This document discusses how proper engineering processes and life cycle management are important for cybersecurity operations and penetration testing. Rushing innovation undermines security foundations. Effective engineering adds security even after implementation. Current computer systems fail to manage risks properly by focusing on reactive tasks over preventative planning and maintenance. Proper risk management, personnel training, and system design are needed to avoid systemic failure. Behavioral monitoring and integrity checks can help address issues if given resources. Legacy systems may be outdated but have long usage histories that aid detection. Management must adapt approaches to succeed in securing systems.
Top cited managing information technology articlesIJMIT JOURNAL
The International Journal of Managing Information Technology (IJMIT) is a quarterly open access peer-reviewed journal that publishes articles that contribute new results in all areas of the strategic application of information technology (IT) in organizations. The journal focuses on innovative ideas and best practices in using IT to advance organizations – for-profit, non-profit, and governmental.
For more course tutorials visit
www.tutorialrank.com
CSEC 610 Project 1 Information Systems and Identity Management
CSEC 610 Project 2 Operating Systems Vulnerabilities (Windows and Linux)
CSEC 610 Project 3 Assessing Information System Vulnerabilities and Risk
An Overview of Information Systems Security Measures in Zimbabwean Small and ...researchinventy
This paper reports on the Information Systems (IS) securitymeasures implemented by small and medium size enterprises (SMEs) in Zimbabwe. A survey questionnaire was distributed to 32 randomly selected participants in order to investigate the security measures and practices in their respective organisations. The results indicated that over 50% of the respondents had installed firewalls, while more than 80% carried out regular software updates and none of the respondents had intrusion detection systems. The researchers recommended that SMEs work to enhance their knowledge on the different IS threats in order to enable the implementation of preventive measures.
The Information Disruption Industry and the Operational Environment of the Fu...Vincent O'Neil
Executive Summary:
Use of everyday technology to collect personal data is increasing, and as these efforts become more intrusive, popular resentment is likely to grow.
If that irritation reaches a tipping point, existing privacy protection services will expand enormously—creating an Information Disruption Industry (IDI) dedicated to thwarting the collection, storage, and sale of personal data.
The expanded IDI’s efforts will do direct and indirect damage to a wide range of systems—even systems unrelated to personal data collection.
This likely scenario has the potential to seriously impact the information landscape in 2035, if not sooner.
End of Summary
I presented the paper in a webinar hosted by the Mad Scientist Initiative and Georgetown University on May 10, 2020. The complete webinar can be viewed at:
https://www.youtube.com/watch?v=j2-cjW1cmrQ&t=75s
Top cited managing information technology articlesIJMIT JOURNAL
The International Journal of Managing Information Technology (IJMIT) is a quarterly open access peer-reviewed journal that publishes articles that contribute new results in all areas of the strategic application of information technology (IT) in organizations. The journal focuses on innovative ideas and best practices in using IT to advance organizations – for-profit, non-profit, and governmental.
For more course tutorials visit
www.tutorialrank.com
CSEC 610 Project 1 Information Systems and Identity Management
CSEC 610 Project 2 Operating Systems Vulnerabilities (Windows and Linux)
CSEC 610 Project 3 Assessing Information System Vulnerabilities and Risk
An Overview of Information Systems Security Measures in Zimbabwean Small and ...researchinventy
This paper reports on the Information Systems (IS) securitymeasures implemented by small and medium size enterprises (SMEs) in Zimbabwe. A survey questionnaire was distributed to 32 randomly selected participants in order to investigate the security measures and practices in their respective organisations. The results indicated that over 50% of the respondents had installed firewalls, while more than 80% carried out regular software updates and none of the respondents had intrusion detection systems. The researchers recommended that SMEs work to enhance their knowledge on the different IS threats in order to enable the implementation of preventive measures.
The Information Disruption Industry and the Operational Environment of the Fu...Vincent O'Neil
Executive Summary:
Use of everyday technology to collect personal data is increasing, and as these efforts become more intrusive, popular resentment is likely to grow.
If that irritation reaches a tipping point, existing privacy protection services will expand enormously—creating an Information Disruption Industry (IDI) dedicated to thwarting the collection, storage, and sale of personal data.
The expanded IDI’s efforts will do direct and indirect damage to a wide range of systems—even systems unrelated to personal data collection.
This likely scenario has the potential to seriously impact the information landscape in 2035, if not sooner.
End of Summary
I presented the paper in a webinar hosted by the Mad Scientist Initiative and Georgetown University on May 10, 2020. The complete webinar can be viewed at:
https://www.youtube.com/watch?v=j2-cjW1cmrQ&t=75s
Security Testing for Testing ProfessionalsTechWell
Today’s software applications are often security-critical, making security testing an essential part of a software quality program. Unfortunately, most testers have not been taught how to effectively test the security of the software applications they validate. Join Jeff Payne as he shares what you need to know to integrate effective security testing into your everyday software testing activities. Learn how software vulnerabilities are introduced into code and exploited by hackers. Discover how to define and validate security requirements. Explore effective test techniques for assuring that common security features are tested. Learn about the most common security vulnerabilities and how to identify key security risks within applications and use testing to mitigate them. Understand how to security test applications—both web- and GUI-based—during the software development process. Review examples of how common security testing tools work and assist the security testing process. Take home valuable tools and techniques for effectively testing the security of your applications going forward.
Attacks on the enterprise are getting increasingly sophisticated. Current solutions available do not seem to be adequate given the innovativeness, precision and persistence of these attacks in different forms and of different dimensions. Organisations thus want to increase the sophistication of their employees and also of the solutions to be deployed given this backdrop.
Security Testing for Testing ProfessionalsTechWell
Today’s software applications are often security-critical, making security testing an essential part of a software quality program. Unfortunately, most testers have not been taught how to effectively test the security of the software applications they validate. Join Jeff Payne as he shares what you need to know to integrate effective security testing into your everyday software testing activities. Learn how software vulnerabilities are introduced into code and exploited by hackers. Discover how to define and validate security requirements. Explore effective test techniques for assuring that common security features are tested. Learn about the most common security vulnerabilities and how to identify key security risks within applications and use testing to mitigate them. Understand how to security test applications—both web- and GUI-based—during the software development process. Review examples of how common security testing tools work and assist the security testing process. Take home valuable tools and techniques for effectively testing the security of your applications going forward.
This Paper is Submitted to Fulfill The English 2 Task Study Program Software Engineering 4th Semester Buddhi Dharma University. Tangerang. Lecturer: Dra. Harisa Mardiana, M.Pd.
An analysis of software aging in cloud environment IJECEIAES
Cloud computing is the environment in which several virtual machines (VM) run concurrently on physical machines. The cloud computing infrastructure hosts multiple cloud services that communicate with each other using the interfaces. During operation, the software systems accumulate errors or garbage that leads to system failure and other hazardous consequences. This status is called software aging. Software aging happens because of memory fragmentation, resource consumption in large scale and accumulation of numerical error. Software aging degrads the performance that may result in system failure. This happens because of premature resource exhaustion. The errors that cause software agings are of special types and target the response time and its environment. This issue is to be resolved only during run time as it occurs because of the dynamic nature of the problem. To alleviate the impact of software aging, software rejuvenation technique is being used. Rejuvenation process reboots the system or reinitiates the softwares. Software rejuvenation removes accumulated error conditions, frees up deadlocks and defragments operating system resources like memory. Software aging and rejuvenation has generated a lot of research interest recently. This work reviews some of the research works related to detection of software aging and identifies research gaps.
EMPLOYEE TRUST BASED INDUSTRIAL DEVICE DEPLOYMENT AND INITIAL KEY ESTABLISHMENTIJNSA Journal
An efficient key management system is required to support cryptography. Most key management systems use either pre-installed shared keys or install initial security parameters using out-of-band channels. These methods create an additional burden for engineers who manage the devices in industrial plants. Hence, device deployment in industrial plants becomes a challenging task in order to achieve security. In this work, we present a device deployment framework that can support key management using the existing trust towards employees in a plant. This approach reduces the access to initial security parameters by employees; rather it helps to bind the trust of the employee with device commissioning. Thus, this approach
presents a unique solution to the device deployment problem. Further, through a proof-of-concept implementation and security analysis using the AVISPA tool, we present that our framework is feasible to implement and satisfies our security objectives.
An efficient key management system is required to support cryptography. Most key management systems use either pre-installed shared keys or install initial security parameters using out-of-band channels. These methods create an additional burden for engineers who manage the devices in industrial plants. Hence, device deployment in industrial plants becomes a challenging task in order to achieve security. In this work, we present a device deployment framework that can support key management using the existing trust towards employees in a plant. This approach reduces the access to initial security parameters by employees; rather it helps to bind the trust of the employee with device commissioning. Thus, this approach presents a unique solution to the device deployment problem. Further, through a proof-of-concept implementation and security analysis using the AVISPA tool, we present that our framework is feasible to implement and satisfies our security objectives.
This paper discusses the question of optimizing security decisions in an organization, based on the information provided by the technical security infrastructure.
For more course tutorials visit
www.tutorialrank.com
CYB 610 Project 1 Information Systems and Identity Management
CYB 610 Project 2 Operating Systems Vulnerabilities (Windows and Linux)
CYB 610 Project 3 Assessing Information System Vulnerabilities and Risk
• ERP security
• ICS security assessment
• Protection of payment applications, remote banking systems, ATMs • Cloud technologies and virtualization systems
• Detection of zero-day vulnerabilities and prevention of APT attacks • Use of Big Data in information security
• Analysis of source code and the SAST/DAST/IAST technologies
• Complex protection of web applications and portals
• Mobile platform and application security
Security Testing for Testing ProfessionalsTechWell
Today’s software applications are often security-critical, making security testing an essential part of a software quality program. Unfortunately, most testers have not been taught how to effectively test the security of the software applications they validate. Join Jeff Payne as he shares what you need to know to integrate effective security testing into your everyday software testing activities. Learn how software vulnerabilities are introduced into code and exploited by hackers. Discover how to define and validate security requirements. Explore effective test techniques for assuring that common security features are tested. Learn about the most common security vulnerabilities and how to identify key security risks within applications and use testing to mitigate them. Understand how to security test applications—both web- and GUI-based—during the software development process. Review examples of how common security testing tools work and assist the security testing process. Take home valuable tools and techniques for effectively testing the security of your applications going forward.
Attacks on the enterprise are getting increasingly sophisticated. Current solutions available do not seem to be adequate given the innovativeness, precision and persistence of these attacks in different forms and of different dimensions. Organisations thus want to increase the sophistication of their employees and also of the solutions to be deployed given this backdrop.
Security Testing for Testing ProfessionalsTechWell
Today’s software applications are often security-critical, making security testing an essential part of a software quality program. Unfortunately, most testers have not been taught how to effectively test the security of the software applications they validate. Join Jeff Payne as he shares what you need to know to integrate effective security testing into your everyday software testing activities. Learn how software vulnerabilities are introduced into code and exploited by hackers. Discover how to define and validate security requirements. Explore effective test techniques for assuring that common security features are tested. Learn about the most common security vulnerabilities and how to identify key security risks within applications and use testing to mitigate them. Understand how to security test applications—both web- and GUI-based—during the software development process. Review examples of how common security testing tools work and assist the security testing process. Take home valuable tools and techniques for effectively testing the security of your applications going forward.
This Paper is Submitted to Fulfill The English 2 Task Study Program Software Engineering 4th Semester Buddhi Dharma University. Tangerang. Lecturer: Dra. Harisa Mardiana, M.Pd.
An analysis of software aging in cloud environment IJECEIAES
Cloud computing is the environment in which several virtual machines (VM) run concurrently on physical machines. The cloud computing infrastructure hosts multiple cloud services that communicate with each other using the interfaces. During operation, the software systems accumulate errors or garbage that leads to system failure and other hazardous consequences. This status is called software aging. Software aging happens because of memory fragmentation, resource consumption in large scale and accumulation of numerical error. Software aging degrads the performance that may result in system failure. This happens because of premature resource exhaustion. The errors that cause software agings are of special types and target the response time and its environment. This issue is to be resolved only during run time as it occurs because of the dynamic nature of the problem. To alleviate the impact of software aging, software rejuvenation technique is being used. Rejuvenation process reboots the system or reinitiates the softwares. Software rejuvenation removes accumulated error conditions, frees up deadlocks and defragments operating system resources like memory. Software aging and rejuvenation has generated a lot of research interest recently. This work reviews some of the research works related to detection of software aging and identifies research gaps.
EMPLOYEE TRUST BASED INDUSTRIAL DEVICE DEPLOYMENT AND INITIAL KEY ESTABLISHMENTIJNSA Journal
An efficient key management system is required to support cryptography. Most key management systems use either pre-installed shared keys or install initial security parameters using out-of-band channels. These methods create an additional burden for engineers who manage the devices in industrial plants. Hence, device deployment in industrial plants becomes a challenging task in order to achieve security. In this work, we present a device deployment framework that can support key management using the existing trust towards employees in a plant. This approach reduces the access to initial security parameters by employees; rather it helps to bind the trust of the employee with device commissioning. Thus, this approach
presents a unique solution to the device deployment problem. Further, through a proof-of-concept implementation and security analysis using the AVISPA tool, we present that our framework is feasible to implement and satisfies our security objectives.
An efficient key management system is required to support cryptography. Most key management systems use either pre-installed shared keys or install initial security parameters using out-of-band channels. These methods create an additional burden for engineers who manage the devices in industrial plants. Hence, device deployment in industrial plants becomes a challenging task in order to achieve security. In this work, we present a device deployment framework that can support key management using the existing trust towards employees in a plant. This approach reduces the access to initial security parameters by employees; rather it helps to bind the trust of the employee with device commissioning. Thus, this approach presents a unique solution to the device deployment problem. Further, through a proof-of-concept implementation and security analysis using the AVISPA tool, we present that our framework is feasible to implement and satisfies our security objectives.
This paper discusses the question of optimizing security decisions in an organization, based on the information provided by the technical security infrastructure.
For more course tutorials visit
www.tutorialrank.com
CYB 610 Project 1 Information Systems and Identity Management
CYB 610 Project 2 Operating Systems Vulnerabilities (Windows and Linux)
CYB 610 Project 3 Assessing Information System Vulnerabilities and Risk
• ERP security
• ICS security assessment
• Protection of payment applications, remote banking systems, ATMs • Cloud technologies and virtualization systems
• Detection of zero-day vulnerabilities and prevention of APT attacks • Use of Big Data in information security
• Analysis of source code and the SAST/DAST/IAST technologies
• Complex protection of web applications and portals
• Mobile platform and application security
How Test Labs Reduce Cyber Security Threats to Industrial Control Systemse cy...Schneider Electric
Federal agencies are moving their industrial control systems (ICS) from operational business networks to separate, dedicated networks in order to enhance security. However, without a system to test the new equipment and software coming into these separate networks, security risks will persist. This paper explores the impact on security of instituting a sanctioned ICS test lab and recommends best practices for setting up and operating these labs.
Operational technology threats in developing countries and possible solutionFaysal Ghauri
My first paper on Cybersecurity, especially to Operational Technology and the challenges in developing countries although I have found similar challenges in the developed countries as well. This paper has been published by the International Journal of Computer Science and Information Security (IJCSIS) in April 2021, Vol. 19 No. 4 Publication.
This article will look at common mistakes that organizations make on the path to achieving vulnerability management perfection, both in process and technology areas.
The Quality “Logs”-Jam: Why Alerting for Cybersecurity is Awash with False Po...Mark Underwood
What happens when the (Observe) Plan-Do-Check-Adjust cycle is undermined by lapses in data integrity? Observations are questioned. Plans may be ill-conceived. Actions may be undertaken that undermine rather than enhance. “Checks” can fail. Adjustments may be guesswork. In cybersecurity, the results of poor data integrity can be expensive outages, ransom requests, breaches, fines -- even bankruptcy (think Cambridge Analytica). But data integrity issues take many forms, ranging from benign to malicious. The full range of these issues is surveyed from a cybersecurity perspective, where logs and alerts are critical for defenders -- as well as quality engineers . Techniques borrowed from model-based systems engineering and ontology AI to are identified that can mitigate these deleterious effects on PDCA.
COMMONALITY AND DIVERSITY OF OPERATING SYSTEMS .docxmccormicknadine86
COMMONALITY AND DIVERSITY OF OPERATING SYSTEMS 2
Maintaining a strong security system in the networking environment to prevent any form of attack and compromise information has been a formidable problem in recent times. There is fairly a small number of operating systems compared to the vast number of computer systems that are in operation. This situation has created a leeway for cyber attackers to target the systems easily (Palmer, 2010). Cyber attackers have formulated diverse techniques to exploit the homogeneity of the network environment. This article will explore the benefits related to diversity and commonality in the event of a malicious attack.
The purpose of any security strategy is to completely eliminate or at least limit the impact of damage to a successful attack on a particular system. At some point, any computer can be vulnerable to malware attacks, and the most important aspect in a case like this is to achieve an optimum level of preparedness. Diversity of the operating systems is beneficial in several ways, though an organization could incur an extra operational cost. Moving some groups of users to various different operating systems helps avert the overall damage caused by the SQL Slammer and MSBlast worms. Malicious-code attacks directed towards the commonly used operating system, windows, have been so rampant, thereby necessitating the need for improved security procedures of the computers (Anderson & Anderson, 2010).
Significant operational damages have been incurred before by businesses and enterprise to extensive downtime, brought about by malware attacks. Adopting diversity in operating systems comes along with several security benefits;
· Helps contain malicious-code attacks- Virus and worm attacks target and exploit the flaws in windows operating systems. In a case like this, availing an alternative operating system would be critical in helping to contain the spread to other PCs owned by the business. The impact of the attack is leveled down since some core business can be carried out in the event of an attack.
· Directing some pressure towards Microsoft- Health competition among service and commodity provider is beneficial for the consumers. Being diversified in terms of operating systems pushes dominant companies like Microsoft to try so hard to meet the security needs of their customers.
· It helps speed up innovations in the sense that other operating system developers will work towards improving their operating systems to match that of the windows. Such innovations include stable security systems that prevent malware from instilling too much damage to the computer system.
Exercising commonality in the usage of operating systems comes with its own benefits, too, especially when dealing with a malicious attack. The business would not incur too much cost, in the event of a ...
Will factory cybersecurity keep up with the accelerating IoT.docxVirha Tiku
The next thing the world's cyber attackers target may be factory security. With the spread of IoT, factories are also changing to an environment connected to the outside world. What is the current state of factory cybersecurity? Here are some examples and countermeasures.
The ability to work in a team is one of the most frequently requested soft skills in job advertisements today. But in practice, this quality is sometimes neglected – which can ultimately lead to a dispute over competence because everyone wants to maintain and represent their position. Alpha versus alpha – or IT versus OT in production companies – often still seems to be part of the order of the day. But this is no longer a contemporary approach because the increasing professionalization of cybercriminals requires a unified approach from both departments.
MULTIMODAL COURSE DESIGN AND IMPLEMENTATION USING LEML AND LMS FOR INSTRUCTIO...IJMIT JOURNAL
Traditionally, teaching has been centered around classroom delivery. However, the onslaught of the
COVID-19 pandemic has cultivated usage of technology, teaching, and learning methodologies for course
delivery. We investigate and describe different modes of course delivery that maintain the integrity of
teaching and learning. This paper answers to the research questions: 1) What course delivery method our
academic institutions use and why? 2) How can instructors validate the guidelines of the institutions? 3)
How courses should be taught to provide student learning outcomes? Using the Learning Environment
Modeling Language (LEML), we investigate the design and implementation of courses for delivery in the
following environments: face-to-face, online synchronous, asynchronous, hybrid, and hyflex. A good
course design and implementation are key components of instructional alignment. Furthermore, we
demonstrate how to design, implement, and deliver courses in synchronous, asynchronous, and hybrid
modes and describe our proposed enhancements to LEML.
Novel R&D Capabilities as a Response to ESG Risks-Lessons From Amazon’s Fusio...IJMIT JOURNAL
Environmental, Social, and Governance (ESG) management is essential for transforming corporate
financial performance-oriented business strategies into Finance (F) + ESG optimization strategies to
achieve the Sustainable Development Goals (SDGs).
In this trend, the rise of ESG risks has divided firms into two categories. Former incorporates a growthmindset that creates a passion for learning, and urges it to improve itself by endeavoring Research and
development (R&D) -driven challenges, while the other category, characterized by risk aversion, avoids
challenging highly uncertain R&D activities and seeks more manageable endeavors.
This duality underscores the complexity of corporate R&D strategies in addressing ESG risks and
necessitates the development of novel R&D capabilities for corporate R&D transformation strategies
towards F + ESG optimization.
International Journal of Managing Information Technology (IJMIT) ** WJCI IndexedIJMIT JOURNAL
The International Journal of Managing Information Technology (IJMIT) is a quarterly open access peer-reviewed journal that publishes articles that contribute new results in all areas of the strategic application of information technology (IT) in organizations. The journal focuses on innovative ideas and best practices in using IT to advance organizations – for-profit, non-profit, and governmental. The goal of this journal is to bring together researchers and practitioners from academia, government, and industry to focus on understanding both how to use IT to support the strategy and goals of the organization and to employ IT in new ways to foster greater collaboration, communication, and information sharing both within the organization and with its stakeholders. The International Journal of Managing Information Technology seeks to establish new collaborations, new best practices, and new theories in these areas.
International Journal of Managing Information Technology (IJMIT) ** WJCI IndexedIJMIT JOURNAL
The International Journal of Managing Information Technology (IJMIT) is a quarterly open access peer-reviewed journal that publishes articles that contribute new results in all areas of the strategic application of information technology (IT) in organizations. The journal focuses on innovative ideas and best practices in using IT to advance organizations – for-profit, non-profit, and governmental. The goal of this journal is to bring together researchers and practitioners from academia, government, and industry to focus on understanding both how to use IT to support the strategy and goals of the organization and to employ IT in new ways to foster greater collaboration, communication, and information sharing both within the organization and with its stakeholders. The International Journal of Managing Information Technology seeks to establish new collaborations, new best practices, and new theories in these areas.
NOVEL R & D CAPABILITIES AS A RESPONSE TO ESG RISKS- LESSONS FROM AMAZON’S FU...IJMIT JOURNAL
Environmental, Social, and Governance (ESG) management is essential for transforming corporate
financial performance-oriented business strategies into Finance (F) + ESG optimization strategies to
achieve the Sustainable Development Goals (SDGs).
In this trend, the rise of ESG risks has divided firms into two categories. Former incorporates a growthmindset that creates a passion for learning, and urges it to improve itself by endeavoring Research and
development (R&D) -driven challenges, while the other category, characterized by risk aversion, avoids
challenging highly uncertain R&D activities and seeks more manageable endeavors.
This duality underscores the complexity of corporate R&D strategies in addressing ESG risks and
necessitates the development of novel R&D capabilities for corporate R&D transformation strategies
towards F + ESG optimization.
Building on this premise, this paper conducts an empirical analysis, utilizing reliable firms data on ESG
risk and brand value, with a focus on 100 global R&D leader firms. It analyzes R&D and actions for ESG
risk mitigation, and assesses the development of new functions that fulfill F + ESG optimization through
R&D. The analysis also highlights the significance of network externality effects, with a specific focus on
Amazon, a leading R&D company, providing insights into the direction for transforming R&D strategies
towards F + ESG optimization.
The dynamics of stakeholder engagement in F + ESG optimization are indicated with the example of
amazon's activities. Through the analysis, it became evident that Amazon's capacity encompassing growth
and scalability, specifically its ability to grow and expand, is accelerating high-level research and
development by gaining the trust of stakeholders in the "synergy through R&D-driven ESG risk
mitigation."
Finally, as examples of these initiatives, the paper discussed the Climate Pledge led by Amazon and the
transformation of Japan's management system.
A REVIEW OF STOCK TREND PREDICTION WITH COMBINATION OF EFFECTIVE MULTI TECHNI...IJMIT JOURNAL
It is important for investors to understand stock trends and market conditions before trading stocks. Both
these capabilities are very important for an investor in order to obtain maximized profit and minimized
losses. Without this capability, investors will suffer losses due to their ignorance regarding stock trends
and market conditions. Technical analysis helps to understand stock prices behavior with regards to past
trends, the signals given by indicators and the major turning points of the market price. This paper reviews
the stock trend predictions with a combination of the effective multi technical indicator strategy to increase
investment performance by taking into account the global performance and the proposed combination of
effective multi technical indicator strategy model.
INTRUSION DETECTION SYSTEM USING CUSTOMIZED RULES FOR SNORTIJMIT JOURNAL
These days the security provided by the computer systems is a big issue as it always has the threats of
cyber-attacks like IP address spoofing, Denial of Service (DOS), token impersonation, etc. The security
provided by the blue team operations tends to be costly if done in large firms as a large number of systems
need to be protected against these attacks. This leads these firms to turn to less costly security
configurations like IDS Suricata and IDS Snort. The main theme of the project is to improve the services
provided by Snort which is a tool used in creating a vague defense against cyber-attacks like DDOS
attacks which are done on both physical and network layers. These attacks in turn result in loss of
extremely important data. The rules defined in this project will result in monitoring traffic, analyzing it,
and taking appropriate action to not only stop the attack but also locate its source IP address. This whole
process uses different tools other than Snort like Wireshark, Wazuh and Splunk. The product of this will
result in not only the detection of the attack but also the source IP address of the machine on which the
attack is initiated and completed. The end product of this research will result in sets of default rules for the
Snort tool which will not only be able to provide better security than its previous versions but also be able
to provide the user with the IP address of the attacker or the person conducting the attack. The system
involves the integration of Wazuh with Snort tool in order to make it more efficient than IDS Suricata
which is another intrusion detection system capable of detecting all these types of attacks as mentioned.
Splunk is another tool used in this project which increases the firewall efficiency to pass the no. of bits to
be scanned and the no. of bits scanned successfully. Wazuh is used in this system as it is the best choice for
traffic monitoring and incident response than any other of its alternatives in the market. Since this system
is used in firms which are known to handle big amounts of data and for this purpose, we use Splunk tool as
it is very efficient in handling big amounts of data. Wireshark is used in this system in order to give the IDS
automation in its capability to capture and report the malicious packets found during the network scan. All
of this gives the IDS a capability of a low budget automated threat detection system. This paper gives
complete guidelines for authors submitting papers for the AIRCC Journals.
Artificial Intelligence (AI) has rapidly become a critical technology for businesses seeking to improve
efficiency and profitability. One area where AI is proving particularly impactful is in service operations
management, where it is used to create AI-powered service operations (AIServiceOps) that deliver highvalue services to customers. AIServiceOps involve the use of AI to automate and optimize various business
processes, such as customer service, sales, marketing, and supply chain management. The rapid
development of Artificial Intelligence has prompted many changes in the field of Information Technology
(IT) Service Operations. IT Service Operations are driven by AI, i.e., AIServiceOps. AI has empowered
new vitality and addressed many challenges in IT Service Operations. However, there is a literature gap on
the Business Value Impact of Artificial intelligence (AI) Powered IT Service Operations. It can help IT
build optimized business resilience by creating value in complex and ever-changing environments as
product organizations move faster than IT can handle. So, this research paper examines how AIServiceOps
creates business value and sustainability, basically how AIServiceOps makes the IT staff liberation from a
low-level, repetitive workout and traditional IT practices for a continuously optimized process. One of the
research objectives is to compare Traditional IT Service Operations with AIServiceOPs. This paper
provides the basis for how enterprises can evaluate AIServiceOps and consider it a digital transformation
tool. The paper presents a case study of a company that implemented AI-powered service operations
(AIServiceOps) and analyzes the resulting business outcomes. The study shows that AIServiceOps can
significantly improve service delivery, reduce response times, and increase customer satisfaction.
Furthermore, it demonstrates how AIServiceOps can deliver substantial cost savings, such as reducing
labor costs and minimizing downtime.
MEDIATING AND MODERATING FACTORS AFFECTING READINESS TO IOT APPLICATIONS: THE...IJMIT JOURNAL
Although IOT seems to be the upcoming trend, it is still in its infancy; especially in the banking industry.
There is a clear gap in literature, as only few studies identify factors affecting readiness to IOT
applications in banks in general, and almost negligible investigations on mediating and moderating
factors. Accordingly, this research aims to investigate the main factors that affect employees’ readiness to
IOT applications, while highlighting the mediating and moderating factors in the Egyptian banking sector.
The importance of Egypt stems from its high population and steady steps taken towards technology
adoption. 479 valid questionnaires were distributed over HR employees in banks. Data collected was
statistically analysed using Regression and SEM. Results showed a significant impact of ‘Security’,
‘Networking’, ‘Software Development’ and ‘Regulations’ on ‘readiness to IOT applications. Thus, the
readiness acceptance level is high‘Security’ and ‘User Intention’ were proven to mediate the relationship
between research variables and readiness to IOT applications, and only a partial moderation role was
proven for ‘Efficiency’. The study contributes to increasing literature on IOT applications in general, and
fills a gap on the Egyptian banking context in particular. Finally, it provides decision makers at banks with
useful guidelines on how to optimally promote IOT applications among employees.
EFFECTIVELY CONNECT ACQUIRED TECHNOLOGY TO INNOVATION OVER A LONG PERIODIJMIT JOURNAL
IT (Information and Communication Technology) companies are facing the dilemma of decreasing
productivity despite increasing research and development efforts. M&A (Merger and Acquisition) is being
considered as a breakthrough solution. From existing research, it has been pointed out that M&A leads to
the emergence of new innovations. Purpose of this study was to discuss the efficient ways of acquisition and
to resolve the dilemma of productivity decline by clarifying how the technology obtained through M&A
leads to the creation of new innovations. Hypothesis 1 was that the technology acquired through M&A is
utilized for innovation creation, Hypothesis 2 was that the acquired technology is utilized over a long
period of time, and Hypothesis 3 was that a long-term utilization has a positive impact on corporate
performance. The results, using sports prosthetics as a case study and using patents as a proxy variable,
confirmed all the hypotheses set. We have revealed that long-term utilization of technology obtained
through M&A is effective for creating new innovations.
International Journal of Managing Information Technology (IJMIT) ** WJCI IndexedIJMIT JOURNAL
The International Journal of Managing Information Technology (IJMIT) is a quarterly open access peer-reviewed journal that publishes articles that contribute new results in all areas of the strategic application of information technology (IT) in organizations. The journal focuses on innovative ideas and best practices in using IT to advance organizations – for-profit, non-profit, and governmental. The goal of this journal is to bring together researchers and practitioners from academia, government, and industry to focus on understanding both how to use IT to support the strategy and goals of the organization and to employ IT in new ways to foster greater collaboration, communication, and information sharing both within the organization and with its stakeholders. The International Journal of Managing Information Technology seeks to establish new collaborations, new best practices, and new theories in these areas.
Authors are solicited to contribute to the journal by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the areas of information technology and management
4th International Conference on Cloud, Big Data and IoT (CBIoT 2023)IJMIT JOURNAL
4th International Conference on Cloud, Big Data and IoT (CBIoT 2023) will act as a major forum for the presentation of innovative ideas, approaches, developments, and research projects in the areas of Cloud, Big Data and IoT. It will also serve to facilitate the exchange of information between researchers and industry professionals to discuss the latest issues and advancement in the area of Cloud, Big Data and IoT.
Authors are solicited to contribute to the conference by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in Cloud, Big Data and IoT.
TRANSFORMING SERVICE OPERATIONS WITH AI: A CASE FOR BUSINESS VALUEIJMIT JOURNAL
Artificial Intelligence (AI) has rapidly become a critical technology for businesses seeking to improve
efficiency and profitability. One area where AI is proving particularly impactful is in service operations
management, where it is used to create AI-powered service operations (AIServiceOps) that deliver highvalue services to customers. AIServiceOps involve the use of AI to automate and optimize various business
processes, such as customer service, sales, marketing, and supply chain management. The rapid
development of Artificial Intelligence has prompted many changes in the field of Information Technology
(IT) Service Operations. IT Service Operations are driven by AI, i.e., AIServiceOps. AI has empowered
new vitality and addressed many challenges in IT Service Operations. However, there is a literature gap on
the Business Value Impact of Artificial intelligence (AI) Powered IT Service Operations. It can help IT
build optimized business resilience by creating value in complex and ever-changing environments as
product organizations move faster than IT can handle. So, this research paper examines how AIServiceOps
creates business value and sustainability, basically how AIServiceOps makes the IT staff liberation from a
low-level, repetitive workout and traditional IT practices for a continuously optimized process. One of the
research objectives is to compare Traditional IT Service Operations with AIServiceOPs. This paper
provides the basis for how enterprises can evaluate AIServiceOps and consider it a digital transformation
tool. The paper presents a case study of a company that implemented AI-powered service operations
(AIServiceOps) and analyzes the resulting business outcomes. The study shows that AIServiceOps can
significantly improve service delivery, reduce response times, and increase customer satisfaction.
Furthermore, it demonstrates how AIServiceOps can deliver substantial cost savings, such as reducing
labor costs and minimizing downtime.
DESIGNING A FRAMEWORK FOR ENHANCING THE ONLINE KNOWLEDGE-SHARING BEHAVIOR OF ...IJMIT JOURNAL
The main objective of this paper is to identify the factors that influence academic staff's digital knowledgesharing behaviors in Ethiopian higher education. A structural equation model was used to validate the
research framework using survey data from 210 respondents. The collected data has been analyzed using
Smart PLS software. The results of the study show that trust, self-motivation, and altruism are positively
related to attitude. Contrary to our expectations, knowledge technology negatively affects attitude.
However, reward systems and empowerment by leaders are significantly associated with knowledgesharing intentions.Knowledge-sharing intention, in turn, was significantly related to digital knowledgesharing behavior. The contributions of this study are twofold. The framework may serve as a roadmap for
future researchers and managers considering their strategy to enhance digital knowledge sharing in HEI.
The findings will benefit academic staff and university administrations.The study will also help academic
staff enhance their knowledge-sharing practices.
BUILDING RELIABLE CLOUD SYSTEMS THROUGH CHAOS ENGINEERINGIJMIT JOURNAL
Cloud computing systems need to be reliable so that they can be accessed and used for computing at any
given point in time. The complex nature of cloud systems is the motivation to conduct research in novel
ways of ensuring that cloud systems are built with reliability in mind. In building cloud systems, it is
expected that the cloud system will be able to deal with high demands and unexpected events that affect the
reliability and performance of the system.
In this paper, chaos engineering is considered a heuristic method that can be used to build reliable cloud
systems. Chaos engineering is aimed at exposing weaknesses in systems that are in production. Chaos
engineering will help identify system weaknesses and strengths when a system is exposed to unexpected
knocks and shocks while it is in production.
Chaos engineering allows system developers and administrators to get insights into how the cloud system
will behave when it is exposed to unexpected occurrences.
A REVIEW OF STOCK TREND PREDICTION WITH COMBINATION OF EFFECTIVE MULTI TECHNI...IJMIT JOURNAL
It is important for investors to understand stock trends and market conditions before trading stocks. Both
these capabilities are very important for an investor in order to obtain maximized profit and minimized
losses. Without this capability, investors will suffer losses due to their ignorance regarding stock trends
and market conditions. Technical analysis helps to understand stock prices behavior with regards to past
trends, the signals given by indicators and the major turning points of the market price. This paper reviews
the stock trend predictions with a combination of the effective multi technical indicator strategy to increase
investment performance by taking into account the global performance and the proposed combination of
effective multi technical indicator strategy model.
NETWORK MEDIA ATTENTION AND GREEN TECHNOLOGY INNOVATIONIJMIT JOURNAL
This paper will provide a novel empirical study for the relationship between network media attention and
green technology innovation and examine how network media attention can ease financing constraints. It
collected data from listed companies in China's heavy pollution industry and performed rigorous
regression analysis, in order to innovatively explore the environmental governance functions of the media.
It found that network media attention significantly promotes green technology innovation. By analyzing the
inner mechanism further, it found that network media attention can promote green innovation by easing
financing constraints. Besides, network media attention has a significant positive impact on green invention
patents while not affecting green utility model patents.
INCLUSIVE ENTREPRENEURSHIP IN HANDLING COMPETING INSTITUTIONAL LOGICS FOR DHI...IJMIT JOURNAL
Information System (IS) research advocates employing collaborative and loose coupling strategies to address contradictory issues to address diversified actors’ interests than the prescriptive and unilateral Information Technology (IT) governance mechanisms’, yet it is rarely depicting how managers employ these strategies in Health Information System (HIS) implementation, particularly in a resource-constrained setting where IS implementation activities have highly relied on multiple international organizations resources. This study explored how managers in resource-constrained settings employ collaborative IT governance mechanisms in the case of District Health Information System 2 (DHIS2) adoption with an interpretative case study approach and the institutional logic concept. The institutional logic concept was used to identify the major actors’ logics underpinning the DHIS2 adoption. The study depicted the importance of high-level officials' distance from the dominant systemic logic to consider new alternative, and to employ inclusive IT governance mechanisms which separated resource from the system that facilitated stakeholders’ collaboration in DHIS2 adoption based on their capacity and interest.
DEEP LEARNING APPROACH FOR EVENT MONITORING SYSTEMIJMIT JOURNAL
With an increasing number of extreme events and complexity, more alarms are being used to monitor
control rooms. Operators in the control rooms need to monitor and analyze these alarms to take suitable
actions to ensure the system’s stability and security. Security is the biggest concern in the modern world. It
is important to have a rigid surveillance that should guarantee protection from any sought of hazard.
Considering security, Closed Circuit TV (CCTV) cameras are being utilized for reconnaissance, but these
CCTV cameras require a person for supervision. As a human being, there can be a possibility to be tired
off in supervision at any point of time. So, we need a system to detect automatically. Thus, we came up with
a solution using YOLO V5. We have taken a data set and used robo-flow framework to enhance the existing
images into numerous variations where it will create a copy of grey scale image, a copy of its rotation and
a copy of its blurred version which will be used to get an enlarged data set. This work mainly focuses on
providing a secure environment using CCTV live footage as a source to detect the weapons. Using YOLO
algorithm, it divides an image from the video into grid system and each grid detects an object within itself
MULTIMODAL COURSE DESIGN AND IMPLEMENTATION USING LEML AND LMS FOR INSTRUCTIO...IJMIT JOURNAL
Traditionally, teaching has been centered around classroom delivery. However, the onslaught of the
COVID-19 pandemic has cultivated usage of technology, teaching, and learning methodologies for course
delivery. We investigate and describe different modes of course delivery that maintain the integrity of
teaching and learning. This paper answers to the research questions: 1) What course delivery method our
academic institutions use and why? 2) How can instructors validate the guidelines of the institutions? 3)
How courses should be taught to provide student learning outcomes? Using the Learning Environment
Modeling Language (LEML), we investigate the design and implementation of courses for delivery in the
following environments: face-to-face, online synchronous, asynchronous, hybrid, and hyflex. A good
course design and implementation are key components of instructional alignment. Furthermore, we
demonstrate how to design, implement, and deliver courses in synchronous, asynchronous, and hybrid
modes and describe our proposed enhancements to LEML.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
Hierarchical Digital Twin of a Naval Power SystemKerry Sado
A hierarchical digital twin of a Naval DC power system has been developed and experimentally verified. Similar to other state-of-the-art digital twins, this technology creates a digital replica of the physical system executed in real-time or faster, which can modify hardware controls. However, its advantage stems from distributing computational efforts by utilizing a hierarchical structure composed of lower-level digital twin blocks and a higher-level system digital twin. Each digital twin block is associated with a physical subsystem of the hardware and communicates with a singular system digital twin, which creates a system-level response. By extracting information from each level of the hierarchy, power system controls of the hardware were reconfigured autonomously. This hierarchical digital twin development offers several advantages over other digital twins, particularly in the field of naval power systems. The hierarchical structure allows for greater computational efficiency and scalability while the ability to autonomously reconfigure hardware controls offers increased flexibility and responsiveness. The hierarchical decomposition and models utilized were well aligned with the physical twin, as indicated by the maximum deviations between the developed digital twin hierarchy and the hardware.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
Water Industry Process Automation and Control Monthly - May 2024.pdf
13421ijmit03Engineering Life Cycle Enables Penetration Testing and Cyber Operations
1. International Journal of Managing Information Technology (IJMIT) Vol.13, No.4, November 2021
DOI: 10.5121/ijmit.2021.13403 33
ENGINEERING LIFE CYCLE
ENABLES PENETRATION TESTING
AND CYBER OPERATIONS
Paul Cheney1
and Ian R. McAndrew2
1
Department of Critical Infrastructure Protection, Capitol Technology
University, Laurel MD., USA
2
Capitol Technology University, Laurel MD., USA
ABSTRACT
This paper discusses the strengths and weaknesses of proper engineering and life cycle management on
higher level cyber security operations. Rushing innovation and increasing profits undermines the
foundations need to operate and create secure stability in IT based companies. This research argues how it
must be considered and how effective engineering processes greatly add to security even post
implementation.
KEYWORDS
Risk Management, Cyber Operations, Penetration Testing, NIST.
1. INTRODUCTION
The current environment of computer engineering and networking, along with Cyber Operations,
is in a state of decay that will lead to systemic failure if not corrected. Modern Cyber Operation
centers fail to properly manage risks: improper foundations, focusing on the more glamorous
tasks such as Incident Response and Cyber Intelligence, and Penetration Testing. These are
reflexive and reactive reactions, which serve to put a Band-Aid on the problem rather than attack
the root cause of issues such as lack of planning, personnel issues, and focus on the lifecycle of
operations. Maintenance, too, is often overlooked in favor of cheaper, easier solutions. The
human factor cannot be overestimated. The best preparation and solid design and forethought can
be undone quickly with untrained, ignorant, or even malicious intervention by people with access
to the underpinnings of the system. Additionally, education can be used by attackers to
circumvent defenses in the same way education can be used by defenders to plan and implement
systems correctly.
2. TECHNICAL
Correctly implementing Critical Infrastructure is a complex problem. Once the system is built
and operating, that system is the only one of its implementations in the world. Changes cannot be
made easily, leading to a soft-center security issue. In order to update and maintain security of
these systems, observance of their behavior can be safely monitored; included in this behavior are
changes congruent with new attacks as well changes after patching or configuration alterations.
These changes to the system should stand out and can be actioned against. Rarely, as changes are
made to the system, this older behavioral data can be used to analyze and compare performance
and ensure reliability of the system as well as security.
2. International Journal of Managing Information Technology (IJMIT) Vol.13, No.4, November 2021
34
Behavioral monitoring and integrity checking can be used to mitigate many of these issues. This
would require additional hardware and personnel. Passive monitoring is used in the commercial
world and it should apply to OT systems as well. However, this model has given way to a series
of patches and jury rigging in order to keep systems operational since many of these systems such
as electrical grids, water systems, etc. cannot be down for any length of time without a great deal
of hardship and upheaval. This is evidenced by the recent problems with the Colonial gas
pipeline and the Texas power grid. Ultimately, we will reach the point of no return with many of
these antiquated systems with numerous dire and wretched outcomes resulting.
A number of systems are still using COBOL systems, some of these older systems remaining in
place after decades of use. A Google search reveals numerous posts about COBOL still being
used. “Today‟s Business Systems Run on COBOL” states the following:
Some of the largest business systems that run COBOL include:
Healthcare: 60 million patients
Banking: 95% ATM transactions
Travel: 96% of the bookings
Social security: 60 million lines of code
Point of sale: 80% of all transactions daily
IRS: 50 million lines of code[8]
Paradoxically, although these systems are outdated, there is one strength they possess, namely,
monitoring, because there is a long history (potentially) of operation and behavior of the system.
While these systems may lack modern day connectivity and up to date anti-virus, the simple and
more deterministic behavior helps detection more than enough to offset these downsides.
Unfortunately, these legacy systems don‟t have enough skilled personnel to upkeep them.[7]
The broader community need to begin assessing computer systems as a safety critical system.
The foundation of critical systems relies on the normal IT structure. While it is novel to
categorize OP and IT systems differently, their underpinning are the same. Relying on firewalls
is not enough. The same idea is true for so many other scenarios. Storms, floods, computer
hacking, electrical outages, and other disasters may not happen often, but can be crippling when
they do. Management banking on the small chance of an occurrence at the cost of proper
preparedness is truly unfortunate when these disasters do occur.
Automation relies on technologies that are not tested and not understood. Using these
technologies to create the foundation of the next tier of infrastructure has unknown risks.
However, programming and computers can outpace humans and the need to be trained and have
that training maintained. This is a boon for business but introduces unknown risks.
Maintenance of the system includes more than just standing the system up and keeping it
patched. SolarWinds was the first of a situation where patching actually increased risks. While
this is ironic, in that patching should increase security, the return on investment was too huge for
attackers to ignore. Maintenance and operation of the system must include behavioral and atomic
information about the system: IP, MAC Address, and Purpose must be in an accessible location
to support further work. Without this information, key tasks cannot be done the system cannot be
monitored for attacks and pen-testing and security audits cannot occur. This information is
critical for recovery from an attack since it is the bounding box for trust of a system.
3. International Journal of Managing Information Technology (IJMIT) Vol.13, No.4, November 2021
35
2.1. IOT Compared to Critical Infrastructure
IOT Devices and OT Systems share similarities. Critical infrastructure systems are often placed
and not touched for fear of breaking them, same goes for IOT. IOT devices lack the larger
context and monitoring that is possible in larger, more static systems. While IOT devices are
cheaper, ubiquitous and capable, they often aren‟t touched once employed. Android cell phones
are a middle ground example where updates could be deployed, but often aren‟t. Cell Phone
manufacturers, particularly in the Android Ecosystem, hold users' security hostage, by saying
“update to get the latest security patches”, whereas Apple IOS 15, newly released as 10/3/2021
can be used on Apple devices such as the iPhone 6, released in 2014. Putting electronic devices
that can be used in malicious ways without long term plans (such as patching or monitoring) is
reckless. Weapon systems for the military also fall into this category.” Tests Revealed that Most
Weapon Systems Under Development Have Major Vulnerabilities, and DOD Likely Does Not
Know the Full Extent of the Problems” [5]
3. BUSINESS
Risk management is integral to this issue. The push to get out new products and code developed
in order to support the bottom line of an organization has become the standard by which
companies operate. Writing code is hard and time consuming, but taking the time and using the
discipline to properly debug programs is not emphasized. The faster code is pushed out, the less
time there is for review and testing, and the more risk is incurred. The standard response to this
risk is to rely on patching and post publication efforts to mitigate risk such as firewalls. This
method does not work with the increase in the use of Zero-Days in attacks and the continuance of
successful phishing attacks to bypass Firewalls, and obtain execution on endpoints.
Companies take risks to gain money, they don‟t take „risks‟ in securing their systems. One
example is having a blacklist of systems that cannot be scanned. Attackers do not know, nor care
about these blacklists. If you are able to induce a failure of the system, by simply scanning the
system, then the fragility will only ever be taken into account during a real attack and not during
any preparation, including scans, assessment or resiliency planning. Engineering and architecture
need to be treated as a continuous improvement process, much as The Capability Maturity Model
is applied to „sexy‟ cyber operations, so too this model should be applied to Engineering and
Architecture. While architectures can be difficult to replace in situ, the learning from their
execution needs to be fed back into the organization, and the cycle of cycles should be self-
reinforcing.
In the rush to increase profits, organizations induce risks both intentionally and unintentionally.
New code is buggy and needs extensive testing. Putting new code over bad bones gives a more
fragile code that cannot be completely trusted to do what it is supposed to do correctly. This leads
to more down time, unhappy customers, and ironically, reduced profits. Innovation is good; but it
must be supported by the full and proper use of the System Life Cycle. Increasing the allotted
time to test code increases security, but with proper management it will only lead to a small
increase in costs. Properly written code being reused increases security. When bugs are found,
new versions are pushed and raise the security bar across the organization. Being self-sufficient
for code by developing it in house is a primary pillar of modern security because when you rely
on third parties for development, this touches on both business processes: how code is developed
as well as the management and timeline effects on personnel. Supply chain attacks and
dependency confusion attacks easily undermine security.[2]
4. International Journal of Managing Information Technology (IJMIT) Vol.13, No.4, November 2021
36
Large corporations are held to multiple sets of laws. In order to operate in China, you must use
specific software. In Russia, government pressure can force even the largest companies to take
certain actions. [4]
These actions can be used to undermine security directly, or indirectly by eroding supporting
processes, mechanisms and procedures.
As the cost of direct attacks against well-protected organizations increases, attackers prefer to
attack their supply chain, which provides the additional motivation of a potentially large-scale
and cross-border impact. This migration has resulted in a larger-than-usual number of supply
chain attack cases reported, with a forecast of four times more supply chain attacks in 2021 than
in 2020[10].
This equivalent of a „business world‟ supply chain attack is just as insidious as software supply
chains that linger and have long term, innumerable effects.
Additionally, laws limiting the types and implementations of cryptography, have the same effect.
The chain is only as strong as the weakest link, and applies especially to cryptography as these
laws are well known and allows attackers to easily focus on these weak spots, compromising
security of the entire system.
Corporations will often farm out the creation of the system, which will then be stood up and the
implementation and design teams dissolved. This is the wrong method for numerous reasons.
First, an incident response needs behavioral and atomic information about the system to decide if
the system is infected, how badly the system was hacked, and if malicious actions continue to
happen. This most elementary information should include the mac address, IP address, hostname,
process list and network connections as the system was stood up. Without specific and granular
information about the system, security assessments and audits cannot occur. If the system is
stood up and forgotten about, if it is living in non-contiguous IP space, it may never be scanned
by responsible parties, instead turning into a ripe target for attackers who are not judicious with
their packets and port scans.
4. PEOPLE
Management is not blameless for the current state of unpreparedness, fragility and brittleness of
our current infrastructure. The ability to plan and adapt has always been a hallmark of managerial
success; unfortunately, this has only been words and not taken to heart. Examples of this are not
hard to find. One manager actually tried to initiate a backup site for operations, only to be
soundly rebuffed by personnel from the other possible locations. When one library's sprinkler
system was accidentally triggered and the thousands of books drenched, no one was sure where
the cut off for the system was not what to do with the wet books. Commercial recovery teams do
exist, but that also has its own set of bureaucratic roadblocks: they are geographically distant,
require a contract before responding, will only do what‟s in the contract and not one single thing
more. If a proper disaster preparedness plan was in place, the damage could have been
minimized. Deming‟s 94% figure comes to play here greatly. [9] In order for companies to
succeed in securing their systems [1], the management must adapt, which is counter-intuitive to
them since that was not the way they got their positions in the first place.
Personnel has its own set of issues. When a person is hired for a position, they are given a cursory
interview, their resume scanned for obvious typos, and the person given a superficial vetting. No
real delving into what the person actually knows and actually can do. Obviously, the candidate
will not reveal their weaknesses, some intend to bluff their way into the job and then do the
5. International Journal of Managing Information Technology (IJMIT) Vol.13, No.4, November 2021
37
minimum to get by. Of course, there are actually qualified candidates who want to do the job and
improve the workflow and increase productivity, but many are simply out for the money and not
to do the job right. Added to this are the employees who are simply out to do the minimum to get
by. Unfortunately, some may work their way into critical positions. This laziness has infected
many people; it has been said that the younger generation simply has their own way of doing
things, but many do not seem to be willing to put out much effort and very few have the drive and
ambition to improve things.
Training is another area that needs attention. So many jobs require on the job training, such as
operators of wastewater treatment plants, electrical grids, etc. Poor training is a downhill slope,
since a person cannot train what he/she does not know. The small but important details tend to
get lost when the generations of operators turn over, and little by little the quality of the oversight
and work slips. Those people who do take the time to properly train and equip the new operators
are to be lauded. During the problems with the electrical grid in Texas, it was only through the
quick action of the controllers that the system was saved from a total disaster. The question is,
what if they were not trained so well? Disaster situations always have post mortems to determine
what went wrong, but they would be well advised to put the effort in before the disaster hits to
possibly curtail or mitigate the damage when disaster does strike.
„Another area of concern is how much of a factor is automation going to be for the workforce of
DOD. The Army‟s approach in Serbu‟s article takes a modernization approach in re-architecting
their network for the future,‟(Serbu, 2019). As Serbu stated, „the Army would instead rely upon
an RFI (Request For Information) for vendors to restructure their IT infrastructure in a quicker
way that speeds up their modernization efforts (Serbu, 2019).‟ In International Journal of
Managing Information Technology (IJMIT) Vol.12, No.3, August 2020 7 outsourcing their
efforts to quickly adopt their modernization efforts, the effects on the workforce could be a major
concern for IT workers looking to maintain and update their skills. New technology forces
workers to adopt a new approach in keeping up with the ever growing changes in the IT field. [3]
5. CONCLUSIONS
In conclusion, the current frangible state of networks and computer systems is a crisis that must
be addressed quickly in order to avert wholesale catastrophe. There are multiple reasons for this,
but as long as there are restrictions on what security personnel can scan, the attacker, once he/she
is in a network, will always know more about the network than the network operators.
Management directed or „inherent‟ network blacklisted IP addresses in a network gives blind
spots or shadows where information about the defense of the network is lost. This precludes
effective Penetration Testing, Vulnerability Management, Incident Response and Incident
Recovery. Having a blacklist in a network is a finding that the architecture is not sufficient.
Proper engineering is not just something that is done when the system is stood up. Architecture
and Behavioral Diagnostics of these systems must be used to enable effective Cyber Operations
in order to enable effective Cyber Defense as a continual process. “In today‟s under regulated
markets, it‟s just too easy for software companies like SolarWinds to save money by skimping on
security and to hope for the best. That‟s a rational decision in today‟s free-market world, and the
only way to change that is to change the economic incentives.”[6]
ACKNOWLEDGEMENTS
The authors would like to family and friends and the larger security and engineering
communities.
6. International Journal of Managing Information Technology (IJMIT) Vol.13, No.4, November 2021
38
REFERENCES
[1] “Deming.pdf.” Accessed: Sep. 26, 2021. [Online]. Available:
https://www.stat.auckland.ac.nz/~mullins/quality/Deming.pdf
[2] A. Birsan, “Dependency Confusion: How I Hacked Into Apple, Microsoft and Dozens of Other
Companies,” Medium, Feb. 09, 2021. https://medium.com/@alex.birsan/dependency-confusion-
4a5d60fec610 (accessed Sep. 27, 2021).
[3] C. L. Gorham, “Developing Enterprise Cyber Situational Awareness,” IJMIT, vol. 12, no. 3, pp. 1–8,
Aug. 2020, doi: 10.5121/ijmit.2020.12301.
[4] Reuters, “Google, Apple remove Navalny app from stores as Russian elections begin,” Reuters, Sep.
17, 2021. Accessed: Sep. 28, 2021. [Online]. Available:
https://www.reuters.com/world/europe/google-apple-remove-navalny-app-stores-russian-elections-
begin-2021-09-17/
[5] “WEAPON SYSTEMS CYBERSECURITY DOD Just Beginning to Grapple with Scale of
Vulnerabilities,” United States Government Accountability Office, GAO-19-128.
[6] “National Security Risks of Late-Stage Capitalism - Schneier on Security.”
https://www.schneier.com/blog/archives/2021/03/national-security-risks-of-late-stage-capitalism.html
(accessed Sep. 26, 2021).
[7] “The IBM i And Its RPG Decade Of Crisis,” IT Jungle, Sep. 29, 2021.
https://www.itjungle.com/2021/09/29/the-ibm-i-and-its-rpg-decade-of-crisis/ (accessed Sep. 30,
2021).
[8] “Today‟s Business Systems Run on COBOL.” https://techchannel.com/Enterprise/03/2021/business-
systems-cobol (accessed Sep. 30, 2021).
[9] D. Andrew, “Who‟s to Blame? 94% Chance It‟s a System Failure, Not You,” Mission.org, Apr. 18,
2018. https://medium.com/the-mission/whos-to-blame-94-chance-it-s-a-system-failure-not-you-
26396b2b3811 (accessed Sep. 27, 2021).
[10] European Union Agency for Cybersecurity., ENISA threat landscape for supply chain attacks. LU:
Publications Office, 2021. Accessed: Oct. 28, 2021. [Online]. Available:
https://data.europa.eu/doi/10.2824/168593
AUTHORS
Paul Cheney is a researcher working in the fields of Risk Management, Artificial Intelligence and Critical
Infrastructure Security and Operations.
Ian R. McAndrew is the Dean of Doctorate Programs and has been publishing for 30
years. He has been leading the Doctorate programs at Capitol Technology University
since 2018 and is a frequent chair or keynote speaker at many international universities.