{"title":"The role risk-management plays in reducing insider threat’s in the federal Government","authors":"A. Stone","doi":"10.1080/19393555.2021.1998735","DOIUrl":"https://doi.org/10.1080/19393555.2021.1998735","url":null,"abstract":"ABSTRACT Today, organizations face a growing cybersecurity threats to their IT infrastructure. The ever expanding remote-workforce has made the risk of insider-threats even more dangerous. How can organizations be better prepared to handle the risk of the next insider-threat? The Federal Government is no different, as one of the largest employer’s in the world, the growing risk of an insider-threat is always present. In a systematic review, the evidence will identify how Federal agencies can utilize risk-management to be better prepared to combat an insider-threat. Recommendations will be made to help Federal agencies be on the lookout for the next viable insider-threat.","PeriodicalId":103842,"journal":{"name":"Information Security Journal: A Global Perspective","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131194269","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
O. K. Xanthidou, D. Xanthidis, Christos Manolas, Han-I Wang
{"title":"Security and privacy consideration for the deployment of electronic health records: a qualitative study covering Greece and Oman","authors":"O. K. Xanthidou, D. Xanthidis, Christos Manolas, Han-I Wang","doi":"10.1080/19393555.2021.2003914","DOIUrl":"https://doi.org/10.1080/19393555.2021.2003914","url":null,"abstract":"ABSTRACT The deployment of an Electronic Health Record (EHR) introduced multiple and obvious benefits. Nevertheless, it also introduced various issues and challenges. Among others, these include considerations regarding the levels of system access, provisions for security and authorization protocols, provisions for backup and recovery mechanisms, and the training of IT staff and their appreciation of the system. The study focused on these areas, and introduced a number of related concepts and observations, based on the opinions of a sample population of EHR system stakeholders across Greece and Oman. The study adopted a qualitative methodology, utilizing field work and visits to the natural settings of medical units in the two countries, where a total of 40 professionals were interviewed. The results indicate that the views of professionals are largely divided in terms of patient access to their personal records. It was also observed that the access of third parties to such records should be both restricted and recorded. In terms of the security level, the ICTs training and the backup and recovery mechanism in place, professionals were generally satisfied, with the majority of the interviewees also confirming that an authorization scheme should be followed in order to access the EHR.","PeriodicalId":103842,"journal":{"name":"Information Security Journal: A Global Perspective","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123312498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A tokenization technique for improving the security of EMV contactless cards","authors":"Ossama Al-Maliki, H. Al-Assam","doi":"10.1080/19393555.2021.2001120","DOIUrl":"https://doi.org/10.1080/19393555.2021.2001120","url":null,"abstract":"ABSTRACT This paper focuses on the EMV contactless payment cards and their vulnerability of leaking sensitive information such as the cardholder name, Primary Account Number (PAN), and the expiry date of the EMV card. Such data can be sniffed using off-the-shelf hardware or software without the knowledge of the genuine cardholder. The paper proposes a tokenization technique to replace the PAN of the actual EMV contactless card’s with a token to protect the genuine data from being sniffed by an attacker and used in the Card-No-Present (CNP) attack or any other attacks. The proposal was inspired by the implementation of the tokenization in the EMV Mobile payment such as Apple, Google, and Samsung mobile payments. We argue that the proposed tokenization technique is easy to adopt and cost-effective to implement by EMV protocol as it does not require any changes to the infrastructure of existing payment systems. A vital feature of the proposal is that all the changes in the EMV protocol are at the personalization phase of the EMV card. The paper presents a successful implementation of the tokenization approach using a Java contactless card framework to represent EMV contactless cards to demonstrate its effectiveness in improving the security and protecting the privacy of the card’s information.","PeriodicalId":103842,"journal":{"name":"Information Security Journal: A Global Perspective","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126509421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"New chaotic satellite image encryption by using some or all the rounds of the AES algorithm","authors":"M. Naim, Ali Pacha, Oran Mohamed Boudiaf, Oran","doi":"10.1080/19393555.2021.1982082","DOIUrl":"https://doi.org/10.1080/19393555.2021.1982082","url":null,"abstract":"ABSTRACT This study suggests new satellite chaotic image encryption by using some or all the rounds of the AES algorithm to improve security techniques to protect sensitive data and images during transmission between satellites and ground stations. First, the 7D hyperchaotic system generates the initial key of the pseudo-AES algorithm by using the first and the second variables of the hyperchaotic system. Second, the pseudo-AES algorithm consists of several rounds, where two of them are fixed rounds (the first and the last rounds of the classical AES algorithm), while the number of the remaining rounds depends on the value of the third variable of the hyperchaotic system which considered as a determiner. Third, the permutation operation is applied to the output of the pseudo-AES algorithm by an arrangement permutation on the rows and the columns using the fourth and fifth variables of the hyperchaotic system. Finally, the remaining two variables of the hyperchaotic system are used to generate a mask matrix to be XORed with the output of the previous step to obtain the final cipher image. Moreover, the experimental results show that the proposed technique of encryption for satellite images has extraordinary resistance against well-known attacks.","PeriodicalId":103842,"journal":{"name":"Information Security Journal: A Global Perspective","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114972504","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mohammed Nasereddin, Ashaar ALKhamaiseh, Malik Qasaimeh, Raad S. Al-Qassas
{"title":"A systematic review of detection and prevention techniques of SQL injection attacks","authors":"Mohammed Nasereddin, Ashaar ALKhamaiseh, Malik Qasaimeh, Raad S. Al-Qassas","doi":"10.1080/19393555.2021.1995537","DOIUrl":"https://doi.org/10.1080/19393555.2021.1995537","url":null,"abstract":"ABSTRACT SQL injection is a type of database-targeted attack for data-driven applications. It is performed by inserting malicious code in the SQL query to alter and modify its meaning, enabling the attacker to retrieve sensitive data or to access the database. Many techniques have been improved and proposed to detect and mitigate these types of attacks. This paper provides a systematic review for a pool of 60 papers on web applications’ SQL injection detection methods. The pool was selected using a developed searching and filtering methodology for the existing literature based on scholar databases (IEEE, ScienceDirect, and Springer) with the aim to provide specific answering for several research questions in the area of SQL injection detection. This provides a basis for the design and use of effective SQL injection detection methods.","PeriodicalId":103842,"journal":{"name":"Information Security Journal: A Global Perspective","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134332805","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Steganalysis attacks resilient, imperceptible, blind, and keyed image hiding in ultra HD 4K video","authors":"B. Banik, Abhinandan Banik","doi":"10.1080/19393555.2021.1986178","DOIUrl":"https://doi.org/10.1080/19393555.2021.1986178","url":null,"abstract":"ABSTRACT A novel data hiding approach is being proposed in this article, camouflaging secret data within a very high-quality video object. The proposed algorithm utilizes Discrete Wavelet Transform (DWT) and Discrete Cosine Transform (DCT) to hide image data, preprocessed using Arnold Transform. The novelty of this approach lies in the combination of five factors, which are – use of very high-resolution Ultra HD 4 K video as a cover object; Use of DCT coefficient in Scene Change Detection to identify cover frame; Scrambling the secret image by Arnold Transformation; Use of DCT-DWT in embedding and extraction process to that hide data in the blue plane of the RGB frame; and lastly, use of three different keys for data hiding to secure the proposed method against attacks, by adhering the Kerckhoff’s principle of a cryptosystem. Several quality metrics like Structural Content, Peak Signal-to-Noise Ratio, Normalized Cross-Correlation, Average Difference, Maximum Difference, and Normalized Absolute Error have been calculated to validate the imperceptibility. This method has also been validated against different steganalysis attacks like random cropping, rotating, resizing, noise addition, filtering, histogram attack, and lastly, compared with existing data hiding methods to prove superiority.","PeriodicalId":103842,"journal":{"name":"Information Security Journal: A Global Perspective","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129399085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yee Jian Chew, Nicholas Lee, S. Ooi, Kok-Seng Wong, Y. Pang
{"title":"Benchmarking full version of GureKDDCup, UNSW-NB15, and CIDDS-001 NIDS datasets using rolling-origin resampling","authors":"Yee Jian Chew, Nicholas Lee, S. Ooi, Kok-Seng Wong, Y. Pang","doi":"10.1080/19393555.2021.1985191","DOIUrl":"https://doi.org/10.1080/19393555.2021.1985191","url":null,"abstract":"ABSTRACT Network intrusion detection system (NIDS) is a system that analyses network traffic to flag malicious traffic or suspicious activities. Several recent NIDS datasets have been published, however, the lack of baseline experimental results on the full version of datasets had made it difficult for researchers to perform benchmarking. As the train-test distribution of the datasets has yet to be pre-defined by the creators, this further obstruct the researchers to compare the performance unbiasedly across each of the machine classifiers. Moreover, cross-validation resampling scheme have also been addressed in the literatures to be inappropriate in the domain of NIDS. Thus, rolling-origin – a standard resampling technique which is also known as a common cross-validation scheme in the forecasting domain is employed to allocate the training and testing distributions. In this paper, rigorous experiments are conducted on the full version of the three recent NIDS datasets: GureKDDCup, UNSW-NB15, and CIDDS-001. While the datasets chosen might not be the latest available datasets, we have selected them as they include the essential IP address fields which are usually missing or removed due to some sort of privacy concerns. To deliver the baseline empirical results, 10 well-known classifiers from Weka are utilized.","PeriodicalId":103842,"journal":{"name":"Information Security Journal: A Global Perspective","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127159713","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Variables influencing the effectiveness of signature-based network intrusion detection systems","authors":"T. Sommestad, Hannes Holm, Daniel Steinvall","doi":"10.1080/19393555.2021.1975853","DOIUrl":"https://doi.org/10.1080/19393555.2021.1975853","url":null,"abstract":"ABSTRACT Contemporary organizations often employ signature-based network intrusion detection systems to increase the security of their computer networks. The effectiveness of a signature-based system primarily depends on the quality of the rules used to associate system events to known malicious behavior. However, the variables that determine the quality of rulesets is relatively unknown. This paper empirically analyzes the detection probability in a test involving Snort for 1143 exploitation attempts and 12 Snort rulesets created by the Emerging Threats Labs and the Sourcefire Vulnerability Research Team. The default rulesets from Emerging Threats raised priority-1-alerts for 39% of the exploit attempts compared to 31% for rulesets from the Vulnerability Research Team. The following features predict detection probability: if the exploit is publicly known, if the ruleset references the exploited vulnerability, the payload, the type of software targeted, and the operating system of the targeted software. The importance of these variables depends on the ruleset used and whether default rules are used. A logistic regression model with these variables classifies 69–92% of the cases correctly for the different rulesets.","PeriodicalId":103842,"journal":{"name":"Information Security Journal: A Global Perspective","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126885534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security analysis and enhancements of UAS architecture","authors":"Bilal Akhtar, A. Masood","doi":"10.1080/19393555.2021.1977873","DOIUrl":"https://doi.org/10.1080/19393555.2021.1977873","url":null,"abstract":"ABSTRACT Unmanned Aerial Vehicles, known as UAVs, are controlled by the autopilot system remotely and autonomously. It is a component of Unmanned Aerial System (UAS) which contains a UAV, a Ground Control System (GCS), and Air link. They are used vastly in all applications; however, over a period of time, a number of security flaws have surfaced in UASs. While considerable research has been undertaken to propose secure solutions for UAS, the prior work on the subject fails to consider a holistic treatment of the security issues. Thereby, keeping in view the lack of a structured approach for UAS security, we have proposed an ISO 18028 standard-based framework for defining security architecture of UAS. ISO standard provides generic guidelines for the security architecture of a network; yet, the same has been extended in this work to propose a holistic security architecture for UASs, which effectively mitigates all the associated risks. Furthermore, the architecture has been used to evaluate two case studies: Commercial UAS based on Cube and Commercial UAS based on DJI A3. The appraisal undertaken in the case studies indicated a number of security limitations in the considered commercial solutions, thus leading to corresponding recommendations for security enhancements.","PeriodicalId":103842,"journal":{"name":"Information Security Journal: A Global Perspective","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121929238","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Comprehensive Survey of Phishing Email Detection and Protection Techniques","authors":"Santosh Kumar Birthriya, A. Jain","doi":"10.1080/19393555.2021.1959678","DOIUrl":"https://doi.org/10.1080/19393555.2021.1959678","url":null,"abstract":"ABSTRACT E-Mails are commonly used as a medium of communication for personal and pro- fessional purposes. Information shared via mail is also sensitive and private, such as financial information, credit records, login data, and so on. This makes them useful to cyber attackers who can exploit this knowledge for illegal purposes. Phishing is a technique used by fraudsters to gain confidential data from users by alleging to be from known sources. In a phished e-mail, the sender can encourage users to provide private in- formation under false premises. Phishing e-mails have also been frequently used in financial institutions and consumer fraud. This paper discusses an overview of dif- ferent techniques for phishing e-mail detection and protection currently used in e-mail filtering. A comparative analysis and review of these techniques are carried out. This survey provides an understanding of the phishing detection issue, its present space for a solution, and its future directions for study.","PeriodicalId":103842,"journal":{"name":"Information Security Journal: A Global Perspective","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115338930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}