Tuesday, September 29, 2020

Ransomware attacks that have arisen recently during COVID-19

 Ransomware attacks that have arisen recently during COVID-19 

1. Introduction 

Ransomware is a kind of disruptive malicious attack which encrypts the offending files and asks for a huge amount of payments back from the victimized party to decrypt files. Internet-connected systems always vulnerable to be getting attacked by any kind of malware. But compared to the other times, the COVID-19 period makes the world hard to involve in regular activities. Then the most attackers take this as a good opportunity to spread their nasty doings since the world spends their whole time recovering the pandemic rather than the other attacks.

2. Recent Attacks faced by globally recognized Organizations.

Honda Manufactures were affected globally by the snake Ransomware. 

One of the ransomware attacks occurred recently during this world grieved epidemic was a snake ransomware attack which was suffered by the “Honda” providers. “Snake”, which developed using the cross-platform supportive language called Golang, is the newly added ransomware to the well-known list of malware in early 2020. (WALTER, 2020)It was a kind of dangerous attack which aim total manufacturing control schemes of the target company(Alex Scroxton, 2020). All the infected files are modified and saved by using the extension with random features. This causes it to be hard to recognize a particular attack by using the file name(Alex Scroxton, 2020). This attack terminates the whole network process rather than considering individual files. Apart from the normal behavior of the other ransomware, this includes lots of enhanced features. This totally interrupts the enterprise's central processing tools and their utilities. And, unlikely conventional ransomware this instructed sufferers to connect directly via emails(Alex Scroxton, 2020). This is effective and dangerous, compared to the other attacks. Such that it apparently primitive, but actively performs a vast number of processes to completely lock down the manufacturing systems which has not been experienced by the directing factories previously(WALTER, 2020). The researchers have found the unorganized databases including machinery’s internal network details and the critical information of dealers and the customers relate to the logging credentials and server monitoring data has been exposed to the public internet due to the fact that was not secured with the proper security mechanisms(Ilascu, 2020). All the IT networks attached to the global Honda car manufacturers located in Japan and Europe were affected by this attack. And this malware caused severe damage to the Honda financial progress as well as the customer demand instabilities, drastically increasing the impact of the snake attack. (Alex Scroxton, 2020). In order to prevent the spread of the attack furthermore, they might wait for a long time by suspending the vehicle production of Honda around the world. One of the japan security authorities got the responsibility to recover or reduce this hard impact which cooperated access to its IT network systems and they attempt to reinstate the functionalities of all the manufacturing and sales activities.(Alex Scroxton, 2020) Since this is a critical situation and the environment in the whole process of the Honda dealers, they decided to maintain regular surveillances to resist the further cyber-attacks due to this made them unstable financially as well as socially. 

Difference between cyberwar and cybercrime

 Difference between cyberwar and cybercrime



Cyberwar, which could describe the same as the concept of war different from the cybercrimes. The activities relate to the cyberwar have a specific target against the régime and military networks accompanying ferocity to interrupt, extinguish, or repudiate the services.(Rohith & Batth, 2019).

Cybercrimes are the activities or behaviors such as financial frauds, identity theft, privacy violations and pornography, etc in which involve misuses of computers, information systems or electronic devices exploiting the personal or the organizational confidentiality, integrity and the availability violating the regular processes (Arief, Adzmi, & Gross, 2015). 


Tuesday, January 8, 2019

Design content for the CMS


Content Management System' quite literally allows you to control and manage the content within your web site - without technical training. Using this uncomplicated system you can very easily add, delete images and edit the text in your web site on the fly. You can also have an unlimited number of pages and a full site-search engine.
Compared to designing for static content (print or web), designing for CMS-output is an entirely different discipline. It requires a big-picture systems-thinking approach that might best be described as architecture.

What is a good CMS design?

  • Accommodates the needs of content and navigation regardless of length.
  • Considers not just the present, but future needs and growth.
  • Exemplifies page-to-page consistency in element placement, type, colours, and imagery.
  • Defines a set of standards that are broad enough to accommodate current and future content needs, but strict enough to maintain strong site-wide consistency. Navigation that makes it clear where you are, where you came from, what’s related, and how to go elsewhere.
  • Retains its identity and consistency regardless of what text it contains or how it’s scaled.
  • Understands and uses the limitations of XHTML/HTML5 as an asset.
  • Developed in an accessible, web standards-friendly way that properly defines and uses markup.


What is bad CMS design?

  • Layouts designed as if they were for print.
  • Layouts that make assumptions about the maximum and minimum length of copy.
  • Headlines, navigation or copy requiring [non-dynamic] images or flash.
  • Layouts with ambiguous navigation.
  • Design that fails to accommodate the stylistic needs of future content, forcing the client to come up with his/her own (often inappropriate) solutions.
  • Layouts that don’t consider the effects of text-wrapping.
  • Designs that are poorly developed (this can make or break it, no matter how good the actual design is).
  • Designs output by a CMS that gives the client too much stylistic control.

Popular CMSs and their Features



What is Content Management System?
Content Management is managing content. Then a CMS is  a tool that enables us to create, edit, delete and finally publish in a varying format a variety of content (such as text, graphics, video, documents, etc) while being governed by a set of rules, processes and workflows that ensure validated electronic content and coherency of the data.
Benefits of CMS
        Consistent website design
        Availability of site modules and templates.
        An open source community (for support).
        Content and structure can easily be adapted.
        Content is well organized and searchable.
        You can assign different webmasters to administer the content.

content management systems (CMS) that allow you to make changes to a website without needing to touch a single line of code. WordPress, Joomla and Drupal all offer great features, tons of customizaions, ease-of-use, and strong security.

·       Wordpress : especially well for small to medium sized websites, blogs and smaller e-commerce stores.
·       Joomla : Great for e-commerce or social networking websites, but requires a basic understanding of technical skills
·       Drupal : The most difficult, but also the most powerful. It requires a familiar understanding of HTML, CSS and PHP.

Wordpress
WordPress is the world’s most popular content management system and  there are a lot of features to become the most popular one as follows,
Easy to Install – Since many web hosting companies offer instantly automated WordPress installs in their hosting environment, you can get a new website up and running in less than 5 minutes.
Customizable - WordPress has significantly more plug-ins, themes and other customizations available than any other CMS. Because of its widespread popularity, more third-party designers and developers will create free (or relatively inexpensive) new WordPress tools to help you create/start a blog that looks like a high-dollar custom website.
Free-WordPress is absolute, no-strings-attached free to use. And building on the last point, there are easily tens of thousands of free plug-ins and themes available to choose from. This is perfect for most beginners putting together their first site because it keeps costs down.
Community Support-support forum includes helpful contributors that can answer any question you might have, within minutes

Joomla
Joomla is the second most popular CMS. It’s like the compromise between WordPress and Drupal.
Social Networking – Joomla makes creating social networks of all three options. Social networks can be a powerful asset for many sites, and with Joomla, you can have one up and running extremely quickly and easily.
Commerce Sites – Joomla also makes setting up an online store quick and painless. You can setup eCommerce shops with both Drupal and WordPress, but it tends to require more effort and special customizations.
Not too Technical – Joomla has found the middle ground between the ease of managing a WordPress website and the power of a Drupal site. The good news is that most non-tech savvy people should be able to run a great Joomla site without needing any technical support.
Help Portal – Joomla offers a great help portal for asking questions and getting technical support. It’s not fast or extensive as WordPress’ community-based support pages but is definitely quicker (and cheaper) than Drupal’s technical support options.
Free – Like both WordPress and Drupal, Joomla is another free option to use on your own web servers. However similar to Drupal, there is no option to have it hosted for free like WordPress offers.

Drupal
Drupal is the third most popular content management system available today, used by sites both large and small
Technically Advanced – Drupal is the most technically advanced of these three content management systems. Good for technical people who like to get their hands dirty.
Improved Performance – Drupal pages typically load more quickly, and have faster response times than those made with WordPress or Joomla. Part of the reason is that it’s less resource-intensive, requiring a less expensive server or hosting setup. (However like with all CMS, adding too many third-party plugins can bog down performance.)
Customizable – Drupal is easy to customize with many widely available plug-ins, themes and other configurable options to choose from. You can also edit the root files directly, perfect for those developers who need to make more significant changes.
Free – You can download the Drupal software for free, and install it on your own hosting server. If you don’t which host to use, use this best web hosting chart.

Biometrics Technology and Healthcare Systems.https://ieeexplore.ieee.org/document/8529442


Abstract 
 Imperative importance of utilization of the biometric technologies in healthcare system is
maintaining patient’s reliability on their medical treatments which basically depend on the medical reports.Clinical document may handle for retrieve rightmedications at right time. Therefore the accuracy and thesafety of the medical reports should be coordinate with the proper identification of each and every patient. As the solution for the critical issues of the healthcare industry is
addressed by biometric systems carrying body sensor details with linking each other including key factors of authentication and authorization processes. This has  become the main reason why the evolution of the technology cope up with the most accurate methodologies to improve the accuracy of their systems. This paper reveals approaches of healthcare security utilizing biometrics technologies and their optimal points, how the biometrics have ensure dealings with encryptions, how
importance of process of disease diagnosis enroll with biometric specifications, issues and drawbacks of systems. At the end of the paper it focuses on how the optimal approaches are interrelated with the healthcare security and privacy and also with the effectiveness of proper medications.

Keywords: Biometrics, modalities, physiological, Behavioral, verification, identification