scholarly journals A Cyber Security Evaluation Framework for In-Vehicle Electrical Control Units

IEEE Access ◽  
2021 ◽  
pp. 1-1
Author(s):  
Haichun Zhang ◽  
Yuqian Pan ◽  
Zhaojun Lu ◽  
Jie Wang ◽  
Zhenglin Liu
2016 ◽  
Vol 8 (2) ◽  
pp. 51-69 ◽  
Author(s):  
Steve Harrison ◽  
Antonis Tzounis ◽  
Leandros Maglaras ◽  
Francois Siewe ◽  
Richard Smith ◽  
...  

2020 ◽  
Vol 5 (7) ◽  
pp. 785-789
Author(s):  
Job Asheri Chaula ◽  
Godfrey Weston Luwemba

The primary purpose of this research was to assess the adequacy and effectiveness of security control of the Supervisory Control and Data Acquisition (SCADA) communication network used by infrastructure companies. Initially, the SCADA networks were physically separated from other networks connected to the internet and hence assumed secure. However, the modern SCADA are now integrated with other network resulting in new security vulnerabilities and attacks similar to those found in traditional IT. Thus, it is important to reassess the security controls of the SCADA because it is operated in an open network environment. In this research, a case of the SCADA security controls in the power sector in Tanzania was assessed, whereby a specific SCADA implementation was studied. The data were gathered using observation, testing, interviews, questionnaire and documentation reviews. The results were analyzed using the Cyber Security Evaluation Tool (CSET) and checked for compliance based on the National Institute of Standards and Technology (NIST) and North America Electric Reliability Corporation (NERC) standards. The findings have shown that there exist security vulnerabilities both in security compliance of the standard and component-based vulnerabilities. Additionally, there is inadequate of audit and accountability, personnel security and system and information integrity. Also, for the component-based security compliance, the finding shows that identification and authentication, security management and audit and accountability. On the basis of the results, the research has indicated the areas that require immediate action in order to protect the critical infrastructure.


Ingenium ◽  
2014 ◽  
Vol 8 (21) ◽  
pp. 11
Author(s):  
Manuel Fernando Fuentes Amaya ◽  
Johan Alberto Gómez Girón

El Android Security Evaluation Framework [ASEF] fue seleccionado por el proyecto Safe Candy como punto de partida para el desarrollo de un aplicativo para control de malware en teléfonos inteligentes con sistema operativo Android, debido a sus características, presentadas en Black-Hat 2012, que lo mostraban como una herramienta poderosa, innovadora y de gran potencial. Como primera actividad, el proyecto realizó una valoración del nivel de avance y la confiabilidad de ASEF, buscando determinar su validez como base de desarrollo e identificar el punto de partida para la generación de la aplicación esperada. Las pruebas de funcionamiento, exactitud y rapidez realizadas, mostraron debilidades y pendientes en el framework, resultado que generó la necesidad de redefinir la metodología prevista, con base en la cual el proyecto desarrolló un sistema para el análisis, la validación y el diagnóstico de aplicaciones Android, que integra –aunque solo de manera complementaria– a la plataforma ASEF. Al producto final se le realizó el mismo set de pruebas, obteniendo una tasa de éxito de 100%


2021 ◽  
pp. 79-92
Author(s):  
Mosabbah Mushir Ahmed ◽  
Youssef Souissi ◽  
Oualid Trabelsi ◽  
Sylvain Guilley ◽  
Antoine Bouvet ◽  
...  

Author(s):  
Syed Rizvi ◽  
Kelsey Karpinski ◽  
Brennen Kelly ◽  
Taryn Walker

2015 ◽  
Vol 16 (2) ◽  
pp. 350
Author(s):  
MD. Hussain Khan ◽  
G. Pradeepini

<p>Phone is a device which provides communication between the people through voice, text, video etc. Now a day’s people may leave without food but not without using phones. No of operating systems are working with various versions and various security issues are working. Security is very important task in Mobiles and mobile apps. To improve the security status of mobiles, existing methodology is using cloud computing and data mining. Out traditional method is named as MobSafe to identify the mobile apps antagonism or graciousness. In the proposed system, we adopt Android Security Evaluation Framework (ASEF) and Static Android Analysis Framework (SAAF).In this paper, our proposed system works on machine learning to conduct automotive forensic analysis of mobile apps based on the generated multifaceted data in this stage.</p>


Sign in / Sign up

Export Citation Format

Share Document