48,566 Hits in 7.7 sec

Towards Security Risk-Oriented Misuse Cases [chapter]

Inam Soomro, Naved Ahmed
2013 Lecture Notes in Business Information Processing  
Security has turn out to be a necessity of information systems (ISs) and information per se.  ...  Nevertheless, existing practices report on numerous cases when security aspects were considered only at the end of the development process, thus, missing the systematic security analysis.  ...  Integrity of Transaction).  ... 
doi:10.1007/978-3-642-36285-9_68 fatcat:o7ojrdwx6zchxps2ugtjfevcbi

Guest Editorial: Special Section on Resilience, Reliability, and Security in Cyber–Physical Systems

Bin Zhang, Peng Zhang, Tuyen Vu, Mo-Yuen Chow
2020 IEEE Transactions on Industrial Informatics  
Chow has established the Advanced Diagnosis, Automation, and Control Laboratory. He was the Co-Editor-in-Chief of the IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2014-2018  ...  His research interests include smart grid; power system dynamics, stability, and control; energy management and optimization; power systems cybersecurity, and integration of distributed energy resources  ...  Theoretical analysis also reveals the impact of attack duration time on the control algorithm convergence time. Case studies show the validity and effectiveness of the proposed method.  ... 
doi:10.1109/tii.2020.2971725 fatcat:rky3mouewzbenlk6mz56ss2n6m

A Broader View of Information Risk during Internet Transactions

James Lee Jr., Merrill Warkentin, Allen C. Johnston
2016 Communications of the Association for Information Systems  
Because information in transit is at risk from a network environment's vulnerabilities, we focus on the implications of such risk on Internet activities.  ...  Ubiquitous networking facilitates Internet access across multiple network environments, whose value is tied directly to user perceptions of its ability to securely execute transactions.  ...  Because denial-of-service attacks indirectly target a user's information, we focus on confidentiality and integrity attacks.  ... 
doi:10.17705/1cais.03808 fatcat:qghwroyrz5eo5cg7pm3mmejvpa

A Taxonomy for Understanding the Security Technical Debts in Blockchain Based Systems [article]

Sabreen Ahmadjee, Rami Bahsoon
2019 arXiv   pre-print
Blockchain is a disruptive technology intended at implementing secure decentralized distributed systems, in which transactional data can be shared, stored and verified by participants of a system using  ...  and choices and their consequences on the dependability of the software system.  ...  Security, data integrity and users privacy might be negatively impacted by this limitation and the decisions to store sensitive information on or off-chain.  ... 
arXiv:1903.03323v1 fatcat:zpfqd5udnjfmjc7jsamcpqktx4

Security of E-Procurement Transactions in Supply Chain Reengineering

Juliette Stephens, Raul Valverde
2013 Computer and Information Science  
of transaction data.  ...  The result is an increasing demand for secure e-procurement transactions to ensure the confidentiality, integrity and availability of data.  ...  The security model proposed for e-Procurement integration for this research can be applied to many reengineering projects of similar sizes that rely on an external system like Ketera.  ... 
doi:10.5539/cis.v6n3p1 fatcat:qjjktrpj7zbvlpxh5a2ojr5aw4

Blockchain Security Attacks, Challenges, and Solutions for the Future Distributed IoT Network

Saurabh Singh, A.S.M. Sanwar Hosen, Byungun Yoon
2021 IEEE Access  
Blockchain concept requires a decentralized data management system for storing and sharing the data and transactions in the network.  ...  such attacks.  ...  System Integration: Is responsible for integrating blockchains in a bidirectional manner with external systems. D.  ... 
doi:10.1109/access.2021.3051602 fatcat:2psy7mq6zrhhnjzg35d6aaecsq

Transaction Security in Online Banking and e-Commerce

Mihai-Ciprian ANGHEL
2017 International Journal of Information Security and Cybercrime  
A stream of news of phishing attacks, website spoofing, payment card skimming (credit /debit cards), fraud in online transactions, malware attack (malicious code attack of viruses, worms, Trojans, and  ...  bots), hacker/cracker infiltration, vandalism, identity theft and data breaches of payment card or bank details are increasingly reported.  ...  R 3 : A high-impact system is an information system in which at least one security objective is HIGH.  ... 
doi:10.19107/ijisc.2017.02.04 fatcat:tr3kw6byuvbyna5jbnnvughpmq

Modeling and Evaluating the Survivability of an Intrusion Tolerant Database System [chapter]

Hai Wang, Peng Liu
2006 Lecture Notes in Computer Science  
The immaturity of current intrusion detection techniques limits the traditional security systems in surviving malicious attacks.  ...  Furthermore, I am interested in understanding the impact of existing system deficiencies, such as false positive, and attack behaviors on the survivability.  ...  This keeps ITDB busy on analyzing and masking the heavy attacks. However, the system integrity is not impacted by the attacks significantly.  ... 
doi:10.1007/11863908_14 fatcat:4ix6lyxp2bfbjngysmxo7hiffm

Scanning Hybrid Transaction Algorithm for Secure Financial Transactions

Divyansh Joshi
2021 International Journal for Research in Applied Science and Engineering Technology  
We give one case study to demonstrate the security of our methodology in order to better understand how it may safeguard someone from having a stolen credit card used.  ...  This is then entered when required on an online retailer's website in order to verify the person making the transaction.  ...  Li, Security analysis and improvement of „a more secure anonymous user authentication scheme for the integrated EPR information system, PloS one, 10(8), 2015, 1-19. [4] C. H. Lin, Y. S. Yeh, S.  ... 
doi:10.22214/ijraset.2021.39355 fatcat:55axbnb32bfghifhslnfpudw5m

Octave Allegro Risk Assessment The George Washington University Hospital

Lingyi Meng, Bahareh Abrishami, Sharifa Rahmani, Yining Xie, Zhe Yang, Parisa Nazarijam
2018 Zenodo  
We analysis the whole eight steps to conduct a risk mitigation plan outlining necessary measures to enhance the security level of the Hospital's staff, patients and vendors are proposed.  ...  technique is used to study the George Washington University hospital for identifying risk measure criteria, developing information asset profiles, and identifying information asset containers and the areas of  ...  Confidentiality Integrity Availability Other  ... 
doi:10.5281/zenodo.1436005 fatcat:jvoucxxgdrgb5mwkjmescj2cqi

Actor-based Risk Analysis for Blockchains in Smart Mobility [article]

Ranwa Al Mallah, Bilal Farooq
2020 arXiv   pre-print
In the case study of the public permissioned BSMD, we highlight the highest risk factors according to their impact on the victims in terms of monetary, privacy, integrity and trust.  ...  We conduct an actor-based analysis to determine the impact of the attacks. The analysis identified five attack goals and five types of attackers that violate the security of the blockchain system.  ...  mobility data, transactions and integrity of the users 3 Severe impact on the integrity of the mobility data, transactions and integrity of the users 4 Catastrophic impact on the integrity of the mobility  ... 
arXiv:2007.09098v1 fatcat:sc7dbeqrlndoznon553zyhmgoa

Systematic review of features for co‐simulating security incidents in Cyber‐Physical Systems

Ricardo M. Czekster, Charles Morisset, John A. Clark, Sadegh Soudjani, Charalampos Patsios, Peter Davison
2021 Security and Privacy  
Cyber-Physical Systems (CPS) and Internet-of-Things (IoT) plus energy are the enabling technology of modern power systems also known as the Smart Grid (SG).  ...  The technique of composing two models of computation in a global simulation of these coupled systems is called co-simulation.  ...  of the SG, allowing scenario exploration for understanding the impact of cyber attacks in the infrastructure.  ... 
doi:10.1002/spy2.150 fatcat:mcrafuc2tnbqnmsywuniygcbcq

A Systematic Approach for Attack Analysis and Mitigation in V2V Networks

Bharat K. Bhargava, Amber M. Johnson, Gisele Izera Munyengabe, Pelin Angin
2016 Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications  
Accurate assessment of the safety and security needs of V2V networks based on context and the costs associated with attack mitigation mechanisms are significant for successful operation of these networks  ...  In this paper we provide an analysis of the major security and reliability issues in V2V networks, and propose a systematic approach for the analysis and mitigation of attacks, based on the break-down  ...  The statements made herein are solely the responsibility of the authors.  ... 
doi:10.22667/jowua.2016.03.31.079 dblp:journals/jowua/BhargavaJMA16 fatcat:m3ej7zx4ofha3oq4efsfnvkbm4

Supply Chain 4.0: A Survey of Cyber Security Challenges, Solutions and Future Directions

Theresa Sobb, Benjamin Turnbull, Nour Moustafa
2020 Electronics  
Supply chain 4.0 denotes the fourth revolution of supply chain management systems, integrating manufacturing operations with telecommunication and Information Technology processes.  ...  This encompasses an assessment of the cyber risks and opportunities for research in the field, including consideration of connectivity, sensing and convergence of systems.  ...  Conflicts of Interest: The authors declare no potential conflict of interests.  ... 
doi:10.3390/electronics9111864 fatcat:h54irum3krb77gsj4x76w2mabm

Distributed Systems Security Knowledge Area [article]

Neeraj Suri
2019 Zenodo  
such as transactions, databases, storage, control, and computing.  ...  These include (a) data flows across the collection of authorised inputs (regulated via Access/Admission Control), (b) transportation of the data to/across the distributed resources (Data Transport functionality  ...  Attacks against P P systems usually show an impact in terms of the system's confidentiality, integrity, or availability.  ... 
doi:10.5281/zenodo.3941852 fatcat:ag6uugbkybg65iacezz6yjmemq
« Previous Showing results 1 — 15 out of 48,566 results