What are the current research for cloud and iot security devices?10 answersCurrent research in the domain of cloud and IoT security devices is multifaceted, addressing the inherent vulnerabilities and proposing innovative solutions to mitigate these risks. The integration of cloud computing with IoT has revolutionized industrial applications by offering flexible architecture and resource dispersion, yet it has also introduced significant security concerns due to the rapid shift to cloud-based systems. These concerns encompass data, network, service, applications, and device security, highlighting the inadequacy of traditional security measures and the need for advanced solutions like deep learning and artificial intelligence to address cloud-based IoT security challenges.
One stream of research focuses on the development of secure frameworks for cloud-based IoT networks, leveraging machine learning and lightweight cryptography to secure communication paths and mitigate vulnerabilities inherent in the dynamic and heterogeneous nature of IoT networks. Additionally, the concept of delivering sensors and actuators as a service in a cloud-based infrastructure has been explored, emphasizing the importance of secure communication between these elements and the control nodes upon which IoT applications rely.
Authentication protocols have also been scrutinized, with proposals for enhanced protocols that offer lower computational and communication costs while maintaining a high level of security against attacks such as privileged insider and temporary value disclosure attacks. The need for building a knowledge base on various attacks and implementing data protection methodologies to safeguard against these threats has been recognized, with a focus on the integration of possible techniques and protective solutions.
Research has also tested the cybersecurity of IoT devices transmitting data to cloud platforms, identifying vulnerabilities to attacks and the necessity of encrypting data to protect against unauthorized access. Efforts to combat destructive attacks like DDoS through special security techniques have been proposed, aiming to safeguard CloudIoT data transfer. Moreover, solutions integrating SNMP, KLD, ACL, and MTD techniques have been suggested to protect against DDoS and false data injection attacks, demonstrating their effectiveness through experimental simulations.
Finally, a practical study of IoT cloud security regulations on IoT device development solutions has been reported, highlighting the pervasiveness of security hazards in IoT cloud security regulation during the development phase and the resultant manufacturing of vulnerable IoT devices. Collectively, these research endeavors underscore the complexity of cloud and IoT security and the ongoing efforts to develop robust, efficient, and scalable solutions to protect against a wide array of cyber threats.
Factors that Influence Security according to researchers?5 answersFactors that influence security according to researchers include human behavioral factors, social media usage factors, cultural influences, management support, awareness and training, accountability, security education training and awareness, top-management's commitment for information security, peer non-compliance behavior, punishment severity, certainty of deterrent, and information security climate.These factors play a significant role in shaping individuals' susceptibility to cybercrime and their compliance with information security policies. Understanding these factors can help in developing effective training programs and security measures to mitigate social engineering attacks and improve overall security in organizations.
What are current research cloud security?4 answersCurrent research in cloud security focuses on addressing the threats and challenges associated with data protection in cloud computing environments. Researchers are exploring various techniques and algorithms to enhance the security of cloud data. Lightweight cryptography, genetics-based cryptography, and machine learning algorithms are being investigated as potential solutions for cloud security issues. Data security in the cloud is crucial for e-commerce, as attacks on data can result in financial losses. Therefore, efficient data security tools and techniques are being developed to protect data at rest and in transit. The practical application of computer data confidentiality technology is being analyzed to enhance cloud security. Additionally, secure data storage on the cloud is being addressed through the implementation of proper security control policies and mechanisms to prevent unauthorized access and collusion attacks. Furthermore, research is being conducted on the security threats of cloud computing platforms and the development of randomization methods to mitigate these threats.
What is the status of the current research regarding code security?4 answersRecent research on code security has shown that it is influenced by socio-technical contexts and developers' behavior. Deep learning (DL) and its representation learning approach have been proposed for vulnerability analysis of program code. The analysis of the OpenPGP standard reveals the collaborative and low-profile practices of maintenance and innovation that keep the code secure. Cyber code analysis is being revolutionized by automated approaches empowered by machine learning, particularly in the context of big code from open source projects. The laser security code is being enhanced using image enhancement algorithms to ensure its effectiveness in strong interference backgrounds.
What are the most pressing information security topics for PhD research?5 answersThe most pressing information security topics for PhD research include the security protection requirements of relay protection equipment in power grids, the comparative study and analysis of symmetric key and key asymmetric encryption algorithms, the investigation of potential weaknesses in the security measures used in the conflict between Russia and Ukraine, and the management of information security risks in agriculture and food security.
What are the main research areas and issues in e-commerce security?5 answersE-commerce security research focuses on various areas and issues. One important area is the protection of electronic commerce assets from unauthorized access, use, modification, or destruction of data. This includes safeguarding against attacks through phoney websites and apps, which have become more prevalent due to the growth of e-commerce. Another area of research is the safety of e-commerce in the context of big data and cloud computing. Researchers analyze the security problems in current systems and propose solutions to ensure secure e-commerce transactions. Additionally, the security of e-commerce platforms is a topic of concern, particularly in relation to government personnel. Studies have shown a positive relationship between e-commerce security and the use of e-commerce platforms among government personnel. Common security issues in e-commerce applications include Cross-Site Scripting (XSS), Cross-Site Request Forgery (CSRF), phishing attacks, SQL injection, and denial-of-service. Effective approaches and tools, such as encryption, firewalls, SSL digital signatures, and security certificates, are used to address these threats.