scholarly journals Analysis and Detection of Bot performing Keylogging Activities.

2014 ◽  
Vol 13 (6) ◽  
pp. 4549-4555
Author(s):  
Miss.Takale Jyoti D

The focus on computer security has increased due to the ubiquitous use of Internet. Botnets are one of the biggest cyber threats. Botnet is a malware controlled by a Botmaster using Command and Control (C&C). Botnet is expanded with infecting fresh computers through social networking sites like facebook, twitter, etc. ZeuS is famous type of botnet for financial gain. It targets bank websites for stealing user’s credentials like password, credit card information,etc. In this paper, an application framework is designed for analysis and detection of ZeuS bot residing on host victim’s machine. The detection phase is based on analysis of bot’s infection stategy means in what way it affects the victims’s pc. All the related files are wiped out from the system in removal phase. The communication between command and control server and the victim machine is analysed in a virtual environment.

2017 ◽  
Vol 20 (9) ◽  
pp. 3304-3322 ◽  
Author(s):  
Holger Pötzsch

This article reconceptualizes the archive in the context of digital media ecologies. Drawing upon archival theory and critical approaches to the political economy of the Internet, I account for new dynamics and implications afforded by digital archives. Operating at both a user-controlled explicit and a state- and corporate-owned implicit level, the digital archive at once facilitates empowerment and enables unprecedented forms of management and control. Connecting the politics and economy of digital media with issues of identity formation and curation on social networking sites, I coin the terms iArchive and predictive retention to highlight how recent technological advances both provide new means for self-expression, mobilization and resistance and afford an almost ubiquitous tracking, profiling and, indeed, moulding of emergent subjectivities.


Author(s):  
Ashutosh Singh ◽  
Annie H. Toderici ◽  
Kevin Ross ◽  
Mark Stamp

Author(s):  
Vladlena Benson

Based on the literature review of the theory of trust, this chapter aims to provide an insight into trust formation on social networking sites (SNS). An overview of the current state of cybercrime and known ways of threat mitigation helps shed some light on the reasons why social networks became easy targets for Internet criminals. Increasingly, personalisation is seen as a method for counteracting attacks perpetrated via phishing messages. This chapter aims to look specifically at trust in online social networks and how it influences vulnerability of users towards cybercrime. The chapter poses a question whether personalisation is the silver bullet to combat cyber threats on social networks. Further research directions are discussed.


Healthcare ◽  
2020 ◽  
Vol 8 (4) ◽  
pp. 577
Author(s):  
Abdulaziz Alblwi ◽  
Dena Al-Thani ◽  
John McAlaney ◽  
Raian Ali

Procrastination refers to the voluntary avoidance or postponement of action that needs to be taken, that results in negative consequences such as low academic performance, anxiety, and low self-esteem. Previous work has demonstrated the role of social networking site (SNS) design in users’ procrastination and revealed several types of procrastination on SNS. In this work, we propose a method to combat procrastination on SNS (D-Crastinate). We present the theories and approaches that informed the design of D-Crastinate method and its stages. The method is meant to help users to identify the type of procrastination they experience and the SNS features that contribute to that procrastination. Then, based on the results of this phase, a set of customised countermeasures are suggested for each user with guidelines on how to apply them. To evaluate our D-Crastinate method, we utilised a mixed-method approach that included a focus group, diary study and survey. We evaluate the method in terms of its clarity, coverage, efficiency, acceptance and whether it helps to increase users’ consciousness and management of their own procrastination. The evaluation study involved participants who self-declared that they frequently procrastinate on SNS. The results showed a positive impact of D-Crastinate in increasing participants’ awareness and control over their procrastination and, hence, enhancing their digital wellbeing.


2020 ◽  
pp. 69-76
Author(s):  
O. Klevtsov ◽  
A. Symonov ◽  
S. Trubchaninov

The paper is devoted to the issues of computer security assessment of instrumentation and control systems (I&C systems) of nuclear power plants (NPPs). The authors specified the main areas of assessing the computer security of NPP I&C systems, especially the assessment of cyber threats, vulnerabilities of I&C computer security, sufficiency of applied measures for ensuring I&C systems computer security, risks of I&C system computer security as well as periodic reassessment of I&C computer security. The paper considers the assessment of I&C computer security vulnerabilities, sufficiency of applied measures for ensuring I&C computer security (assessment of cyber threats and the risks of I&C computer security are discussed in detail in other publications from the series “Computer Security of NPP Instrumentation and Control Systems”). Approaches to assessing the computer security vulnerabilities of I&C systems and software at each stage of I&C life cycle are considered. The recommendations for assessing vulnerabilities regarding technical and software protection against unauthorized access or connection to I&C, protection of local networks, implementation of organizational measures and procedures for computer security are provided. The paper describes the scope and procedures for the initial assessment and periodic reassessment of NPP I&C computer security. Recommendations for the formation of an appropriate evaluation team are provided. Methods of assessing I&C computer security are considered, namely: analysis of documents (computer security policy, program, plan, reports, etc.), survey of staff (administrative, operational, service and computer security experts), direct review of I&C systems, their components and local networks. The evaluation stages (collection of information, detailed analysis, reporting) and the scope of work at each stage are described. General information about the possibility and necessity of assessing the computer security risks of I&C systems in the case of using risk-informed approaches is provided. The need to document the results of the assessment is noted separately and specific proposals about the procedure for developing relevant reports are made.


2011 ◽  
Vol 86 (9-11) ◽  
pp. 2067-2070 ◽  
Author(s):  
J. Tuominen ◽  
A. Muhammad ◽  
J. Mattila ◽  
L. Aha ◽  
H. Saarinen ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document