Search results

1 – 10 of over 43000
Article
Publication date: 30 April 2024

C. Bharanidharan, S. Malathi and Hariprasath Manoharan

The potential of vehicle ad hoc networks (VANETs) to improve driver and passenger safety and security has made them a hot topic in the field of intelligent transportation systems…

Abstract

Purpose

The potential of vehicle ad hoc networks (VANETs) to improve driver and passenger safety and security has made them a hot topic in the field of intelligent transportation systems (ITSs). VANETs have different characteristics and system architectures from mobile ad hoc networks (MANETs), with a primary focus on vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communication. But protecting VANETs from malicious assaults is crucial because they can undermine network security and safety.

Design/methodology/approach

The black hole attack is a well-known danger to VANETs. It occurs when a hostile node introduces phony routing tables into the network, potentially damaging it and interfering with communication. A safe ad hoc on-demand distance vector (AODV) routing protocol has been created in response to this issue. By adding cryptographic features for source and target node verification to the route request (RREQ) and route reply (RREP) packets, this protocol improves upon the original AODV routing system.

Findings

Through the use of cryptographic-based encryption and decryption techniques, the suggested method fortifies the VANET connection. In addition, other network metrics are taken into account to assess the effectiveness of the secure AODV routing protocol under black hole attacks, including packet loss, end-to-end latency, packet delivery ratio (PDR) and routing request overhead. Results from simulations using an NS-2.33 simulator show how well the suggested fix works to enhance system performance and lessen the effects of black hole assaults on VANETs.

Originality/value

All things considered, the safe AODV routing protocol provides a strong method for improving security and dependability in VANET systems, protecting against malevolent attacks and guaranteeing smooth communication between cars and infrastructure.

Details

International Journal of Intelligent Unmanned Systems, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2049-6427

Keywords

Article
Publication date: 5 April 2024

Lida Haghnegahdar, Sameehan S. Joshi, Rohith Yanambaka Venkata, Daniel A. Riley and Narendra B. Dahotre

Additive manufacturing also known as 3D printing is an evolving advanced manufacturing technology critical for the new era of complex machinery and operating systems…

20

Abstract

Purpose

Additive manufacturing also known as 3D printing is an evolving advanced manufacturing technology critical for the new era of complex machinery and operating systems. Manufacturing systems are increasingly faced with risk of attacks not only by traditional malicious actors such as hackers and cyber-criminals but also by some competitors and organizations engaged in corporate espionage. This paper aims to elaborate a plausible risk practice of designing and demonstrate a case study for the compromised-based malicious for polymer 3D printing system.

Design/methodology/approach

This study assumes conditions when a machine was compromised and evaluates the effect of post compromised attack by studying its effects on tensile dog bone specimens as the printed object. The designed algorithm removed predetermined specific number of layers from the tensile samples. The samples were visually identical in terms of external physical dimensions even after removal of the layers. Samples were examined nondestructively for density. Additionally, destructive uniaxial tensile tests were carried out on the modified samples and compared to the unmodified sample as a control for various mechanical properties. It is worth noting that the current approach was adapted for illustrating the impact of cyber altercations on properties of additively produced parts in a quantitative manner. It concurrently pointed towards the vulnerabilities of advanced manufacturing systems and a need for designing robust mitigation/defense mechanism against the cyber altercations.

Findings

Density, Young’s modulus and maximum strength steadily decreased with an increase in the number of missing layers, whereas a no clear trend was observed in the case of % elongation. Post tensile test observations of the sample cross-sections confirmed the successful removal of the layers from the samples by the designed method. As a result, the current work presented a cyber-attack model and its quantitative implications on the mechanical properties of 3D printed objects.

Originality/value

To the best of the authors’ knowledge, this is the original work from the team. It is currently not under consideration for publication in any other avenue. The paper provides quantitative approach of realizing impact of cyber intrusions on deteriorated performance of additively manufactured products. It also enlists important intrusion mechanisms relevant to additive manufacturing.

Details

Rapid Prototyping Journal, vol. 30 no. 4
Type: Research Article
ISSN: 1355-2546

Keywords

Article
Publication date: 9 April 2024

Ahmed Shehata and Metwaly Eldakar

Social engineering is crucial in today’s digital landscape. As technology advances, malicious individuals exploit human judgment and trust. This study explores how age, education…

Abstract

Purpose

Social engineering is crucial in today’s digital landscape. As technology advances, malicious individuals exploit human judgment and trust. This study explores how age, education and occupation affect individuals’ awareness, skills and perceptions of social engineering.

Design/methodology/approach

A quantitative research approach was used to survey a diverse demographic of Egyptian society. The survey was conducted in February 2023, and the participants were sourced from various Egyptian social media pages covering different topics. The collected data was analyzed using descriptive and inferential statistics, including independent samples t-test and ANOVA, to compare awareness and skills across different groups.

Findings

The study revealed that younger individuals and those with higher education tend to research social engineering more frequently. Males display a higher level of awareness but score lower in terms of social and psychological consequences as well as types of attacks when compared to females. The type of attack cannot be predicted based on age. Higher education is linked to greater awareness and ability to defend against attacks. Different occupations have varying levels of awareness, skills, and psychosocial consequences. The study emphasizes the importance of increasing awareness, education and implementing cybersecurity measures.

Originality/value

This study’s originality lies in its focus on diverse Egyptian demographics, innovative recruitment via social media, comprehensive exploration of variables, statistical rigor, practical insights for cybersecurity education and diversity in educational and occupational backgrounds.

Details

Library Hi Tech, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0737-8831

Keywords

Article
Publication date: 21 October 2020

Vijaya Geeta Dharmavaram

Today, online shopping and online business has become a new norm especially in the current pandemic scenario. With more businesses running online, cyber criminals are coming up…

Abstract

Purpose

Today, online shopping and online business has become a new norm especially in the current pandemic scenario. With more businesses running online, cyber criminals are coming up with different tactics to steal identity and sensitive information such as credit card and banking credentials either for personal monetary gain or to sell in the dark Web. One form of such attack that is seen in the recent times is formjacking attack. This paper aims to review the current scenario of formjacking attack and its modus operandi. The paper also provides certain counter measures that can be adopted by the users and website owners.

Design/methodology/approach

The paper mainly focuses on the modus operandi of formjacking attack to understand the severity of the problem. Based on the way the attack is carried out, some guidelines to be followed are provided. Later, a brief review of machine learning techniques is furnished to understand how it may help as secure defense mechanism.

Findings

Formjacking attacks are on a rise in the past two years, especially during the holiday season. Cyber criminals have been using smart tactics to carry out these attacks which are very difficult to detect. Machine learning techniques may prove to be effective in combating these attacks.

Originality/value

Formjacking attack is not just a concern of the customers who may lose their sensitive data, but the onus also lies on the companies itself to ensure they protect their customer’s data from theft. Not much research is found regarding formjacking attack, as it is relatively a new form of attack. The paper reviews this attack and provides some measure that can be followed. It also provides few guidelines which can be used for further research in devising a security tool to mitigate this problem.

Details

Journal of Financial Crime, vol. 28 no. 2
Type: Research Article
ISSN: 1359-0790

Keywords

Book part
Publication date: 24 October 2003

Brent K. Marshall, J.Steven Picou and Duane A. Gill

The purpose of this article is to apply what social scientists have learned from decades of research on natural and technological disasters to better understand the short-term and…

Abstract

The purpose of this article is to apply what social scientists have learned from decades of research on natural and technological disasters to better understand the short-term and potential long-term human impacts of the 9/11 attacks. The short-term response to the 9/11 attacks was similar to how people and communities typically respond to natural disasters. One year after the attacks, news reports suggest that factors identified in technological disaster research as causing collective trauma, rather than recovery, are beginning to surface. We identify three patterns typically present in (but not restricted to) the aftermath of technological disasters that contribute to slow recovery and ongoing collective trauma and evaluate the likelihood that these factors will impact the recovery process for those impacted by the 9/11 attacks. We conclude that due to perceptions of governmental failure, the likelihood of protracted litigation, and uncertainty regarding the mental and physical health of victims, the social and psychological impacts of the 9/11 attacks will likely be severe and long-term. As such, the concluding section recommends the implementation of a long-term clinical intervention program for mitigating these potential chronic impacts and facilitating the timely recovery of survivors.

Details

Terrorism and Disaster: New Threats, New Ideas
Type: Book
ISBN: 978-1-84950-227-6

Book part
Publication date: 15 September 2022

Caner Asbaş and Şule Tuzlukaya

A cyberattack is an attempt by cybercriminals as individuals or organizations with unauthorized access using one or more computers and computer systems to steal, expose, change…

Abstract

A cyberattack is an attempt by cybercriminals as individuals or organizations with unauthorized access using one or more computers and computer systems to steal, expose, change, disable or eliminate information, or to breach computer information systems, computer networks, and computer infrastructures. Cyberattackers gain a benefit from victims, which may be criminal such as stealing data or money, or political or personal such as revenge. In cyberattacks, various targets are possible. Some potential targets for businesses include business and customer financial data, customer lists, trade secrets, and login credentials.

Cyberattackers use a variety of methods to gain access to data, including malware such as viruses, worms, and spyware and phishing methods, man-in-the-middle attacks, denial-of-service attacks, SQL injection, zero-day exploit, and DNS tunneling.

Related to cyberattack, the term cyberwarfare is gaining popularity nowadays. Cyberwarfare is the use of cyberattacks by a state or an organization to cause harm as in warfare against another state's or organization's computer information systems, networks, and infrastructures.

Military, civil, and ideological motivations, or hacktivism can be used to launch a cyberwarfare. For these reasons, cyberwarfare may be used to conduct espionage, sabotage, propaganda, and economic disruption.

Considering highly digitalized business processes such as e-mails, digital banking, online conference, and digital manufacturing methods, damage of cyberwarfare to businesses and countries are unavoidable. As a result, developing strategies for defending against cyberattacks and cyberwarfare is critical for businesses. The concepts of cyberattack and cyberwarfare, as well as business strategies to be protected against them will be discussed in this chapter.

Details

Conflict Management in Digital Business
Type: Book
ISBN: 978-1-80262-773-2

Keywords

Book part
Publication date: 21 June 2014

Peter Phillips

This chapter explains how economic analysis can contribute to the delineation of the lone wolf’s opportunities and choices in a manner that allows operationally relevant advice to…

Abstract

Purpose

This chapter explains how economic analysis can contribute to the delineation of the lone wolf’s opportunities and choices in a manner that allows operationally relevant advice to be contributed to the investigative process.

Approach

Using a risk-reward analytical framework we examine the lone wolf’s attack method opportunities and choices and identify those attack methods that would be chosen by lone wolves with different levels of risk aversion. We also use prospect theory as an alternative methodology for the determination of the lone wolf’s preference orderings over the available attack methods in a context where he references his actions against those of a predecessor whom he wishes to emulate.

Findings

We find that lone wolf terrorists with different levels of risk aversion can be expected to choose different attack methods or combinations of attack methods. More risk averse lone wolf terrorists will choose attack methods such as assassination. Less risk averse lone wolf terrorists will choose attack methods such as bombing, hostage-taking and unconventional attacks. Also, we find that lone wolf terrorists who reference their actions against ‘predecessor’ lone wolf terrorists will choose differently from among the available attack methods depending on which predecessor lone wolf is being referenced.

Limitations

The analysis provides two different perspectives on terrorist choice but by no means exhausts the analytical alternatives. The analysis focuses on the fatalities and injuries inflicted whereas other perspectives might include different ‘payoffs’ series, including news or media coverage.

Originality

The chapter contributes an analysis of the order in which lone wolf terrorists with particular characteristics will choose from a set of available attack methods. During the course of our discussion we point out the consistency between the ‘rise’ of the lone wolf terrorist and the diseconomies to scale that are evident within the terrorism context. This presents the opportunity for new debates.

Book part
Publication date: 11 September 2015

Jason Manning

In this chapter, I apply theories of conflict and social control derived from the work of Donald Black to explain when suicide attacks will occur and who will carry them out.

Abstract

Purpose

In this chapter, I apply theories of conflict and social control derived from the work of Donald Black to explain when suicide attacks will occur and who will carry them out.

Methodology/approach

Drawing on the published literature on suicide, suicide terrorism, and social control, I present a structural analysis of suicide attacks that specifies which configurations of social space and social time are most likely to produce them.

Findings

I propose that suicide attacks can be explained by structural patterns such as social distance, status inferiority, organization, and large movements of social time. Furthermore, sacrifice is greater among those who are socially marginal individuals whose locations are otherwise conducive to both partisanship and self-destruction.

Originality/value

I highlight structural similarities between suicide attacks and other forms of violence, social control, and suicide, thus contributing to the systemization of structural theories of human behavior and suggesting avenues for further study.

Details

Terrorism and Counterterrorism Today
Type: Book
ISBN: 978-1-78560-191-0

Keywords

Abstract

Details

Addressing Xenophobia in South Africa: Drivers, Responses and Lessons from the Durban Untold Stories
Type: Book
ISBN: 978-1-80262-480-9

Book part
Publication date: 18 April 2017

Stephen C. Poulson

This study investigates patterns of violence employed by insurgents killing civilians living in small ethnic enclaves located in Ninewa Province, Iraq from 2003 to 2009. The…

Abstract

This study investigates patterns of violence employed by insurgents killing civilians living in small ethnic enclaves located in Ninewa Province, Iraq from 2003 to 2009. The ethnic minorities in these communities include: (1) Yazidis in Sinjar District, (2) Chaldo-Assyrian Christians in the Ninewa Plains and, (3) the Turkmen enclave of Tal Afar. To date, there has been little investigation into violence directed toward small ethnic enclaves during civil war, though some have suggested that ethnic enclaves might insulate civilians from violence (Kaufmann, 1996). Using fatality data from the Iraq Body Count, this study compares the patterns of insurgent violence directed toward these enclave communities to co-ethnic and mixed-ethnic communities. The experiences of the enclaves were varied – some were largely insulated from attacks – but when attacked, the average number killed was greater and more indiscriminate as compared to communities with significant Arab populations. One possible explanation for these differences is that insurgents did not regard these citizens as being “convertible,” which caused them to employ violence in a more indiscriminate manner. When insurgents did act to secure control of enclave communities, they used indiscriminate forms of violence against civilians, as compared to more selective forms of violence employed when controlling co-ethnic communities.

Details

Non-State Violent Actors and Social Movement Organizations
Type: Book
ISBN: 978-1-78714-190-2

Keywords

1 – 10 of over 43000