scholarly journals Design of Accented Character-based CAPTCHA with Usability Test for Online Transactions

2017 ◽  
Vol 1 (1) ◽  
pp. 20-24
Author(s):  
O. T. Olanrewaju ◽  
O. Osunade

Websites serve as the primary interface on the Internet for transactions such as subscription, downloads, database access and storage. Websites are however, sources of security breaches to information systems that are attached to them. Several techniques have been developed to provide security on websites such as secured socket layer (ssl) and CAPTCHA systems. CAPTCHA is an authentication system for verifying human identity during online transactions. Text, mathematical operations, images and audio have been used to develop CAPTCHA systems. The basis of each system has been limited thus leading to successful attacks and compromised systems. In this work, the aim is to integrate accented characters into the CAPTCHA code generation mechanism and test the usability of the developed system on a website. The results indicate successful generation and user acceptability.

Author(s):  
Nassima Yamouni-Khelifi ◽  
Kaddour Sadouni ◽  
Michał Śmiałek ◽  
Mahmoud Zennaki

Requirements definition is the first step in the life cycle of a software system. Requirements are formulated as paragraphs of text and appear ambiguous, so they cannot be translated directly into code. For this reason, they are treated as secondary artifacts for software developers. This paper presents a model-driven based approach where requirements are treated as first-class citizens, and can contribute to the final code. In this approach, requirements are formulated as use case models with their textual scenarios, using a precise requirements language called RSL, allowing an automatic transition to executable Java code. The structure of the generated code follows the Model-View-Presenter (MVP) architectural pattern. The work focuses on the Model layer code, which is responsible for the persistence and storage of data in a database system.


2019 ◽  
Vol 2019 ◽  
pp. 1-11 ◽  
Author(s):  
Fernando Nakayama ◽  
Paulo Lenz ◽  
Stella Banou ◽  
Michele Nogueira ◽  
Aldri Santos ◽  
...  

Smart health (s-health) is a vital topic and an essential research field today, supporting the real-time monitoring of user’s data by using sensors, either in direct or indirect contact with the human body. Real-time monitoring promotes changes in healthcare from a reactive to a proactive paradigm, contributing to early detection, prevention, and long-term management of health conditions. Under these new conditions, continuous user authentication plays a key role in protecting data and access control, once it focuses on keeping track of a user’s identity throughout the system operation. Traditional user authentication systems cannot fulfill the security requirements of s-health, because they are limited, prone to security breaches, and require the user to frequently authenticate by, e.g., a password or fingerprint. This interrupts the normal use of the system, being highly inconvenient and not user friendly. Also, data transmission in current authentication systems relies on wireless technologies, which are susceptible to eavesdropping during the pairing stage. Biological signals, e.g., electrocardiogram (ECG) and electroencephalogram (EEG), can offer continuous and seamless authentication bolstered by exclusive characteristics from each individual. However, it is necessary to redesign current authentication systems to encompass biometric traits and new communication technologies that can jointly protect data and provide continuous authentication. Hence, this article presents a novel biosignal authentication system, in which the photoplethysmogram (PPG) biosignal and a galvanic coupling (GC) channel lead to continuous, seamless, and secure user authentication. Furthermore, this article contributes to a clear organization of the state of the art on biosignal-based continuous user authentication systems, assisting research studies in this field. The evaluation of the system feasibility presents accuracy in keeping data integrity and up to 98.66% accuracy in the authentication process.


Author(s):  
Sushil K. Sharma ◽  
Jatinder N.D. Gupta ◽  
Ajay K. Gupta

The ability to perform E-Commerce over the Internet has become the driver of the new digital economy. As it has opened up opportunities for businesses and consumers to conduct online transactions on a 24/7 basis, at the same time, it has also opened new opportunities for hackers to exploit the medium for nefarious cyber attacks. This paper discusses various potential security holes that exists in the e-commerce environment and suggests a framework to protect organizations from security breaches.


2016 ◽  
Vol 0 (0) ◽  
pp. 19-24 ◽  
Author(s):  
Olga Dzięgielewska ◽  
Bolesław Szafrański

With cyber-attacks on the dramatic rise in the recent years, the number of entities which realize the necessity of protecting their IT assets increases. Individuals are more aware of the potential threats and demand high level of security from the business entities having access to their personal and private data. Such entities have legal obligations to satisfy the confidentiality when processing sensitive data, but many fails to do so. Keeping the statistical data private is a challenge as the approach to the security breaches slightly differs from the classical understanding of data disclosure attacks. The statistical disclosure can be achieved using inference attacks on the not-effectively protected assets. Such attacks do not target the database access itself, i.e. are performed from a perspective of an internal user, but the statistical interface used to retrieve the statistical data from the database records. This paper sums up basic types of inference attacks classifying them in the CVSS standard and provides a series of fundamental countermeasures which can be undertaken to mitigate the risk of performing successful attack.


Author(s):  
Irina Mikheeva ◽  

The article deals with the issues of customer identification using new modern technologies that make it possible for banks to carry out more effective measures to counteract the legalization (laundering) of proceeds from crime. The author analyzes the current Russian legislation and regulations of the Bank of Russia in terms of remote identification of individual customers for individual banking operations. The mechanism of remote identification is considered, within which a technological infrastructure has been developed, including a Single biometric system and a Single identification and authentication system. The article notes that the introduction of remote identification provides advantages for both banks and Bank clients. The ability of banks to use identification data obtained by other credit institutions is the main goal of changes to the remote identification procedure. At the same time, credit organizations in such cases, taking into account the recommendation of the Basel Committee, should not forget to implement the “know your customer” policy. The paper examines the practice of Russian banks in the framework of pilot projects on the use of blockchain technology for remote identification and storage of information in relation to customers, in particular, on the example of a pilot KYC Project based on Masterchains. The author identifies the main legal risks of using new digital technologies, and emphasizes the need to ensure the safety of personal data.


2018 ◽  
Vol 208 ◽  
pp. 05001 ◽  
Author(s):  
Shahab Tayeb ◽  
Neha Raste ◽  
Matin Pirouz ◽  
Shahram Latifi

The advancement in technology has transformed Cyber Physical Systems and their interface with IoT into a more sophisticated and challenging paradigm. As a result, vulnerabilities and potential attacks manifest themselves considerably more than before, forcing researchers to rethink the conventional strategies that are currently in place to secure such physical systems. This manuscript studies the complex interweaving of sensor networks and physical systems and suggests a foundational innovation in the field. In sharp contrast with the existing IDS and IPS solutions, in this paper, a preventive and proactive method is employed to stay ahead of attacks by constantly monitoring network data patterns and identifying threats that are imminent. Here, by capitalizing on the significant progress in processing power (e.g. petascale computing) and storage capacity of computer systems, we propose a deep learning approach to predict and identify various security breaches that are about to occur. The learning process takes place by collecting a large number of files of different types and running tests on them to classify them as benign or malicious. The prediction model obtained as such can then be used to identify attacks. Our project articulates a new framework for interactions between physical systems and sensor networks, where malicious packets are repeatedly learned over time while the system continually operates with respect to imperfect security mechanisms.


Author(s):  
R. C. Gonzalez

Interest in digital image processing techniques dates back to the early 1920's, when digitized pictures of world news events were first transmitted by submarine cable between New York and London. Applications of digital image processing concepts, however, did not become widespread until the middle 1960's, when third-generation digital computers began to offer the speed and storage capabilities required for practical implementation of image processing algorithms. Since then, this area has experienced vigorous growth, having been a subject of interdisciplinary research in fields ranging from engineering and computer science to biology, chemistry, and medicine.


Author(s):  
John W. Roberts ◽  
E. R. Witkus

The isopod hepatopancreas, as exemplified by Oniscus ascellus. is comprised of four blind-ending diverticula. The regenerative cells at the tip of each diverticula differentiate into either club-shaped B-cells, which serve a secretory function, or into conoid S-cells, which serve in the absorption and storage of nutrients.The glandular B-cells begin producing secretory material with the development of rough endoplasmic reticulum during their process of maturation from the undifferentiated regenerative cells. Cytochemical and morphological data indicate that the hepatopancreas sequentially produces two types of secretory material within the large club-shaped cells. The production of the carbohydrate-like secretory product in immature cells seems to be phased out as the production of the osmiophilic secretion was phased in as the cell matured.


Sign in / Sign up

Export Citation Format

Share Document