The Role of Quantum Computing in Software Forensics and Digital Evidence

Author(s):  
Sandeep Kumar Sharma ◽  
Mazhar Khaliq

Quantum computing has immense computational advantages. It escorts today's world of computing towards qubits universe of computing by the logical superposition technique. Various new technologies will come to reality with replacement of existing problem-solving methodology. The development of quantum computing imposes significant impact on cyber security and digital forensics technologies. Cybercrimes may be dramatically increased and malicious code will get ability to harm speedily. The quantum computing in software forensics methodology needs to develop in order to counter the challenges such as traceability of malicious code automation, sources of malicious code generation, intellectual property right theft issues, source code validation, plagiarism, breach of copyright issues, and an acquisition of digital evidence with quality and quantity with the wings of quantum forensics. This chapter aims to concentrate on the key issues of quantum computing approach in the field of software forensics with ontological aspects.

2020 ◽  
Vol 102 (913) ◽  
pp. 367-387
Author(s):  
Massimo Marelli

AbstractDigitalization and new technologies have an increasingly important role in today's humanitarian activities. As humanitarian organizations become more active in and reliant on new and digital technologies, they evolve from being simple bystanders to being fully fledged stakeholders in cyberspace, vulnerable to adverse cyber operations that could impact on their capacity to protect and assist people affected by armed conflict or other situations of violence.This shift makes it essential for humanitarian organizations to understand and properly map their resulting cyber perimeter. Humanitarian organizations can protect themselves and their activities by devising appropriate cyber strategies for the digital environment. Clearly defining the digital boundaries within which they carry out operations lays the groundwork for humanitarian organizations to develop a strategy to support and protect humanitarian action in the digital environment, channel available resources to where they are most needed, and understand the areas in which their operational dialogue and working modalities need to be adapted for cyberspace.The purpose of this article is to identify the unique problems facing international humanitarian organizations operating in cyberspace and to suggest ways to address them. More specifically, the article identifies the key elements that an international humanitarian organization should consider in developing a cyber security strategy. Throughout, the International Committee of the Red Cross and its specificities are used as an example to illustrate the problems identified and the possible ways to address them.


1998 ◽  
Vol 55 (spe) ◽  
pp. 79-82 ◽  
Author(s):  
P.T. Della Vecchia ◽  
C.A.R. da Silva ◽  
P. Terenciano-Sobrinho

Seed market is becoming global and globalization is growing very fast. To compete favourably in this new global seed world, quality and cost are and will be certanly the key issues. High seed quality can only be obtained by a thorough control of the entire seed production process, step by step from planning to final delivery. That requires science, technology, expertise, experience, good management and certanly, the most important, an absolute and unconditional commitment with quality. Seed testing for quality assurance is one important step in the process of production of high quality seed. In the late years a considerable amount of research has been published, particularly on the use of some Polymerase Chain Reaction DNA based new technologies (RAPD, microsatelites, AFLP) for genetic purity determinations in seed testing. As far as we know, no Brazilian seed company is using, on regular basis, RAPD or other molecular marker techniques in the determination of genetic purity in seed testing. Most of these are using morphological or physiological traits expressed by seed, seedling or mature plant and/or electrophoresis of seed or seedling proteins/isoenzymes for that purpose. Main reasons for that are: DNA molecular marker techniques are relatively new; lack of specialized personnel to run DNA molecular marker assays on routine basis; higher cost/sample when compared to proteins/isoenzymes electrophoresis.


Author(s):  
Paul Vanoostende ◽  
Etienne Vanzieleghem ◽  
Emmanuel Rousseau ◽  
Christian Massy ◽  
François Gérard
Keyword(s):  

Signals ◽  
2021 ◽  
Vol 2 (4) ◽  
pp. 803-819
Author(s):  
Nabin Chowdhury

As digital instrumentation in Nuclear Power Plants (NPPs) is becoming increasingly complex, both attack vectors and defensive strategies are evolving based on new technologies and vulnerabilities. Continued efforts have been made to develop a variety of measures for the cyber defense of these infrastructures, which often consist in adapting security measures previously developed for other critical infrastructure sectors according to the requirements of NPPs. That being said, due to the very recent development of these solutions, there is a lack of agreement or standardization when it comes to their adoption at an industrial level. To better understand the state of the art in NPP Cyber-Security (CS) measures, in this work, we conduct a Systematic Literature Review (SLR) to identify scientific papers discussing CS frameworks, standards, guidelines, best practices, and any additional CS protection measures for NPPs. From our literature analysis, it was evidenced that protecting the digital space in NPPs involves three main steps: (i) identification of critical digital assets; (ii) risk assessment and threat analysis; (iii) establishment of measures for NPP protection based on the defense-in-depth model. To ensure the CS protection of these infrastructures, a holistic defense-in-depth approach is suggested in order to avoid excessive granularity and lack of compatibility between different layers of protection. Additional research is needed to ensure that such a model is developed effectively and that it is based on the interdependencies of all security requirements of NPPs.


SEEU Review ◽  
2020 ◽  
Vol 15 (1) ◽  
pp. 71-85
Author(s):  
Adrian Besimi ◽  
Visar Shehu

Abstract In the last period, especially during the COVID-19 pandemics, individuals as well as institutions globally and in North Macedonia particularly, have failed to correctly respond to the new challenges related to cyber security, online attacks, and fake news. Being that in a state of isolation and quarantine most governmental institutions have heavily relied on online tools to communicate among each other and with the public, it is quite evident that they have not been well prepared to adopt new technologies. This paper aims to bridge together the needs for technology during the COVID-19 pandemics versus the security challenges that many forget to mention. The primary focus of this paper is to elaborate on the security challenges associated with technology with several examples from incidents around the world and from North Macedonia. As such, it represents a perspective paper with focus on current and emerging advances on IT security for running the “new normal” world.


2020 ◽  
Vol 60 (11) ◽  
pp. 16-20
Author(s):  
Vugar Hajimahmud Abdullayev ◽  
◽  
Vusala Alyag Abuzarova ◽  

The article is devoted to the study of cyber security problems in the Smart Cities system. The development of the IT industry has led to the introduction of new technologies into our lives. One of these technologies is the Internet of Things technology. The application of IoT technology has increased in recent years. One of the most important areas in which Internet of Things technology is applied is the Smart Cities system. The main difference between smart cities and other cities is that their components are connected to each other via the Internet. All these smart devices create a smart city system in general. One of the biggest and most important problems in many areas where the Internet is used is security. The article looks at possible security problems in the system of smart cities and solutions to ensure cyber security. Key words: Smart city; Internet of Things; Information technologies; Security; Cyber security


2008 ◽  
pp. 789-805
Author(s):  
Stephen A. Rains ◽  
Craig R. Scott

This chapter examines the technologies available to virtual teams and issues associated with training virtual teams. We first evaluate the benefits and limitations of technologies to aid communication and collaboration. We consider the merits and limitations of asynchronous and synchronous discussion tools, groupware and collaboration tools, and electronic meeting systems. We then offer three different levels of training possible for virtual teams and discuss some key issues associated with training. Each level of training varies in intensity and is dependent upon the nature of the assignment and team objectives. The chapter concludes with some predictions and recommendations about the future of new technologies and virtual teams in the educational setting. Throughout the chapter, special considerations are made for those virtual teams operating in the traditional classroom.


Author(s):  
Uma N. Dulhare ◽  
Shaik Rasool

Advanced Evidence is any data of probative quality that is either put away or transmitted in a double frame. In today's universe of propelling advances, more data is being produced, put away and appropriated by electronic means. This requires numerous offices to build the utilization of advanced proof social affair as a regular or standard instrument in their fight against violations. Computerized proof can be helpful in an extensive variety of criminal examinations. Numerous computerized gadgets productively track client action; it is likewise conceivable to recoup erased records, both of which may influence a criminal examination. Data is similar to the backbone for associations of all sizes, sorts and industry areas. It should be overseen and secured, and when there is a break or wrongdoing conferred including spilled or stolen data, the culprits must be recognized and indicted. Expanded Internet entrance has given exponential ascent in refined assaults on Information Technology framework. Keeping in mind the end goal to make our IT framework versatile against the dangers, there is a requirement for Cyber Security. Digital criminology, likewise called PC legal sciences or advanced legal sciences, is the procedure of extricating data and information from PCs to serve as computerized proof - for common purposes or, by and large, to demonstrate and lawfully indict cybercrime. PC crime scene investigation has as of late increased noteworthy Popularity with numerous nearby law authorization organizations. It is at present utilized in extortion, robbery, drug authorization and each other implementation action. Law implementation organizations confront another test in managing digital wrongdoings. Criminal acts are being perpetrated and the confirmation of these exercises is recorded in electronic structure. Also, wrongdoings are being dedicated in the internet. Proof in these violations is quite often recorded in computerized design. It is critical that PC security experts know about a percentage of the necessities of the lawful framework and comprehends the creating field of PC legal sciences. It will clarify why Digital Evidence is a vital part of any crime scene investigation examination and why strict approaches and methodology must exist to manage the administration of confirmation. Digital examination conventions offer specialists some assistance with gathering computerized proof in a forensically substantial manner. Computerized proof is “information that is made, controlled, put away or conveyed by any gadget, PC or PC framework or transmitted over a correspondence framework that is significant to the procedure.” The section will give a brief of how Digital confirmation starts from a large number of sources including seized PC hard-drives and reinforcement media, ongoing email messages, talk room logs, ISP records, site pages, advanced system activity, nearby and virtual databases, computerized catalogs, remote gadgets, memory cards, and computerized cameras. The advanced confirmation is not virtual exist, but rather there are some different components to search for, the computerized proof can be duplicated with boundless contrasts, can be altered effortlessly, difficult to be distinguished the first asset, can be incorporated information check, and can't be seen straightforwardly without specialized procedure. The trust value of this computerized information is a basic question that advanced scientific analysts must consider. For this reason, part “advanced proof” partitioned into seven classifications. This part gives the learning important to handle advanced confirmation in its numerous structures, to utilize this proof to construct a case, to manage the difficulties connected with this kind of confirmation and ways to deal with taking care of computerized proof put away and transmitted utilizing systems as a part of a way that is well on the way to be acknowledged by law. The section presents the procedure of distinguishing, saving, examining and displaying computerized proof in a way that is legitimately satisfactory. It will clarify why Digital Evidence is an imperative part of any crime scene investigation examination and why strict arrangements and techniques must exist to manage the administration of proof. The section will give a brief of how Digital confirmation starts from a huge number of sources including seized PC hard-drives. Further the part will contain order of computerized confirmations where Digital proof can be grouped, looked at, and individualized in a few ways. One of those courses is by the substance of the confirmation. The later Section in the part will contain how the advanced proofs are gathered, what techniques and apparatuses can be utilized to safeguard the computerized confirmations.


Author(s):  
Stephen A. Rains ◽  
Craig R. Scott

This chapter examines the technologies available to virtual teams and issues associated with training virtual teams. We first evaluate the benefits and limitations of technologies to aid communication and collaboration. We consider the merits and limitations of asynchronous and synchronous discussion tools, groupware and collaboration tools, and electronic meeting systems. We then offer three different levels of training possible for virtual teams and discuss some key issues associated with training. Each level of training varies in intensity and is dependent upon the nature of the assignment and team objectives. The chapter concludes with some predictions and recommendations about the future of new technologies and virtual teams in the educational setting. Throughout the chapter, special considerations are made for those virtual teams operating in the traditional classroom.


Sign in / Sign up

Export Citation Format

Share Document