FUW TRENDS IN SCIENCE & TECHNOLOGY JOURNAL

(A Peer Review Journal)
e–ISSN: 2408–5162; p–ISSN: 2048–5170

FUW TRENDS IN SCIENCE & TECHNOLOGY JOURNAL

VULNERABILITIES OF THE INTERNET AND STRATEGIES FOR COUNTERING CYBER ATTACK
Pages: 84-91
F.N. Ogwueleka1 and E.T. Sode-Shinni


keywords: Vulnerabilities, internet, cyber-attack, cybercrime, hackers, security, strategy.

Abstract

There exist numerous software tools on the Internet both for security and attack. These tools are available as open source (freeware) for anyone including malicious hackers to access. The question is how to secure the Internet in the midst of all the available tools. The simple answer is strategy. This study avoids reinventing the wheel and concentrates on strategy. The strategy adopted is a model called the Automated Intelligent Vulnerability Insurance system, which assembles the decentralized security tool to form a centralized security interface that minimizes the end users involvement. The system is modelled and implemented using a web-based virtual internet laboratory, which serves as an interface between the user and the Internet. Implementing this model implies that internet users can worry less about trying to install updates and security patches against vulnerability and the security tools use to counterany cyber-attack. The model produces a higher security against cybercrime and reduces the error that can be made by the users ignorance. This research also exposes existing cyber technologies employed by hackers to exploit vulnerable systems and various cyber-attacks.

References

Binational Working Groupon Cross-Border Mass Marketing Fraud 2006. Report on Phising, pp. 1-23. http://www.justice.gov/opa/report_on_phishing.pdf Bruce VH2003. Ethical Hacking: The Value of Controlled Penetration Tests. pp 1-47, http://www.certconf.org/presentations/2003/Wed/WM4.pdf. Craig JB 2004.Combating Cyber Crime: The legal (& practical) challenges. Alliance Law Group, pp. 1-17. www.alliancelawgroup.com. Cyber Security Policy Review 2009.Internet Security Alliance, the Cyber Security Social Contract: Policy Recommendations for Obama Administration and 111th Congress, 5: 1-76.http://www.whitehouse.gov/assets/documents/Cyberspace_Policy_Review_final.pdf. Dinach 2012.Criminals Pay to Hide Vulnerabilities,p. 1, http://www.dionach.com. Piessen F2002.A Taxonomy of Causes of Software Vulnerabilities in Internet Software. Dept. of Computer Science, K. U. Leuven, pp. 1-5. Patrick E2011.Basics of Ethical Hacking. Waltham, MA 02451, USA, p. 1-178. Rahul T & Sunil W 2004.Impact of software vulnerability announcements on market value of software vendors: An empirical investigation, pp. 1-12. Shane PC2007. Air Force and the Cyber Space Mission defending the Air Forces Computer Network in the future. Center for Strategy and Technology Air War College, pp. 1-38;http://www.au.af.mil/au/awcgate/awccsat.htm. Sena T2012.How the Internet Works; http://simplytatydesigns.com, pp. 5-23. Tidwell T, Larson R, Fitch K& Hale J 2001.Modelling Internet Attack.Proceedings of the 2001 IEEE Workshop on Information Assurance and Security United States Military Academy, West Point, NY, pp 54-59. Netlingo-http://www.netlingo.com/tips/cyber-safety-statistics.php. The Web Application Security Consortium; http://projects.webappsec.org/w/page/13246991/Web20Hacking20Statistics. http://adventuresinsecurity.com/images/Keystroke_Logging.pdf. Internet world Stats- www.internetworldstats.com/stats.htm. http://www.contextis.com/research/whitepaper/WebApplicationVulnerabilityStatistics2010-2011.

Highlights