advantages and limitations of existing IDS enabling the selection of best possible IDS to protect the system. Moreover, the comparison between signature-based and anomaly-based IDS exemplifies that one viable approach to accurately detect the zero-day vulnerabilities would be the integration of hybrid mechanism.

Details

Smart Analytics, Artificial Intelligence and Sustainable Performance Management in a Global Digitalised Economy
Type: Book
ISBN: 978-1-80382-555-7

Keywords

Book part
Publication date: 21 June 2014

Kaisa Hinkkainen

An investigation of parallels between homegrown, international, and domestic terrorism.

Abstract

Purpose

An investigation of parallels between homegrown, international, and domestic terrorism.

Methodology/approach

A comparative method is used to analyze data from two main sources, ITERATE data on international and the TWEED data on domestic terrorism. The similarities are tested in various dimensions – target types, severity, and the method of the attacks.

Findings

Homegrown terrorism is inherently motivated by domestic issues. Moreover, variables of ethnic heterogeneity, political inclusiveness of fringe groups, and problems in the democratization process are good predictors of the occurrence of other forms of domestic and homegrown terrorism alike.

Research limitations/implications

Number of observable cases of homegrown terrorism are low. The two main datasets have potentially overlapping incidents.

Originality/value

Provides and operational definition of homegrown terrorism and test empirically the similarity between homegrown and other types of terrorisms.

1 – 10 of over 43000