Search results
1 – 10 of over 43000C. Bharanidharan, S. Malathi and Hariprasath Manoharan
The potential of vehicle ad hoc networks (VANETs) to improve driver and passenger safety and security has made them a hot topic in the field of intelligent transportation systems…
Abstract
Purpose
The potential of vehicle ad hoc networks (VANETs) to improve driver and passenger safety and security has made them a hot topic in the field of intelligent transportation systems (ITSs). VANETs have different characteristics and system architectures from mobile ad hoc networks (MANETs), with a primary focus on vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communication. But protecting VANETs from malicious assaults is crucial because they can undermine network security and safety.
Design/methodology/approach
The black hole attack is a well-known danger to VANETs. It occurs when a hostile node introduces phony routing tables into the network, potentially damaging it and interfering with communication. A safe ad hoc on-demand distance vector (AODV) routing protocol has been created in response to this issue. By adding cryptographic features for source and target node verification to the route request (RREQ) and route reply (RREP) packets, this protocol improves upon the original AODV routing system.
Findings
Through the use of cryptographic-based encryption and decryption techniques, the suggested method fortifies the VANET connection. In addition, other network metrics are taken into account to assess the effectiveness of the secure AODV routing protocol under black hole attacks, including packet loss, end-to-end latency, packet delivery ratio (PDR) and routing request overhead. Results from simulations using an NS-2.33 simulator show how well the suggested fix works to enhance system performance and lessen the effects of black hole assaults on VANETs.
Originality/value
All things considered, the safe AODV routing protocol provides a strong method for improving security and dependability in VANET systems, protecting against malevolent attacks and guaranteeing smooth communication between cars and infrastructure.
Details
Keywords
Lida Haghnegahdar, Sameehan S. Joshi, Rohith Yanambaka Venkata, Daniel A. Riley and Narendra B. Dahotre
Additive manufacturing also known as 3D printing is an evolving advanced manufacturing technology critical for the new era of complex machinery and operating systems…
Abstract
Purpose
Additive manufacturing also known as 3D printing is an evolving advanced manufacturing technology critical for the new era of complex machinery and operating systems. Manufacturing systems are increasingly faced with risk of attacks not only by traditional malicious actors such as hackers and cyber-criminals but also by some competitors and organizations engaged in corporate espionage. This paper aims to elaborate a plausible risk practice of designing and demonstrate a case study for the compromised-based malicious for polymer 3D printing system.
Design/methodology/approach
This study assumes conditions when a machine was compromised and evaluates the effect of post compromised attack by studying its effects on tensile dog bone specimens as the printed object. The designed algorithm removed predetermined specific number of layers from the tensile samples. The samples were visually identical in terms of external physical dimensions even after removal of the layers. Samples were examined nondestructively for density. Additionally, destructive uniaxial tensile tests were carried out on the modified samples and compared to the unmodified sample as a control for various mechanical properties. It is worth noting that the current approach was adapted for illustrating the impact of cyber altercations on properties of additively produced parts in a quantitative manner. It concurrently pointed towards the vulnerabilities of advanced manufacturing systems and a need for designing robust mitigation/defense mechanism against the cyber altercations.
Findings
Density, Young’s modulus and maximum strength steadily decreased with an increase in the number of missing layers, whereas a no clear trend was observed in the case of % elongation. Post tensile test observations of the sample cross-sections confirmed the successful removal of the layers from the samples by the designed method. As a result, the current work presented a cyber-attack model and its quantitative implications on the mechanical properties of 3D printed objects.
Originality/value
To the best of the authors’ knowledge, this is the original work from the team. It is currently not under consideration for publication in any other avenue. The paper provides quantitative approach of realizing impact of cyber intrusions on deteriorated performance of additively manufactured products. It also enlists important intrusion mechanisms relevant to additive manufacturing.
Details
Keywords
Ahmed Shehata and Metwaly Eldakar
Social engineering is crucial in today’s digital landscape. As technology advances, malicious individuals exploit human judgment and trust. This study explores how age, education…
Abstract
Purpose
Social engineering is crucial in today’s digital landscape. As technology advances, malicious individuals exploit human judgment and trust. This study explores how age, education and occupation affect individuals’ awareness, skills and perceptions of social engineering.
Design/methodology/approach
A quantitative research approach was used to survey a diverse demographic of Egyptian society. The survey was conducted in February 2023, and the participants were sourced from various Egyptian social media pages covering different topics. The collected data was analyzed using descriptive and inferential statistics, including independent samples t-test and ANOVA, to compare awareness and skills across different groups.
Findings
The study revealed that younger individuals and those with higher education tend to research social engineering more frequently. Males display a higher level of awareness but score lower in terms of social and psychological consequences as well as types of attacks when compared to females. The type of attack cannot be predicted based on age. Higher education is linked to greater awareness and ability to defend against attacks. Different occupations have varying levels of awareness, skills, and psychosocial consequences. The study emphasizes the importance of increasing awareness, education and implementing cybersecurity measures.
Originality/value
This study’s originality lies in its focus on diverse Egyptian demographics, innovative recruitment via social media, comprehensive exploration of variables, statistical rigor, practical insights for cybersecurity education and diversity in educational and occupational backgrounds.
Details
Keywords
Today, online shopping and online business has become a new norm especially in the current pandemic scenario. With more businesses running online, cyber criminals are coming up…
Abstract
Purpose
Today, online shopping and online business has become a new norm especially in the current pandemic scenario. With more businesses running online, cyber criminals are coming up with different tactics to steal identity and sensitive information such as credit card and banking credentials either for personal monetary gain or to sell in the dark Web. One form of such attack that is seen in the recent times is formjacking attack. This paper aims to review the current scenario of formjacking attack and its modus operandi. The paper also provides certain counter measures that can be adopted by the users and website owners.
Design/methodology/approach
The paper mainly focuses on the modus operandi of formjacking attack to understand the severity of the problem. Based on the way the attack is carried out, some guidelines to be followed are provided. Later, a brief review of machine learning techniques is furnished to understand how it may help as secure defense mechanism.
Findings
Formjacking attacks are on a rise in the past two years, especially during the holiday season. Cyber criminals have been using smart tactics to carry out these attacks which are very difficult to detect. Machine learning techniques may prove to be effective in combating these attacks.
Originality/value
Formjacking attack is not just a concern of the customers who may lose their sensitive data, but the onus also lies on the companies itself to ensure they protect their customer’s data from theft. Not much research is found regarding formjacking attack, as it is relatively a new form of attack. The paper reviews this attack and provides some measure that can be followed. It also provides few guidelines which can be used for further research in devising a security tool to mitigate this problem.
Details
Keywords
Brent K. Marshall, J.Steven Picou and Duane A. Gill
The purpose of this article is to apply what social scientists have learned from decades of research on natural and technological disasters to better understand the short-term and…
Abstract
The purpose of this article is to apply what social scientists have learned from decades of research on natural and technological disasters to better understand the short-term and potential long-term human impacts of the 9/11 attacks. The short-term response to the 9/11 attacks was similar to how people and communities typically respond to natural disasters. One year after the attacks, news reports suggest that factors identified in technological disaster research as causing collective trauma, rather than recovery, are beginning to surface. We identify three patterns typically present in (but not restricted to) the aftermath of technological disasters that contribute to slow recovery and ongoing collective trauma and evaluate the likelihood that these factors will impact the recovery process for those impacted by the 9/11 attacks. We conclude that due to perceptions of governmental failure, the likelihood of protracted litigation, and uncertainty regarding the mental and physical health of victims, the social and psychological impacts of the 9/11 attacks will likely be severe and long-term. As such, the concluding section recommends the implementation of a long-term clinical intervention program for mitigating these potential chronic impacts and facilitating the timely recovery of survivors.
Caner Asbaş and Şule Tuzlukaya
A cyberattack is an attempt by cybercriminals as individuals or organizations with unauthorized access using one or more computers and computer systems to steal, expose, change…
Abstract
A cyberattack is an attempt by cybercriminals as individuals or organizations with unauthorized access using one or more computers and computer systems to steal, expose, change, disable or eliminate information, or to breach computer information systems, computer networks, and computer infrastructures. Cyberattackers gain a benefit from victims, which may be criminal such as stealing data or money, or political or personal such as revenge. In cyberattacks, various targets are possible. Some potential targets for businesses include business and customer financial data, customer lists, trade secrets, and login credentials.
Cyberattackers use a variety of methods to gain access to data, including malware such as viruses, worms, and spyware and phishing methods, man-in-the-middle attacks, denial-of-service attacks, SQL injection, zero-day exploit, and DNS tunneling.
Related to cyberattack, the term cyberwarfare is gaining popularity nowadays. Cyberwarfare is the use of cyberattacks by a state or an organization to cause harm as in warfare against another state's or organization's computer information systems, networks, and infrastructures.
Military, civil, and ideological motivations, or hacktivism can be used to launch a cyberwarfare. For these reasons, cyberwarfare may be used to conduct espionage, sabotage, propaganda, and economic disruption.
Considering highly digitalized business processes such as e-mails, digital banking, online conference, and digital manufacturing methods, damage of cyberwarfare to businesses and countries are unavoidable. As a result, developing strategies for defending against cyberattacks and cyberwarfare is critical for businesses. The concepts of cyberattack and cyberwarfare, as well as business strategies to be protected against them will be discussed in this chapter.
Details
Keywords
This chapter explains how economic analysis can contribute to the delineation of the lone wolf’s opportunities and choices in a manner that allows operationally relevant advice to…
Abstract
Purpose
This chapter explains how economic analysis can contribute to the delineation of the lone wolf’s opportunities and choices in a manner that allows operationally relevant advice to be contributed to the investigative process.
Approach
Using a risk-reward analytical framework we examine the lone wolf’s attack method opportunities and choices and identify those attack methods that would be chosen by lone wolves with different levels of risk aversion. We also use prospect theory as an alternative methodology for the determination of the lone wolf’s preference orderings over the available attack methods in a context where he references his actions against those of a predecessor whom he wishes to emulate.
Findings
We find that lone wolf terrorists with different levels of risk aversion can be expected to choose different attack methods or combinations of attack methods. More risk averse lone wolf terrorists will choose attack methods such as assassination. Less risk averse lone wolf terrorists will choose attack methods such as bombing, hostage-taking and unconventional attacks. Also, we find that lone wolf terrorists who reference their actions against ‘predecessor’ lone wolf terrorists will choose differently from among the available attack methods depending on which predecessor lone wolf is being referenced.
Limitations
The analysis provides two different perspectives on terrorist choice but by no means exhausts the analytical alternatives. The analysis focuses on the fatalities and injuries inflicted whereas other perspectives might include different ‘payoffs’ series, including news or media coverage.
Originality
The chapter contributes an analysis of the order in which lone wolf terrorists with particular characteristics will choose from a set of available attack methods. During the course of our discussion we point out the consistency between the ‘rise’ of the lone wolf terrorist and the diseconomies to scale that are evident within the terrorism context. This presents the opportunity for new debates.
Details
Keywords
In this chapter, I apply theories of conflict and social control derived from the work of Donald Black to explain when suicide attacks will occur and who will carry them out.
Abstract
Purpose
In this chapter, I apply theories of conflict and social control derived from the work of Donald Black to explain when suicide attacks will occur and who will carry them out.
Methodology/approach
Drawing on the published literature on suicide, suicide terrorism, and social control, I present a structural analysis of suicide attacks that specifies which configurations of social space and social time are most likely to produce them.
Findings
I propose that suicide attacks can be explained by structural patterns such as social distance, status inferiority, organization, and large movements of social time. Furthermore, sacrifice is greater among those who are socially marginal individuals whose locations are otherwise conducive to both partisanship and self-destruction.
Originality/value
I highlight structural similarities between suicide attacks and other forms of violence, social control, and suicide, thus contributing to the systemization of structural theories of human behavior and suggesting avenues for further study.
Details
Keywords
This study investigates patterns of violence employed by insurgents killing civilians living in small ethnic enclaves located in Ninewa Province, Iraq from 2003 to 2009. The…
Abstract
This study investigates patterns of violence employed by insurgents killing civilians living in small ethnic enclaves located in Ninewa Province, Iraq from 2003 to 2009. The ethnic minorities in these communities include: (1) Yazidis in Sinjar District, (2) Chaldo-Assyrian Christians in the Ninewa Plains and, (3) the Turkmen enclave of Tal Afar. To date, there has been little investigation into violence directed toward small ethnic enclaves during civil war, though some have suggested that ethnic enclaves might insulate civilians from violence (Kaufmann, 1996). Using fatality data from the Iraq Body Count, this study compares the patterns of insurgent violence directed toward these enclave communities to co-ethnic and mixed-ethnic communities. The experiences of the enclaves were varied – some were largely insulated from attacks – but when attacked, the average number killed was greater and more indiscriminate as compared to communities with significant Arab populations. One possible explanation for these differences is that insurgents did not regard these citizens as being “convertible,” which caused them to employ violence in a more indiscriminate manner. When insurgents did act to secure control of enclave communities, they used indiscriminate forms of violence against civilians, as compared to more selective forms of violence employed when controlling co-ethnic communities.
Details