Proceedings of the International Conference on Cybersecurity and Cybercrime - 2022
Proceedings of the International Conference on Cybersecurity and Cybercrime - 2022
Contributor(s): Ioan-Cosmin MIHAI (Editor), Costel CIUCHI (Editor), Gabriel PETRICĂ (Editor)
Subject(s): ICT Information and Communications Technologies
ISSN: 2393-0837
Published by: Asociatia Romana pentru Asigurarea Securitatii Informatiei
Keywords: AI; Cybersecurity; cybercrime;
Summary/Abstract: The International Conference on Cybersecurity and Cybercrime (IC3) is an annual scientific conference, with the purpose to encourage the exchange of ideas about the evolution of cyberspace, information security challenges, and new facets of the phenomenon of cybercrime. The event provides the appropriate framework for experts to present their research in this field.
The International Conference on Cybersecurity and Cybercrime is part of the CyberCon Romania event, organized by the Romanian Association for Information Security Assurance. CyberCon Romania brings together experts from public institutions, private companies, and universities, for raising the level of awareness and embodies the cybersecurity culture.
- Page Count: 119
- Publication Year: 2022
- Language: English
AI and IoT Mapping and the Transition to an Interconnected Cyber Defence and Intelligence Capabilities
AI and IoT Mapping and the Transition to an Interconnected Cyber Defence and Intelligence Capabilities
(AI and IoT Mapping and the Transition to an Interconnected Cyber Defence and Intelligence Capabilities)
- Author(s):Joseph JONES, Angela Ioniță, Ioan-Cosmin MIHAI
- Language:English
- Subject(s):Security and defense, Military policy, ICT Information and Communications Technologies
- Page Range:5-22
- No. of Pages:18
- Keywords:AI; Decision-making; Human-machine teams; Hyperautomation; IoT;
- Summary/Abstract:This paper brings together authors from a diverse range of technical areas to discuss the evolving cyber threat landscape and how military forces, have transformed their capabilities to meet present-day operational challenges in cyberspace. The Internet of Things (IoT) is based on the premise that enough data can lead to new perspectives on processes and systems. With over 7 billion IoT devices connected today, experts expect that number to increase to 22 billion by 2025. They can be used to support decisions and new products and services, or they can lead to internal savings and new external revenue streams. Despite countless discussions and opinions on the definition of AI in its various facets, successful IoT implementation projects require major actors to play their part, but in conjunction with human experts to work with to make better decisions in cyberspace, improving the quality of human-machine team’s actions in asymmetric operations. The Defence domain already looking at ways to organize better human-machine teams, which promise to boost individual and team performance, reduce threats to humans, enable new operating concepts, and ultimately boost national power.
On Digital Diplomacy. Key Issues
On Digital Diplomacy. Key Issues
(On Digital Diplomacy. Key Issues)
- Author(s):Mihai SEBE
- Language:English
- Subject(s):Diplomatic history, International relations/trade, ICT Information and Communications Technologies
- Page Range:23-28
- No. of Pages:6
- Keywords:cyber diplomacy; digital diplomacy; digital foreign policy; e-diplomacy; terminology;
- Summary/Abstract:The current paper intends to be a foray into the aspects related to digital diplomacy. It presents the main working definitions and key legislative aspects as well as the Romanian case study, what have we done and what needs to be done.
At the Intersection of Interests and Objectives in Cybersecurity
At the Intersection of Interests and Objectives in Cybersecurity
(At the Intersection of Interests and Objectives in Cybersecurity)
- Author(s):Mircea-Constantin ȘCHEAU, Mihai-Daniel LEU, Cătălin Udroiu
- Language:English
- Subject(s):Security and defense, Methodology and research technology, ICT Information and Communications Technologies
- Page Range:29-34
- No. of Pages:6
- Keywords:cyber security; involvement; threat landscape;
- Summary/Abstract:The exponential increase in the advancements registered across all sectors of the information technology field gave a new, ever-expanding dimension to the idea of protesting against national governments by introducing political activism into cyberspace. Despite the apparent noble objectives, there is a thin line between hacking as a form of protest against the established order and cyber-criminal activity that can cause financial or material prejudice against organizations. This aspect outlines several dimensions of hacktivism which will be brought into discussion. Another interesting characteristic in hacktivist psychology is the pursuit of “digital clout” as a way to measure success: the more notorious a group becomes, the more attention it will get from the press alas the more successful it is. Even though it is a clear distinction between financially motivated threat actors and hacktivists, some shifts were observed in the cyber threat spectrum in the very politically charged context of war, with different groups which had a history of financially motivated cybercrime, joining the cyber conflict and engaging in hacktivist campaigns either on the one side or the other.
Security Enhancements for Cloud Applications
Security Enhancements for Cloud Applications
(Security Enhancements for Cloud Applications)
- Author(s):Ana-Maria DINCĂ, Sabina-Daniela AXINTE
- Language:English
- Subject(s):Security and defense, ICT Information and Communications Technologies
- Page Range:35-40
- No. of Pages:6
- Keywords:cybersecurity; cloud platform security; security augmentation; security by design;
- Summary/Abstract:This study scrutinizes the cloud applications infrastructure and the associated vulnerabilities that could allow unauthorized access to users’ accounts. The research is based on a Fault Tree Analysis that uncovers various security design flaws and their occurrence probabilities. For each undesirable event, a preventive mechanism is suggested and validated by the testing results, decreasing to a minimum the risk exposure of unauthorized access to users’ sensitive data.
From the Borderless Digital Chambers to Prison’s Four Walls After Committing Personal Data Unlawful Acts
From the Borderless Digital Chambers to Prison’s Four Walls After Committing Personal Data Unlawful Acts
(From the Borderless Digital Chambers to Prison’s Four Walls After Committing Personal Data Unlawful Acts)
- Author(s):Larisa-Mădălina MUNTEANU
- Language:English
- Subject(s):Criminal Law, ICT Information and Communications Technologies
- Page Range:41-48
- No. of Pages:8
- Keywords:cybercrimes; electronic data; global legal systems; imprisonment; personal data protection;
- Summary/Abstract:This paper represents a concise comparative presentation of how and why can imprisonment be a penalty in different legal systems when committing cybercrimes that affect personal data. Yet, since personal data is closely linked to cybersecurity (especially in cases of non-compliance with regulatory standards), the subject matter herein will focus on the subsequent relationship between personal data and cybercrimes, but from a peculiar perspective - how impactful unlawful acts can be so as to result in criminal convictions. It relies, therefore, on a symbiosis of acknowledging where personal data sits in the cybercrimes’ ecosystem and applying this to the most threatening cases identified by global regulators. In this context, the current research is contingent on mirroring the major legal models worldwide, based on which these offences are sanctioned with imprisonment. It is utterly thought-provoking to analyse how the contrasting legal provisions are driven by a common goal: preventing cybercrimes or, as the case may be, minimising their consequences. All these differences have, essentially, homogenous values at a foundational level. Particularly, that foundational level is the research core of this paper.
Healthcare Cybersecurity Vulnerabilities
Healthcare Cybersecurity Vulnerabilities
(Healthcare Cybersecurity Vulnerabilities)
- Author(s):Ryan DRAKE, Evan RIDDER
- Language:English
- Subject(s):Health and medicine and law, ICT Information and Communications Technologies, EU-Legislation
- Page Range:49-56
- No. of Pages:8
- Keywords:Cybersecurity; GDPR; Healthcare; HIPPA; PHI; Privacy;
- Summary/Abstract:The healthcare industry sector is often considered a soft target for malicious actors. Having a large attack surface coupled with a focus directed toward patient care rather than security, often health organizations haven’t taken the necessary precautions to secure patient data or access to medical devices within their infrastructures. As the severity and the associated costs of cyber-attacks on entities within healthcare organizations continue to escalate, an increased effort within this industry to mitigate the risks associated with these vulnerabilities is necessary. This study seeks to present the most common types of healthcare attacks and their mitigation methodologies. Additionally, a discussion of how compliance with the GDPR in the European Union and the HIPPA regulation in the United States can positively affect a healthcare organization’s defensive posture.
Integrating and Shaping Military Cyber Defence in Operational and Intelligence Planning
Integrating and Shaping Military Cyber Defence in Operational and Intelligence Planning
(Integrating and Shaping Military Cyber Defence in Operational and Intelligence Planning)
- Author(s):Joseph JONES
- Language:English
- Subject(s):Security and defense, Military policy, ICT Information and Communications Technologies
- Page Range:57-62
- No. of Pages:6
- Keywords:cyber capacity building; cyber defence; cyber intelligence; military cyber operation;
- Summary/Abstract:The cyber threat landscape has undoubtedly evolved at an exponential rate. As such, NATO and EU forces have transformed their capabilities to meet present-day operational challenges in cyberspace. However, this paper will not only identify relative successes by NATO and EU forces with regards to their respective development of cyber defence capabilities, it will also indicate limitations with regards to the projection of power within cyberspace and the lack of national and international coordination concerning offensive cyber operations and the collection of intelligence from cyberspace.
Children and the Internet: Vulnerability or Opportunity?
Children and the Internet: Vulnerability or Opportunity?
(Children and the Internet: Vulnerability or Opportunity?)
- Author(s):Nicoleta APOLOZAN
- Language:English
- Subject(s):Behaviorism, ICT Information and Communications Technologies
- Page Range:63-68
- No. of Pages:6
- Keywords:digital skills; level of information; information needs; online behaviour; online safety;
- Summary/Abstract:As a member of the implementation team of the Cyberex RO Project - Improving, cooperating and preventing in the fight against cybercrime, I conducted a survey among students aged 10 to 18 on the topic of online security. This paper discusses the results of this survey regarding children's habits on using the Internet, the safety measures they know and use, their level of information and their need to learn about Internet safety issues.
Cybersecurity of WordPress Platforms. An Analysis Using Attack-Defense Trees Method
Cybersecurity of WordPress Platforms. An Analysis Using Attack-Defense Trees Method
(Cybersecurity of WordPress Platforms. An Analysis Using Attack-Defense Trees Method)
- Author(s):Gabriel PETRICĂ
- Language:English
- Subject(s):Communication studies, Security and defense, ICT Information and Communications Technologies
- Page Range:69-76
- No. of Pages:8
- Keywords:Attack-Defense Tree; CMS; cyber-attacks; software vulnerabilities; WordPress;
- Summary/Abstract:The aim of this paper is to analyze the techniques for securing a Content Management System, highlighting the vulnerabilities of the WordPress platform. The study includes qualitative and quantitative analyzes on the resilience of CMS platforms to cyber-attacks, simulated by the AD Trees methodology. The data provided by CVE is used to build possible attack scenarios that could compromise the cybersecurity of the web application. At the end of the paper, in order to minimize the impact of these attacks, solutions are proposed as sets of countermeasures within the Attack Defense Trees.
Cyber-Laundering
Cyber-Laundering
(Cyber-Laundering)
- Author(s):Nathalie RÉBÉ
- Language:English
- Subject(s):Security and defense, Financial Markets, ICT Information and Communications Technologies
- Page Range:77-82
- No. of Pages:6
- Keywords:Cyber-laundering; Financial Crimes; Internet Regulations; Virtual Asset / Currencies;
- Summary/Abstract:The aim of this chapter is to help the reader gain understanding of the various money laundering practices using technology and discover the way they may be utilized by criminals to finance their illegal endeavors. The author will discuss international compliance and regulatory mechanisms, as well as international countermeasures to deter cyber-laundering.
Cyber-Attacks Identification and Measures for Prevention
Cyber-Attacks Identification and Measures for Prevention
(Cyber-Attacks Identification and Measures for Prevention)
- Author(s):Shubham CHOPRA, Hitesh MARWAHA, Anurag Sharma
- Language:English
- Subject(s):Security and defense, ICT Information and Communications Technologies
- Page Range:83-90
- No. of Pages:8
- Keywords:cyber-attacks; cyber-threats; cybersecurity; prevention measures;
- Summary/Abstract:In the present digitization era, almost everything is available online, at just one click away from us, which offer a lot of opportunities, like saving a lot of time, but also many challenges, due to the existence of many cyber-attacks, more complex and difficult to be detected. The cyber-attacks effects can be data theft, modification, or alteration. In recent time, cybersecurity is very important also in the academic field, because schools and universities systems are connected online. To protect our data from various attacks, cybersecurity plays the most important key role. Cybersecurity helps in ensuring the safety of data, personally identifiable information, and intellectual property. Cybersecurity is not only for individuals, a specific group or organization, but it is for all the people and for the government to keep data integrity, confidentiality, and availability. This paper presents the cybersecurity concept, analyzing different cyber-attacks and the specific preventions measures.
Analysis of Online Marketplace Scams
Analysis of Online Marketplace Scams
(Analysis of Online Marketplace Scams)
- Author(s):Mihai COTITU
- Language:English
- Subject(s):Security and defense, Financial Markets, ICT Information and Communications Technologies
- Page Range:91-98
- No. of Pages:8
- Keywords:classiscam; cybersecurity; marketplace; scam; WhatsApp;
- Summary/Abstract:One of the many effects of the Covid-19 pandemic was reflected in the accelerated migration of many face-to-face activities towards the online environment, with online trading experiencing a significant growth during this period. At the same time, the risks specific to the digital environment have gone through a prosperous period. Thus, a telling example is given by the period August - December 2020, during which, at the level of the relevant authorities (D.I.I.C.O.T. and the Romanian Police) were registered approximately one thousand cases, based on cybercrime with similar modus operandi. These cases involved the collection of personal data through online resources, phishing, targeting in particular those who posted advertisements for the sale of objects through the OLX platform.
Zero Trust Security
Zero Trust Security
(Zero Trust Security)
- Author(s):Ioan-Alexandru DUMITRU
- Language:English
- Subject(s):Security and defense, ICT Information and Communications Technologies
- Page Range:99-104
- No. of Pages:6
- Keywords:access management; cybersecurity; Zero Trust architecture;
- Summary/Abstract:Zero Trust security is an IT security model that requires strict identity verification for every person and device trying to access resources on a private network, whether they are inside or outside the perimeter of the network. No specific technology is associated with the Zero Trust architecture; It is a holistic approach to network security that incorporates several different principles and technologies. The traditional security of the IT network is based on the „castle-and-moat” concept. In that model, it's hard to gain access from outside the network, but everyone on the network is trusted by default. The problem with this approach is that once an attacker gains access to the network, he has free rein over everything inside.
Developing a Comprehensive Model for Digital Lifelong Learning Using Cyber Resilience Framework
Developing a Comprehensive Model for Digital Lifelong Learning Using Cyber Resilience Framework
(Developing a Comprehensive Model for Digital Lifelong Learning Using Cyber Resilience Framework)
- Author(s):Costel CIUCHI
- Language:English
- Subject(s):Security and defense, Adult Education, ICT Information and Communications Technologies
- Page Range:105-112
- No. of Pages:8
- Keywords:cyber resilience; cybersecurity; education; learning framework; resilience;
- Summary/Abstract:Ensuring a secure environment through the use of information systems are mandatory requirements of today's society, practically it become an intense and ongoing concern in relation to possible risks and threats. The development of organizations is conditioned by the use of information systems, which gain vital importance over time and become the "engine" of daily activity. Also, in addition to the fact that information systems meet administrative and operational needs, they have gradually gained a significant share at all levels of the organization, up to the strategic and decision-making level. The working flows model must include new approaches, starting from the technological levels to managerial levels including most important layer of an organization: human resources. User’s education and cybersecurity management knowledge represent an important part of ensuring the real organization's data and influenced managerial decisions. Technological threats and vulnerabilities can compromise decisional process starting from the early stages. With all the latest security technology implemented, a system will become cyber resilient if will take in consideration the 3 dimensions - human resources, processes, and technology. To achieve this goals, new approaches in cyber security education is needed. The diversity of technologies and accelerated developments of information technology in all domains need to be supported by a complex educational environment who must meet the actual society requirements.
Establishing Effective Cyber Diplomacy and Deterrence Capabilities Between International Partners
Establishing Effective Cyber Diplomacy and Deterrence Capabilities Between International Partners
(Establishing Effective Cyber Diplomacy and Deterrence Capabilities Between International Partners)
- Author(s):Cristian-Vlad OANCEA
- Language:English
- Subject(s):Diplomatic history, International relations/trade, Security and defense, EU-Accession / EU-DEvelopment, ICT Information and Communications Technologies
- Page Range:113-116
- No. of Pages:4
- Keywords:Cyber Diplomacy; Cybersecurity; Deterrence; IoT;
- Summary/Abstract:Changes has been always a constant in a modern and dynamic world, but the rapidity of change in the global security landscape accelerated after 9/11 and global war against terrorism. There is a new approach regarding political, ideological, economic and military race due to globalization which improved the landscape with good practices and developmental growth but is still a major driver of instability. While threat of conventional decrease, accordingly the spread of conflict, it complexity, accuracy, changeable and reach into many areas have emerged. Many new types of warfare have also emerging like cyber, network, digital, information, economic, media pursued cross domains both in peace or war. Especially nowadays but also during challenging times, deterrence has been an important part of foreign affairs of a nation, to conserve internal and external stability and preserve its integrity.