Database Forensics and Security Measures to Defend from Cyber Threats

Author(s):  
P. Srinivasa Murthy ◽  
V. Nagalakshmi
2022 ◽  
pp. 214-234
Author(s):  
Heru Susanto ◽  
Nurul Mardhiah ◽  
Alifya Kayla Shafa Susanto

In recent years, the number of financial technology players and users have increased at a significant rate due to the rapid technological advancement in financial technology. While smart devices are providing more useful features to users, they have also made it possible for cyber threats to migrate from desktops to smart devices. Thus, it is important for smart device users to be aware that their device could be exposed to cyber threats and that users could protect their devices by employing data-centric cyber security measures. This study reveals how financial technology business model responded to the breach phenomenon by employing data-centric protection approaches. The result is very interesting. Data-centric security is very needed as it is capable of protecting data as a whole. It provides a gapless protection, meaning to say, the data are encrypted and classified wherever it moves. With persistent protection and cross-platform operability, data-centric security will eliminate gaps and keep data protected.


Author(s):  
Yangha Chun

In the past, the general practice for the control system network that manages and controls industrial facilities such as electric power, gas, oil, water, chemicals, automobiles, etc. was to install and operate this as an independent system, but over time the practice has gradually shifted toward the use of an open and standardized system. Until recently, most industrial control systems consisted of an independent network, and the possibility of cyber threat infringement was very low. As information storage media such as laptops or USB are connected to the control system for maintenance or management purposes, the possibility of cyber infringement is increasing. When the use of the control system's operational information increases due to beingVinked with the internal business system network or the Internet, countermeasures against external cyber threats must be provided.This paper analyzes and organizes the cyber threat factors that exist in the linking section connected to the industrial control system and other networks, examining domestic and foreign incidents of hacking of control systems to identify the vulnerabilities and security measures for each scenario in the control system network linkage section. Through this analysis, a method is suggested for establishing a control network that secures both availability and security, which are important in the control system, as well as the safe relay system in the configuration of the linkage between the control network and the business network, while addressing the vulnerabilities in the structure due to long-term use of the control system.This study analyzes cyber threat factors and real-life examples of infringements with the aim of providing approaches that will ensure industrial control systems can be operated safely and the risk of cyber hacking threats that occur in connection with other networks can be managed, and suggesting cyber security measures for the control system connection sections.


Author(s):  
Anisha Banu Dawood Gani ◽  
Yudi Fernando

The objective of this chapter is to discuss the concept and practices of cyber supply chain (CSC) in manufacturing context. Technological advancements are drastically transforming manufacturing industry, which in turn drives the need for a digitally integrated supply chain. While CSC has its share of benefits, it is also vulnerable to cyber threats. In order to mitigate the risks, a comprehensive security measures must be undertaken in the areas of technology, organization, governance, and culture, and integrate them into the company's established risk management processes. To ensure a resilient CSC, all members of the supply chain network must play a role to protect their respective systems from potential breach.


Author(s):  
Anisha Banu Dawood Gani ◽  
Yudi Fernando

The objective of this chapter is to discuss the concept and practices of cyber supply chains (CSC) in the manufacturing context. Technological advancements are drastically transforming the manufacturing industry, which in turn drives the need for a digitally integrated supply chain. While CSC has its share of benefits, it is also vulnerable to cyber threats. In order to mitigate the risks, comprehensive security measures must be undertaken in the areas of technology, organization, governance, and culture, and they must be integrated into the company's established risk management processes. To ensure a resilient CSC, all members of the supply chain network must play a role to protect their respective systems from potential breach.


Author(s):  
Winfred Yaokumah ◽  
Ferdinard Katsriku ◽  
Jamal-Deen Abdulai ◽  
Kwame Okwabi Asante-Offei

Application security measures are the controls within software systems that protect information assets from security attacks. Cyber attacks are largely carried out through software systems running on computing systems in cyberspace. To mitigate the risks of cyber attacks on software systems, identification of entities operating within cyberspace, threats to application security and vulnerabilities, and defense mechanisms are crucial. This chapter offers a taxonomy that identifies assets in cyberspace, classifies cyber threats into eight categories (buffer overflow, malicious software, input attacks, object reuse, mobile code, social engineering, back door, and logic bomb), provides security defenses, and maps security measures to control types and functionalities. Understanding application security threats and defenses will help IT security professionals in the choice of appropriate security countermeasures for setting up strong defense-in-depth mechanisms. Individuals can also apply these safeguards to protect themselves from cyber-attacks.


2020 ◽  
pp. 31-35
Author(s):  
Oksana MAKOVETS ◽  
Iryna DROZD

Introduction. As a component of the business environment the information environment is characterized by significant cyber threats and requires cyber protection. The processes of Ukrainian society digitalization and changes in providing the information security update the enterprise's financial security measures and their connection with cybersecurity. The purpose of the paper is to analyze the essence of cybersecurity as a factor of the enterprise's financial security and to identify its impact on the investment attractiveness of the business entity. To achieve the purpose the task is to explore the concepts of financial security, cybersecurity and cyber threats, to identify their relationship and impact on business' financial losses of the, the consequences for the enterprise's investment attractiveness. The study will provide information on business management and plan effective policies to combat cyber threats. Results. The essence of enterprise's financial security is investigated. There are three approaches in identifying the essence of this concept, including as part of the enterprise's economic security, as the state of the most effective use of information, financial indicators and as its financial condition level, which provides stable protection of priority balanced financial interests from real and potential external and internal threats. These definitions are used to substantiate the connection with the concepts of cyber threat and cyber security. The areas of possible losses based on the losses assessment due to cyber threats are identified by the authors, namely the intellectual property loss, the business information loss, the IT systems' continuity disruption, the reputation damage as a result of the attack, the automated personal data loss. Conclusion. It is concluded that the necessary measures of cybersecurity, protection of enterprises' information resources and prevention of unauthorized interference in the enterprises' activities, which has a positive effect on investment attractiveness and increases the enterprises' competitiveness.


Author(s):  
Heru Susanto

In recent years, the number of mobile device users has increased at a significant rate due to the rapid technological advancement in mobile technology. While mobile devices are providing more useful features to its users, it has also made it possible for cyber threats to migrate from desktops to mobile devices. Thus, it is important for mobile device users to be aware that their mobile device could be exposed to cyber threats and that users could protect their devices by employing cyber security measures. This study discusses how users in responded to the smart mobile devices (SMD) breaches. A number of behavioural model theories are used to understand the user behaviour towards security features of smart mobile devices. To assess the impact of smart mobile devices (SMD) security and privacy, surveys had been conducted with users, stressing on product preferences, user behaviour of SMD, as well as perceptions on the security aspect of SMD. The results was very interesting, where the findings revealed that there were a lack of positive relationships between SMD users and their level of SMD security awareness. A new framework approach to securing SMD is proposed to ensure that users have strong protection over their data within SMD.


2019 ◽  
Author(s):  
Marjin Martens ◽  
Ralf De Wolf ◽  
Lieven De Marez
Keyword(s):  

Author(s):  
Curtis G. Northcutt

The recent proliferation of embedded cyber components in modern physical systems [1] has generated a variety of new security risks which threaten not only cyberspace, but our physical environment as well. Whereas earlier security threats resided primarily in cyberspace, the increasing marriage of digital technology with mechanical systems in cyber-physical systems (CPS), suggests the need for more advanced generalized CPS security measures. To address this problem, in this paper we consider the first step toward an improved security model: detecting the security attack. Using logical truth tables, we have developed a generalized algorithm for intrusion detection in CPS for systems which can be defined over discrete set of valued states. Additionally, a robustness algorithm is given which determines the level of security of a discrete-valued CPS against varying combinations of multiple signal alterations. These algorithms, when coupled with encryption keys which disallow multiple signal alteration, provide for a generalized security methodology for both cyber-security and cyber-physical systems.


Sign in / Sign up

Export Citation Format

Share Document