对网络空间网络掠夺行为的研究,以建立防止网络掠夺者攻击的框架

Ambrose Kinyanjui Muchonjo, G. Wanyembi, C. Makori
{"title":"对网络空间网络掠夺行为的研究,以建立防止网络掠夺者攻击的框架","authors":"Ambrose Kinyanjui Muchonjo, G. Wanyembi, C. Makori","doi":"10.9790/0661-1903052836","DOIUrl":null,"url":null,"abstract":"The information age society is becoming highly dependent on technological advancements and in particular software platform and devices that can access the cyberspace. The way people acquire, access and share data, files and, information have significantly revolutionized peoples‟ social-technical interactions shaping their lifestyle and activities in regard to both the physical space and cyberspace. Ubiquitous computing for instance tends to offer digital society great, exciting, powerful features and capabilities that enable reliable and productive encounters within convenient environments. In ubiquitous environments however, there is high possibility of users‟ data, files and other users‟ digital assets being exposed to high risk of disclosure and tampering by iPredators. Such disclosure and tampering of users‟ sensitive data and information potentially exposes the targeted persons in society to many risks in regard to their digital and environmental security and privacy. In event of a successful iPredator‟s attacks on targets, the aftermath tend to be quite devastating sometimes leading to loss of lives, financial investments, critical data, human dignity and/or freedom. Dangers lurking in the cyberspace where there is increased usage of ICTs within a highly connected society of people and devices are therefore real and costly. The iPredators attack on users in cyberspace is a problem that requires cyber security awareness for users to address. To achieve this, this paper explored the various typologies of iPredators attacks targeting users in the cyberspace. The output of the study lead to a proposed framework by the researcher for preventing iPredators attacks on cyberspace. Desktop study research technique was adopted by the study which inclined to qualitative research design.","PeriodicalId":91890,"journal":{"name":"IOSR journal of computer engineering","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"An Investigation into Ipredation in Cyberspace towards Developing a Framework for Preventing Ipredators’ Attacks\",\"authors\":\"Ambrose Kinyanjui Muchonjo, G. Wanyembi, C. Makori\",\"doi\":\"10.9790/0661-1903052836\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The information age society is becoming highly dependent on technological advancements and in particular software platform and devices that can access the cyberspace. The way people acquire, access and share data, files and, information have significantly revolutionized peoples‟ social-technical interactions shaping their lifestyle and activities in regard to both the physical space and cyberspace. Ubiquitous computing for instance tends to offer digital society great, exciting, powerful features and capabilities that enable reliable and productive encounters within convenient environments. In ubiquitous environments however, there is high possibility of users‟ data, files and other users‟ digital assets being exposed to high risk of disclosure and tampering by iPredators. Such disclosure and tampering of users‟ sensitive data and information potentially exposes the targeted persons in society to many risks in regard to their digital and environmental security and privacy. In event of a successful iPredator‟s attacks on targets, the aftermath tend to be quite devastating sometimes leading to loss of lives, financial investments, critical data, human dignity and/or freedom. Dangers lurking in the cyberspace where there is increased usage of ICTs within a highly connected society of people and devices are therefore real and costly. The iPredators attack on users in cyberspace is a problem that requires cyber security awareness for users to address. To achieve this, this paper explored the various typologies of iPredators attacks targeting users in the cyberspace. The output of the study lead to a proposed framework by the researcher for preventing iPredators attacks on cyberspace. Desktop study research technique was adopted by the study which inclined to qualitative research design.\",\"PeriodicalId\":91890,\"journal\":{\"name\":\"IOSR journal of computer engineering\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-06-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IOSR journal of computer engineering\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.9790/0661-1903052836\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IOSR journal of computer engineering","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.9790/0661-1903052836","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

摘要

信息时代的社会越来越依赖于技术的进步,特别是能够进入网络空间的软件平台和设备。人们获取、访问和共享数据、文件和信息的方式极大地改变了人们的社会技术互动,塑造了他们在物理空间和网络空间的生活方式和活动。例如,无处不在的计算倾向于为数字社会提供伟大、令人兴奋、强大的特性和功能,使人们能够在方便的环境中进行可靠和富有成效的接触。然而,在无处不在的环境中,用户的数据、文件和其他用户的数字资产极有可能暴露在ipredator泄露和篡改的高风险中。这种对用户敏感数据和信息的披露和篡改,可能会使社会上的目标人群在数字和环境安全和隐私方面面临许多风险。一旦“捕食者”成功攻击目标,后果往往是毁灭性的,有时会导致生命、金融投资、关键数据、人类尊严和/或自由的损失。因此,在一个人与设备高度互联的社会中,随着信息通信技术使用量的增加,潜伏在网络空间中的危险是真实存在且代价高昂的。ipredator对网络空间用户的攻击是一个需要用户提高网络安全意识才能解决的问题。为了实现这一点,本文探讨了针对网络空间用户的ipredator攻击的各种类型。这项研究的结果导致了一个由研究人员提出的框架,用于防止ipredator对网络空间的攻击。本研究采用桌面研究方法,倾向于定性研究设计。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
An Investigation into Ipredation in Cyberspace towards Developing a Framework for Preventing Ipredators’ Attacks
The information age society is becoming highly dependent on technological advancements and in particular software platform and devices that can access the cyberspace. The way people acquire, access and share data, files and, information have significantly revolutionized peoples‟ social-technical interactions shaping their lifestyle and activities in regard to both the physical space and cyberspace. Ubiquitous computing for instance tends to offer digital society great, exciting, powerful features and capabilities that enable reliable and productive encounters within convenient environments. In ubiquitous environments however, there is high possibility of users‟ data, files and other users‟ digital assets being exposed to high risk of disclosure and tampering by iPredators. Such disclosure and tampering of users‟ sensitive data and information potentially exposes the targeted persons in society to many risks in regard to their digital and environmental security and privacy. In event of a successful iPredator‟s attacks on targets, the aftermath tend to be quite devastating sometimes leading to loss of lives, financial investments, critical data, human dignity and/or freedom. Dangers lurking in the cyberspace where there is increased usage of ICTs within a highly connected society of people and devices are therefore real and costly. The iPredators attack on users in cyberspace is a problem that requires cyber security awareness for users to address. To achieve this, this paper explored the various typologies of iPredators attacks targeting users in the cyberspace. The output of the study lead to a proposed framework by the researcher for preventing iPredators attacks on cyberspace. Desktop study research technique was adopted by the study which inclined to qualitative research design.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信