OIC-CERT JOURNAL OF CYBER SECURITY
ISSN 2636-9680 | eISSN 2682-9266


 

 

Indexing:

 

Abstracted and indexed in:

 

 

 

Future:

 

 

Edition > Volume 2 > Issue 1

VOLUME 2, ISSUE 1

 

Title:

A Systematic Literature Review on the Security and Privacy of the Blockchain and Cryptocurrency

 

 

Author(s):

Aslinda Hassan, Mohd Zaki Mas'ud, Wahidah Md. Shah, Shekh Faisal Abdul-Latip, Rabiah Ahmad, Aswami Ariffin & Zahri Yunos

 

 

Abstract:

A blockchain can be summarized as a decentralized ledger of all transactions across a peer-to-peer network. It is the main technology behind the large number of diverse cryptocurrencies that are currently available in circulation. Since its introduction, the blockchain technology has shown promising application prospects and attracted lot of attention from both academia and industry.

 

 



Title:

Cloud Forensic Challenges and Recommendations: A Review

 

 

Author(s):

Warusia Yassin, Mohd Faizal Abdollah, Rabiah Ahmad, Zahri Yunos & Aswami Ariffin

 

 

Abstract:

Cloud computing becomes more popular since the emergence of the Fourth Industrial Revolution (IR 4.0) as almost all internet services are highly dependent on high-end networks of server computers. The large-scale used on the internet around the world may cause the cloud server to be highly exposed to cyber threats and it is very difficult to apply forensic method specifically in conducting cloud forensic investigation.

 

 



Title:

Digital Certificate’s Level of Assurance Development with Information Value and Sensitivity Measurement

 

 

Author(s):

Nikson Badua Putra & Arry Akhmad Arman

 

 

Abstract:

This paper presents the research to develop the digital certificate's level of assurance. The level of assurance (LoA) in this paper is a level of assurance which reflects the authenticity degree of digital certificate's ownership. This LoA has a three-level, which define in four LoA standards such as ISO 29115: 2013, NIST SP 800-63-3, STORK, and KANTARA.

 

 



Title:

Identity-Division Multiplexing Technique for Enhancing Privacy of Paging Procedure in LTE

 

 

Author(s):

Abdulrahman Muthana & Abdulraqeb Al-Samei

 

 

Abstract:

Despite efforts have been made by Long Term Evolution (LTE) toward enhancing privacy preserving capabilities, LTE is still vulnerable to privacy attacks. This paper evaluates the privacy issues of paging procedure in LTE and suggests a solution for enhancing the privacy of paging procedure in LTE. The solution introduces the Identity-Division Multiplexing (IDM) technique, in which the total sequence of temporary mobile subscriber identifiers M-TMSIs (232 unique M-TMSI identities) is divided into a series of overlapping M-TMSIs ranges, each of which is allocated to one or more user equipment (UE).

 

 



Title:

Knowledge Impact on Information Quality, Service Quality and System Quality for Security of 1GovUC

 

 

Author(s):

Rossly Salleh & Azni Haslizan Ab Halim

 

 

Abstract:

The users play a crucial role in information system (IS) implementation. They are the ones who learned, utilized, and experienced the system. Studying and understanding user satisfaction are important since user satisfaction – along with the quality of the system, the utilization by the users, and the support the users received during the system implementation – are all important aspects that influenced the IS success.

 

 



Title:

Malware Discovery using Lebahnet Technology

 

 

Author(s):

Fathi Kamil Mohad Zainudin, Izzatul Hazirah Ishak, Sharifuddin Sulaman, Farah Ramlee, Nur Sarah Jamaludin & Shuaib Chantando

 

 

 

Abstract:

Recent trends indicate that the cyber-crimes caused by the malware is increasing as these malicious tools are authored to spread through multiple platform and affecting the millions of users. In order to explore new attack and exploitation trends, virtual honeypot is used to simulate the virtual computer systems at the network level.

 

 



Title:

Securing the OLSR Routing Protocol

 

 

Author(s):

Amin Nurian Dehkordi & Fazlollah Adibnia

 

 

Abstract:

Mobile Ad-hoc networks are self-organized wireless mobile networks that do not rely on any fixed network infrastructure. Due to limited capability including battery, local memory, CPU cycle, any design of protocols in these networks has to consider these limitations. Trust always exists in protocols, which their running are based on cooperation, especially in routing operations between the nodes in these networks.

 

 

 


Title:

The Development of Constraints in Role-based Access Control: A Systematic Review

 

 

Author(s):

Nazirah Abd Hamid, Rabiah Ahmad & Siti Rahayu Selamat

 

 

Abstract:

Role-based access control (RBAC) model attracts many organizations to transform their traditional access control method to RBAC model mainly because of the security features in the RBAC. The RBAC model is generated to achieve security objectives and to do so, RBAC enforces various constraints to accomplish those objectives.