Abstract

Communication technologies have a significant influence on the business industry. Exchanging information, storing and retrieving data, and cutting communication costs are prime reasons for relying heavily on these technologies. However, these technologies are significantly affected by hacking. Due to neglecting the behaviour of hackers during the initial design stage of common security solutions, including firewalls, Intrusion Detection Systems, Intrusion Detection and Prevention Systems, Honeypot and Honeynet, successful hacking attempts still exist. This paper aims to investigate pre-hacking steps (footprinting, scanning, and enumeration) and to highlight the risk factors that are not considered during the development of current security solutions. These risk factors are the common causes of the failures of current security solutions against many hacking attempts. Moreover, this paper proposes a dynamic security model to guide security researchers towards proposing security countermeasures that address these risk factors, which eventually lead to minimising hacking risks.

Recommended Citation

Alsunbul, S.A., Le, P.D., Newmarch, J., & Tan, J. (2016). A Dynamic Security Model for Addressing Hacking Risk Factors. In J. Gołuchowski, M. Pańkowska, C. Barry, M. Lang, H. Linger, & C. Schneider (Eds.), Information Systems Development: Complexity in Information Systems Development (ISD2016 Proceedings). Katowice, Poland: University of Economics in Katowice. ISBN: 978-83-7875-307-0. http://aisel.aisnet.org/isd2014/proceedings2016/General/1.

Paper Type

Event

Share

COinS
 

A Dynamic Security Model for Addressing Hacking Risk Factors

Communication technologies have a significant influence on the business industry. Exchanging information, storing and retrieving data, and cutting communication costs are prime reasons for relying heavily on these technologies. However, these technologies are significantly affected by hacking. Due to neglecting the behaviour of hackers during the initial design stage of common security solutions, including firewalls, Intrusion Detection Systems, Intrusion Detection and Prevention Systems, Honeypot and Honeynet, successful hacking attempts still exist. This paper aims to investigate pre-hacking steps (footprinting, scanning, and enumeration) and to highlight the risk factors that are not considered during the development of current security solutions. These risk factors are the common causes of the failures of current security solutions against many hacking attempts. Moreover, this paper proposes a dynamic security model to guide security researchers towards proposing security countermeasures that address these risk factors, which eventually lead to minimising hacking risks.