What exactly is Security Assurance?

If you are a regular reader of Cybersecurity Magazine, you may have come across Security Assurance before. In this article, we take a look at what is behind this abstract term and why it is so important.
Security assurance is an umbrella term for several processes aimed at ensuring individual system components can adequately protect themselves from attacks. Doing so requires not just a one-time effort, but actually spans the complete system lifecycle. After all, what is considered an acceptable security posture may change over time depending on, for example, newly emerging threats or changes to how the system itself is utilized.

Read more

A Secure Trust-aware Cross-layer Routing Protocol for Vehicular Ad hoc Networks

VANETs currently represent one of the most prominent solutions that aim to reduce the number of road accident victims and congestion problems while improving the quality of driving. VANETs form a very dynamic open network in which vehicles exchange information and warnings about road situations and other traffic information through several routing protocols, without any intermediate control.

Read more

A Boosted Performances of NTRUencrypt Post-Quantum Cryptosystem

Abstract: The bottleneck of all cryptosystems is the difficulty of the computational complexity of the polynomials multiplication, vectors multiplication, etc. Thus most of them use some algorithms to reduce the complexity of the multiplication like NTT, Montgomery, CRT, and Karatsuba algorithms, etc. We contribute by creating a new release of NTRUencrypt1024 with great improvement, by using our own polynomials multiplication algorithm operate in the ring of the form Rq=Zq[X]/(XN+1), combined to Montgomery algorithm rather than using the NTT algorithm as used by the original version.

Read more

Evaluating and Improving a Content Delivery Network (CDN) Workflow using Stochastic Modelling

Abstract: Content Delivery Networks (CDN) are the backbone of Internet. A lot of research has been done to make CDNs more reliable. Despite that, the world has suffered from CDN inefficiencies quite a few times, not just due to external hacking attempts but due to internal failures as well. In this research work the authors have analyzed the performance of a content delivery network through various reliability measures.

Read more

TPA Auditing to Enhance the Privacy and Security in Cloud Systems

Over the last decade, many enterprises around the world migrating from traditional infrastructure to cloud resources in order to cut down operational and capital expenditure. With cloud computing, huge amount of data transactions is communicated between cloud consumers and cloud service providers. However, this cloud computing enables surplus security challenges associated to unauthorized access and data breaches. We proposed in this paper a trusted third-party auditor (TPA) model which uses lightweight cryptographic system and lightweight hashing technique to ensure data security and data integrity to audit the cloud users outsourced data from cloud service providers.

Read more

DDOS Detection on Internet of Things Using Unsupervised Algorithms

The increase in the deployment of IOT networks has improved productivity of humans and organisations. However, IOT networks are increasingly becoming platforms for launching DDOS attacks due to inherent weaker security and resource-constrained nature of IOT devices. This paper focusses on detecting DDOS attack in IOT networks by classifying incoming network packets on the transport layer as either “Suspicious” or “Benign” using unsupervised machine learning algorithms.

Read more

A Lightweight Security Scheme (LSS) for Wireless Node Communication for Border Surveillance System

The physical breach across the borders is a very common issue these days among nations sharing boundaries. It is controlled via proper border surveillance system. The border surveillance system is trivially a physical border intrusion detection system in which CCTV cameras are used traditionally to observe manually the presence of some intruder. Instead, we utilize the raspberry PI controller board based wireless sensor nodes fitted with raspberry PI camera for identifying the intruder.

Read more

Time Lag-Based Modelling for Software Vulnerability Exploitation Process

With the increase in the discovery of vulnerabilities, the expected exploits occurred in various software platform has shown an increased growth with respect to time. Only after being discovered, the potential vulnerabilities might be exploited. There exists a finite time lag in the exploitation process; from the moment the hackers get information about the discovery of a vulnerability and the time required in the final exploitation.

Read more

Exploring The Correlation between Cyber Security Awareness, Protection Measures and the State of Victimhood: The Case Study of Ambo University’s Academic Staffs

Abstract: The advancement of information communication technology has triggered a revolution in using the Internet for legitimate educational purposes on university campuses. Therefore, the Internet has changed the way of human communication and contributed to the development of mankind. On the other hand it is regrettable that its revolution has helped malicious users to exploit it for the malign purpose to commit a cyberspace crime that has in turn negatively affected fellow users who were preyed on by cyber predators. This work aimed to examine the awareness of cybersecurity, the measures taken to protect against cyberattacks and the state of victimization among professors at Ambo University.

Read more