scholarly journals A Strengthening Asean Cyber Cooperation in Countering Cyber Terrorist Groups Activities on the Internet by Implementing the Six-Ware Cyber Security Framework

2018 ◽  
Vol 13 ◽  
pp. 3288-3300
Author(s):  
Rudy Agus Gemilang Gultom ◽  
Asep Adang Supriyadi ◽  
Tatan Kustana

Nowadays, the extremism, radicalism and terrorism groups have taken advantages the use of Internet access to support their activities, i.e, member recruitment, propaganda, fundraising, cyberattack actions against their targets, etc. This is one of the issues of cyber security as a negative impact of internet utilization especially by the extremism, radicalism and terrorism groups. They know the benefits of the internet services and social media can be used to facilitate the control of information in their organizational command and control system.  In order to tackle this cyber security issue, the internet users in Association of Southeast Asian Nations (ASEAN) member countries should get more understanding as well as protection from their government against the danger of cyber extremism, cyber radicalism or cyber terrorism activities over the Internet. Therefore, this paper tries to explain the need of an ASEAN Cyber Security Framework standard in order to countering cyber terrorism activities via Internet as well as introducing the initial concept of Six-Ware Cyber Security Framework (SWCSF). 

2014 ◽  
Vol 52 ◽  
Author(s):  
Noluxolo Kortjan ◽  
Rossouw Von Solms

The Internet is becoming increasingly interwoven in the daily lives of many individuals, organisations and nations. It has, to a large extent, had a positive effect on the way people communicate. It has also introduced new avenues for business; and it has offered nations an opportunity to govern online. Nevertheless, although cyberspace offers an endless list of services and opportunities, it is also accompanied by many risks, of which many Internet users are not aware. As such, various countries have developed and implemented cyber-security awareness and education measures to counter the perceived ignorance of the Internet users. However, there is currently a definite lack in South Africa (SA) in this regard; as there are currently, little government-led and sponsored cyber-security awareness and education initiatives. The primary research objective of this paper, therefore, is to propose a cyber-security awareness and education framework for SA that would assist in creating a cyber-secure culture in SA among all of the users of the Internet. This framework will be developed on the basis of key factors extrapolated from a comparative analysis of relevant developed countries.


Author(s):  
Xichen Zhang ◽  
Ali A. Ghorbani

Over recent years, the extensive development of information technology has dramatically advanced the way that people use the internet. The fast growth of the internet of things and mobile crowdsensing applications raise challenging security and privacy issues for the society. More often than before, malicious attackers exploit human vulnerability as the weakest link to launch cyberattacks and conduct fraudulent online activities. How to profile users' daily behavior becomes an essential component for identifying users' vulnerable/malicious level and predicting the potential cyber threats. In this chapter, the authors discuss human factors and their related issues in cyber security and privacy. Three categories of human behaviors—desktop behavior, mobile behavior, and online behavior—and their corresponding security and privacy issues are demonstrated in detail to estimate the vulnerabilities of internet users. Some future directions related to human-factor based security and privacy issues are proposed at the end of this chapter.


Author(s):  
Kenneth C. C. Yang ◽  
Yowei Kang

On February 4, 2015, China announced its new regulations that require all Chinese Internet users to register with their real names. The heightened control of Internet clearly demonstrates Chinese government's concerns over increasing social unrests and the abilities of Chinese Internet users to access information not censored by the government. However, the real-name registration regime has posed the greatest challenge to the anonymity of the Internet that many Chinese users have valued in an authoritarian society. Furthermore, the real-name registration system also impinges on Chinese Internet users' privacy, political freedom, and freedom of speech. This book chapter analyzes microblog discussions to examine existing Chinese censorship and control systems on the Internet, to investigate government's rhetoric to justify its censorship and control systems, and to identify major themes in Chinese netizens' reactions and discourses.


2003 ◽  
Vol 18 (3) ◽  
pp. 272-275 ◽  
Author(s):  
A. Clem ◽  
Sagar Galwankar ◽  
George Buck

AbstractThe world is becoming ever more interconnected via the Internet, creating both benefits and disadvantages for human communities. This article examines cyber-terrorism, one of the major negative consequences of the Internet. It also examines the potential impact of cyber-terrorism on the health of populations, its possible perpetrators, and its prevention and control.


2021 ◽  
Vol 11 (16) ◽  
pp. 7738
Author(s):  
Kyounggon Kim ◽  
Faisal Abdulaziz Alfouzan ◽  
Huykang Kim

Cyber-attacks have become commonplace in the world of the Internet. The nature of cyber-attacks is gradually changing. Early cyber-attacks were usually conducted by curious personal hackers who used simple techniques to hack homepages and steal personal information. Lately, cyber attackers have started using sophisticated cyber-attack techniques that enable them to retrieve national confidential information beyond the theft of personal information or defacing websites. These sophisticated and advanced cyber-attacks can disrupt the critical infrastructures of a nation. Much research regarding cyber-attacks has been conducted; however, there has been a lack of research related to measuring cyber-attacks from the perspective of offensive cybersecurity. This motivated us to propose a methodology for quantifying cyber-attacks such that they are measurable rather than abstract. For this purpose, we identified each element of offensive cybersecurity used in cyber-attacks. We also investigated the extent to which the detailed techniques identified in the offensive cyber-security framework were used, by analyzing cyber-attacks. Based on these investigations, the complexity and intensity of cyber-attacks can be measured and quantified. We evaluated advanced persistent threats (APT) and fileless cyber-attacks that occurred between 2010 and 2020 based on the methodology we developed. Based on our research methodology, we expect that researchers will be able to measure future cyber-attacks.


Author(s):  
М.А. Держо ◽  
М.М. Лаврентьев ◽  
А.В. Шафаренко

В данной работе обсуждаются фундаментальные вопросы разработки программ магистратуры в области Интернета вещей (Internet of Things — IoT). Мы кратко сравниваем предложения Сколтеха и Стэнфорда и утверждаем, что наиболее гибкое решение достигается посредством вводного блока и четырех параллельных потоков учебных курсов: обработка сигналов и управление, обучение машин и искусственный интеллект (ИИ), программирование и схемотехника платформ с применением микроконтроллеров, и, наконец, сети и кибербезопасность. Вводный блок предполагается оснастить достаточным количеством предметов по выбору, чтобы поступающие выпускники бакалавриата из областей прикладной математики, информационных технологий и электроники/телекоммуникаций могли приобрести необходимые знания для освоения потоковых курсов. Мы утверждаем, что еще одним необходимым отличием программы IoT должен явиться междисциплинарный групповой дипломный проект значительного объема, также основанный на потоковых курсах. This paper discusses the fundamentals of postgraduate curriculum development for the area of the Internet of Things (IoT). We provide a brief contrasting analysis of Skoltech and Stanford Masters programs and argue that the most flexible way forward is via the introduction of a leveling-off, elective introductory stage, and four parallel course streams: signal processing and control; Artificial Intelligence (AI), and machine learning; microcontroller systems design; and networks and cyber security. The leveling-off stage is meant to provide sufficient electives for graduates of applied math, Information Technologies (IT), or electronics/telecom degrees to learn the necessary fundamentals for the stream modules. We argue that another distinguishing feature of an IoT masters program is a large project drawing on the stream modules and requiring a multidisciplinary, team development effort.


2020 ◽  
Vol 8 (2) ◽  
pp. 159-166
Author(s):  
Alan Dupont

Governments and telecommunications companies have invested heavily in measures designed to protect overall system security. But these measures may not be enough if China is successful in setting the rules and designing the architecture of a new internet, because the one-party state’s internet vision reflects authoritarian values that are diametrically opposed to ours. China has suggested a radical change to the way the internet functions to the International Telecommunications Union. This would bake authoritarianism into the architecture underpinning the web, giving state-run internet service providers granular control over citizens’ use. The authoritarian state’s ability to monitor and control undersea fibre optic cables is emerging as a major national security issue for Australia and other democracies. The world could split into two separate information worlds, one led by the US and the other by China. A Balkanised internet is not in Australia’s interest. We must engage with friends and allies to come up with a fit-for-purpose world wide web that is more efficient, secure, user friendly and compatible with democracy.


2021 ◽  
Author(s):  
◽  
Kyle Gibson

<p>This research explores the level of security awareness, of domestic Internet users in New Zealand. Awareness and online security are the top priorities of the New Zealand Cyber Security Strategy, but little research has been conducted to gauge the current level of security awareness in context with common mitigation strategies. The majority of the literature on the subject is primarily focused on organisational technology security and awareness so this had to be put in context with domestic users. A sample set of Facebook friends of the researcher were asked to respond to an online survey. The survey explored the respondents' attitude and selfevaluated level of security awareness, and their awareness of a subset of mitigation strategies from the Australian Defence Signals Directorates' 'Strategies to Mitigate Targeted Cyber Intrusions'. The respondents demonstrated a good level of security awareness regarding patching and anti-virus, but there is a need for more education regarding access control and social engineering.</p>


Author(s):  
Kenneth C. C. Yang ◽  
Yowei Kang

On February 4, 2015, China announced its new regulations that require all Chinese Internet users to register with their real names. The heightened control of Internet clearly demonstrates Chinese government's concerns over increasing social unrests and the abilities of Chinese Internet users to access information not censored by the government. However, the real-name registration regime has posed the greatest challenge to the anonymity of the Internet that many Chinese users have valued in an authoritarian society. Furthermore, the real-name registration system also impinges on Chinese Internet users' privacy, political freedom, and freedom of speech. This book chapter analyzes microblog discussions to examine existing Chinese censorship and control systems on the Internet, to investigate government's rhetoric to justify its censorship and control systems, and to identify major themes in Chinese netizens' reactions and discourses.


Author(s):  
Maurice Dawson ◽  
Marwan Omar ◽  
Jonathan Abramson ◽  
Brian Leonard ◽  
Dustin Bessette

The threat of cyber terrorism has become a reality with recent attacks such as Stuxtnet, Flame, Sony Pictures, and North Korea's websites. As the Internet of Things (IoT) continues to become more hyperconnected it will be imperative that cyber security experts to develop new security architectures for multiple platforms such as mobile devices, laptops, embedded systems, and even wearable displays. The futures of national and international security rely on complex countermeasures to ensure that a proper security posture is maintained during this state of hyperconnectivity. To protect these systems from exploitation of vulnerabilities it is essential to understand current and future threats to include the laws that drive their need to be secured. Examined within this chapter are the potential security related threats with the use of social media, mobile devices, virtual worlds, augmented reality, and mixed reality.


Sign in / Sign up

Export Citation Format

Share Document