Filters








2,051 Hits in 8.8 sec

Understanding the behaviour of hackers while performing attack tasks in a professional setting and in a public challenge

Mariano Ceccato, Paolo Tonella, Cataldo Basile, Paolo Falcarin, Marco Torchiano, Bart Coppens, Bjorn De Sutter
2018 Empirical Software Engineering  
and a public challenge consisting of eight attack tasks with open participation.  ...  Knowledge of the actual hacker behaviours while performing real attack tasks can inform better ways to protect the software and can provide more realistic assumptions to the developers, evaluators, and  ...  Acknowledgment The research leading to these results has received funding from the European Union Seventh Framework Programme (FP7/2007-2013) under grant agreement number 609734.  ... 
doi:10.1007/s10664-018-9625-6 fatcat:yxwqfjacrjb43nqtnbkiwvldky

Attacker Behaviour Forecasting Using Methods of Intelligent Data Analysis: A Comparative Review and Prospects

Elena Doynikova, Evgenia Novikova, Igor Kotenko
2020 Information  
Usually, the "attacker profile" is a set of attacker's attributes—both inner such as motives and skills, and external such as existing financial support and tools used.  ...  The implemented analysis allowed outlining the main advantages and limitations of the approaches to attack forecasting and attacker's profile constructing, existing challenges, and prospects in the area  ...  Conflicts of Interest: The authors declare no conflict of interest. Information 2020, 11, 168  ... 
doi:10.3390/info11030168 fatcat:hhgj7dspynfwblsmblweq6bznm

Preface to the Special Issue on Program Comprehension

David Lo, Alexander Serebrenik
2018 Empirical Software Engineering  
The results call for tool support to help guide developers in understanding the structure of the code and the technical details of a project while taking into account the exact requirements imposed by  ...  In their extended version, entitled BInvestigating Whether and How Software Developers Understand Open Source Software Licensing^, the authors have conducted a survey of 375 developers that posed development  ...  Another paper in this special issue is authored by Ceccato et al. entitled BUnderstanding the Behaviour of Hackers while Performing Attack Tasks in a Professional Setting and in a Public Challenge^.  ... 
doi:10.1007/s10664-018-9662-1 fatcat:3yllti2spjet3ocz4jiikpt4ce

The Consent of the Victim as Legal Defence in Cybercrime cases

Maxim DOBRINOIU
2017 Challenges of the Knowledge Society  
the victim may grant permission to the attackers to perform specific tasks against its own systems or data, especially when these belongs to a public institution.  ...  Taking into consideration the nature of such security evaluation techniques, that in certain situations may be regarded as cybercrimes, there should be a proper understanding of the circumstances when  ...  While in the case of a natural person (individual) the situation is clear and a valid approval given represents the legal ground for the other party (the "attacker") to not be prosecuted, things are a  ... 
doaj:54be5e9b71f44e99a2837467c7ae0765 fatcat:jhjgsvfqsbaw7bu3oqq2d3n3ma

A Survey on Ethical Hacking: Issues and Challenges [article]

Jean-Paul A. Yaacoub, Hassan N. Noura, Ola Salman, Ali Chehab
2021 arXiv   pre-print
However, in order to reduce the effect of these attacks, penetration tests are highly required, and can be considered as a suitable solution for this task.  ...  In other terms, pen testing is a simulated attack with the goal of identifying any exploitable vulnerability or/and a security gap.  ...  Pen Testing Pen testing require the presence of ethical hackers to perform this task in a verified professional way that guarantees their safety and the organisation's safety.  ... 
arXiv:2103.15072v1 fatcat:kqj6isalovdzbald3w2kxnqhbe

Moving from a "Human-as-Problem" to a "Human-as-Solution" Cybersecurity Mindset

Verena Zimmermann, Karen Renaud
2019 International Journal of Human-Computer Studies  
We conclude by proposing a set of key principles and, with the help of a prototypical fictional organisation, consider how this mindset could enhance and improve cybersecurity across the socio-technical  ...  Cybersecurity has gained prominence, with a number of widely publicised security incidents, hacking attacks and data breaches reaching the news over the last few years.  ...  Acknowledgement This research work has been funded by the German Federal Ministry of Education and Research and the Hessen State Ministry for Higher Education, Research and the Arts within their joint  ... 
doi:10.1016/j.ijhcs.2019.05.005 fatcat:dtqedztcmngyrdwcba55yuxhj4

Design and Evaluation of an Augmented Reality Game for Cybersecurity Awareness (CybAR)

Hamed Alqahtani, Manolya Kavakli-Thorne
2020 Information  
The results indicate that CybAR is useful for players to develop an understanding of cybersecurity attacks and vulnerabilities.  ...  The design and evaluation of the application are described in detail. A survey was conducted to verify the effectiveness of the game received positive responses from 91 participants.  ...  Two months earlier, press accounts reported that British Airways had experienced a data breach involving the personal and financial details of almost 400,000 customers, while in the previous month hackers  ... 
doi:10.3390/info11020121 fatcat:6vry4rikbbgezj7io4a3uhlcly

Cyber security: challenges for society- literature review

Atul M Tonge
2013 IOSR Journal of Computer Engineering  
These in turn led to consideration of a variety of possible approaches for improving cyber security in the future.  ...  The paper also describes the challenges due to lack of coordination between Security agencies and the Critical IT Infrastructure.  ...  Acknowledgment It gives us a great pleasure to submit the paper topic titled-Cyber Security: A Challenge To Society‖.We wish to take this opportunity to express our heartiest gratitude with pleasure to  ... 
doi:10.9790/0661-1226775 fatcat:ki2yjfgaovhnzgxxvm7e2zmby4

Hacking – Tracing the History: What can India do with its Hackers?

E. Dilipraj
2016 Zenodo  
In the process of evolution, the human emotion of curiosity has played a major role in advancing the evolutionary process from one phase to the next.  ...  And each and every outcome of this consuming curiosity opens a new avenue for further exploration of the path – a process which then proceeds into an explosive chain reaction of newer discoveries and inventions  ...  in the trade and are capable of accomplishing highly complex hacking tasks.  ... 
doi:10.5281/zenodo.3372309 fatcat:64zdhdba7zbglofmlsksudcgdu

The Challenges and Opportunities of Human-Centered AI for Trustworthy Robots and Autonomous Systems [article]

Hongmei He, John Gray, Angelo Cangelosi, Qinggang Meng, T.Martin McGinnity, Jörn Mehnen
2021 arXiv   pre-print
While applications of RAS have mainly focused on performance and productivity, the risks posed by advanced AI in RAS have not received sufficient scientific attention.  ...  of RAS with respects to safety, security, health and HMI, while reflecting the requirements of ethics in the design of RAS.  ...  The most challenge lies in that the performance and quality of RAS for various tasks in the context of a specific application domain must align with the five properties of a trustworthy RAS. A.  ... 
arXiv:2105.04408v1 fatcat:jvlx7lkjizgnbcu2t27ndi4l3q

Security Problems in Iot Model and Privacy Preserving in Various Iot Devices

2019 International journal of recent technology and engineering  
Within this paper, our company temporarily showed the kinds of security concerns in IoT style, personal privacy-preserving in different IoT devices as well as additional challenges and also method for  ...  It is instead required for IoT units to equip along with the potential to withstand security and privacy threats when fulfilling the intended useful criteria and services.  ...  This difficulty makes it challenging to safeguard the privacy of one delicate behaviour in isolation of the others, and also it limits the devices that can be made use of.  ... 
doi:10.35940/ijrte.d8382.118419 fatcat:refxxcaeyvbz3kfjb53f7i5gma

Improving Student Engagement in the Study of Professional Ethics: Concepts and an Example in Cyber Security

John D. Bustard
2017 Science and Engineering Ethics  
This led to a hacker group declaring the church a legitimate target for attacks and started a long-running conflict between hacktivists and the church.  ...  The middle third find the task more challenging and tend to focus on ''the facts of the case,'' with much less emphasis on motives and dynamics.  ... 
doi:10.1007/s11948-017-9904-4 pmid:28401507 pmcid:PMC5876413 fatcat:vxomjdjrcvfujf7cwcym4xrhzq

Influence of Human Factors on Cyber Security within Healthcare Organisations: A Systematic Review

Sokratis Nifakos, Krishna Chandramouli, Charoula Konstantina Nikolaou, Panagiotis Papachristou, Sabine Koch, Emmanouil Panaousis, Stefano Bonacina
2021 Sensors  
A steady increase in the literature on the threat of phishing attacks evidences the growing threat of social engineering attacks.  ...  Following an increase in the frequency and ingenuity of attacks launched against hospitals and clinical environments with the intention of causing service disruption, there is a strong need to study the  ...  The rationale presented in the publication reflected upon the human nature of performing repetitive tasks-The behaviour rapidly becomes automatic and does not require conscious control.  ... 
doi:10.3390/s21155119 fatcat:opxkchww7vbunatnrj723p42ry

ICT security in tax administration - Rapid7 Nexpose vulnerability analysis

Tomasz Muliński
2021 Studia Informatica  
We discuss the specifics of security research in public administration resulting from the laws in force in these institutions.  ...  The article focuses on the subject of IT security in tax administration.  ...  Like the black box method, it is quite time consuming in the case of a fairly well secured system. However, it allows you to reflect a real hacker attack.  ... 
doi:10.34739/si.2020.24.03 fatcat:nnqydx7y4fg7xd2axgsgcd3atu

Tacit Knowledge in Software Evolution [chapter]

Jan Ole Johanssen, Fabien Patrick Viertel, Bernd Bruegge, Kurt Schneider
2019 Managed Software Evolution  
In long-living software systems, requirements identification and update are particularly challenging. This typically results in an incomplete set of requirements.  ...  In the long term of a long-living software system, externalising and reusing tacit security knowledge will be embedded in a cyclic learning process.  ...  While the first behaviour indicates easily readable content, the latter one might be interpreted in a way that the list's content is hardly understandable and requires the full attention of a user.  ... 
doi:10.1007/978-3-030-13499-0_5 fatcat:px2exrzd6fa6bkw3evl6jzuzzm
« Previous Showing results 1 — 15 out of 2,051 results