Analysis of On-site Evaluation Methods of Network Security in the Evaluation of Information Security Level Protection

Author(s):  
Dabin Sun ◽  
Bowei Wang
2015 ◽  
Vol 11 (1) ◽  
pp. 92-103 ◽  
Author(s):  
Daniel P. O'Connor ◽  
Rebecca E. Lee ◽  
Paras Mehta ◽  
Debbe Thompson ◽  
Alok Bhargava ◽  
...  

Author(s):  
Ch. Himabindu

The availability of realistic network data plays a significant role in fostering collaboration and ensuring U.S. technical leadership in network security research. Unfortunately, a host of technical, legal, policy, and privacy issues limit the ability of operators to produce datasets for information security testing. In an effort to help overcome these limitations, several data collection efforts (e.g., CRAWDAD[14], PREDICT [34]) have been established in the past few years. The key principle used in all of these efforts to assure low-risk, high-value data is that of trace anonymization—the process of sanitizing data before release so that potentially sensitive information cannot be extracted.


2015 ◽  
Vol 23 (4) ◽  
pp. 370-381 ◽  
Author(s):  
André Lötter ◽  
Lynn Futcher

Purpose – The purpose of this paper is to propose a framework to address the problem that email users are not well-informed or assisted by their email clients in identifying possible phishing attacks, thereby putting their personal information at risk. This paper therefore addresses the human weakness (i.e. the user’s lack of knowledge of phishing attacks which causes them to fall victim to such attacks) as well as the software related issue of email clients not visually assisting and guiding the users through the user interface. Design/methodology/approach – A literature study was conducted in the main field of information security with a specific focus on understanding phishing attacks and a modelling technique was used to represent the proposed framework. This paper argues that the framework can be suitably implemented for email clients to raise awareness about phishing attacks. To validate the framework as a plausible mechanism, it was reviewed by a focus group within the School of Information and Communication Technology (ICT) at the Nelson Mandela Metropolitan University (NMMU). The focus group consisted of academics and research students in the field of information security. Findings – This paper argues that email clients should make use of feedback mechanisms to present security related aspects to their users, so as to make them aware of the characteristics pertaining to phishing attacks. To support this argument, it presents a framework to assist email users in the identification of phishing attacks. Research limitations/implications – Future research would yield interesting results if the proposed framework were implemented into an existing email client to determine the effect of the framework on the user’s level of awareness of phishing attacks. Furthermore, the list of characteristics could be expanded to include all phishing types (such as clone phishing, smishing, vishing and pharming). This would make the framework more dynamic in that it could then address all forms of phishing attacks. Practical implications – The proposed framework could enable email clients to provide assistance through the user interface. Visibly relaying the security level to the users of the email client, and providing short descriptions as to why a certain email is considered suspicious, could result in raising the awareness of the average email user with regard to phishing attacks. Originality/value – This research presents a framework that email clients can use to identify common forms of normal and spear phishing attacks. The proposed framework addresses the problem that the average Internet user lacks a baseline level of online security awareness. It argues that the email client is the ideal place to raise the awareness of users regarding phishing attacks.


2014 ◽  
Vol 602-605 ◽  
pp. 2134-2137
Author(s):  
De Feng Chen ◽  
Wen Yan Zhang ◽  
Zhi Bin Yang

Currently, information security inspection can only be conducted via network scan using a laptop, which results in a low-efficient one-by-one check, and moreover lacks the ability to locate wireless networks and not to mention technical measures to discover hidden networks. With respect to the regulations of a power supply enterprise regarding wireless network security, combined with the operation and maintenance comprehensive supervision system (IMS), and the information extranet security monitoring system (ISS), a cascading wireless network security inspection platform is studied and implemented. This paper describes the wireless network encryption technology, and details the deployment pattern and the work flow, etc. about the wireless network security inspection platform. Experiments show that the platform provides support for the information security supervision work of wireless networks and can effectively safeguard the security of wireless networks in a power enterprise.


2013 ◽  
Vol 284-287 ◽  
pp. 3423-3427
Author(s):  
Hung Wei Chang ◽  
Che Wun Chiou ◽  
Wen Yew Liang ◽  
Jenq Haur Wang

Information security is getting more important due to the highly-developed computer technologies. The information security is heavily dependent on cryptosystems such as RSA and elliptic curve cryptosystem (ECC). ECC is suitable for the resource-constrained devices such as embedded system or hand-held devices because ECC can achieve the same security level but uses less cost as compared to RSA. Galois/Finite field multiplication is the most crucial operation in ECC. There are three popular bases in finite field in GF(2m), polynomial basis (PB), normal basis (NB), and dual basis (DB). A low-complexity bit-parallel DB multiplier which employs multiplexer approach is presented in this paper. While comparing with other related works, the proposed DB multiplier saves at least 20% space complexity.


Sign in / Sign up

Export Citation Format

Share Document