Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 5 of 5

Full-Text Articles in Business

Social Engineering Cyber Threats, Young B. Choi, Josh Rubin Dec 2023

Social Engineering Cyber Threats, Young B. Choi, Josh Rubin

Journal of Global Awareness

The article explores the pervasive threat of social engineering in cybersecurity, emphasizing its success in infiltrating information systems by manipulating individuals rather than employing traditional hacking methods. The author underscores the vulnerability arising from human trust, as individuals, especially those lacking technology education, tend to be targets. While cryptography offers partial security, social engineering complicates overall system security. Mitigation strategies include educating employees on threats, risks, and security policies, coupled with enforcing penalties for noncompliance. Additionally, employing two-factor authentication and physical token-based access adds layers of protection. The article delves into semantic attacks, classifying various exploitation methods and emphasizing the …


Review Of Cybersecurity Hardware Devices, Eriselda Malaj Jun 2022

Review Of Cybersecurity Hardware Devices, Eriselda Malaj

International Journal of Business and Technology

In the modern world, cybersecurity is an important issue in the field of technology. The main security problem is the security of the data we receive on the server side after being sent by the client or by the sensors. Nowadays cybersecurity is seen as an area where software is more important than hardware and this led to an increase in the number of securities at the software level. By increasing security at the hardware level cyber security takes another dimension. Network infrastructure devices serve for the realization of communication of applications, data, services and multi-media. These devices include firewalls, …


Sec Reporting Of Cybersecurity Incidents, Michaela Morosky May 2022

Sec Reporting Of Cybersecurity Incidents, Michaela Morosky

Honors Scholar Theses

This paper documents the reporting to the SEC of 197 major incidents of cybersecurity breaches among public firms in the years 2011-2019. My goal is to contribute to the debate on the need to revise the disclosure guidance by evaluating the extent to which cybersecurity breaches are disclosed in SEC filings under the current regulatory regime. In evaluating the individual breaches, I document whether prior to the SEC’s 2022 proposed amendment, firms were already following the SEC recommendation of disclosing material cybersecurity breaches in a timely manner. I find that it is extremely rare for a firm to follow the …


Computer Security Checklist For Non-Security Technology Professionals, Chlotia P. Garrison, Roderick B. Posey Jan 2006

Computer Security Checklist For Non-Security Technology Professionals, Chlotia P. Garrison, Roderick B. Posey

Journal of International Technology and Information Management

Networked computers and electronic data storage make computer security a fundamental component of a company’s survival. Security incidents can cause reputation damage, loss customers, or even liability. Companies that are unable or unwilling to hire certified security professionals often rely on non-security IT professionals for assistance. This paper provides a checklist the non-security professional can use to assist the company in the critical areas of conducting risk analysis, performing vulnerability assessments, educating employees and developing computer security policies and procedures


Nidh - Network Intrusion Detection Hierarchy: A Model For Gathering Attack Intelligence, Craig Valli Jan 2001

Nidh - Network Intrusion Detection Hierarchy: A Model For Gathering Attack Intelligence, Craig Valli

Research outputs pre 2011

Internet proxy systems such as Squid exchange intelligence relevant to their function as caching proxy servers via a distributed and trusted hierarchy of machines. The required intelligence is broadcast based along the network based upon established trust relationships throughout the connected network via specific port and protocols of exchange. An intrusion detection system that incorporates this functionality for gathering attack intelligence could be a formidable foe even for the wiliest attacker. This paper will outline a possible model for the deployment of a network/distributed network intrusion detection system utilising technologies and techniques already in existence to provide the supporting infrastructure.