scholarly journals Buffer Overflow

Author(s):  
Bhushan Waje ◽  
Vishal Belbase ◽  
Tauhid Chaudhari ◽  
Tej Rathi ◽  
Umesh Pawar

Buffer overflow is the most common type or form of cyber security vulnerability in the last ten years. Buffer over flow is the vulnerability of remote network penetration area vulnerabilities, where a hacker, Attacker or anonymous user can have the gain or control of a host. Buffer over flow vulnerability can be effectively be eliminated, the big part of the serious security threats would be removed. In this paper, we learn, what is buffer over flow vulnerability, what are the methodology, what are the steps to exploit the buffer over flow vulnerability.

Author(s):  
Shaveta Bhatia

 The epoch of the big data presents many opportunities for the development in the range of data science, biomedical research cyber security, and cloud computing. Nowadays the big data gained popularity.  It also invites many provocations and upshot in the security and privacy of the big data. There are various type of threats, attacks such as leakage of data, the third party tries to access, viruses and vulnerability that stand against the security of the big data. This paper will discuss about the security threats and their approximate method in the field of biomedical research, cyber security and cloud computing.


2017 ◽  
Vol 2 (3) ◽  
pp. 1
Author(s):  
Hanane Bennasar ◽  
Mohammad Essaaidi ◽  
Ahmed Bendahmane ◽  
Jalel Benothmane

Cloud computing cyber security is a subject that has been in top flight for a long period and even in near future. However, cloud computing permit to stock up a huge number of data in the cloud stockage, and allow the user to pay per utilization from anywhere via any terminal equipment. Among the major issues related to Cloud Computing security, we can mention data security, denial of service attacks, confidentiality, availability, and data integrity. This paper is dedicated to a taxonomic classification study of cloud computing cyber-security. With the main objective to identify the main challenges and issues in this field, the different approaches and solutions proposed to address them and the open problems that need to be addressed.


Author(s):  
Chris Reeves ◽  
Geoff Davis ◽  
David D. Ward ◽  
Tim Edwards ◽  
Alastair R. Ruddle

2020 ◽  
Vol 8 (2) ◽  
pp. 264-266
Author(s):  
Zhe Liu ◽  
Kim-Kwang Raymond Choo ◽  
Weiqiang Liu ◽  
Muhammad Khurram Khan

2020 ◽  
pp. 53-60
Author(s):  
Mohammed I. Alghamdi ◽  

Our economy, infrastructure and societies rely to a large extent on information technology and computer networks solutions. Increasing dependency on information technologies has also multiplied the potential hazards of cyber-attacks. The prime goal of this study is to critically examine how the sufficient knowledge of cyber security threats plays a vital role in detection of any intrusion in simple networks and preventing the attacks. The study has evaluated various literatures and peer reviewed articles to examine the findings obtained by consolidating the outcomes of different studies and present the final findings into a simplified solution.


2019 ◽  
Vol 214 ◽  
pp. 07016 ◽  
Author(s):  
Tian Yan ◽  
Shan Zeng ◽  
Mengyao Qi ◽  
Qingbao Hu ◽  
Fazhi Qi

To improve hardware utilization and save manpower in system maintenance, most of the web services in IHEP have been migrated to a private cloud build upon OpenStack. However, cyber security attacks becomes a serious threats to the cloud progressively. Therefore, a cyber security detection and monitoring system is deployed for this cloud platform. This system collects various security related logs as data sources, and processes them in a framework composed of open source data store, analysis and visualization tools. With this system, security incidents and events can be handled in time and rapid response can be taken to protect cloud platform against cyber security threats.


2021 ◽  
Vol 6 (1) ◽  
pp. 72-82
Author(s):  
Faiz Iman Djufri ◽  
Charles Lim

Cyber Security is an interchange between attackers and defenders, a non-static balancing force. The increasing trend of novel security threats and security incidents, which does not seem to be stopping, prompts the need to add another line of security defences. This is because the risk management and risk detection has become virtually impossible due to the limited access towards user data and the variations of modern threat taxonomies. The traditional strategy of self-discovery and signature detection which has a static nature is now obsolete in facing threats of the new generation with a dynamic nature; threats which are resilient, complex, and evasive. Therefore, this thesis discusses the use of MISP and The Triad Investigation approach to share the Indicator of Compromise on Cyber Intelligence Sharing Platform to be able to address the newt threats.


2021 ◽  
Vol 3 (6) ◽  
pp. 12-25
Author(s):  
Rahmah Ahmad H. Osman ◽  
Luqman Zakariyah ◽  
Habeebullah Zakariyah ◽  
Abdul Rahman Ahmad Dahlan

Man has experienced a tremendous advancement in his way of communication due to the technological breakthrough which reached the apex in recent years. Specifically, the importance of social media has become significant as it spans several spectrums of human life. Thus, cybersecurity is becoming an issue of paramount importance since the amount of information and technology available in cyberspace is skyrocketing. This study was an attempt to present the Maqasidic analysis of the benefits derived from the use of Facebook use as a social media platform, as well as the security threats facing cyber users while using the application. Using the Maqasid al-Shariah (The higher objectives of Islam) as the basis, the researcher found that Facebook users derive certain benefits from their Facebook use, and this assists them to achieve Maqasid al-Shariah’s higher objectives. Nevertheless, human beings are faced with certain security threats which hamper their achievements of these Maqasid higher objectives. The researchers then proposed some guidelines and principles by which cybersecurity can be best achieved through the Maqasid al-Shariah.


Sign in / Sign up

Export Citation Format

Share Document