Search results

1 – 10 of 33
Article
Publication date: 16 August 2022

Nisha TN and Mugdha Shailendra Kulkarni

The purpose of the study is to confirm the fact that in informations security, the human factor was considered as a key carrier of the majority of attacks that an information…

Abstract

Purpose

The purpose of the study is to confirm the fact that in informations security, the human factor was considered as a key carrier of the majority of attacks that an information system faces. Banking and other financial services are always top among the most attractive targets for cyber attackers. Blind phishing or spear phishing is still one of the major contributors to all malicious activities in the e-banking sector. All the counter mechanisms, therefore, revolve around the concept of how security-aware the customers are. To fool these mechanisms, attacks are becoming smarter and are searching for methods where the human involvement is diminishing to zero. Zero click attacks are one big leap that attackers are taking that removes the requirement of human involvement in initiating attacks and are moving toward an era of unassisted attacks. Even though the standard procedure and protocols are built into the banking system, they fail to detect this attack resulting in significant losses.

Design/methodology/approach

This paper follows a conceptual review of the upcoming concept in security and its implication in e-banking sector. The methodology adopted in this paper uses review papers, articles and white papers to conclude a theoretical model. A detailed analysis of unassisted attacks is considered from 2010 onwards till 2022.

Findings

This research deliberates on the methodologies of zero click attacks and gives a detailed analysis of attack vectors and their exploits. This research also identifies the likely attacks on e-banking that these vulnerabilities can trigger.

Originality/value

The key contribution is toward the early detection of zero click attacks, suggesting countermeasure, reducing the likelihood of these attacks and the financial impact.

Details

Journal of Financial Crime, vol. 30 no. 5
Type: Research Article
ISSN: 1359-0790

Keywords

Book part
Publication date: 14 July 2006

Jay Kolar

Inconsistencies and contradictions in the US government's story of hijackers and their masterminds are examined to account for what happened on 9-11. A little-known initial FBI…

Abstract

Inconsistencies and contradictions in the US government's story of hijackers and their masterminds are examined to account for what happened on 9-11. A little-known initial FBI list of 19, scrutinized for four names not on its final list, calls into question the FBI naming process. We discovered 11 of the FBI-named finalists could not have been on those planes, with 10 still alive and another's identity improvised by a double. The Dulles videotape, essentially the government's case that hijackers boarded the 9-11 flights, is found to have serious problems including authentication, as does the so-called bin Laden “confession” video.

Were “hijackers” known to be in the US before intelligence alleges it knew? Evidence is examined which shows that they were closely monitored by agencies which denied this knowledge; in particular, an undercover FBI agent lived with them the prior year.

Noting government refusal to disclose evidence called for by investigators, we find some pieces altered or fabricated and others confiscated or destroyed. Other revelations point to hijackers with national security overrides, protection in their alternate roles as drug traffickers, and deep political connections with government elites. We investigate patterns, reminiscent of historical intelligence involvement, revealing the presence of a covert intelligence operation disguised as an outside enemy attack.

Details

The Hidden History of 9-11-2001
Type: Book
ISBN: 978-1-84950-408-9

Abstract

Details

Legal Professions: Work, Structure and Organization
Type: Book
ISBN: 978-0-76230-800-2

Book part
Publication date: 15 July 2009

Ross B. Emmett and Kenneth C. Wenzer

Our Dublin correspondent telegraphed last night:

Abstract

Our Dublin correspondent telegraphed last night:

Details

Henry George, the Transatlantic Irish, and their Times
Type: Book
ISBN: 978-1-84855-658-4

Book part
Publication date: 21 December 2010

Jay Chaskes

This chapter explores the process through which one's moral career proceeds as one acquires a physical disability later in life. The author, who acquired a disability later in…

Abstract

This chapter explores the process through which one's moral career proceeds as one acquires a physical disability later in life. The author, who acquired a disability later in life, explores Goffman's notion of “moral career” as a process constructed from one's experience with both physical access and social access to the environment in which everyday interaction takes place. Using the extant literature and his personal experience, the author argues that one's identity as a person with a disability is always in a state of evolution. Rather than stable and fixed, it is unstable, although the rate of change is quite variable.

Details

Disability as a Fluid State
Type: Book
ISBN: 978-0-85724-377-5

Article
Publication date: 17 June 2019

Estee van der Walt and Jan Eloff

This paper aims to describe requirements for a model that can assist in identity deception detection (IDD) on social media platforms (SMPs). The model that was discovered…

Abstract

Purpose

This paper aims to describe requirements for a model that can assist in identity deception detection (IDD) on social media platforms (SMPs). The model that was discovered demonstrates the usefulness of the requirements. The aim of the model is to identify humans lying about their identity on SMPs.

Design/methodology/approach

The requirements of a model for IDD will be determined through a literature study combined with a study that identifies currently available identity related metadata on SMPs. This metadata refers to the attributes that describe a user account on an SMP. The aim is to restrict IDD to be only based on these types of attributes, as opposed to or combined with the contents of a single or multiple communications.

Findings

Data science experiments were conducted and in particular supervised machine learning models were discovered that indeed detects identity deception on SMPs with an area under the receiver operator characteristics curve (ROC-AUC) of 75.5 per cent.

Originality/value

SMPs allow any user to easily communicate with their friends or the general public at large. People can now be targeted at great scale, most often for malicious purposes. The reality is that many of these cyber-attacks involve some form of identity deception, where the attackers lie about who they are. Much focus to date has been on the identification of non-human deceptive accounts. This paper focuses on deceptive human accounts that target vulnerable individuals on SMPs.

Details

Information & Computer Security, vol. 27 no. 4
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 1 April 1937

Under this heading are published regularly abstracts of all Reports and Memoranda of the Aeronautical Research Committee, Reports and Technical Notes of the U.S. National Advisory…

Abstract

Under this heading are published regularly abstracts of all Reports and Memoranda of the Aeronautical Research Committee, Reports and Technical Notes of the U.S. National Advisory Committee for Aeronautics, and publications of other similar research bodies as issued

Details

Aircraft Engineering and Aerospace Technology, vol. 9 no. 4
Type: Research Article
ISSN: 0002-2667

Article
Publication date: 1 April 1906

THE sudden death, at a comparatively early age, of Mr. Franklin Trengrouse Barrett, of the Fulham Public Libraries, removes from the ranks of librarians, one of the most…

Abstract

THE sudden death, at a comparatively early age, of Mr. Franklin Trengrouse Barrett, of the Fulham Public Libraries, removes from the ranks of librarians, one of the most promising, highly‐trained, and best‐loved of those younger men whose work is making itself so strongly felt in this country. His death came as a severe shock to most of his friends, and particularly to his father, Mr. Francis T. Barrett, the universally‐esteemed City Librarian of Glasgow, who was quite unprepared for such a sudden and bitter bereavement. To him, as to Mrs. Franklin Barrett, a lady well‐known and much respected by London librarians, I am sure the deepest sympathy of all librarians and other colleagues will go forth. The sad event has already produced a great many messages of sympathy from many kind friends, and for these, and other efforts of consolation and comfort, the family are deeply grateful.

Details

New Library World, vol. 8 no. 5
Type: Research Article
ISSN: 0307-4803

Article
Publication date: 1 June 1907

Any scheme whereby the treasures of a public reference library are made more widely known is sure of the sympathetic consideration of all serious librarians, for it is a…

Abstract

Any scheme whereby the treasures of a public reference library are made more widely known is sure of the sympathetic consideration of all serious librarians, for it is a lamentable fact that reference libraries generally, and especially those in the provinces, are very sparingly appreciated. Their primary function is largely defeated by the ignorance of those most likely to be benefited. When there is displayed any considerable use of the facilities for research and study, analysis will often show it to be a mere prostitution by competition‐mongers and acrostic‐solvers; the genuine student is seldom much in evidence.

Details

New Library World, vol. 9 no. 12
Type: Research Article
ISSN: 0307-4803

Abstract

Details

Criminal Justice Responses to Maternal Filicide: Judging the failed mother
Type: Book
ISBN: 978-1-83909-621-1

1 – 10 of 33