scholarly journals Prevention of Session Hijacking and Authentication Providing to the Session Cookie

2019 ◽  
Vol 8 (4) ◽  
pp. 9685-9690

The current world is running around the word “Privacy”. Every individual’s aim is to secure their data and transactions so that no one can access them without proper authentication. In this digital era, all the data stored in the internet protected by a password. The general opinion is that a password can protect the data from being acquired by an unauthorized user. The issue is about what happens subsequently with an authorized login. Once we login into our account, all our actions, state of browser and timestamps are recorded in a simple text file known as “Cookie”. In this paper, we proposed a mechanism which is easy to implement and robust in providing authentication to the session cookie. This obstructs an unauthorized user from getting access to our private data. Our mechanism provides authentication by using the concept of hashing combined with a unique identifier.

2020 ◽  
Vol 16 (4) ◽  
pp. 602-617
Author(s):  
Sukanya Sharma ◽  
Saumya Singh ◽  
Fedric Kujur ◽  
Gairik Das

In this digital era, the internet, and Social Media (SM) has had a radical impact on the shopping behavior of “costumers” The SM provides a platform where “costumers” are exposed to the best product with the best price along with reviews and opinions about the merchandise. So, we can turn our heads and look at a brand in a way as if the brand is speaking to us. This study was an attempt to explore the Social Media Marketing Activities (SMMA) that are being used for the marketing of fashionable products like apparel and to what level the SMMA activities of brands truly strengthen the relationship with customers and motivate purchase intention. Moreover, SMMA has a robust application in developing a marketing strategy for business. It has become a significant tool that collaborates with businesses and people. It is concluded that the “costumer”-brand relationship does have a positive and statistically significant impact on consumers’ purchase intention through SM.


Author(s):  
Sarah Hatchuel ◽  
Nathalie Vienne-Guerrin

This introduction explores the consequences of the digital revolution on the production, distribution, dissemination, and study of Shakespeare on screen. Since the end of the 20th century, the rise (and fall) of the DVD, the digitalisation of sounds and images allowing us to experience and store films on our computers, the spreading of easy filming/editing tools, the live broadcasts of theatre performances in cinemas or on the Internet, the development of online archives and social media, as well as the globalisation of production and distribution have definitely changed the ways Shakespeare on screen is (re)created, consumed, shared, and examined.


2021 ◽  
Vol 21 (3) ◽  
pp. 1-22
Author(s):  
Celestine Iwendi ◽  
Saif Ur Rehman ◽  
Abdul Rehman Javed ◽  
Suleman Khan ◽  
Gautam Srivastava

In this digital age, human dependency on technology in various fields has been increasing tremendously. Torrential amounts of different electronic products are being manufactured daily for everyday use. With this advancement in the world of Internet technology, cybersecurity of software and hardware systems are now prerequisites for major business’ operations. Every technology on the market has multiple vulnerabilities that are exploited by hackers and cyber-criminals daily to manipulate data sometimes for malicious purposes. In any system, the Intrusion Detection System (IDS) is a fundamental component for ensuring the security of devices from digital attacks. Recognition of new developing digital threats is getting harder for existing IDS. Furthermore, advanced frameworks are required for IDS to function both efficiently and effectively. The commonly observed cyber-attacks in the business domain include minor attacks used for stealing private data. This article presents a deep learning methodology for detecting cyber-attacks on the Internet of Things using a Long Short Term Networks classifier. Our extensive experimental testing show an Accuracy of 99.09%, F1-score of 99.46%, and Recall of 99.51%, respectively. A detailed metric representing our results in tabular form was used to compare how our model was better than other state-of-the-art models in detecting cyber-attacks with proficiency.


2021 ◽  
Author(s):  
Scott W Campbell ◽  
Morgan Q Ross

Abstract This article revisits the theoretical terrain surrounding solitude to address conceptual, methodological, and practical challenges manifest in the digital era. First, solitude has been approached from a number of different research traditions, resulting in disconnected streams of theory. Furthermore, these streams were developed before the rise of the Internet and mobile media. As a result, solitude is commonly, if not most commonly, conceptualized and measured as a matter of being physically alone. This article re-conceptualizes solitude as “noncommunication” to offer a more contemporary and inclusive perspective, one that uproots it from ideations of physical aloneness and replants it in social aloneness. Whereas previous theory in this area often ignores mediated interaction, we recognize it as a meaningful way for people to connect, with important implications for solitude. Our framework also calls for interrogation of key contextual factors that condition whether and how solitude is experienced in the digital era.


2021 ◽  
Vol 5 (1) ◽  
pp. 28-39
Author(s):  
Minami Yoda ◽  
Shuji Sakuraba ◽  
Yuichi Sei ◽  
Yasuyuki Tahara ◽  
Akihiko Ohsuga

Internet of Things (IoT) for smart homes enhances convenience; however, it also introduces the risk of the leakage of private data. TOP10 IoT of OWASP 2018 shows that the first vulnerability is ”Weak, easy to predict, or embedded passwords.” This problem poses a risk because a user can not fix, change, or detect a password if it is embedded in firmware because only the developer of the firmware can control an update. In this study, we propose a lightweight method to detect the hardcoded username and password in IoT devices using a static analysis called Socket Search and String Search to protect from first vulnerability from 2018 OWASP TOP 10 for the IoT device. The hardcoded login information can be obtained by comparing the user input with strcmp or strncmp. Previous studies analyzed the symbols of strcmp or strncmp to detect the hardcoded login information. However, those studies required a lot of time because of the usage of complicated algorithms such as symbolic execution. To develop a lightweight algorithm, we focus on a network function, such as the socket symbol in firmware, because the IoT device is compromised when it is invaded by someone via the Internet. We propose two methods to detect the hardcoded login information: string search and socket search. In string search, the algorithm finds a function that uses the strcmp or strncmp symbol. In socket search, the algorithm finds a function that is referenced by the socket symbol. In this experiment, we measured the ability of our proposed method by searching six firmware in the real world that has a backdoor. We ran three methods: string search, socket search, and whole search to compare the two methods. As a result, all methods found login information from five of six firmware and one unexpected password. Our method reduces the analysis time. The whole search generally takes 38 mins to complete, but our methods finish the search in 4-6 min.


Author(s):  
Alexandre B. Augusto ◽  
Manuel E. Correia

The massive growth of the Internet and its services is currently being sustained by the mercantilization of users’ identities and private data. Traditional services on the Web require the user to disclose many unnecessary sensitive identity attributes like bankcards, geographic position, or even personal health records in order to provide a service. In essence, the services are presented as free and constitute a means by which the user is mercantilized, often without realizing the real value of its data to the market. In this chapter the auhors describe OFELIA (Open Federated Environment for Leveraging of Identity and Authorization), a digital identity architecture designed from the ground up to be user centric. OFELIA is an identity/authorization versatile infrastructure that does not depend upon the massive aggregation of users’ identity attributes to offer a highly versatile set of identity services but relies instead on having those attributes distributed among and protected by several otherwise unrelated Attribute Authorities. Only the end user, with his smartphone, knows how to aggregate these scattered Attribute Authorities’ identity attributes back into some useful identifiable and authenticated entity identity that can then be used by Internet services in a secure and interoperable way.


Author(s):  
Muhammad Raihan Nasution

In this digital era, young people are very vulnerable to negative things, therefore Islam as a religion which is rahmatan lil alamin, must take appropriate and fast actions to save young generations of Islam from getting lost in the darkness of cyberspace life. This article is prepared with a library research approach by conducting a literature review and collecting data from various sources and subsequently, the data is analyzed descriptively by presenting facts or findings which are then theoretically reviewed. Therefore da’wah of digital era really must use the media, especially new media. The development of communication technology has changed the way people communicate and interact. Nowadays, almost everyone uses the internet to send, search, and read information. Therefore, the Qur’an Surah An-Nahl: 125 offering da'wah methods of digital era have to be able to attract sympathetic Millennials, presenting representative, interactive and innovative da'wah methods through social media is the best way to save the young generations of Islam in the future.


2021 ◽  
Vol 19 (2) ◽  
Author(s):  
Santho Vlennery Mettan ◽  
Aldo Hardi Sancoko

Indonesian’s Millennials are estimated to reach 70% of the productive population in 2020-2030 (BPS 2018), who cannot be separated from the internet and social media (Harahap 2017). Due to this fact, (Hsu 2018) and (Benini 2018) claim that millennials are afraid of being left behind by ephemeral content which will disappear within 24 hours so that many social media platforms are equipped with these temporary content features and companies are using temporary content strategies to reach more consumers. SMEs on the other hand have low knowledge of ephemeral content, even though 84% of millennials buy products due to the influence of social media, where ephemeral content lies within (Boen 2016). In the other hand, word-of-mouth has a significant impact on customer purchasing decisions until now. Along with the change to the digital era, word-of-mouth is being accelerated with the help of the internet, it called e-WOM, where many businesses use social media or other online platforms to promote business. The results showed that the two variables of ephemeral content and word-of-mouth with the help of the internet had a significant effect on customer purchase intentions, especially the millennial customer for SMEs in Surabaya City. In the future, by implementing ephemeral content in SMEs media social will increases their customer’s e-WOM.


2021 ◽  
Vol 9 (2) ◽  
pp. 67-74
Author(s):  
Tukino Tukino ◽  
Sasa Ani Arnomo

The progress of the internet has become the best means to start a property business and it has been proven to be an effective and effective media of information from the internet to disseminate information that is fully accessible to anyone,anytime and anywhere. The great effect on the property business is caused through the internet because only by accessing it from smartphone device and computers at home or in the office of prospective buyers can see property add information.In today’s digital era property sales are mostly done on social media. Social media has many users. But social media has the disadvantages of having to pay if you want to advertise sales, consumers are only users of social media, sales posts quickly sink. In this research, a web-based property sales and leasing information system will be built to cover the shortage.


2021 ◽  
Vol 17 (1) ◽  
pp. 279-287
Author(s):  
Dorin IORDACHE

The importance of information security in general, of managed information at the level of a database has increased with the expansion of the Internet. On the other hand, it has acquired new facets with the increase of the accessibility of the users to as many resources as possible. Large volume of private data in use and the limitation of unauthorized actions to information have brought new aspects to the issue of ensuring their protection. The scope of this field is wide and allows the operation in several directions: identification, description, creation, implementation and testing of mechanisms aimed at improving the working environment in which database management systems operates. Due to the importance of the information managed by a DBMS[1], it is necessary to define a framework safe and easy to use. The database fulfills not only the role of storage, but also of data provider to users. Thus, the information must be protected throughout the interaction process: generation, storage, processing, modification, deletion, etc. Therefore, the security of databases must not only be reduced to the protection of certain data considered sensitive, but also to the creation of a secure, authorized and controlled global environment through which information becomes available to users.   [1] DBMS – DataBase Management System


Sign in / Sign up

Export Citation Format

Share Document