Search results
1 – 10 of 33Nisha TN and Mugdha Shailendra Kulkarni
The purpose of the study is to confirm the fact that in informations security, the human factor was considered as a key carrier of the majority of attacks that an information…
Abstract
Purpose
The purpose of the study is to confirm the fact that in informations security, the human factor was considered as a key carrier of the majority of attacks that an information system faces. Banking and other financial services are always top among the most attractive targets for cyber attackers. Blind phishing or spear phishing is still one of the major contributors to all malicious activities in the e-banking sector. All the counter mechanisms, therefore, revolve around the concept of how security-aware the customers are. To fool these mechanisms, attacks are becoming smarter and are searching for methods where the human involvement is diminishing to zero. Zero click attacks are one big leap that attackers are taking that removes the requirement of human involvement in initiating attacks and are moving toward an era of unassisted attacks. Even though the standard procedure and protocols are built into the banking system, they fail to detect this attack resulting in significant losses.
Design/methodology/approach
This paper follows a conceptual review of the upcoming concept in security and its implication in e-banking sector. The methodology adopted in this paper uses review papers, articles and white papers to conclude a theoretical model. A detailed analysis of unassisted attacks is considered from 2010 onwards till 2022.
Findings
This research deliberates on the methodologies of zero click attacks and gives a detailed analysis of attack vectors and their exploits. This research also identifies the likely attacks on e-banking that these vulnerabilities can trigger.
Originality/value
The key contribution is toward the early detection of zero click attacks, suggesting countermeasure, reducing the likelihood of these attacks and the financial impact.
Details
Keywords
Inconsistencies and contradictions in the US government's story of hijackers and their masterminds are examined to account for what happened on 9-11. A little-known initial FBI…
Abstract
Inconsistencies and contradictions in the US government's story of hijackers and their masterminds are examined to account for what happened on 9-11. A little-known initial FBI list of 19, scrutinized for four names not on its final list, calls into question the FBI naming process. We discovered 11 of the FBI-named finalists could not have been on those planes, with 10 still alive and another's identity improvised by a double. The Dulles videotape, essentially the government's case that hijackers boarded the 9-11 flights, is found to have serious problems including authentication, as does the so-called bin Laden “confession” video.
Were “hijackers” known to be in the US before intelligence alleges it knew? Evidence is examined which shows that they were closely monitored by agencies which denied this knowledge; in particular, an undercover FBI agent lived with them the prior year.
Noting government refusal to disclose evidence called for by investigators, we find some pieces altered or fabricated and others confiscated or destroyed. Other revelations point to hijackers with national security overrides, protection in their alternate roles as drug traffickers, and deep political connections with government elites. We investigate patterns, reminiscent of historical intelligence involvement, revealing the presence of a covert intelligence operation disguised as an outside enemy attack.
Ross B. Emmett and Kenneth C. Wenzer
Our Dublin correspondent telegraphed last night:
This chapter explores the process through which one's moral career proceeds as one acquires a physical disability later in life. The author, who acquired a disability later in…
Abstract
This chapter explores the process through which one's moral career proceeds as one acquires a physical disability later in life. The author, who acquired a disability later in life, explores Goffman's notion of “moral career” as a process constructed from one's experience with both physical access and social access to the environment in which everyday interaction takes place. Using the extant literature and his personal experience, the author argues that one's identity as a person with a disability is always in a state of evolution. Rather than stable and fixed, it is unstable, although the rate of change is quite variable.
Estee van der Walt and Jan Eloff
This paper aims to describe requirements for a model that can assist in identity deception detection (IDD) on social media platforms (SMPs). The model that was discovered…
Abstract
Purpose
This paper aims to describe requirements for a model that can assist in identity deception detection (IDD) on social media platforms (SMPs). The model that was discovered demonstrates the usefulness of the requirements. The aim of the model is to identify humans lying about their identity on SMPs.
Design/methodology/approach
The requirements of a model for IDD will be determined through a literature study combined with a study that identifies currently available identity related metadata on SMPs. This metadata refers to the attributes that describe a user account on an SMP. The aim is to restrict IDD to be only based on these types of attributes, as opposed to or combined with the contents of a single or multiple communications.
Findings
Data science experiments were conducted and in particular supervised machine learning models were discovered that indeed detects identity deception on SMPs with an area under the receiver operator characteristics curve (ROC-AUC) of 75.5 per cent.
Originality/value
SMPs allow any user to easily communicate with their friends or the general public at large. People can now be targeted at great scale, most often for malicious purposes. The reality is that many of these cyber-attacks involve some form of identity deception, where the attackers lie about who they are. Much focus to date has been on the identification of non-human deceptive accounts. This paper focuses on deceptive human accounts that target vulnerable individuals on SMPs.
Details
Keywords
Under this heading are published regularly abstracts of all Reports and Memoranda of the Aeronautical Research Committee, Reports and Technical Notes of the U.S. National Advisory…
Abstract
Under this heading are published regularly abstracts of all Reports and Memoranda of the Aeronautical Research Committee, Reports and Technical Notes of the U.S. National Advisory Committee for Aeronautics, and publications of other similar research bodies as issued
THE sudden death, at a comparatively early age, of Mr. Franklin Trengrouse Barrett, of the Fulham Public Libraries, removes from the ranks of librarians, one of the most…
Abstract
THE sudden death, at a comparatively early age, of Mr. Franklin Trengrouse Barrett, of the Fulham Public Libraries, removes from the ranks of librarians, one of the most promising, highly‐trained, and best‐loved of those younger men whose work is making itself so strongly felt in this country. His death came as a severe shock to most of his friends, and particularly to his father, Mr. Francis T. Barrett, the universally‐esteemed City Librarian of Glasgow, who was quite unprepared for such a sudden and bitter bereavement. To him, as to Mrs. Franklin Barrett, a lady well‐known and much respected by London librarians, I am sure the deepest sympathy of all librarians and other colleagues will go forth. The sad event has already produced a great many messages of sympathy from many kind friends, and for these, and other efforts of consolation and comfort, the family are deeply grateful.
Any scheme whereby the treasures of a public reference library are made more widely known is sure of the sympathetic consideration of all serious librarians, for it is a…
Abstract
Any scheme whereby the treasures of a public reference library are made more widely known is sure of the sympathetic consideration of all serious librarians, for it is a lamentable fact that reference libraries generally, and especially those in the provinces, are very sparingly appreciated. Their primary function is largely defeated by the ignorance of those most likely to be benefited. When there is displayed any considerable use of the facilities for research and study, analysis will often show it to be a mere prostitution by competition‐mongers and acrostic‐solvers; the genuine student is seldom much in evidence.