Abstract
Communication technologies have a significant influence on the business industry. Exchanging information, storing and retrieving data, and cutting communication costs are prime reasons for relying heavily on these technologies. However, these technologies are significantly affected by hacking. Due to neglecting the behaviour of hackers during the initial design stage of common security solutions, including firewalls, Intrusion Detection Systems, Intrusion Detection and Prevention Systems, Honeypot and Honeynet, successful hacking attempts still exist. This paper aims to investigate pre-hacking steps (footprinting, scanning, and enumeration) and to highlight the risk factors that are not considered during the development of current security solutions. These risk factors are the common causes of the failures of current security solutions against many hacking attempts. Moreover, this paper proposes a dynamic security model to guide security researchers towards proposing security countermeasures that address these risk factors, which eventually lead to minimising hacking risks.
Original language | English |
---|---|
Title of host publication | Proceedings of the 25th International Conference on Information Systems Development, ISD 2016 |
Subtitle of host publication | August 24-26, 2016, Katowice, Poland |
Editors | Jerzy Gołuchowski, Małgorzata Pańkowska |
Publisher | Association for Information Systems |
Pages | 586-594 |
Number of pages | 9 |
ISBN (Electronic) | 9788378753070 |
Publication status | Published - 2016 |
Event | International Conference on Information Systems Development 2016 - University of Economics in Katowice, Katowice, Poland Duration: 24 Aug 2016 → 26 Aug 2016 Conference number: 25th http://aisel.aisnet.org/isd2014/proceedings2016/ (AIS Conference Proceedings) |
Conference
Conference | International Conference on Information Systems Development 2016 |
---|---|
Abbreviated title | ISD 2016 |
Country/Territory | Poland |
City | Katowice |
Period | 24/08/16 → 26/08/16 |
Internet address |
|
Keywords
- Dynamic security model
- Enumeration
- Footprinting
- Hacking techniques
- Pre-hacking steps
- Scanning