852 Hits in 3.1 sec

Visual Analysis of Photo Policy Misconfigurations Using Treemaps [article]

Yousra Javed, Mohamed Shehab
2019 arXiv   pre-print
Online photo privacy is a major concern for social media users. Numerous visualization tools have been proposed to help the users easily compose and understand policies on social networks.  ...  We propose a tool that displays the photo albums w.r.t their policy misconfigurations using a Treemap visualization.  ...  Their results indicated the users' privacy concern for their online photos. Being non-experts in access control-the users frequently end up giving access to unintended audience.  ... 
arXiv:1903.02612v1 fatcat:rhvo3xfn2zhndk7tlobgot7buy

Security, Control and Management of Smart Remote Laboratory for Remote Experiments in Electricity and Electronics

Yassine Larbaoui
2020 International Journal of Advanced Trends in Computer Science and Engineering  
In addition, this paper presents the major parts of developed, integrated and deployed resources for online experimenting and distance learning through this hybrid platform.  ...  different techniques for smart environment control and management.  ...  Moreover, we aim to optimize the control and management of deployed resources in term of security, online access and monitoring.  ... 
doi:10.30534/ijatcse/2020/234932020 fatcat:vlvycktmnjblpmltnz6uybzk7m

Security Professionals Must Reinforce Detect Attacks to Avoid Unauthorized Data Exposure

Alain Loukaka, Shawon S. M. Rahman
2021 Information Technology in Industry  
Digital criminals are responsible for increased network breaches using elusive security tools to penetrate secure environments with sophistication.  ...  Monetary investment in cybersecurity and management support plays a significant role in assuring the implementation of information security throughout any organizational processes.  ...  The previous idea resolution incorporated the use of the least-privilege principle and access controls. The focus also shifted to better physical security and better access control.  ... 
doi:10.17762/itii.v8i1.76 fatcat:fp3fpedw3vbffm3c65lp4r5jcq

Detection of Vulnerabilities in Network-Connected Servers

Mrs. S. Saritha
2013 IOSR Journal of Engineering  
This paper considers some of the facts why business need information security policies, procedures, technical measures used to prevent unauthorized access, alteration, theft or physical damages.  ...  Today, computer networks and distributed software systems are pervasive. Thus, the idea of secure computing is paramount.  ...  Policies for access control, authentication etc. ii) Physical Security refers to securing the building, work areas, devices and data in the form of documents.  ... 
doi:10.9790/3021-03523439 fatcat:44pe56jw4fdovkfcirjuue442e

A Review of Cyber-security Measuring and Assessment Methods for Modern Enterprises

Said Fathi Ahmed, Noha A. Hikal
2019 JOIV: International Journal on Informatics Visualization  
cyber-security system followed and policies used in modern enterprises.  ...  of a modern enterprise data network.  ...  Authority and Access Control Policy: Access to a company's network and servers, must be through unique logins that require an authentication process in the form of passwords, tokens, biometrics, IDs.  ... 
doi:10.30630/joiv.3.3.241 fatcat:pn7gl76g4za7xi676rk2trhz5y

Relationship-based information sharing in cloud-based decentralized social networks

Davide Alberto Albertini, Barbara Carminati
2014 Proceedings of the 4th ACM conference on Data and application security and privacy - CODASPY '14  
DSNs have been presented as a valid alternative to Online Social Networks (OSNs), replacing the centralized paradigm of OSNs with a decentralized distribution of the features offered by the social networking  ...  Indeed, it is nowadays well accepted that the definition of access control policies is an error-prone task.  ...  access control policies, we set up an online platform tailored for such experiment.  ... 
doi:10.1145/2557547.2557574 dblp:conf/codaspy/AlbertiniC14 fatcat:isavxnqj65fd5cfbqh3si33qmi

Operational Security Requirements for Large Collaborative Compute Infrastructures

Himanshu Khurana, Jim Basney, Von Welch, Roy Campbell
2006 2006 International Conference on Collaborative Computing: Networking, Applications and Worksharing  
In this paper we argue that gaps in security policies and procedures combined with organizational autonomy are the primary drivers motivating a set of requirements that go beyond those observed today.  ...  In order to secure these infrastructures a comprehensive requirements study is needed that takes into account the novel risks, threats, and operational issues brought on by the large-scale, distributed  ...  Any opinions, findings and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the ONR or NSF.  ... 
doi:10.1109/colcom.2006.361884 dblp:conf/colcom/KhuranaBWC06 fatcat:o4y3spvlfjfylnzhn2nhjitlw4

Social Networking Security during COVID-19: A Systematic Literature Review

Rabia Abid, Muhammad Rizwan, Peter Veselý, Asma Basharat, Usman Tariq, Abdul Rehman Javed, Kuruva Lakshmanna
2022 Wireless Communications and Mobile Computing  
This research extensively discusses the social networking threats, challenges, online surveys, and future effects.  ...  We conduct an online survey using the google forms platform to collect the responses of social networking sites (SNS) users within Pakistan to show how SNS affects health positively and negatively.  ...  Social Networking Security Based Online Survey Here, in this paper, we work on the social networking-based online survey to get the adverse or positive effect of SNS on audience or end-users.  ... 
doi:10.1155/2022/2975033 fatcat:xqvxb7mpwrhgvmmrstmry5dilq

Policy-by-example for online social networks

Gorrell P. Cheek, Mohamed Shehab
2012 Proceedings of the 17th ACM symposium on Access Control Models and Technologies - SACMAT '12  
We introduce two approaches for improving privacy policy management in online social networks.  ...  In addition, we demonstrated considerable reductions in policy authoring time using Same-As Policy Management over traditional group based policy management approaches.  ...  [3] analyze the impacts of community information on access control policy decisions within social networks.  ... 
doi:10.1145/2295136.2295142 dblp:conf/sacmat/CheekS12 fatcat:ws2yzcq5cfgkza2r3rnknanvna

What you want is not what you get

Arunesh Sinha, Yan Li, Lujo Bauer
2013 Proceedings of the 2013 ACM workshop on Artificial intelligence and security - AISec '13  
Studies repeatedly show that users frequently misconfigure their policies or misunderstand the privacy features offered by social networks.  ...  As the amount of content users publish on social networking sites rises, so do the danger and costs of inadvertently sharing content with an unintended audience.  ...  Das et al. analyzed fileserver access-control policy to detect inconsistencies in the permissions given to otherwise similar users [11] .  ... 
doi:10.1145/2517312.2517317 dblp:conf/ccs/SinhaLB13 fatcat:x6rc6fitbre2vmontluoi65zwa

KGSecConfig: A Knowledge Graph Based Approach for Secured Container Orchestrator Configuration [article]

Mubin Ul Haque, M. Mehdi Kholoosi, M. Ali Babar
2021 arXiv   pre-print
We also demonstrate the utilization of the knowledge graph for automated misconfiguration mitigation in a Kubernetes cluster.  ...  We assert that our knowledge graph based approach can help in addressing several challenges, e.g., misconfiguration of security, associated with manually configuring the security of CO.  ...  International Conference on Advances in Social Networks Analysis and [8] StackRox. (2020) The state of container and kubernetes security. Access Mining, 2019, pp. 879–886.  ... 
arXiv:2112.12595v1 fatcat:3ddw5irclrgxfooe3chpwzqfpi

Consumer-centric protection for online social networks

Raja Naeem Akram, Ryan K. L. Ko, Tsz Fung Law
2014 Proceedings of the 2014 IEEE 15th International Conference on Information Reuse and Integration (IEEE IRI 2014)  
Online Social Networks (OSNs) are a unique construct that is shaped by the advancement and availability of Internet technologies.  ...  In this proposal, the individual user controls how her data can be accessed by her contacts (e.g. friends and family members) and others, thus giving control of user data back to the rightful owner -the  ...  A large number of online users engage in one way or another with these social network sites, which are also called "Online Social Networks (OSNs)".  ... 
doi:10.1109/iri.2014.7051872 dblp:conf/iri/AkramKL14 fatcat:cus2e3ufefbkviczv5bosdw7xi

DEMACRO: Defense against Malicious Cross-Domain Requests [chapter]

Sebastian Lekies, Nick Nikiforakis, Walter Tighzert, Frank Piessens, Martin Johns
2012 Lecture Notes in Computer Science  
In this paper, we confirm the findings of the aforementioned studies and we design DEMACRO, a client-side defense mechanism which detects potentially malicious cross-domain requests and de-authenticates  ...  Three recent studies showed that a significant number of Web applications implement poor cross-domain policies allowing malicious domains to embed Flash and Silverlight applets which can conduct arbitrary  ...  Beato et al. propose a client-side access-control system for social networks, where the publishing user can select who will get access to the published information [3] .  ... 
doi:10.1007/978-3-642-33338-5_13 fatcat:mf44zuokdfc3vefdb7kjpgojv4

Overview of the Impact of Human Error on Cybersecurity based on ISO/IEC 27001 Information Security Management

Amar Yasser El-Bably
2021 Journal of Information Security and Cybercrimes Research  
Information security is the practice of protecting information by mitigating the risk of cyber-attack, and typically includes preventing or reducing the possibility of unauthorized/inappropriate access  ...  International standards related to information security such as ISO/IEC 27001 emphasis on effective implementation of the information security policies and applications without hampering the productivity  ...  Your security policy should clearly outline how to handle critical data and passwords, who can access them, which security and monitoring software to use, etc.  ... 
doi:10.26735/wlpw6121 fatcat:js5qmakxmnebbaf5y3w7dxiczi

Network Error Logging: Client-side measurement of end-to-end web service reliability

Sam Burnett, Lily Chen, Douglas A. Creager, Misha Efimov, Ilya Grigorik, Ben Jones, Harsha V. Madhyastha, Pavlos Papageorge, Brian Rogan, Charles Stahl, Julia Tuttle
2020 Symposium on Networked Systems Design and Implementation  
Since 2014, NEL has been invaluable in monitoring all of Google's domains, allowing us to detect and investigate instances of DNS hijacking, BGP route leaks, protocol deployment bugs, and other problems  ...  We present NEL (Network Error Logging), a planet-scale, client-side, network reliability measurement system.  ...  In particular, we thank Emma Christie, Fred Douglas, Logan Ingalls, Martijn Stevenson, Matthew Steele, Steve Wang, Wesley Darlington, and Yan Avlasov for investigating issues that NEL has detected over  ... 
dblp:conf/nsdi/BurnettCCEGJMPR20 fatcat:q7pdxprtpndrhecyrj4hssdqke
« Previous Showing results 1 — 15 out of 852 results