scholarly journals A Taxonomy for Security Flaws in Event-Based Systems

2020 ◽  
Vol 10 (20) ◽  
pp. 7338
Author(s):  
Youn Kyu Lee ◽  
Dohoon Kim

Event-based system (EBS) is prevalent in various systems including mobile cyber physical systems (MCPSs), Internet of Things (IoT) applications, mobile applications, and web applications, because of its particular communication model that uses implicit invocation and concurrency between components. However, an EBS’s non-determinism in event processing can introduce inherent security vulnerabilities into the system. Multiple types of attacks can incapacitate and damage a target EBS by exploiting this event-based communication model. To minimize the risk of security threats in EBSs, security efforts are required by determining the types of security flaws in the system, the relationship between the flaws, and feasible techniques for dealing with each flaw. However, existing security flaw taxonomies do not appropriately reflect the security issues that originate from an EBS’s characteristics. In this paper, we introduce a new taxonomy that defines and classifies the particular types of inherent security flaws in an EBS, which can serve as a basis for resolving its specific security problems. We also correlate our taxonomy with security attacks that can exploit each flaw and identify existing solutions that can be applied to preventing such attacks. We demonstrate that our taxonomy handles particular aspects of EBSs not covered by existing taxonomies.

Author(s):  
Jean-Frédéric Morin ◽  
Amandine Orsini ◽  
Sikina Jinnah

This chapter discusses the relationship between the environment and security. The concept of ‘environmental security’ is omnipresent, but is nonetheless ambiguous and contested. What exactly needs to be secured, and what are the security threats? Is environmental security about state security, faced with the loss of natural resources? Or is it about protecting individuals and communities from environmental degradation and reduced access to key environmental resources? A first step in clarifying these questions is to disentangle two related but distinct causal arguments. In the relationship between environment and security, environmental degradation can be analysed either as a cause or as a consequence of security issues. A second step needed to clarify these debates is to adopt clear definitions. In the context of international relations, security has traditionally been understood in relation to the survival of the state, and the main threats to state security are armed conflicts. For the purpose of this chapter, conflicts are defined as any type of disagreement. The chapter also examines the impact of conflicts on the environment.


2021 ◽  
Vol 2021 ◽  
pp. 1-15
Author(s):  
Irfan Ahmad ◽  
Taj Rahman ◽  
Asim Zeb ◽  
Inayat Khan ◽  
Inam Ullah ◽  
...  

Underwater Wireless Sensor Networks (UWSN) have gained more attention from researchers in recent years due to their advancement in marine monitoring, deployment of various applications, and ocean surveillance. The UWSN is an attractive field for both researchers and the industrial side. Due to the harsh underwater environment, own capabilities, and open acoustic channel, it is also vulnerable to malicious attacks and threats. Attackers can easily take advantage of these characteristics to steal the data between the source and destination. Many review articles are addressed some of the security attacks and taxonomy of the Underwater Wireless Sensor Networks. In this study, we have briefly addressed the taxonomy of the UWSNs from the most recent research articles related to the well-known research databases. This paper also discussed the security threats on each layer of the Underwater Wireless sensor networks. This study will help the researchers design the routing protocols to cover the known security threats and help industries manufacture the devices to observe these threats and security issues.


Author(s):  
Pietro Ferrara ◽  
Amit Kr Mandal ◽  
Agostino Cortesi ◽  
Fausto Spoto

AbstractThe Open Web Application Security Project (OWASP), released the “OWASP Top 10 Internet of Things 2018” list of the high-priority security vulnerabilities for IoT systems. The diversity of these vulnerabilities poses a great challenge toward development of a robust solution for their detection and mitigation. In this paper, we discuss the relationship between these vulnerabilities and the ones listed by OWASP Top 10 (focused on Web applications rather than IoT systems), how these vulnerabilities can actually be exploited, and in which cases static analysis can help in preventing them. Then, we present an extension of an industrial analyzer (Julia) that already covers five out of the top seven vulnerabilities of OWASP Top 10, and we discuss which IoT Top 10 vulnerabilities might be detected by the existing analyses or their extension. The experimental results present the application of some existing Julia’s analyses and their extension to IoT systems, showing its effectiveness of the analysis of some representative case studies.


Author(s):  
G. Ikrissi ◽  
T. Mazri

Abstract. Smart environments provide many benefits to the users including comfort, convenience, energy efficiency, safety, automation, and service quality. The Internet of Things (IoT) has developed to become one of the widely used technologies in smart environments. Many security attacks and threats are generated by security flaws in IoT-based systems and devices, which may affect smart environments applications. As a result, security is one of the most important issues in any smart area or environment based on the IoT model. This paper presents an overview of smart environments based on IoT technology and highlights the main security issues and countermeasures in the four layers of smart environment IoT architecture. It also reviews some of the current solutions that ensure the security of information in smart environments applications.


Author(s):  
Mamta Bachani ◽  
Ahsan Memon ◽  
Faisal Karim Shaikh

This chapter aims to develop an understanding of sensor networks and the security threats posed to them, owing to the inherently insecure wireless nature. It also highlights the current security issues associated with the exchange of information and presents respective countermeasures that can be used to secure the network of malevolent behavior. It builds the reader's understanding of security threats by presenting an idealistic security mechanism and comparing it to currently practiced security mechanisms. Doing so, it identifies the security flaws in each mechanism, henceforth, enumerating a list of well-known security attacks that are connected to the respective security flaws. To provide a better understanding of security threats, the security attacks, in general, are discussed in the perspective of a network administrator, and an adversary. Their impact is also considered from the side of a network administrator and its respective benefits to the adversary. The chapter is later concluded along with future directives and an insight on requirements of forthcoming technologies.


2022 ◽  
Vol 2022 ◽  
pp. 1-7
Author(s):  
Ashwag Albakri ◽  
Huda Fatima ◽  
Maram Mohammed ◽  
Aisha Ahmed ◽  
Aisha Ali ◽  
...  

With the presence of the Internet and the frequent use of mobile devices to send several transactions that involve personal and sensitive information, it becomes of great importance to consider the security aspects of mobile devices. And with the increasing use of mobile applications that are utilized for several purposes such as healthcare or banking, those applications have become an easy and attractive target for attackers who want to get access to mobile devices and obtain users’ sensitive information. Developing a secure application is very important; otherwise, attackers can easily exploit vulnerabilities in mobile applications which lead to serious security issues such as information leakage or injecting applications with malicious programs to access user data. In this paper, we survey the literature on application security on mobile devices, specifically mobile devices running on the Android platform, and exhibit security threats in the Android system. In addition, we study many reverse-engineering tools that are utilized to exploit vulnerabilities in applications. We demonstrate several reverse-engineering tools in terms of methodology, security holes that can be exploited, and how to use these tools to help in developing more secure applications.


2020 ◽  
Vol 01 (04) ◽  
pp. 170-182
Author(s):  
A K M Bahalul Haque ◽  
Sonia Tasmin

Internet of things (IoT) is the epitome of sustainable development. It has facilitated the development of smart systems, industrialization, and the state-of-the-art quality of life. IoT architecture is one of the essential baselines of understanding the widespread adoption. Security issues are very crucial for any technical infrastructure. Since IoT comprises heterogeneous devices, its security issues are diverse too. Various security attacks can be responsible for compromising confidentiality, integrity, and availability. In this paper, at first, the IoT architecture is described briefly. After that, the components of IoT are explained with perspective to various IoT based applications and services. Finally, various security issues, including recommended solutions, are elaborately described and the potential research challenges and future research directions.


2020 ◽  
pp. 1-21
Author(s):  
Mamta Bachani ◽  
Ahsan Memon ◽  
Faisal Karim Shaikh

This chapter aims to develop an understanding of sensor networks and the security threats posed to them, owing to the inherently insecure wireless nature. It also highlights the current security issues associated with the exchange of information and presents respective countermeasures that can be used to secure the network of malevolent behavior. It builds the reader's understanding of security threats by presenting an idealistic security mechanism and comparing it to currently practiced security mechanisms. Doing so, it identifies the security flaws in each mechanism, henceforth, enumerating a list of well-known security attacks that are connected to the respective security flaws. To provide a better understanding of security threats, the security attacks, in general, are discussed in the perspective of a network administrator, and an adversary. Their impact is also considered from the side of a network administrator and its respective benefits to the adversary. The chapter is later concluded along with future directives and an insight on requirements of forthcoming technologies.


2017 ◽  
Vol 5 (2) ◽  
pp. 118
Author(s):  
Abdulrahman Alzahrani ◽  
Ali Alqazzaz ◽  
Nabil Almashfi ◽  
Huirong Fu ◽  
Ye Zhu

Strong security in web applications is critical to the success of your online presence. Security importance has grown massively, especially among web applications. Dealing with web application or website security issues requires deep insight and planning, not only because of the many tools that are available but also because of the industry immaturity. Thus, finding the proper tools requires deep understanding and several steps, including analyzing the development environment, business needs, and the web applications’ complexity. In this paper, we demonstrate the architecture of web applications then list and evaluate the widespread security vulnerabilities. Those vulnerabilities are: Fingerprinting, Insufficient Transport Layer Protection, Information Leakage, Cross-Site Scripting, SQL Injection, and HTTP Splitting. In addition, this paper analyzes the tools that are used to scan for these widespread vulnerabilities in web applications. Finally, it evaluates tools due to security vulnerabilities and gives recommendations to the web applications’ users and administrators aiming to educate them.


Author(s):  
Jibril Adamu ◽  
Raseeda Hamzah ◽  
Marshima Mohd Rosli

The electronic medical record has been more widely accepted due to its unarguable benefits when compared to a paper-based system. As electronic medical record becomes more popular, this raises many security threats against the systems. Common security vulnerabilities, such as weak authentication, cross-site scripting, SQL injection, and cross-site request forgery had been identified in the electronic medical record systems. To achieve the goals of using EMR, attaining security and privacy is extremely important. This study aims to propose a web framework with inbuilt security features that will prevent the common security vulnerabilities in the electronic medical record. The security features of the three most popular and powerful PHP frameworks Laravel, CodeIgniter, and Symfony were reviewed and compared. Based on the results, Laravel is equipped with the security features that electronic medical record currently required. This paper provides descriptions of the proposed conceptual framework that can be adapted to implement secure EMR systems.


Sign in / Sign up

Export Citation Format

Share Document