• Title/Summary/Keyword: Website Security

Search Result 105, Processing Time 0.02 seconds

Fine Grained Security in Cloud with Cryptographic Access Control

  • Aparna Manikonda;Nalini N
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.7
    • /
    • pp.123-127
    • /
    • 2024
  • Cloud computing services has gained increasing popularity in recent years for supporting various on demand and scalable services for IT consumers where there is a need of less investment towards infrastructure. While storage architecture of cloud enjoys a more robust and fault-tolerant cloud computing network, such architecture also poses a number of security challenges especially when applied in applications related to social networks, Financial transactions, etc. First, as data are stored and maintained by individual virtual machines so Cloud resources are prone to hijacked. Such attacks allow attackers to create, modify and delete machine images, and change administrative passwords and settings successfully. hence, it is significantly harder to ensure data security. Second, Due to dynamic and shared nature of the Cloud, data may be compromised in many ways. Last but not least, Service hijacking may lead to redirect client to an illegitimate website. User accounts and service instances could in turn make a new base for attackers. To address the above challenges, we propose in this paper a distributed data access control scheme that is able to fulfil fine-grained access control over cloud data and is resilient against strong attacks such as compromise and user colluding. The proposed framework exploits a novel cryptographic primitive called attribute-based encryption (ABE), tailors, and adapts it for cloud computing with respect to security requirements

A Study on Security, Interaction and Navigation Functionality for Customer Trust on Line - focus on internet bookshops -

  • Deng Hua;Kim Chang-Eun
    • Journal of the Korea Safety Management & Science
    • /
    • v.7 no.4
    • /
    • pp.193-206
    • /
    • 2005
  • In recent years, electronic commerce has provided another access for consumers to purchase products. Shopping on line provides much information and less searching cost for customers, but some researches have pointed out that there are difficulties for companies to do business on web. For lack of trust, many people not prefer purchasing through virtual channels. Based on the literature review, this study aims at empirically testing the impact of website design on individual trust in internet firms. From statistic analysis, we will conclude that security, interaction, and navigation functionality will affect on-line trust. The result of this study may provide some managerial implications, especially for firms which want to enter on-line businesses.

Using SQLMAP to Detect SQLI Vulnerabilities

  • Almadhy, Waad;Alruwaili, Amal;Hendaoui, Saloua
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.1
    • /
    • pp.234-240
    • /
    • 2022
  • One of the most discussed topics is cyber security when it comes to web application and how to protect it and protect databases. One of the most widely used and widespread techniques is SQLI, and it is used by hackers and hackers. In this research, we touched on the concept of SQLI and what are its different types, and then we detected a SQLI vulnerability in a website using SQLMAP. Finally, we mentioned different ways to avoid and protect against SQLI.

Website Evaluation Framework Development Using Usability (Usability 중심의 웹사이트 평가 프레임워크 개발)

  • 이수열;박종현;윤명환
    • Proceedings of the Korean Society for Emotion and Sensibility Conference
    • /
    • 2003.11a
    • /
    • pp.1221-1222
    • /
    • 2003
  • 본 연구는 Usability 중심의 웹사이트 평가를 위한 프레임워크 모델의 구축을 목표로 한다. 이를 위해 기존에 구축된 웹사이트 평가 방법론을 분석하여 평가 요소 별 중요도를 설정하였다. 비교 분석을 통해 나온 문제점들을 기초로 웹사이트평가를 위한 평가요인(Critical Factor)을 선정하여 새로운 프레임워크 모델 $C^3$ISP(Contents, Community, Commerce, Interface, Security, Performance)를 제시하였다. 향후 연구과제로는 프레임워크의 유용성을 분석하기 위한 Running Test를 실시한다.

  • PDF

Security Analysis on the Implementation Vulnerabilities of I-PIN (주민등록번호 대체수단에 대한 구현 취약점 분석)

  • Choi, Youn-Sung;Lee, Yun-Ho;Kim, Seung-Joo;Won, Dong-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.2
    • /
    • pp.145-185
    • /
    • 2007
  • A resident registration number is used to confirm and prove his/her identity in a government/non-governmental agency. It is a essential requirement to become the registered member on internet website in Korea. It is serious problem that the resident registration number and name are outflowed in internet and misused by others. So the MIC(Ministry of Information and Communication) in Korea plans and operates the identification system using I-PIN that integrate 5 alternative methods of resident registration number. In this paper, we analyze the problem about the method of 5 I-PIN services and show the security analysis on the implementation vulnerabilities of I-PIN services. we also analyze 17 websites that provides identification system using I-PIN. Finally, we analyze the overall problem of I-PIN service and propose the countermeasure about the problem.

Electric Vehicle Circulating Parking System (전기차 순환 주차 시스템)

  • Sang-Hoon Han;Ji-Yun Lee;Seok-Bin Yoon;Seung-Min Hong;Won-Bin Im
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2024.01a
    • /
    • pp.485-488
    • /
    • 2024
  • 본 논문에서는 전기차 시장의 성장 및 수요 증가로 인한 충전 인프라 부족에 대한 문제를 해소하기 위한 방안으로, 센서를 활용한 각 자리별 빈 주차 자리 확인 기능과 전기차 충전 자리의 남은 대기 시간에 대한 정보를 실시간 모니터링 할 수 있는 시스템을 구현하였다. 기존의 LED 표시등의 정보를 웹사이트를 통해 시각적으로 전달하며, 실시간으로 주차 여유 공간과 전기차 충전 자리의 대기 시간을 확인할 수 있게 하였다. 더불어 발레 파킹 서비스와의 융합을 통해 충전 완료 후 차량 이동의 불편함 및 인프라 운영의 효율을 늘리는 방안을 제안해본다.

  • PDF

An Empirical Study of Intention of Usage of Health Information on the Internet: Comparison by Gender (인터넷에서 건강정보 이용의도에 대한 실증 연구: 성별에 따른 비교)

  • Lim, Se-Hun;Lee, Sung-Ho;Kim, Dae-Kil
    • Journal of Information Technology Services
    • /
    • v.10 no.3
    • /
    • pp.77-94
    • /
    • 2011
  • Since the general quality of life has been improving, people have become interested in "well-being." The widespread acceptance of the importance of "well-being" to quality of life has encouraged people to take more interest in getting health information online when they need it. Expansive use of online health information suggests that individual characteristics (i.e., gender and other traits), Website features, and perceived trust are related to the primary concern for many online health information consumers. This study examines whether familiarity, perceived security, and reputation of health information on various Websites influence the relationship of trust and intention to use by gender. These research results will contribute to the adoption of online health information by gender and, moreover, will provide companies with an understanding of key characteristics of consumers who use emoticons and provide useful implications for marketing strategies to current and future consumers.

Towards a Deep Analysis of High School Students' Outcomes

  • Barila, Adina;Danubianu, Mirela;Paraschiv, Andrei Marcel
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.6
    • /
    • pp.71-76
    • /
    • 2021
  • Education is one of the pillars of sustainable development. For this reason, the discovery of useful information in its process of adaptation to new challenges is treated with care. This paper aims to present the initiation of a process of exploring the data collected from the results obtained by Romanian students at the BBaccalaureate (the Romanian high school graduation) exam, through data mining methods, in order to try an in-depth analysis to find and remedy some of the causes that lead to unsatisfactory results. Specifically, a set of public data was collected from the website of the Ministry of Education, on which several classification methods were tested in order to find the most efficient modeling algorithm. It is the first time that this type of data is subjected to such interests.

Phishing Email Detection Using Machine Learning Techniques

  • Alammar, Meaad;Badawi, Maria Altaib
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.5
    • /
    • pp.277-283
    • /
    • 2022
  • Email phishing has become very prevalent especially now that most of our dealings have become technical. The victim receives a message that looks as if it was sent from a known party and the attack is carried out through a fake cookie that includes a phishing program or through links connected to fake websites, in both cases the goal is to install malicious software on the user's device or direct him to a fake website. Today it is difficult to deploy robust cybersecurity solutions without relying heavily on machine learning algorithms. This research seeks to detect phishing emails using high-accuracy machine learning techniques. using the WEKA tool with data preprocessing we create a proposed methodology to detect emails phishing. outperformed random forest algorithm on Naïve Bayes algorithms by accuracy of 99.03 %.

Electronic Questionnaire of Organizational Citizenship, Job Satisfaction and Their Relationship to Performance Quality for Physical Education Teachers in the Western Region - KSA

  • Hesham Sayed Ahmed Abdalfatah
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.2
    • /
    • pp.227-236
    • /
    • 2023
  • The research aims to identify the degree of the organizational citizenship, satisfaction and performance quality of the teachers and relationship between organizational citizenship, job satisfaction and performance quality for physical education teachers . The researcher used the descriptive method, The participants were (195) teachers. The researcher conducted the research main study in the period from 05/12/2022 to 30/12/2022 use the website to distribute and collect the questionnaire: https://www.surveymonkey.com. The researcher used the computer in the statistical processing, using the SPSS statistical program, and the following methods: Mean, SD, percentages, Correlation Coefficient, Alpha Cronbach coefficient, differences Indicator using chi2 . Conclusions: There is high degree of organizational citizenship behavior practices, job satisfaction and performance quality for some teachers at the schools. Recommendation the importance of enhancing the organizational citizenship behavior in schools, according to the positive effects of these behaviors on the individual and group performances.