• Title/Summary/Keyword: Security Strategies

Search Result 620, Processing Time 0.025 seconds

Honeypot game-theoretical model for defending against APT attacks with limited resources in cyber-physical systems

  • Tian, Wen;Ji, Xiao-Peng;Liu, Weiwei;Zhai, Jiangtao;Liu, Guangjie;Dai, Yuewei;Huang, Shuhua
    • ETRI Journal
    • /
    • v.41 no.5
    • /
    • pp.585-598
    • /
    • 2019
  • A cyber-physical system (CPS) is a new mechanism controlled or monitored by computer algorithms that intertwine physical and software components. Advanced persistent threats (APTs) represent stealthy, powerful, and well-funded attacks against CPSs; they integrate physical processes and have recently become an active research area. Existing offensive and defensive processes for APTs in CPSs are usually modeled by incomplete information game theory. However, honeypots, which are effective security vulnerability defense mechanisms, have not been widely adopted or modeled for defense against APT attacks in CPSs. In this study, a honeypot game-theoretical model considering both low- and high-interaction modes is used to investigate the offensive and defensive interactions, so that defensive strategies against APTs can be optimized. In this model, human analysis and honeypot allocation costs are introduced as limited resources. We prove the existence of Bayesian Nash equilibrium strategies and obtain the optimal defensive strategy under limited resources. Finally, numerical simulations demonstrate that the proposed method is effective in obtaining the optimal defensive effect.

The Effect of Using the Interactive Electronic Models in Teaching Mathematical Concepts on Students Achievement in the University Level

  • Alzahrani, Yahya Mizher
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.5
    • /
    • pp.149-153
    • /
    • 2022
  • This study examines the effect of using interactive electronic models to teach mathematical concepts on students' achievement in the linear algebra course at university. The field sample consisted of 200 students divided into two equal groups, an experimental group of 100 students and a control group of 100 students. The researcher used an achievement test in some mathematical concepts related to linear algebra. The results of the study showed that there were statistically significant differences (0.05) between the average achievement scores of the experimental and control groups in the post application of the achievement test, in favor of the experimental group. The size of the influence of the independent factor on the results of the study, which is "interactive electronic forms", on the dependent factor, which is the students' academic achievement in the prepared test, had a very large effect. Also, the results of the study showed that there were statistically significant differences (0.05) between the mean scores of the experimental group in the pre and post applications of the achievement test, in favor of the post application. The researcher recommended the use of interactive electronic models in teaching mathematical concepts at the university level and diversifying the strategies of teaching mathematics, using technology to attract learners and raise their academic achievement.

Exploring Pseudonymous based Schemes for Safegaurding Location Privacy in Vehicular Adhoc Network (VANET)

  • Arslan Akhtar Joyo;Fizza Abbas Alvi;Rafia Naz Memon;Irfana Memon;Sajida Parveen
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.2
    • /
    • pp.101-110
    • /
    • 2023
  • Vehicular Ad Hoc Network (VANET) is considered to be a subclass of Mobile Ad Hoc Networks (MANET). It has some challenges and issues of privacy which require to be solved before practical implementation of the system i.e., location preservation privacy. Many schemes have been proposed. The most prominent is pseudonym change based location preservation scheme. Safety message can be compromised when it sends via a wireless medium, consequently, an adversary can eavesdrop the communication to analyze and track targeted vehicle. The issue can be counter by use of pseudo identity instead of real and their change while communication proves to be a sufficient solution for such problems. In this context, a large amount of literature on pseudonym change strategies has been proposed to solve such problems in VANET. In this paper, we have given details on strategies proposed last two decades on pseudonym change based location preservation along with issues that they focus to resolve and try to give full understanding to readers.

Conflict Resolution: Analysis of the Existing Theories and Resolution Strategies in Relation to Face Recognition

  • A. A. Alabi;B. S. Afolabi;B. I. Akhigbe;A. A. Ayoade
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.9
    • /
    • pp.166-176
    • /
    • 2023
  • A scenario known as conflict in face recognition may arise as a result of some disparity-related issues (such as expression, distortion, occlusion and others) leading to a compromise of someone's identity or contradiction of the intended message. However, addressing this requires the determination and application of appropriate procedures among the various conflict theories both in terms of concepts as well as resolution strategies. Theories such as Marxist, Game theory (Prisoner's dilemma, Penny matching, Chicken problem), Lanchester theory and Information theory were analyzed in relation to facial images conflict and these were made possible by trying to provide answers to selected questions as far as resolving facial conflict is concerned. It has been observed that the scenarios presented in the Marxist theory agree with the form of resolution expected in the analysis of conflict and its related issues as they relate to face recognition. The study observed that the issue of conflict in facial images can better be analyzed using the concept introduced by the Marxist theory in relation to the Information theory. This is as a result of its resolution strategy which tends to seek a form of balance as result as opposed to the win or lose case scenarios applied in other concepts. This was also consolidated by making reference to the main mechanisms and result scenario applicable in Information theory.

Agile Software Development Methodologies Evaluation Research Analysis: A review

  • Sadaf Niaz;Babar Hayat
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.5
    • /
    • pp.103-110
    • /
    • 2024
  • In the quickly developing world, the idea of the conventional advancement needs to advance[1]. When applied to the advanced work environment, the conventional strategies give as much damage as they do great. Tragically, an absence of versatility in the customary techniques has prompted an inflexible work structure that is truly not viable with the present business. The Agile technique is, subsequently, a more adequate practice, in view of creating programming at a faster speed, while as yet looking after proficiency. The coordinated programming improvement strategies are concentrated in this paper. As per study results, Agile software development group needs solid client association; great light-footed task the executives' measures; item proprietor expands business esteem conveyed by group and need and draw in partners; great deft designing procedures or practices; and great advancements and advancement apparatuses[2]. This examination has suggestions for positive social change since associations that comprehend the basic components might have the option to improve project the executives' systems and money saving advantages prompting higher effectiveness, productivity, and efficiency hence profiting the board, representatives, and client. This survey paper incorporates various methodologies of Agile and their analysis.

Bridging the Gap: Follow-up Strategies for Effective Software Architecture Implementation

  • Abdullah A H Alzahrani
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.7
    • /
    • pp.1-10
    • /
    • 2024
  • Software architecture are High-level design decisions shaping a software system's components, structure, and interactions. It can be a blueprint for development, evolution, and ongoing maintenance. This research investigates the communication practices employed by software architects and developers to ensure adherence to the designed software architecture. It explores the factors influencing the selection of follow-up methods and the impact of follow-up frequency on successful implementation. Findings reveal that formalized follow-up procedures are not yet a ubiquitous element within the software development lifecycle. While electronic communication, particularly email, appears to be the preferred method for both architects and developers, physical and online meetings are utilized less frequently. Interestingly, the study suggests a potential confidence gap, with architects expressing concerns about developers' ability to faithfully implement the architecture. This may lead to architects providing additional clarification. Conversely, while most developers reported confidence in their software knowledge, overly detailed architecture documentation may pose challenges, highlighting the need for architects to consider alternative communication strategies. A key limitation of this study is the sample size, restricting the generalizability of the conclusions. However, the research offers valuable preliminary insights into the communication practices employed for architecture implementation, paving the way for further investigation with a larger and more diverse participant pool.

Strengthening Enterprise Security through the Adoption of Zero Trust Architecture - A Focus on Micro-segmentation Approach - (제로 트러스트 아키텍처 도입을 통한 기업 보안 강화 방안 - 마이크로 세그먼테이션 접근법 중심으로 -)

  • Seung-Hyun Joo;Jin-Min Kim;Dae-Hyun Kwon;Yong-Tae Shin
    • Convergence Security Journal
    • /
    • v.23 no.3
    • /
    • pp.3-11
    • /
    • 2023
  • Zero Trust, characterized by the principle of "Never Trust, Always Verify," represents a novel security paradigm. The proliferation of remote work and the widespread use of cloud services have led to the establishment of Work From Anywhere (WFA) environments, where access to corporate systems is possible from any location. In such environments, the boundaries between internal and external networks have become increasingly ambiguous, rendering traditional perimeter security models inadequate to address the complex and diverse nature of cyber threats and attacks. This research paper introduces the implementation principles of Zero Trust and focuses on the Micro Segmentation approach, highlighting its relevance in mitigating the limitations of perimeter security. By leveraging the risk management framework provided by the National Institute of Standards and Technology (NIST), this paper proposes a comprehensive procedure for the adoption of Zero Trust. The aim is to empower organizations to enhance their security strategies.

Review of the Current Policy Related to Exploration and Development of Mineral Resources in China (중국의 광물자원 탐사개발 관련 최신 정책 고찰)

  • Kim, Seong-Yong;Bae, Jun-Hee;Lee, Jae-Wook;Heo, Chul-Ho
    • Economic and Environmental Geology
    • /
    • v.49 no.3
    • /
    • pp.201-212
    • /
    • 2016
  • Due to growing problems securing stable mineral and energy resources with international political and economic changes, China has dedicated itself to strategies and policies to enhance its stable mineral and energy resources security. China has established a rare earth elements(REE) industry policy after the abolition of the REE exports quota system. China's six large REE companies have also been integrated into REE mining, smelting and refining companies. Efforts have been increased to enhance China's energy security through unconventional oil and gas exploration and development investment, as well as effort in R&D. The country will focus on technology development and exploration to promote commercial production of unconventional oil and gas based on countries with shale gas. China is making long-term contracts and joint ventures to ensure the acquisition of reliable mineral and energy resources from abroad. Government of China has proposed a range of initiatives, such as the integration of resources development strategies and environmental development strategies, internationalization of resource management, supply diversification and advancement, strengthening industry linking strategy, grouping and diversification strategy.

Study of Information System Model in University (대학 정보시스템 모델연구)

  • Chung, Jong-In
    • The Journal of Korean Association of Computer Education
    • /
    • v.5 no.3
    • /
    • pp.27-35
    • /
    • 2002
  • This paper is presented a model of management and application of PC, one of the most important computer resources and software and a model for optimal speed of network to organize information budget of University. I propose strategies to promote utilization degree of existing PCs, problems and strategies to maintain PC, effective strategies to expand PC and change into new models, and strategies to utilize effectively and purchase softwares. Also, I propose an optimal model for network environment and management, which is core to establish master plan of information system. Network is divided into internal and external network and formula model is proposed to calculate optimal speed of these. And strategy is proposed to maintain security of University preserving its characteristics.

  • PDF

Risk Perceptions and Risk-reduction Strategies in Internet Apparel Shopping

  • Lee, Mi-Young
    • Journal of Fashion Business
    • /
    • v.9 no.3
    • /
    • pp.134-149
    • /
    • 2005
  • Although Internet retailing is becoming a viable channel for apparel retailing, consumers are still reluctant to use Internet for apparel purchasing because at their concerns at Internet security and the difficulties at virtual shopping in unfamiliar shopping environment. The purpose at this study is to examine the nature at perceived risk associated with Internet apparel shopping and risk-reduction strategies used by Internet apparel shoppers. The data were collected via an online survey by a online research company. A total at 4,254 Internet users participated in this survey. Among these Internet users, 1,146 respondents had previous shopping experience in Internet shopping. Within this group, 195 were Internet apparel information seekers, and 589 were Internet apparel purchasers. Descriptive statistics, analysis of variance, and t-test were used to analyze the data. The perceived risks and risk-reduction strategies used by Internet apparel no-interest shoppers, Internet apparel information seekers (browsers), moderate Internet apparel purchasers, heavy Internet apparel purchasers were examined and compared. The results indicated that these tour groups were significantly different in apparel related risk, performance risk, and privacy risk. Internet purchasers tend to perceive more apparel-related, performance, and privacy risks than others. The results also indicated that these tour groups were significantly different in their opinions of risk-reduction strategies.