cyber criminals
Recently Published Documents


TOTAL DOCUMENTS

97
(FIVE YEARS 41)

H-INDEX

5
(FIVE YEARS 1)

Significance This, coupled with interdependencies among cloud services and growing sophistication of cyber criminals, is driving improvement in the operational resiliency of cloud services. While cloud computing at present is more reliable than not, the fact that cloud outages with a global impact still occur about a dozen times each year exposes continuing gaps, even among top providers. Impacts The black market for cybercrime related to cloud services will proliferate. A targeted attack against cloud infrastructure by a state-linked cyber actor would cause wide-ranging disruption. Large cloud services providers are likely to dominate the global market since they can lower costs while financing innovation.


Keyword(s):  

Headline INT: REvil hackers' fate will deter cyber criminals


Author(s):  
Jiqiang ZHAI ◽  
Pan CHEN ◽  
Xiao XU ◽  
Hailu YANG

The current forensic research on heaps mainly extracts information from the heap of Linux and the NT heap of Windows. However, the study of how to extract the information on the segment heap in the Windows 10 from dump files is not sufficient. To reproduce the internal information on the segment heap, this paper proposes a method for locating and extracting the internal information on the segment heap in the Windows 10 according to the field offset in the vtype description information of memory object. The method uses the pool scanning technology to locate the process object, obtains the starting position of the process heap and scans the process heap according to the structural information on the process object and the process environment block object. Then it locates the position of the segment heap with its feature values, thereby extracting its internal information. Based on the analysis results, five forensic plugins for extracting the information on the segment heap were developed on the Volatility framework. The experimental results show that this method can effectively extract the information on the address of each segment heap and its internal components in the memory and on the size of committed memory, etc. The information can help investigators to analyze the digital traces left in the memory by cyber criminals or cyber attackers.


2021 ◽  
Vol 13 (4) ◽  
pp. 77-87
Author(s):  
Maja Baretić ◽  
Nikola Protrka

The term “health information technology” (health IT) refers to the electronic systems that store, share, analyze, and protect electronic health records. It includes also electronic prescribing, knowledge sharing, patient support tools, and mobile health technology together with decision-making algorithms. The privacy, security, and ethics of health information are priority for both patients and healthcare providers. The health IT is a target for cyber-criminals; stolen health information, or blackmailing via different kind of cryptolockers, is good on the black market. While the healthcare industry relies more on technology, cyber-attacks are threatening health IT. This article argues health IT issues from two perspectives. The first one is a physician's point of view aiming to improve quality of care using fast and accurate health IT. The second is the standpoint of cyber-security specialists aiming to protect data form cyber-criminals, continually developing new strategies and best practices.


Author(s):  
Abhay Patil

Abstract: A VPN association camouflages your information traffic on the web and shields it from outside access. The decoded information can be seen by any individual who has network access and needs to see it. With a VPN, programmers and cyber criminals can't bypass this information. The proposed paper portrays the methodology of the working of Virtual Private Network-to-network associations along with its different types based on the deployments. The encryption is discussed which are essentially required during the creation of the safe passaging/tunnelling. Keywords: VPN, ISP, VPDN, Tunnelling, Authentication


Author(s):  
Shivankur Thapliyal ◽  
Renu Bahuguna

Cyber and Information Security are one of the most concernable and challenging issues of today’s strengthen Information age. Cyber attackers and Cyber intruders performs and accomplished a very highly powerful and potential Cyber threat in our most sensitive Cyber Space and threaten our Cyber Security. So the need of the hour is that we have some robust and vigorous Cyber Security algorithms which protects our Cyber Space against these cyber Intruders or Cyber Criminals. Because many algorithms, which are currently runs to protect Cyber Space and responsible for potential data encryption and decryption mechanisms during sensitive transactions of data are worked very slow in manner and consume a large size of memory bandwidth and contains a very expensive computational cost and as the technological advancements in our Cyber Space, Cyber Intruder and Cyber Criminal achieved a very high skills mechanisms to breach the securities bridge of that algorithms, and some algorithms which contains a very typical and complex structure taking a lot of time to perform the mechanisms of desired security tasks and very costly rich for computations. So we design two Cyber Security algorithms models, which also contains a very complex and typical structure but never consume a lot of computation power and as well as memory and also contains a least cost for performing computations, these both two algorithms are a fusion of multiple ciphers and some control mechanisms, which are technically very strong as well as redirect to optimality. Randomization are the main theme point of first algorithm that’s why for Cyber Intruders and Cyber Criminals are very hard to find the actual pattern of data or to accomplished any Cyber Attacks. The detailed mechanisms of these algorithms are covers in the next upcoming sections of this research paper.


ITNOW ◽  
2021 ◽  
Vol 63 (3) ◽  
pp. 41-43
Author(s):  
Dionysios Demetis

Abstract How and why do cyber criminals hide their money's source? Dr Dionysios Demetis, Senior Lecturer in Management Systems at Hull University, explains.


Author(s):  
Asma Rashid ◽  
Anum Yar Khan ◽  
Syed Wasif Azim

The world has shifted to a digital landscape in the recent decade with both its perks and underlying threats. Russia, throughout history has experimented with its information along with cyber channels and have been able to generate fruitful results that are manifested in the contemporary era. Russian expertise towards merging cyber domain into its military capabilities is praiseworthy to the point that its Western adversaries, despite the fact being economically and technologically advanced compared to Russia, have not been able to effectively counter Russian aggression. This research examines the essentiality of cyber security as a mere software or cyber command can create instability and drastic consequences requiring millions for clean-up by examining Russian cyber-attacks on Estonia, Georgia, Ukraine, US and Western Europe and concludes that the first steps towards Cyber and Information Warfare have been made, it is now to be made sure this does not escalate into a Cyber Arms Race. The research recommends that cyber security should be treated as an international issue with rules established for cyber governance and databases identifying cyber criminals and the software used by them or can be used by them and requires cooperation rather than competition amongst states particularly global superpowers.


Author(s):  
Hassan Adeyoola

as the growth and popularity of technology has become simultaneous ascend in both impacts and numbers of cyber criminals thanks to the web. For many years, the organization has strived in ways of preventing any attacks from cyber-criminal with advanced techniques. Cybercriminals and intruders are developing a more advanced way to breach the security surface of an organization. Advanced Persistent Threats are also known as APT are new and a lot more sophisticated version for multistep attack scenarios that are known and are targeted just to achieve a goal most commonly undercover activities. this report, there will cover everything I know that tells us about APT with more word and brief explanations


Sign in / Sign up

Export Citation Format

Share Document