Open Access. Powered by Scholars. Published by Universities.®
- Discipline
- Institution
- Publication
- Publication Type
Articles 1 - 5 of 5
Full-Text Articles in Business
Social Engineering Cyber Threats, Young B. Choi, Josh Rubin
Social Engineering Cyber Threats, Young B. Choi, Josh Rubin
Journal of Global Awareness
The article explores the pervasive threat of social engineering in cybersecurity, emphasizing its success in infiltrating information systems by manipulating individuals rather than employing traditional hacking methods. The author underscores the vulnerability arising from human trust, as individuals, especially those lacking technology education, tend to be targets. While cryptography offers partial security, social engineering complicates overall system security. Mitigation strategies include educating employees on threats, risks, and security policies, coupled with enforcing penalties for noncompliance. Additionally, employing two-factor authentication and physical token-based access adds layers of protection. The article delves into semantic attacks, classifying various exploitation methods and emphasizing the …
Review Of Cybersecurity Hardware Devices, Eriselda Malaj
Review Of Cybersecurity Hardware Devices, Eriselda Malaj
International Journal of Business and Technology
In the modern world, cybersecurity is an important issue in the field of technology. The main security problem is the security of the data we receive on the server side after being sent by the client or by the sensors. Nowadays cybersecurity is seen as an area where software is more important than hardware and this led to an increase in the number of securities at the software level. By increasing security at the hardware level cyber security takes another dimension. Network infrastructure devices serve for the realization of communication of applications, data, services and multi-media. These devices include firewalls, …
Sec Reporting Of Cybersecurity Incidents, Michaela Morosky
Sec Reporting Of Cybersecurity Incidents, Michaela Morosky
Honors Scholar Theses
This paper documents the reporting to the SEC of 197 major incidents of cybersecurity breaches among public firms in the years 2011-2019. My goal is to contribute to the debate on the need to revise the disclosure guidance by evaluating the extent to which cybersecurity breaches are disclosed in SEC filings under the current regulatory regime. In evaluating the individual breaches, I document whether prior to the SEC’s 2022 proposed amendment, firms were already following the SEC recommendation of disclosing material cybersecurity breaches in a timely manner. I find that it is extremely rare for a firm to follow the …
Computer Security Checklist For Non-Security Technology Professionals, Chlotia P. Garrison, Roderick B. Posey
Computer Security Checklist For Non-Security Technology Professionals, Chlotia P. Garrison, Roderick B. Posey
Journal of International Technology and Information Management
Networked computers and electronic data storage make computer security a fundamental component of a company’s survival. Security incidents can cause reputation damage, loss customers, or even liability. Companies that are unable or unwilling to hire certified security professionals often rely on non-security IT professionals for assistance. This paper provides a checklist the non-security professional can use to assist the company in the critical areas of conducting risk analysis, performing vulnerability assessments, educating employees and developing computer security policies and procedures
Nidh - Network Intrusion Detection Hierarchy: A Model For Gathering Attack Intelligence, Craig Valli
Nidh - Network Intrusion Detection Hierarchy: A Model For Gathering Attack Intelligence, Craig Valli
Research outputs pre 2011
Internet proxy systems such as Squid exchange intelligence relevant to their function as caching proxy servers via a distributed and trusted hierarchy of machines. The required intelligence is broadcast based along the network based upon established trust relationships throughout the connected network via specific port and protocols of exchange. An intrusion detection system that incorporates this functionality for gathering attack intelligence could be a formidable foe even for the wiliest attacker. This paper will outline a possible model for the deployment of a network/distributed network intrusion detection system utilising technologies and techniques already in existence to provide the supporting infrastructure.