Cybersecurity Threats for a Web Development |
Author : João Cunha |
Abstract | Full Text |
Abstract :With the increasing digitization of the world, web development has become an essential part of businesses and organizations worldwide. However, with the rapid development of technology, cyber threats and attacks have become a major concern for web developers. This article looks at some of the most common cybersecurity threats that web developers should be aware of, and the importance of taking preventative measures to secure web applications. By understanding these cyber threats and taking proactive steps to protect against them, web developers can ensure the security of their users data and maintain the integrity of their web applications. |
|
The Editorial of ARIS2 - Advanced Research on Information Security Volume 2, Edition 2 - December 2022 |
Author : Nuno Mateus-Coelho |
Abstract | Full Text |
Abstract :The globe continues to support an abnormal occurrence that has a severe influence on cyber security, which is the conflict between Russia and Ukraine that persists in establishing the first cyber war. This assistance comes as the year 2022 reaches its last range. Since the beginning of this fight, two enormous organizations have been formed in order to investigate potential weaknesses in the security measures used by either side. They exploit weaknesses and resort to force or engage in social engineering in order to achieve their goals. |
|
Post-Quantum Cryptography |
Author : Jose Pinto |
Abstract | Full Text |
Abstract :Cryptography is used broadly in the digital age, making our communications secure, ensuring our data is safe, and enabling secure transactions on which we rely daily. Our reality is connected, we send an email without thinking about all the underlying protocols, we buy online, and we check the weather on our fridge. Utilizations are countless and so is our exposure. Cryptographic systems keep us safe, a shield for our privacy and our fundamental rights. However, we have arrived at the dawn of a new age, the quantum computing era. Seen for a long as a theoretical emanation of quantum mechanics it gives the first baby steps in the real world, making the world as we know it less safe and more dangerous. Post-quantum cryptography is the paladin that is coming to the rescue but will it be up to the challenge of keeping our world safe. |
|
(In)Security in Wi-Fi networks: a systematic review |
Author : Diogo Faíscas |
Abstract | Full Text |
Abstract :Everyone wants to be connected to the internet at every second of their lives. Due to the ease and speed of access, Wi-Fi networks are the main internet connection point for users. The amount and coverage of Wi-Fi networks multiply each passing day, as all the countries are now trying to give free Wi-Fi at public places. If we search for available networks anywhere with our phone, there will be very few places where there are not at least one or two networks available. In this paper we will do a systematic review of papers and literature indexed in Google Scholar; Research Gate or IEEE and on reliable webpages like Cisco, that analyze the risk to which Wi-Fi networks are exposed and why these networks are insecure. We will especially investigate the most used wireless security protocols like WEP; WPA; WPA2 or WPA3. |
|
Can machine learning be used to detect malware |
Author : Andre Lima |
Abstract | Full Text |
Abstract :Nowadays everyone has one or even more than one smartphone or tablet. The existing applications with the most diverse purposes allow us to perform a series of tasks such as using home banking or checking the email, using only our smartphone/tablet. Android OS being one of the most used in this type of equipment becomes an appealing target for viruses, malware and others. At a time when technology is evolving faster and faster, both in terms of hardware and software, Artificial Intelligence has more and more weight in technological evolution, being used in the most diverse purposes. This review aims to demonstrate how Machine Learning can assist in identifying vulnerabilities in Android OS. |
|
Steganography and Computer Forensics - the art of hiding information: a systematic review |
Author : Claudia Sofia Fernandes |
Abstract | Full Text |
Abstract :This paper focuses on the study of steganoprahy as an anti-forensic method. The purpose of steganography techniques is to hide information from individuals unrelated to its content. Through a systematic review, the objectives of this article are: (I) explore and investigate the importance of steganography in computer forensics; (II) understand and analyze the methodology used to hide information in a file and (III) understand and analyze the methodology used to extract the information. The results summarize the previous research on this topics and we conclude the article with a warning to develpop more studies regarding this thematic as well as and make the security forces aware of this type of digital evidence and, in the same way that the methodology is being developed, the stegananalysis must also seek, at least, to reach the same technological level |
|
Web 3.0 and Cybersecurity – Short Paper |
Author : Sónia Silva |
Abstract | Full Text |
Abstract :The Web 3.0 ecosystem is growing exponentially, which also adds to the cybersecurity concerns it imposes. There is a continuous shift in the Internet architecture, from a read/write model to a newer model known as Web 3.0. Global companies are exploring Web 3.0 opportunities in their business processes. Along with opportunities, Web 3.0 poses several cybersecurity risks to organizations that need to be detected and mitigated efficiently. Data breaches, computer attacks, and social engineering defined the cybersecurity risk landscape of Web 2.0. This work aims to identify solutions to the problem between the evolution of Web 3.0 and companies to evolve their infrastructures promptly to ensure the privacy and security of their data |
|
Predicting Cybersecurity Risk - A Methodology for Assessments |
Author : Daniel Jorge Ferreira |
Abstract | Full Text |
Abstract :Defining an appropriate cybersecurity incident response model is a critical challenge that all companies face on a daily basis.
However, there is not always an adequate answer. This is due to the lack of predictive models based on data (evidence). There is a significant investment in research to identify the main factors that can cause such incidents, always trying to have the most appropriate response and, consequently, enhancing response capacity and success. At the same time, several different methodologies assess the risk management and maturity level of organizations. |
|
Case study to identify vulnerabilities in applications developed for the Android |
Author : Tatiani de Andrade |
Abstract | Full Text |
Abstract :The growing use of mobile devices has caused many developers to focus more on design and user experience, but with this neglected security issues, whether due to lack of knowledge in this field or lack of delivery time, thus exposing thousands of users to information leaks among other malicious actions. In this sense, this work aims to expose the main vulnerabilities that impact the security of a mobile application, going through analyzes in mobile applications, with the intention of alerting developers about the flaws that are usually present in the applications due to bad coding practices and to reflect on how to make your apps more secure. |
|