Development of the World Cyber Security

Author(s):  
Keyword(s):  
2020 ◽  
Vol 8 (2) ◽  
pp. 86-94
Author(s):  
Nikola Radić

The world is fundamentally changing , which leads to dramatic changes in opportunities and risks. In this regard, banks are facing three interrelated fundamental changes. First, the digital revolution has drastically increased the availability and use of data and the speed of decision-making. Second, technological innovation accelerates changes in the competitive and consumer environment in which banks operate. Finally, hyperconnection multiplies the speed of information flow and reshapes the way people think and act, influencing the nature of a bank's relationship with its customers and other stakeholders. The unprecedented speed of change and the high degree of uncertainty suggest the need to introduce different approaches to risk. For banks and other financial institutions, threats arise inside and out, ranging from inappropriate and illegal behavior by employees, to sophisticated cybercrime, trade wars and climate change. As a result, risk functions need to become more dynamic and flexible, they need to help guide institutions through a complex and changing environment of opportunities and risks, while meeting new expectations key actors - regulators, legislators, shareholders, customers (clients) and the community as a whole. The paper especially emphasizes the issue of fraud, various forms of financial crime in relation to cyber security.


2020 ◽  
Vol 12 (2) ◽  
pp. 143-153
Author(s):  
Christian Ronaldo Sopaheluwakan ◽  
Dian Widiyanto Chandra

Backdoor or commonly also known as web shell is one of the malicious software that hackers use to maintain access systems that they have entered. Relatively few programs like Anti Web-Shell, PHP Backdoor Scanner circulating on the Internet, and can be obtained free of charge to deal with the issues above. But most of these programs have no actual database of signature behavior to deal with PHP backdoor / Shell nowadays. Then comes the contemporary Anti Web-Shell program that can deal with today's backdoor shell. This study uses an experimental method concerning previous similar studies and is implemented directly into the world of cyber security professional industries. By enriching the Regex dictionary signature and String Array Matching the actualized Anti Web-Shell program can detect more backdoor than similar programs that have existed in the past. The results of this study are in the form of a web application software in PHP extension. The application can minimize 100% of false positives and is twice as fast in scanning files because it is more specific in heuristic analysis scan.


Author(s):  
Charu Virmani ◽  
Tanu Choudhary ◽  
Anuradha Pillai ◽  
Manisha Rani

With the exponential rise in technological awareness in the recent decades, technology has taken over our lives for good, but with the application of computer-aided technological systems in various domains of our day-to-day lives, the potential risks and threats have also come to the fore, aiming at the various security features that include confidentiality, integrity, authentication, authorization, and so on. Computer scientists the world over have tried to come up, time and again, with solutions to these impending problems. With time, attackers have played out complicated attacks on systems that are hard to comprehend and even harder to mitigate. The very fact that a huge amount of data is processed each second in organizations gave birth to the concept of Big Data, thereby making the systems more adept and intelligent in dealing with unprecedented attacks on a real-time basis. This chapter presents a study about applications of machine learning algorithms in cyber security.


Author(s):  
Sowmiya B. ◽  
Poovammal E.

The information in any real-time application is needed to be digitalized across the world. Since digitalization of data happens, there comes the role of privacy. Blockchain could address the security challenge that happens in the any real sector. There are a few more challenges that prevail in the industry such as integrity in data, traceability of stored records, and interoperability among organizations that share information. This chapter says what blockchain is and applications in which blockchain technology could solve the existing challenges where they lack security, privacy, integrity, and interoperability.


2019 ◽  
Vol 47 (02) ◽  
pp. 70-89
Author(s):  
Hala Bou Alwan

AbstractDespite an ongoing drive by governments and law enforcers around the world to improve the sophistication of their risk mitigation measures, cyber-attacks are continually increasing. A study from Computer Crime and Intellectual Property Section (CCIPS) shows more than 4,000 ransomware attacks occurred daily in 2016. That's a 300 percent increase over 2015, where 1,000 ransomware attacks were seen per day. Cyber criminals are successfully penetrating even the most high-profile companies and governmental agencies. The breach at the NSA was truly alarming and just one recent example of the dire situation the country, and world, face as cybercrime intensifies and the cyber security talent shortage becomes more serious.Accordingly, the purpose of this research is to focus on cyber education at the national, government, and law enforcement level examining the methodology to set the tone from the top ensuring alignment between governments, law enforcers, private sector, and academic level. It also examines the gaps in cyber laws and educational governance initiatives and their impact on efficient execution of cyber policies for various regions of the world with a focus on the United Arab Emirates and the United States of America.Finally, this article recommends policy guidelines and a compliance manual framework for governments and law enforcers to consider ensuring that cyber risks are properly addressed and mitigated in a structured and coherent way.


Author(s):  
Vihang Dilip Gaokar ◽  
Karan Harish Tundejwala

In the world of full of technology and digitization security is the main concern right now. With the help of internet, we can do most of our work like shopping, office work, e-banking, other transactions, etc. With mobile banking everyone knows how to do transactions, online shopping, but most of the people don’t know what the security while doing any kind of online work, people have lack of knowledge in cyber security and hacker, cyber criminals take advantage of that. According to report in 2020, the transaction volume share in India stood at 15.6 per cent and 22.9 per cent for instant payments and other electronic payments respectively, while paper-based payments had a considerable share of 61.4 per cent. And by the 2024 the electronic transaction will increase by 50% and this will touch 71.7% by 2025. India is a developing country and is moving forward in digitization. While this is happening securing the online data or transaction will become more and more challenging. E- banking makes work easier and fast but it is not safe, it will never be 100% secure. And cybercrime is increasing faster than we imagine. This study paper mainly focuses on banking frauds in India, online transaction, scenarios faced by cyber victims, e-banking challenges. It also focuses on the cyber security and how can we avoid most of the e-banking fraud.


Author(s):  
Yurii I. Khlaponin ◽  
Svitlana V. Kondakova ◽  
Yevheniia Ye. Shabala ◽  
Liliia P. Yurchuk ◽  
Pavlo S. Demianchuk

The article is devoted to the study of trends in cybercrime, which is a threat to the country's information security. The place and role of cybersecurity in the system of national security are determined. The state of the system of protection against cyber attacks in the developed countries of the world, such as France, Japan, China, South Korea and the United Kingdom, was analyzed. The main shortcomings and perspectives of protection of cyberspace are revealed. The use of modern information technologies in state structures, as well as in society in general, proposes solving information security problems as one of the main ones. The economy, logistics and security of the country increasingly depend on the technical infrastructure and its security. To improve the effectiveness of the fight against cybercrime, developed countries have long started the appropriate work needed to create their own cyber security strategy. Incidents in the field of cybersecurity affect the lives of consumers information and many other services and cyber attacks aimed at various objects of infrastructure of electronic communications systems or technological processes management. Modern world trends in the development of cybercrime and the strengthening of cyber attacks indicate an increase in the value of combating it for the further development of society, which in turn predetermines the assignment of certain groups of social relations of the cybersphere to the competence of legal regulation. The current situation with cybercrime requires constant improvement of methods the fight against cybercrime, the development of information systems and methods aimed at ensuring the cyber security of the country. Necessary tasks are the development of a national strategy on cybersecurity, which will include tactical and strategic priorities and tasks in this area for state bodies. So, the issue of cyberspace security, the fight against cybercrime is relevant both at the international level and at the level of the individual country, and therefore needs further consideration.


2021 ◽  
Vol 11 (16) ◽  
pp. 7738
Author(s):  
Kyounggon Kim ◽  
Faisal Abdulaziz Alfouzan ◽  
Huykang Kim

Cyber-attacks have become commonplace in the world of the Internet. The nature of cyber-attacks is gradually changing. Early cyber-attacks were usually conducted by curious personal hackers who used simple techniques to hack homepages and steal personal information. Lately, cyber attackers have started using sophisticated cyber-attack techniques that enable them to retrieve national confidential information beyond the theft of personal information or defacing websites. These sophisticated and advanced cyber-attacks can disrupt the critical infrastructures of a nation. Much research regarding cyber-attacks has been conducted; however, there has been a lack of research related to measuring cyber-attacks from the perspective of offensive cybersecurity. This motivated us to propose a methodology for quantifying cyber-attacks such that they are measurable rather than abstract. For this purpose, we identified each element of offensive cybersecurity used in cyber-attacks. We also investigated the extent to which the detailed techniques identified in the offensive cyber-security framework were used, by analyzing cyber-attacks. Based on these investigations, the complexity and intensity of cyber-attacks can be measured and quantified. We evaluated advanced persistent threats (APT) and fileless cyber-attacks that occurred between 2010 and 2020 based on the methodology we developed. Based on our research methodology, we expect that researchers will be able to measure future cyber-attacks.


Sign in / Sign up

Export Citation Format

Share Document