56 pages, 8928 KiB  
Review
A Comprehensive Review and Assessment of Cybersecurity Vulnerability Detection Methodologies
by Khalid Bennouk, Nawal Ait Aali, Younès El Bouzekri El Idrissi, Bechir Sebai, Abou Zakaria Faroukhi and Dorra Mahouachi
J. Cybersecur. Priv. 2024, 4(4), 853-908; https://doi.org/10.3390/jcp4040040 - 7 Oct 2024
Cited by 7 | Viewed by 16538
Abstract
The number of new vulnerabilities continues to rise significantly each year. Simultaneously, vulnerability databases have challenges in promptly sharing new security events with enough information to improve protections against emerging cyberattack vectors and possible exploits. In this context, several organizations adopt strategies to [...] Read more.
The number of new vulnerabilities continues to rise significantly each year. Simultaneously, vulnerability databases have challenges in promptly sharing new security events with enough information to improve protections against emerging cyberattack vectors and possible exploits. In this context, several organizations adopt strategies to protect their data, technologies, and infrastructures from cyberattacks by implementing anticipatory and proactive approaches to their system security activities. To this end, vulnerability management systems play a crucial role in mitigating the impact of cyberattacks by identifying potential vulnerabilities within an organization and alerting cyber teams. However, the effectiveness of these systems, which employ multiple methods and techniques to identify weaknesses, relies heavily on the accuracy of published security events. For this reason, we introduce a discussion concerning existing vulnerability detection methods through an in-depth literature study of several research papers. Based on the results, this paper points out some issues related to vulnerability databases handling that impact the effectiveness of certain vulnerability identification methods. Furthermore, after summarizing the existing methodologies, this study classifies them into four approaches and discusses the challenges, findings, and potential research directions. Full article
(This article belongs to the Section Security Engineering & Applications)
Show Figures

Figure 1

1 pages, 153 KiB  
Retraction
RETRACTED: Alrubaiq, A.; Alharbi, T. Developing a Cybersecurity Framework for e-Government Project in the Kingdom of Saudi Arabia. J. Cybersecur. Priv. 2021, 1, 302–318
by Abdullah Alrubaiq and Talal Alharbi
J. Cybersecur. Priv. 2024, 4(4), 909; https://doi.org/10.3390/jcp4040041 - 10 Oct 2024
Viewed by 932
Abstract
The journal retracts the article titled “Developing a Cybersecurity Framework for e-Government Project in the Kingdom of Saudi Arabia” [...] Full article
28 pages, 3824 KiB  
Article
A Risk Assessment Analysis to Enhance the Security of OT WAN with SD-WAN
by Van Joshua Abergos and Faiza Medjek
J. Cybersecur. Priv. 2024, 4(4), 910-937; https://doi.org/10.3390/jcp4040042 - 10 Oct 2024
Cited by 3 | Viewed by 4133
Abstract
This paper introduces a comprehensive risk assessment of various wide area network (WAN) technologies as applied to Operational Technology (OT) infrastructures, thus uncovering which WAN technology is best suited for OT to mitigate the risks of Denial of View (DoV), Denial of Control [...] Read more.
This paper introduces a comprehensive risk assessment of various wide area network (WAN) technologies as applied to Operational Technology (OT) infrastructures, thus uncovering which WAN technology is best suited for OT to mitigate the risks of Denial of View (DoV), Denial of Control (DoC), and Denial of Service (DoS). A new risk weight-based evaluation approach is proposed following NIST CSF and ISA/IEC 62443 standard risk scoring (RS). In this approach, RS was modified by introducing new risk metrics, namely, risk (Rn), mitigation (Mm), risk prioritization (WRn), and mitigation prioritization (WMm) to create a specialized probability formula to assess risks on OT WAN infrastructure. The proposed formula has been implemented to automate data analysis and risk scoring across nine WAN technologies. The obtained results demonstrated that software-defined wide area network (SD-WAN) has the best security features that even overshadow its vulnerabilities to perform not just as a WAN solution but as a security solution against DoV, DoC, and DoS. Furthermore, this paper identifies and highlights what to prioritize when designing and assessing an SD-WAN setup. In addition, this paper proposes an SD-WAN-based architecture to reduce DoV, DoC, and DoS risks. Full article
(This article belongs to the Section Security Engineering & Applications)
Show Figures

Figure 1

13 pages, 3721 KiB  
Article
Suspicious Financial Activity in the Context of In-Game Asset Exchange Marketplace
by Emil Eminov and Stephen V. Flowerday
J. Cybersecur. Priv. 2024, 4(4), 938-950; https://doi.org/10.3390/jcp4040043 - 5 Nov 2024
Viewed by 2113
Abstract
In this study, we investigated the expanding problem of suspicious activity when using online in-game asset trading platforms. The decentralized structures and anonymity offered by these platforms provide a basis for suspicious actions, creating a threat to the virtual economy. By evaluating 18,157 [...] Read more.
In this study, we investigated the expanding problem of suspicious activity when using online in-game asset trading platforms. The decentralized structures and anonymity offered by these platforms provide a basis for suspicious actions, creating a threat to the virtual economy. By evaluating 18,157 rows of anonymized transaction data from 38 unique sellers with the help of the interquartile range approach and network analysis, we were able to identify suspicious activities. The results highlight suspicious online activities of individual transactions. This research contributes by identifying new, concerning trends and unraveling complex networks by analyzing in-game asset transaction data. It also assists in informing experts and lawmakers about new suspicious activities. Full article
(This article belongs to the Section Security Engineering & Applications)
Show Figures

Figure 1