-
A Conceptual Model for Holistic Classification of Insider
Authors:
Ikuesan Richard Adeyemi,
Shukor Abd Razak,
Mazleena Salleh
Abstract:
The process through which an insider to an organization can be described or classified is lined within the orthodox paradigm of classification in which an organization considers only subject with requisite employee criterion as an insider to that organization. This is further clouded with the relative rigidity in operational security policies being implemented in organizations. Establishing invest…
▽ More
The process through which an insider to an organization can be described or classified is lined within the orthodox paradigm of classification in which an organization considers only subject with requisite employee criterion as an insider to that organization. This is further clouded with the relative rigidity in operational security policies being implemented in organizations. Establishing investigation process in instances of misuse occurrence and or ascertaining the efficiency of staff member using such archaic paradigm is maligned with endless possibilities of uncertainties. This study, therefore, proposes a holistic model for which insider classification can be crystallized using the combination of qualitative research process and analysis of moment structure evaluation process. A full comprehension of this proposition could serve as a hinge through which insider misuse investigation can be thoroughly carried out. In addition, integrating this paradigm into existing operational security policies could serve as a metric upon which an organization can understand insider dynamics, in order to prevent misuses, and enhance staff management.
△ Less
Submitted 16 June, 2017;
originally announced June 2017.
-
Bio-Thentic Card: Authentication concept for RFID Card
Authors:
Ikuesan R. Adeyemi,
Norafida Bt Ithnin
Abstract:
Radio frequency identification (RFID) is a technology that employs basic identifier of an object embedded in a chip, transmitted via radio wave, for identification. An RFID Card responds to query or interrogation irrespective of "Who" holds the Card; like a key to a door. Since an attacker can possess the card, access to such object can therefore be easily compromised. This security breach is clas…
▽ More
Radio frequency identification (RFID) is a technology that employs basic identifier of an object embedded in a chip, transmitted via radio wave, for identification. An RFID Card responds to query or interrogation irrespective of "Who" holds the Card; like a key to a door. Since an attacker can possess the card, access to such object can therefore be easily compromised. This security breach is classified as an unauthorized use of Card, and it forms the bedrock for RFID Card compromise especially in access control. As an on-card authentication mechanism, this research proposed a concept termed Bio-Thentic Card, which can be adopted to prevent this single point of failure of RFID Card. The Bio-Thentic Card was fabricated, tested and assessed in line with the known threats, and attacks; and it was observed to proffer substantive solution to unauthorized use of RFID Card vulnerability
△ Less
Submitted 5 October, 2012;
originally announced October 2012.
-
Users Authentication and Privacy control of RFID Card
Authors:
Ikuesan R. Adeyemi,
Norafida Bt. Ithnin
Abstract:
Security and Privacy concerns in Radio frequency identification (RFID) technology particularly RFID Card, is a wide research area which have attracted researchers for over a decade. Authenticating users at the Card end of the RFID technology constitutes one of the major sources of attacks on the system. In this research, we studied the various known attacks and mitigation available. We proposed a…
▽ More
Security and Privacy concerns in Radio frequency identification (RFID) technology particularly RFID Card, is a wide research area which have attracted researchers for over a decade. Authenticating users at the Card end of the RFID technology constitutes one of the major sources of attacks on the system. In this research, we studied the various known attacks and mitigation available. We proposed a conceptual framework that that can be used to mitigate the unauthorized use of RFID Card. This concept will mitigate the single point of the RFID card failure: unauthorized use.
△ Less
Submitted 5 October, 2012;
originally announced October 2012.
-
Identifying critical features for network forensics investigation perspectives
Authors:
Ikuesan R. Adeyemi,
Shukor Abd Razak,
Nor Amira Nor Azhan
Abstract:
Research in the field of network forensics is gradually expanding with the propensity to fully accommodate the tenacity to help in adjudicating, curbing and apprehending the exponential growth of cyber crimes. However, investigating cyber crime differs, depending on the perspective of investigation. There is therefore the need for a comprehensive model, containing relevant critical features requir…
▽ More
Research in the field of network forensics is gradually expanding with the propensity to fully accommodate the tenacity to help in adjudicating, curbing and apprehending the exponential growth of cyber crimes. However, investigating cyber crime differs, depending on the perspective of investigation. There is therefore the need for a comprehensive model, containing relevant critical features required for a thorough investigation for each perspective, which can be adopted by investigators. This paper therefore presents the findings on the critical features for each perspective, as well as their characteristics. The paper also presents a review of existing frameworks on network forensics. Furthermore, the paper discussed an illustrative methodological process for each perspective encompassing the relevant critical features. These illustrations present a procedure for the thorough investigation in network forensics.
△ Less
Submitted 5 October, 2012;
originally announced October 2012.