Cybersecurity Governance on Social Engineering Awareness

Author(s):  
Vasaki Ponnusamy ◽  
Leslie Mark Pannir Selvam ◽  
Khalid Rafique

Raising awareness on social engineering is becoming more essential. When we are connected to the internet, we are at the risk of becoming victims of numerous attacks. It is very difficult to protect ourselves from all of these threats, but the least we could do is not jeopardize our own safety. In order to achieve this, the need to have substantial knowledge on social engineering techniques and how to safeguard one from being victimized are mandatory. This research presents the overview of social engineering attacks. This plays a crucial role in supporting victims of cyber assaults.

Author(s):  
Cécile Boex

Since March 2011 the revolt in Syria has engendered a considerable and heterogeneous mass of videos made by demonstrators, activists, and fighters and posted on the Internet. During the peaceful manifestations between 2011 and 2013, the videos played a crucial role in the narrative of the revolt but also in the emergence of new modes of protesting focused on the work of the image. The author questions the effects of amateur video on the perception of the protest as well as on protest activities themselves in an ultra-repressive context. She pays particular attention to the relationship between the act of filming and the act of protesting, both linked by bodies, words, and emotions. Thus, it is an issue of exploring the different visual dimensions of the revolt in Syria, in accordance with the evolution of the movement and the spaces it occupied, to understand better how the protest experience is articulated and put into images.


Author(s):  
Khuda Bux ◽  
Muhammad Yousaf ◽  
Akhtar Hussain Jalbani ◽  
Komal Batool

The number of client-side attacks is increasing day-by-day. These attacks are launched by using various methods like phishing, drive-by downloads, click-frauds, social engineering, scareware, and ransomware. To get more advantage with less exertion and time, the attackers are focus on the clients, rather than servers which are more secured as compared to the clients. This makes clients as an easy target for the attackers on the Internet. A number of systems/tools have been created by the security community with various functions for detection of client-side attacks. The discovery of malicious servers that launch the client side attacks can be characterized in two types. First to detect malicious servers with passive detection which is often signature based. Second to detect the malicious servers with active detection often with dynamic malware analysis. Current systems or tools have more focus on identifying malicious servers rather than preventing the clients from those malicious servers. In this paper, we have proposed a solution for the detection and prevention of malicious servers that use the Bro Intrusion Detection System (IDS) and VirusTotal API 2.0. The detected malicious link is then blocked at the gateway.


2021 ◽  
Vol 2129 (1) ◽  
pp. 012080
Author(s):  
Chinonso Okereke ◽  
Nur Haliza Abdul Wahab ◽  
Mohd Murtadha Mohamad ◽  
S H Zaleha

Abstract Water, mostly oceans, covers over two-third of the earth. About 95% of these oceans are yet to be explored which includes 99% of the sea-beds. The introduction of the Internet of Underwater Things (IoUT) underwater has become a powerful technology necessary to the quest to develop a SMART Ocean. Autonomous Underwater Vehicles (AUVs) play a crucial role in this technology because of their mobility and longer energy storage. In order for AUV technologies to be effective, the challenges of AUVs must be adequately solved. This paper provides an overview of the challenges of IoUT, the contributions of AUVs in IoUT as well as the current challenges and opening in AUV. A summary and suggestion for future work was discussed.


Author(s):  
Helen Joanne Wall ◽  
Linda K. Kaye

The growth in computer-mediated communication has created real challenges for society; in particular, the internet has become an important resource for “convincing” or persuading a person to make a decision. From a cybersecurity perspective, online attempts to persuade someone to make a decision has implications for the radicalisation of individuals. This chapter reviews multiple definitions and theories relating to decision making to consider the applicability of these to online decision making in areas such as buying behaviour, social engineering, and radicalisation. Research investigating online decision making is outlined and the point is made that research examining online research has a different focus than research exploring online decision making. The chapter concludes with some key questions for scholars and practitioners. In particular, it is noted that online decision making cannot be explained by one single model, as none is sufficient in its own capacity to underpin all forms of online behaviour.


Author(s):  
Sarina Yusuf ◽  
Md. Salleh Hj. Hassan ◽  
Adamkolo Mohammed Mohammed Ibrahim

Previous studies have highlighted that the Internet offers various online opportunities to users, for example children, and that the Internet possesses great potential to boost their educational and provide health information. Scholars have emphasised the great utility of the Internet in successfully raising awareness regarding children online safety issues and enhancing social relationships. However, despite the positive effects of the Internet, it has negative effects as well. Nowadays, children and adolescent are increasingly using the Internet at younger ages, through diverse platforms and devices, and there have been rising concerns about children's safety online. The chapter investigated the level of cyberbullying among Malaysian children and discovered that the level of cyberbullying among Malaysian children is moderate. However, since the results of the study found majority of the children surveyed had experienced cyberbullying at least once, it therefore concludes that there is likelihood that cyberbullying could become a menace to the Malaysian child online.


2013 ◽  
Vol 3 (2) ◽  
pp. 58-70 ◽  
Author(s):  
B. Dawn Medlin

Due to the Internet and applications that can access the Internet, healthcare employees can benefit from the ability to view patient data almost anywhere and at any time. Data and information is also being shared among third party vendors, partners and supplies. With this type of accessibility of information which generally does include very personal information such as diagnosis and social security numbers, data can easily be obtained either through social engineering techniques or weak password usage. In this paper, a presentation of social engineering techniques is explored as well as the password practices of actual health care workers.


Author(s):  
Maria Yin Ling Fung ◽  
John Paynter

The increased use of the Internet and latest information technologies such as wireless computing is revolutionizing the healthcare industry by improving services and reducing costs. The advances in technology help to empower individuals to understand and take charge of their healthcare needs. Patients can participate in healthcare processes, such as diagnosis and treatment, through secure electronic communication services. Patients can search healthcare information over the Internet and interact with physicians. The same advances in technology have also heightened privacy awareness. Privacy concerns include healthcare Web sites that do not practice the privacy policies they preach, computer break-ins, insider and hacker attacks, temporary and careless employees, virus attacks, human errors, system design faults, and social engineering. This chapter looks at medical privacy issues and how they are handled in the U.S. and New Zealand. A sample of 20 New Zealand health Web sites was investigated.


2011 ◽  
pp. 1071-1101 ◽  
Author(s):  
Maria Yin Ling Fung

The increased use of the Internet and latest information technologies such as wireless computing is revolutionizing the healthcare industry by improving services and reducing costs. The advances in technology help to empower individuals to understand and take charge of their healthcare needs. Patients can participate in healthcare processes, such as diagnosis and treatment, through secure electronic communication services. Patients can search healthcare information over the Internet and interact with physicians. The same advances in technology have also heightened privacy awareness. Privacy concerns include healthcare Web sites that do not practice the privacy policies they preach, computer break-ins, insider and hacker attacks, temporary and careless employees, virus attacks, human errors, system design faults, and social engineering. This chapter looks at medical privacy issues and how they are handled in the U.S. and New Zealand. A sample of 20 New Zealand health Web sites was investigated.


2020 ◽  
Vol 11 (1) ◽  
pp. 9-13
Author(s):  
Alexa Osterman

Before humans inserted themselves into the aquatic food chain, sharks were at the top maintaining balance and playing a crucial role on this earth. For hundreds of millions of years (even before the dinosaurs!) sharks have been shaping our underwater ecosystem and creating a foundation for life in all parts of the sea. Now with 95% of shark populations decreasing everywhere our health and the planet's health is at major risk. Shark livers contain an oil so hydrating and rich all cosmetic that companies want to get their hands on it. This simple substance, also known as squalene, is found all around the world in the form of cosmetics (lotions, anti-wrinkle creams, sunscreen, foundations) and daily off the shelf supplements. With the serious lack of education about what’s in our cosmetics, it makes it scary to think that almost all of us have been absentmindedly plastering on prehistoric predators on our body in the name of beauty.


Sign in / Sign up

Export Citation Format

Share Document