Analysis of the Conditions of Experimental Evaluation Security of Applied Computer Process
Pavlo Khusainov,
Serhii Shtanenko
Issue:
Volume 11, Issue 3, June 2022
Pages:
35-38
Received:
22 April 2022
Accepted:
6 May 2022
Published:
26 May 2022
DOI:
10.11648/j.ijiis.20221103.11
Downloads:
Views:
Abstract: The need to ensure the effective operation of entities of the National Cyber Security System stipulate the urgency of developing a scientific and methodological apparatus for rapid response to cyber incidents (cyberattacks). The fundamental impossibility of achieving algorithmic and information completeness of cyber defense equipment anticipates the implementation of a process to support the decision-making of the operational staff of cybersecurity. Another factor of decision uncertainty is the lack of a priori data to identify the magnitude of the damage from the effects of the cyber incident. The latter is due to the fact that the description of a cyber incident consists of a set of signs of detection of a possible (potential) cyberattack, but the amount of damage cannot be reliably known instantly. Determining the amount of damage at the moment of detecting a cyberattack can be done using security proof models of information security theory, based on the subject-object representation of the object of cybersecurity. The use of these models requires knowledge of the probability of protection against the imposition of unforeseen execution for applied computing processes of all types in the object of cyber security. The proposition is to evaluate the reliability from influence on the applied computational process in the form of an experiment. The experiment allows obtaining the most complete image of the possibilities and features of the use of typical vulnerabilities of the software implementation of the target computational process. The organization of the experiment is to establish the fact of the execution of an active code from the composition of special code combinations in input data. The result of the experiment: a description of the code combination of input data (subsets of possible combinations) the processing of which led to the execution of the active payload; the average time of the experiment with the target computing process before the transfer of control to the active payload. The article is devoted to the presentation of the results of the analysis of conditions that must be taken into account when organizing an experimental assessment of the possibility of influence on the applied computational process.
Abstract: The need to ensure the effective operation of entities of the National Cyber Security System stipulate the urgency of developing a scientific and methodological apparatus for rapid response to cyber incidents (cyberattacks). The fundamental impossibility of achieving algorithmic and information completeness of cyber defense equipment anticipates th...
Show More
Transnational Flow of Personal Data in Home and Office Devices
Robert Walters,
Sinta Dewi Rosadi
Issue:
Volume 11, Issue 3, June 2022
Pages:
39-50
Received:
18 May 2022
Accepted:
9 June 2022
Published:
18 July 2022
DOI:
10.11648/j.ijiis.20221103.12
Downloads:
Views:
Abstract: The world is embracing Artificial Intelligence (AI) at a rapid rate, and over the forthcoming decade it is likely to pervade the daily lives of everybody. Countries are developing, embracing and adopting AI at varying rates, some more rapidly than others. On the one hand, the application of AI in managing the smart home infrastructure will pave the way for personal data to be gathered from the automated devices. It will be that advanced, the technology will be able to predict user behaviour, provide maintenance data, help enhance data security and privacy. This can be achieved, by connecting devices throughout the homes by many different devices. Nonetheless, as people begin to adopt new technology in the home, or otherwise known as Smart Home technology (robots, televisions, fridges, toys etc.), the access to personal data will be on an unprecedented level. Conversely, the privacy intrusions may out-weigh the benefits of the technology. Apart from the social and economic benefits that AI will bring into the home, it will have it downsides. There is an emerging debate as to the safety of personal data, and privacy from these devices. In other words, what has emerged is the notion of dataveillance or behavioural data that, is able to detect and store specific data on and individual, enabling others to learn intimate knowledge of actions, moods and expression, amongst others. Arguably, some of the most vulnerable cohorts will be children, the disabled and elderly, from the use of this technology, and the personal data that entities are able to capture, and subsequently use for financial gain. Furthermore, problematic is the development of ‘behavioural data’. Behavioural data, has the ability to create significant bias based on race, ethnicity, religion, disability and language. Put another way, behavioural data has many similarities to dataveillance. This paper will briefly highlight how transnational data flows from the devices have the potential to create and restrict competition. The paper further confirms that a recent study in 2021, demonstrated that as this economic activity (data flows) grows there are increasing security concerns and issues that expose personal and commercial data. Further research is needed to reconcile the law with the technology, to ensure data flows are providing their intended economic benefits, with that of protecting the personal data captured and used by in home and office devices.
Abstract: The world is embracing Artificial Intelligence (AI) at a rapid rate, and over the forthcoming decade it is likely to pervade the daily lives of everybody. Countries are developing, embracing and adopting AI at varying rates, some more rapidly than others. On the one hand, the application of AI in managing the smart home infrastructure will pave the...
Show More