Journal of Cybersecurity Research (JCR)
Latest Publications


TOTAL DOCUMENTS

8
(FIVE YEARS 0)

H-INDEX

1
(FIVE YEARS 0)

Published By Clute Institute

2471-2485

2018 ◽  
Vol 3 (1) ◽  
pp. 19-28
Author(s):  
Paul J. Morrow

This paper reviews cybersecurity and the new criminal procedure standards of searches and seizures based on the perspectives of probable cause in the digital age involving cell phones. Also, this paper examines the civil corporate policy perspectives involving data breaches as the topic relates to the consumer using social media and provides guidance for executives to enact proper and responsible corporate policies navigating the new cybersecurity landscape in the post - Carpenter vs. U.S. era. Reading this paper is worth your time because: (1) you will learn the new cybercrimes legal standards involved with cyber-privacy and the criminal process which is necessary to develop director competencies; (2) you will gain knowledge which is the key to proposing ethical systems within the corporation required by law; (3) moving forward, we are at a critical point in America and good guidance is vitally important.


2018 ◽  
Vol 3 (1) ◽  
pp. 1-12
Author(s):  
Georges Bell Bitjoka ◽  
Antoine Elang

According to studies conducted by researchers across the globe, in recent years there has been an increase in organization and company attacks. Some attacks have been detected, but others, however, were able to bypass the security mechanisms, taking advantage of an unknown vulnerability in security systems. In this context, Honeypots systems aim to collect information on the intruder’s activities and learn about threats and attackers’ behavior. Honeypots systems are not designed to remedy failures or security errors on the network, but are responsible for providing adequate information on potential attackers before compromising real systems. In this paper, a honeypot system was designed to study the techniques used by attackers. We designed and implemented a malware analysis laboratory based on honeypots technology in a controlled environment to analyze various security incidents. The use of honeypots is based on the idea of simulating applications with vulnerabilities and recording all events produced by attackers, so the network administrator can learn about the different types of attacks to protect organizational systems that are being produced. The results have been very important in terms of the number and types of security incidents recorded by the honeypots. Also, an administration interface for controlling and analyzing the gathered information was designed. This system was not only implemented but also tested for several weeks and data was collected from the attacks was analyzed.  This led to some interesting statistics and characteristics about attackers and their goals. 


2018 ◽  
Vol 3 (1) ◽  
pp. 13-18 ◽  
Author(s):  
Phillip R. Neely, Jr. ◽  
Michelle T. Allen

In order to police a crime there must be an act that is considered a crime and punishable under the law. There also must exist the capability to investigate for potential suspects and obtain physical or circumstantial evidence of the crime to be used in criminal proceedings. The act of gaining unauthorized access to a network system is a criminal act under federal law. Several key factors are presented during the course of this discussion and then built upon. Two methods of attack planning are presented. The attack planning cycle for traditional terrorist and then cyber terrorists planning used to penetrate a network system. Supervisory Control and Data Acquisition System (SCADA) are defined and presented as an important critical target within the nation’s infrastructure. Examples of successful attacks are presented. A brief overview is used to present malicious software and the effects of its use against SCADA systems. The path for which data takes through a network is explained. The importance of the data path is vital in understanding the five methods of attribution which serve as methods of investigating cyber terrorism.  


2017 ◽  
Vol 2 (1) ◽  
pp. 17-26
Author(s):  
Mohammad Dadashzadeh

This paper addresses the question of choosing/investing in IT (hardware/software) platforms that avoid quick obsolescence and the underlying dilemmas of choosing proprietary software versus open source software, and opting for managed services such as public cloud computing versus in-house hardware/communication infrastructures.  These dilemmas in strategic information systems planning have become more significant in light of the recent revelations of security backdoors in commercial software, encryption backdoors in communication software, and governmental access to private data on managed services for national security reasons.  This paper considers enterprise-wide challenges and strategies for adopting open source software/hardware in response to these security concerns.


2017 ◽  
Vol 2 (1) ◽  
pp. 13-16 ◽  
Author(s):  
Kimberly Pavlik

As cybercrime continues to evolve, legislation will continue to play a key role in the prosecution of individuals committing computer related offenses. The public has witnessed the rapid change in computer technology, continued popularity of social media, and increased e-commerce. With those changes comes an increase in computer crimes being committed. This article gives an overview of the evolution of cybercrime, and its influence on current legislation.


2017 ◽  
Vol 2 (1) ◽  
pp. 5-12
Author(s):  
Paul J. Morrow Sr

In Cyberspace, more and more, corporations with global holdings are seeking excellence in business around the world mostly by Internet. In order to do business, several legal and economic developments must be explored to assess the risks and practicalities involving the new legal issues created by cyberspace.  Compliance officers, because of their responsibilities to develop cybersecurity plans, need to understand the personal jurisdictional effects test and the subject matter test to assess risk of loss.  Jurisdiction as to what court or what administrative agency has authority to decide a particular case is critical to the success of a recovering party filing a lawsuit seeking damages for a cyberattack. The jurisdictional nuances analyzed in this paper offer a gradual development of the leading court and administrative cases for guidance on the issues. This paper is worth your time because: 1) it examines the inconsistent and obscure legal standards for jurisdiction in cyber space including cyberattacks, 2) it shows the places and methods used by both the Federal Trade Commission and the Courts having jurisdiction over cyberattack litigation, 3) it gives the recommendations for U.S. and international corporations on the subject of cyber jurisdiction. All of this is supported by current case law and journal articles involving cybersecurity to help minimize the mistakes that I have observed in the practice saving time and money. This is a new technology area of inquiry facing many corporate legal departments, and IT managers today. So, this paper involves the legal/business research necessary to give guidance regarding the jurisdictional boundaries of cyberattack litigation and ways to substantially reduce the risk of loss.


2017 ◽  
Vol 2 (1) ◽  
pp. 1-4
Author(s):  
Chris Rose

The Internet of Things connects various electronic devices and these can range from the expensive, such as cars or computers, to the mundane, such as toasters or light bulbs and this creates a major security problem. While attention is paid to the complex expensive items, the inexpensive items, although connected to the same network, are often overlooked. With a desperate race to produce more for less and to connect more items to the network, these inexpensive items are overlooked, never updated and in many cases, are downright dangerous when connected to a network and this makes the Internet insecure for everyone else.


2016 ◽  
Vol 1 (1) ◽  
pp. 1-6
Author(s):  
Harry Katzan

The effectiveness of modern computer applications is normally regarded as a function of five basic attributes of secure computer and information systems: availability, accuracy, authenticity, confidentiality, and integrity.  The concepts generally apply to government, business, education, and the ordinary lives of private individuals.  The considerations normally involve extended Internet applications – hence the name Cybersecurity.  Achieving and maintaining a secure cyberspace is a complicated process, and some of the concerns involve personal identity, privacy, intellectual property, the critical infrastructure, and the sustainability of organizations.  The threats to a secure operating infrastructure are serious and profound: cyber terrorism, cyber war, cyber espionage, and cyber crime, to which the technical community has responded with safeguards and procedures, usually supplied by the private sector.  This paper provides a comprehensive view of security in the cyber domain with the ultimate objective of developing a science of cybersecurity.


Sign in / Sign up

Export Citation Format

Share Document