信息安全(英文)Pub Date : 2022-01-01DOI: 10.4236/jis.2022.132004
Suhail Qadir, Uzair Bashir
{"title":"Measuring the Impact of DoS Attack on Availability: Empirical Study Based on Accessibility","authors":"Suhail Qadir, Uzair Bashir","doi":"10.4236/jis.2022.132004","DOIUrl":"https://doi.org/10.4236/jis.2022.132004","url":null,"abstract":"Information Security is determined by three well know security parameters i.e. Confidentiality, Integrity and Availability. Availability is an important pillar when it comes to security of an information system. It is dependent upon the reliability, timeliness and accessibility of the Information System. This paper presents an analytical view of the fact that when Accessibility is degraded during the presence of an ongoing attack, the other factors reliability and timeliness can also get affected, therefore creating a degrading impact on the overall Availability of the system, which eventually leads to the Denial of Service Attack and therefore affecting the security of the System.","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70334742","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
信息安全(英文)Pub Date : 2022-01-01DOI: 10.4236/jis.2022.134018
C. Adams
{"title":"Security Analysis of a Privacy-Preserving Identity-Based Encryption Architecture","authors":"C. Adams","doi":"10.4236/jis.2022.134018","DOIUrl":"https://doi.org/10.4236/jis.2022.134018","url":null,"abstract":"Identity-Based Encryption (IBE) has seen limited adoption, largely due to the absolute trust that must be placed in the private key generator (PKG)—an authority that computes the private keys for all the users in the environment. Several constructions have been proposed to reduce the trust required in the PKG (and thus preserve the privacy of users), but these have generally relied on unrealistic assumptions regarding non-collusion between various entities in the system. Unfortunately, these constructions have not significantly improved IBE adoption rates in real-world environments. In this paper, we present a construction that reduces trust in the PKG without unrealistic non-collusion assumptions. We achieve this by incorporating a novel combination of digital credential technology and bilinear maps, and making use of multiple random-ly-chosen entities to complete certain tasks. The main result and primary contri-bution of this paper are a thorough security analysis of this proposed construction, examining the various entity types, attacker models, and collusion oppor-tunities in this environment. We show that this construction can prevent, or at least mitigate, all considered attacks. We conclude that our construction ap-pears to be effective in preserving user privacy and we hope that this construction and its security analysis will encourage greater use of IBE in real-world environments.","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70334966","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
信息安全(英文)Pub Date : 2022-01-01DOI: 10.4236/jis.2022.134016
Fauziyah Fauziyah, Zhao Wang, Gabriel Joy
{"title":"Knowledge Management Strategy for Handling Cyber Attacks in E-Commerce with Computer Security Incident Response Team (CSIRT)","authors":"Fauziyah Fauziyah, Zhao Wang, Gabriel Joy","doi":"10.4236/jis.2022.134016","DOIUrl":"https://doi.org/10.4236/jis.2022.134016","url":null,"abstract":"","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70334958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
信息安全(英文)Pub Date : 2022-01-01DOI: 10.4236/jis.2022.133006
J. Dykstra, Lawrence A. Gordon, Martin P. Loeb, Lei Zhou
{"title":"The Economics of Sharing Unclassified Cyber Threat Intelligence by Government Agencies and Departments","authors":"J. Dykstra, Lawrence A. Gordon, Martin P. Loeb, Lei Zhou","doi":"10.4236/jis.2022.133006","DOIUrl":"https://doi.org/10.4236/jis.2022.133006","url":null,"abstract":"","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70334763","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
信息安全(英文)Pub Date : 2022-01-01DOI: 10.4236/jis.2022.133008
Zhiyong Zheng, Kun Tian
{"title":"On the LWE Cryptosystem with More General Disturbance","authors":"Zhiyong Zheng, Kun Tian","doi":"10.4236/jis.2022.133008","DOIUrl":"https://doi.org/10.4236/jis.2022.133008","url":null,"abstract":"","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70334810","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
信息安全(英文)Pub Date : 2022-01-01DOI: 10.4236/jis.2022.134012
Gbenga Ikuomenisan, Y. Morgan
{"title":"Systematic Review of Graphical Visual Methods in Honeypot Attack Data Analysis","authors":"Gbenga Ikuomenisan, Y. Morgan","doi":"10.4236/jis.2022.134012","DOIUrl":"https://doi.org/10.4236/jis.2022.134012","url":null,"abstract":"","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70334869","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
信息安全(英文)Pub Date : 2022-01-01DOI: 10.4236/jis.2022.134014
Jie Xu, Zhiyong Zheng, Kun Tian
{"title":"Low-Density Parity-Check Codes: Research Status and Development Direction","authors":"Jie Xu, Zhiyong Zheng, Kun Tian","doi":"10.4236/jis.2022.134014","DOIUrl":"https://doi.org/10.4236/jis.2022.134014","url":null,"abstract":"","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70334921","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
信息安全(英文)Pub Date : 2022-01-01DOI: 10.4236/jis.2022.132005
Yanogo Kiswendsida Jean Hermann
{"title":"Study on the Instability of Information Systems and Security Risks in the Public Administration: Case of Burkina Faso Public Administration","authors":"Yanogo Kiswendsida Jean Hermann","doi":"10.4236/jis.2022.132005","DOIUrl":"https://doi.org/10.4236/jis.2022.132005","url":null,"abstract":"The purpose of this research is to show the instability and the security risks of the information system in Burkina-Faso public administration. In this paper, witnessing unsatisfactory services such as government messaging (mailer.gov.bf) as well as G-cloud services which are the government cloud were studied. The behavior of user agents on the administration’s IT infra-structures which could expose the information system to security risks was also studied. The expected result shows evidence of the weakness of the public administration information system and provides some recommenda-tion.","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70334754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
信息安全(英文)Pub Date : 2022-01-01DOI: 10.4236/jis.2022.133010
Zhiyong Zheng, Fengxia Liu, Wen-Tzeng Huang, Jie Xu, Kun Tian
{"title":"A Generalization of NTRUEncrypt —Cryptosystem Based on Ideal Lattice","authors":"Zhiyong Zheng, Fengxia Liu, Wen-Tzeng Huang, Jie Xu, Kun Tian","doi":"10.4236/jis.2022.133010","DOIUrl":"https://doi.org/10.4236/jis.2022.133010","url":null,"abstract":"","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70334853","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}