Journal of Cybersecurity and Information Management

Journal DOI

https://doi.org/10.54216/JCIM

Submit Your Paper

2690-6775ISSN (Online) 2769-7851ISSN (Print)

Systematic Literature Review on Quantum Cryptography

Manav Sohal , Mandeep Kaur Sandhu , Rupinder kaur

In the field of cryptography, new tasks are generated when advancement has taken place from conventional computing to quantum computing. In the case of computer security, cryptography had always been a valuable and essential tool. When quantum mechanics principles are applied to cryptography, it gives rise to a new system that will secure communication and also assures that no spying can take place. The work below presents the review on quantum cryptography, which includes the concept of quantum cryptography and what can be its evaluation measures. Articles of quantum cryptography from various databases have been studied. In this SLR various research questions are identified and on the basis of the results of their answers have been formulated for this review along with that various performance measures are also discussed.

Read More

Doi: https://doi.org/10.54216/JCIM.070101

Vol. 7 Issue. 1 PP. 05-12, (2021)

Impact of Cyber Attack on Saudi Aramco

Mohammed. I.alghamdi

  Saudi Aramco is the world’s leading oil producer based in Saudi Arabia. Around 1/10th of oil is exported from this organization to the world. Oil production is the major source of revenue for Saudi Arabia and its economy relies completely on it. The Shamoon virus attacked Saudi Aramco in August 2012. The country receives over 80% to 90% of total revenues from the exports of oil and contributes over 40% of the GDP [8]. Shamoon spread from the company's network and removed all of the hard drives. The company was limited only to office workstations and the software was not affected by the virus, due to which all technical operations could have been affected. It was the most disastrous cyber attack in the history of Saudi Arabia. Around 30,000 workstations had been infected by the virus. This paper also discusses the effects of Ransomware which recently attacked Aramco. Apart from that, we will also discuss some suggestions and security measures to prevent those attacks. 

Read More

Doi: https://doi.org/10.54216/JCIM.070102

Vol. 7 Issue. 1 PP. 13-21, (2021)

Audit, Validation, Verification and Assessment for Safety and Security Standards

Robert Kemp , Richard Smith

Internal auditing is important for ensuring compliance to multiple safety and security standards. The problem is that although safety and security have similarities when it comes to auditing, they also have differences that makes auditing both areas under the same process difficult. This paper has shown how to overcome those differences and leverage the similarities to create one auditing process for both safety and security. The paper has harmonized the different terminology between safety and security and showed how the new auditing process can allow compliance to IEC 61508, ISO 27001 and IEC 62443.

Read More

Doi: ttps://doi.org/10.54216/JCIM.070103

Vol. 7 Issue. 1 PP. 22-50, (2021)

A New Chaos-based Approach for Robust Image Encryption

Ibrahim Yasser , Abeer T. Khalil , Mohamed A. Mohamed , Fahmi Khalifa

Chaotic encryptions offered various advantages over traditional encryption methods, like high security, speed, reasonable computational overheads. This paper introduces novel perturbation techniques for data encryption based on double chaotic systems. A new technique for image encryption utilizing mixed the proposed chaotic maps is presented. The proposed hybrid system parallels and combines two chaotic maps as part of a new chaotification method. It based on permutation, diffusion and system parameters, which are then involved in pixel shuffling and substitution operations, respectively. Many statistical test and security analysis indicate the validity of the results, e.g., the average values for NPCR and UACI are 99.67145% and 33.63288%, respectively. The proposed technique can achieve low residual intelligibility, high sensitivity and quality of recovered data, high security performance, and it show that the encrypted image has good resistance against attacks. 

Read More

Doi: https://doi.org/10.54216/JCIM.070104

Vol. 7 Issue. 1 PP. 51-64, (2021)