{"title":"Generation Z and the Age of Technology Addiction","authors":"Alexandra Raluca Albescu","doi":"10.54851/v4i1y202202","DOIUrl":"https://doi.org/10.54851/v4i1y202202","url":null,"abstract":"","PeriodicalId":127637,"journal":{"name":"Romanian Cyber Security Journal","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126786180","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cryptographic Analysis of P2DPI","authors":"Mihai-Alexandru Bogatu","doi":"10.54851/v4i1y202201","DOIUrl":"https://doi.org/10.54851/v4i1y202201","url":null,"abstract":": This paper represents an analysis of the recently proposed P2DPI encryption scheme for deep packet inspection. Constructs of the algorithm are challenged with a complete confidentiality and integrity evaluation. Later in the article, there is proof that, in the current form, usage of P2DPI can compromise user privacy.","PeriodicalId":127637,"journal":{"name":"Romanian Cyber Security Journal","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123387578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The New Challenges of Romania’s Cyber Security Policy","authors":"I. Petcu, Dragos-Catalin Barbu","doi":"10.54851/v4i1y202207","DOIUrl":"https://doi.org/10.54851/v4i1y202207","url":null,"abstract":": The 21st century has presented us with not easy challenges for society. The global security strategy has entered a new era following the September 2001 attack on the World Trade Center. Breaking the real estate bubble in 2008 caused massive losses for international banks and investors, leading to a severe financial crisis and an impending recession. The Arab Spring was marked by demonstrations in the Islamic world in the early 2010s. The refugee crisis followed as millions of people migrated from the Middle East to Europe. A new challenge came at the end of 2019 when a contagious virus triggered the Covid-19 pandemic leading to a global health crisis. When we thought that everything was back to normal, the appearance of the military conflict on the borders of Romania led to the deepening of the energy and food crisis, creating premises for the beginning of a new economic recession. This international context has led to new challenges for Romania, and paradigm shifts in EU security policies and strategies have created favorable conditions for updating the legislative framework on national defense policies, including the approval of Romania’s new Cyber Security Strategy.","PeriodicalId":127637,"journal":{"name":"Romanian Cyber Security Journal","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125889137","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Importance of Simulation Modeling of Different Systems, with an Emphasis on Agent-Based Modeling","authors":"Mihnea-Vlad Nicolae","doi":"10.54851/v4i1y202203","DOIUrl":"https://doi.org/10.54851/v4i1y202203","url":null,"abstract":": Simulation modeling has become a key instrument for planners and decision makers over the years and its development has increased the accuracy of the resulted data and the efficiency of the simulated model. Agent-Based Modeling is being used in a vast variety of areas, helping in developing new applications, new transport systems, increasing the security of different infrastructures and even helping to manage natural disasters. This modeling technique has a lot of benefits over physically simulating the environment and this accounts for its growing use. This paper presents the importance of simulation modeling, highlights key applications and focuses on tracing the evolution of agent-based modeling in the field of transport.","PeriodicalId":127637,"journal":{"name":"Romanian Cyber Security Journal","volume":"123 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132473692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cybersecurity Management for Incident Response","authors":"Alin Zamfiroiu, Ramesh C Sharma","doi":"10.54851/v4i1y202208","DOIUrl":"https://doi.org/10.54851/v4i1y202208","url":null,"abstract":": In information technology, security is the protection of information assets through the use of technology, processes and training. There will always be situations of attack on software systems but the software must continue to work properly under such potential risks. The security process assumes and is required to provide three important elements: integrity, authentication, and availability. Security is a set of processes and techniques implemented to protect private information in electronic or printed format against modification, destruction or unauthorized access. This paper discusses effective management of cybersecurity for incident response.","PeriodicalId":127637,"journal":{"name":"Romanian Cyber Security Journal","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134369649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Study on Actual Developments in the Field of Quantum Computing in Terms of Cyber Security and Physical Systems","authors":"Maria-Daniela Iancu","doi":"10.54851/v4i1y202206","DOIUrl":"https://doi.org/10.54851/v4i1y202206","url":null,"abstract":": This paper deals with the concept of quantum computer, which describes the quantum algorithms, areas of use and weaknesses or strengths of quantum computing, cyber security and circuits.","PeriodicalId":127637,"journal":{"name":"Romanian Cyber Security Journal","volume":"233 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133339677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
V. Popescu, Tiberiu Ion, Victor Gânsac, M. Parvu, Sorin Pistol, Olivia Comşa
{"title":"Research on Simulating the Volume of Industrial Traffic Control System Using Standard Communication Protocols","authors":"V. Popescu, Tiberiu Ion, Victor Gânsac, M. Parvu, Sorin Pistol, Olivia Comşa","doi":"10.54851/v4i1y202205","DOIUrl":"https://doi.org/10.54851/v4i1y202205","url":null,"abstract":": This paper aims to analyze, simulate and test the control of industrial traffic by using existing standard communication protocols in order to be able to respond to cyber security incidents and to implement new services and innovative processes. This study with practical results is part of the research carried out within the project “Center of Excellence for Cyber Security and Critical Infrastructure Resilience - SafePIC, funded under the Operational Program Competitiveness 2014-2020.","PeriodicalId":127637,"journal":{"name":"Romanian Cyber Security Journal","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121959689","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mihai Apostol, Bogdan Paliniuc, Rareș Morar, Florin Vidu
{"title":"Malicious Strategy: Watering Hole Attacks","authors":"Mihai Apostol, Bogdan Paliniuc, Rareș Morar, Florin Vidu","doi":"10.54851/v4i1y202204","DOIUrl":"https://doi.org/10.54851/v4i1y202204","url":null,"abstract":": A recent attack strategy named watering hole attack has evolved in the past years, a combination of different techniques which are aimed at companies network by infecting websites which are frequently accesed by its employees. This paper aims to bring a better understanding and awareness of this type of attack. A case study is included in this research and also an analysis of Earth Lusca, a criminal organization whose strategy is concentrated on watering hole attacks.","PeriodicalId":127637,"journal":{"name":"Romanian Cyber Security Journal","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122293675","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}