{"title":"Information Security Awareness of School Administrators","authors":"Songül Karabatak, M. Karabatak","doi":"10.1109/ISDFS.2019.8757525","DOIUrl":"https://doi.org/10.1109/ISDFS.2019.8757525","url":null,"abstract":"The aim of this study is to determine the information security awareness levels of school administrators. The sample of the quantitative study conducted in the scanning model was composed of 174 school administrators selected by the disproportionate element sampling method among the school administrators working in the high schools in the city of Elazlğ. The Information Security Awareness Scale was used as the data collection tool. The mean, percentage, and frequency techniques, correlation analysis and t-test were used to data analysis. According to the results, school administrators mostly connect to the internet at school and use the internet mostly to do research. Information security awareness level of school administrators is generally above the medium level and the highest level of awareness is the dimension of social media usage. It has been revealed that there is a moderate, negative, and significant relationship between the school administrators' age and their information security awareness level. The awareness level of male school administrators is higher than females in terms of information security. At the end of the study, various suggestions were made about increasing the awareness of school administrators about information security.","PeriodicalId":247412,"journal":{"name":"2019 7th International Symposium on Digital Forensics and Security (ISDFS)","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128147525","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Advantages to Disadvantages of Cloud Computing for Small-Sized Business","authors":"Peshraw Ahmed Abdalla, A. Varol","doi":"10.1109/ISDFS.2019.8757549","DOIUrl":"https://doi.org/10.1109/ISDFS.2019.8757549","url":null,"abstract":"This paper presents a complete overview of the storage landscape and cloud computing. It explains the major advantages and disadvantages of storing data online using cloud storage, how this works, and the basic concepts involved in cloud computing, while also demonstrating the layers of its architecture with reference to the Infrastructure as a Service (IaaS) that contains the cloud storage architecture. The paper further discusses the concept of Storage as a Service (StaaS), which lets users or clients utilize cloud storage to save data by providing them space without them having to use physical storage.","PeriodicalId":247412,"journal":{"name":"2019 7th International Symposium on Digital Forensics and Security (ISDFS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126436461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Speculative Execution Attack Methodologies (SEAM): An overview and component modelling of Spectre, Meltdown and Foreshadow attack methods","authors":"Andrew Johnson, Ross Davies","doi":"10.1109/ISDFS.2019.8757547","DOIUrl":"https://doi.org/10.1109/ISDFS.2019.8757547","url":null,"abstract":"Speculative execution has made a significant impact in the processing speed of computing devices over the last circa 20 years. The functionality of modern CPU's to be able to ‘speculatively’ execute instructions ahead and ‘out-of-order’ of the normal process has increasingly optimized performance. However, vulnerabilities inherent in the speculative execution design are being increasingly discovered. This paper will provide an overview of some of the published works of these CPU vulnerabilities. In addition to providing an overview, this paper presents SEAM: Speculative Execution Attack Methodologies. Representing the attacks via Speculative Execution Attack Schemas (SE Attack Schemas) of the attack types provides further granularity to the attacks. The SE Schemas of existing exploits can potentially be used in future research to identify specific attack approaches and enable scrutiny of the underlying complexity in a more organized manner.","PeriodicalId":247412,"journal":{"name":"2019 7th International Symposium on Digital Forensics and Security (ISDFS)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131789021","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Review Paper on Cryptography","authors":"Abdalbasit Mohammed Qadir, Nurhayat Varol","doi":"10.1109/ISDFS.2019.8757514","DOIUrl":"https://doi.org/10.1109/ISDFS.2019.8757514","url":null,"abstract":"With the internet having reached a level that merges with our lives, growing explosively during the last several decades, data security has become a main concern for anyone connected to the web. Data security ensures that our data is only accessible by the intended receiver and prevents any modification or alteration of data. In order to achieve this level of security, various algorithms and methods have been developed. Cryptography can be defined as techniques that cipher data, depending on specific algorithms that make the data unreadable to the human eye unless decrypted by algorithms that are predefined by the sender.","PeriodicalId":247412,"journal":{"name":"2019 7th International Symposium on Digital Forensics and Security (ISDFS)","volume":"276 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133367239","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Application of Similarity-Based Image Steganography Method to Computerized Tomography Images","authors":"Songul Karakus, E. Avci","doi":"10.1109/ISDFS.2019.8757521","DOIUrl":"https://doi.org/10.1109/ISDFS.2019.8757521","url":null,"abstract":"With the rapid development of technology, computers have got in every area of our lives. One of these areas is the area of health. Medical records are now stored in computer environments and can be accessed if needed. Nowadays, thanks to internet technologies, access to information has been facilitated, and this has brought security problems with malicious users. Using computed tomography images in this study, doctor reviews are hidden in these images. For this purpose, similarity based least significant bit method was used. While hiding the reviews of the doctor, three different messages were concealed with the capacity of hiding, applied directly to the hiding and NOT to the reviews to be hidden. The mean square error and peak signal to noise ratio metrics were used as performance evaluation criteria. As a result, the peak signal to noise ratio value of the lowest message hiding capacity (961 bytes) was found as 71.4408, applied to the original reviews, while the peak signal to noise ratio value was found to be 71.0473, applied to the inverted reviews.","PeriodicalId":247412,"journal":{"name":"2019 7th International Symposium on Digital Forensics and Security (ISDFS)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123841534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"New Trends in Speech Emotion Recognition","authors":"Yesim Ulgen Sonmez, A. Varol","doi":"10.1109/ISDFS.2019.8757528","DOIUrl":"https://doi.org/10.1109/ISDFS.2019.8757528","url":null,"abstract":"In this study, sound energy and characteristics of sound were investigated. Then, emotion recognition models built upon sound data in the literature were reviewed. Speech emotion recognition studies which adopt the most suitable machine-learning algorithms making feature extraction using both acoustic analysis methods and spectrogram analysis methods were investigated. In light of these studies, implementation has been carried out using EMO-DB data. Speech emotion recognition is a difficult problem for machine learning. The analysis of a sound signal is difficult to make as it includes various frequencies and features. Speech is digitized using signal processing methods and then sound characteristics are obtained through acoustic analysis. However, the overall success rate changes as the changes in these characteristics differ according to the emotions (sadness, fear, anger, happiness, neutral, displeasure, etc.). Although different methods are utilized in both feature extraction and emotion recognition, the success rate varies according to emotions and databases.","PeriodicalId":247412,"journal":{"name":"2019 7th International Symposium on Digital Forensics and Security (ISDFS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122472586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Statistical Modulation Type Identifier for Remote Keyless Entry Transmitters Based on Extended Energy Detector","authors":"Özgür Alaca, A. Boyacı, Serhan Yarkan, M. Aydin","doi":"10.1109/ISDFS.2019.8757512","DOIUrl":"https://doi.org/10.1109/ISDFS.2019.8757512","url":null,"abstract":"Remote keyless entry (RKE) systems are an integral part of modern daily life. Vehicle access, drive authorization, and arming/disarming the alarm systems for houses, garages, and/or facilities are instances for popular uses of RKE. Despite their obvious advantages such as gaining access/authorization solely by carrying them, any security breach experienced with remote keyless entrys (RKEs) could end up with cataclysmic consequences. Therefore, manufacturers continuously develop new methods and techniques to fortify their RKEs systems. One of the prominent ways of tackling the inherent security concern is to establish a rapid wireless message exchange mechanism/protocol such that intruders could not have time to place their attacks. However, with recent advances in digital technology along with software-defined radio (SDR), quantification of rapidness becomes crucial for RKE manufacturers. Therefore, in this study, a statistical modulation type identifier for RKEs systems is proposed. Both an automatic modulation type identifier based on complex baseband equivalent of the received signal and an automatic mode detector are employed as an extension of traditional energy detector. This way, presumable bottlenecks for the receiver at intruder side are identified and elaborated. Measurement results are provided along with relevant discussions. Results demonstrate that frequency compensation along with energy detection are the two indispensable serial modules and provide the bottleneck for any receiver at intruder's side.","PeriodicalId":247412,"journal":{"name":"2019 7th International Symposium on Digital Forensics and Security (ISDFS)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121536424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Securing Database Management Systems using RAM Serial Numbers","authors":"Sapan Noori Azeez, Serkan Varol","doi":"10.1109/ISDFS.2019.8757496","DOIUrl":"https://doi.org/10.1109/ISDFS.2019.8757496","url":null,"abstract":"For any Management System (DBMS) program, protection of the program is the most important element of recognizing faults in system quality that can sometimes lead to system failure. When launching any new product, we aim to use RAM serial number method makes its use simpler and easier for the developer and all users in the future. In addition, providing security techniques for databases (DBs) is very critical when defending against hackers to prevent them from making copies of the program and accessing the source code. Protecting a database so that nobody can access it without permission is necessary due to copyright principles. In this paper, the existing kinds of encryption methods have been obtained in ITC: SW and HW encryption by utilizing the serial number of random access memory (RAM), which is a part of the PC that has its own unique serial number.","PeriodicalId":247412,"journal":{"name":"2019 7th International Symposium on Digital Forensics and Security (ISDFS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130296311","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance Comparison of New Fast Weighted Naïve Bayes Classifier with Other Bayes Classifiers","authors":"Gamzepelin Aksoy, M. Karabatak","doi":"10.1109/ISDFS.2019.8757558","DOIUrl":"https://doi.org/10.1109/ISDFS.2019.8757558","url":null,"abstract":"Rapid development of the technology, along with the increasing amount of data, makes data analysis inconvenient. Nowadays, it is important that many processes can be recorded, stored and accessed in an electronic environment. As long as the data is not processed, it does not make any sense. Data mining is used to make the data meaningful. Data mining enables useful information to be reached by separating information from large-scale data. At the same time, it is the process of searching for the data by using software to make predictions about the future. In this study, a new fast weighted Bayesian Classifier is proposed, and its performance is compared with Naïve Bayes Classifier and Weighted Naïve Bayes Classifier, which is one of the data mining classification methods. Various data sets are used to obtain the results of the comparison. It is observed that the accuracy rate of the Fast Weighted Bayes Algorithm is better than Naïve Bayes Classifier and it is faster than the Weighted Naïve Bayes Classifier.","PeriodicalId":247412,"journal":{"name":"2019 7th International Symposium on Digital Forensics and Security (ISDFS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128912156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Legal and Technical Aspects of Web Forensics","authors":"Yesim Ulgen Sonmez, A. Varol","doi":"10.1109/ISDFS.2019.8757536","DOIUrl":"https://doi.org/10.1109/ISDFS.2019.8757536","url":null,"abstract":"Web forensics is a discipline that has legal and technical aspects and deals with a continuously expanding problem. This study has been conducted for two reasons-to answer the question ‘Can criminal tendency be detected from web activities?’ and to contribute to technical developments in computer forensics. Criminal records for conventional and cybercrimes committed in Turkey, detection of criminals, the sentences given, and the methods used have been examined. The technical developments in the literature dealing with web forensics have been investigated and emphasis has been laid on the types of crimes to be handled in order to develop new models. The process, method, technique, application and software of the web forensics procedure, which handles web activities, have been investigated. We observed that problems are encountered mainly at the stage of evidence analysis. The crime models that were analyzed in the legal department were determined in order to create a database for new models in the technical field.","PeriodicalId":247412,"journal":{"name":"2019 7th International Symposium on Digital Forensics and Security (ISDFS)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116010236","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}