https://journals.mesopotamian.press/index.php/CyberSecurity/issue/feed Mesopotamian Journal of CyberSecurity 2024-06-11T00:43:22+00:00 Open Journal Systems <div class="flex flex-grow flex-col gap-3"> <div class="min-h-[20px] flex flex-col items-start gap-4 whitespace-pre-wrap break-words"> <div class="markdown prose w-full break-words dark:prose-invert light"> <p style="text-align: justify;">Attention cybersecurity scholars and researchers! The Mesopotamian Journal of Cybersecurity has successfully launched and is rapidly gaining recognition in the academic community. With three impactful issues already published, our journal is attracting attention from respected publishers such as Scopus, Taylor &amp; Francis, and others. We invite you to contribute your cutting-edge research and insights to our esteemed publication.</p> </div> </div> </div> https://journals.mesopotamian.press/index.php/CyberSecurity/article/view/281 Transaction Security and Management of Blockchain-Based Smart Contracts in E-Banking-Employing Microsegmentation and Yellow Saddle Goatfish 2024-03-17T11:16:13+00:00 Mishall Al-Zubaidie mishall_zubaidie@utq.edu.iq Wid Jebbar widalaa.23co4@utq.edu.iq <p>The process security of money transactions is considered an important issue in e-banking. Additionally, it is an enormous problem if never controlled. particular, security should be a combination of fast and sturdy characteristics, which is the subject of previous studies suffered from. Our research attempts to improve the system in which banks deal with the security of financial transactions. This research leverages the idea of microsegmenting the entire system into designated zones to concentrate on security, where each zone has its own rules and limitations. These rules are managed by a smart contract, which decides whether they have been observed to verify the legitimacy of the customer. First, the two-phase commit algorithm (2PC) was used to specify the type of e-banking request. After this, the microsegmentation principle was applied to isolate each type of e-transaction process alone in a separate segment. Then, the yellow saddle goatfish algorithm (YSGA) was used to determine whether the smart contract conditions were optimized. Finally, if the customer is authorized, then the entire transaction process is saved in the blockchain's main ledger and secured by a unique hash. The blockchain application makes our system capable of dealing with large numbers of users in a decentralized manner. In addition, using a hash with each block prevents fraudulent transactions by adversaries. Our system has been examined against several recent well-known assaults/attacks, such as falsification, advanced persistent threat, bribery, spoofing, double spending, chosen text, race, and transaction replay attacks, and has proven to overcome them. In terms of the performance evaluation, we obtained an execution time of approximately 0.0056 nanoseconds, 3.75% complexity, and 1500 KB of memory and disk drive, which is considered low compared to that of state-of-the-art research. Thus, our proposed system is highly acceptable for banking sector applications.</p> 2024-05-09T00:00:00+00:00 Copyright (c) 2024 Mishall Al-Zubaidie, Wid https://journals.mesopotamian.press/index.php/CyberSecurity/article/view/360 Cybersecurity for Sustainable Smart Healthcare: State of the Art, Taxonomy, Mechanisms, and Essential Roles 2024-05-16T19:03:50+00:00 Guma Ali a.guma@muni.ac.ug Maad M. Mijwil maadalnaimiy@gmail.com <p>Cutting-edge technologies have been widely employed in healthcare delivery, resulting in transformative advances and promising enhanced patient care, operational efficiency, and resource usage. However, the proliferation of networked devices and data-driven systems has created new cybersecurity threats that jeopardize the integrity, confidentiality, and availability of critical healthcare data. This review paper offers a comprehensive evaluation of the current state of cybersecurity in the context of smart healthcare, presenting a structured taxonomy of its existing cyber threats, mechanisms and essential roles. This study explored cybersecurity and smart healthcare systems (SHSs). It identified and discussed the most pressing cyber threats and attacks that SHSs face, including fake base stations, medjacking, and Sybil attacks. This study examined the security measures deployed to combat cyber threats and attacks in SHSs. These measures include cryptographic-based techniques, digital watermarking, digital steganography, and many others. Patient data protection, the prevention of data breaches, and the maintenance of SHS integrity and availability are some of the roles of cybersecurity in ensuring sustainable smart healthcare. The long-term viability of smart healthcare depends on the constant assessment of cyber risks that harm healthcare providers, patients, and professionals. This review aims to inform policymakers, healthcare practitioners, and technology stakeholders about the critical imperatives and best practices for fostering a secure and resilient smart healthcare ecosystem by synthesizing insights from multidisciplinary perspectives, such as cybersecurity, healthcare management, and sustainability research. Understanding the most recent cybersecurity measures is critical for controlling escalating cyber threats and attacks on SHSs and networks and encouraging intelligent healthcare delivery.</p> 2024-05-23T00:00:00+00:00 Copyright (c) 2024 Guma Guma, Maad M. Mijwil https://journals.mesopotamian.press/index.php/CyberSecurity/article/view/259 Cybersecurity Awareness among Special Needs Students: The Role of Parental Control 2024-06-11T00:43:22+00:00 Hapini Awang hapini.awang@uum.edu.my Nur Suhaili Mansor nursuhaili@uum.edu.my Mohamad Fadli Zolkipli m.fadli.zolkipli@uum.edu.my Sarkin Tudu Shehu Malami stjabo@gmail.com Khuzairi Mohd Zaini khuzairi@uum.edu.my Ti Dun Yau alan.yau@tainocate.com <p>The awareness of cybersecurity among special needs students is necessary to help them stay safe while using technology. Recently, a good amount of interest has been drawn toward understanding the concepts and awareness of cybersecurity, and institutions have made efforts to help introduce awareness campaigns to help students understand the concepts of cybersafety, particularly for special needs students. The prior literature has focused primarily on exploring students' preferences, readiness, and experiences with cybersecurity. However, little attention has been given to measuring the level of cybersecurity awareness among students with special needs. To bridge this knowledge gap, the present study conducted an online survey to analyse the level of cybersecurity awareness and parental control among secondary school students with special needs aged 13 to 19 years in Malaysia. The study revealed that special needs students have a moderate level of cybersecurity awareness, with no significant difference among genders or academic streams. However, age does play a role in the level of awareness. Students with better cybersecurity knowledge are more satisfied with their online activities. Educating and monitoring special needs students on cyberattacks, password management, and phishing is crucial. In addition, parental control was found to be reasonable for most parents of students with special needs. This study contributes new knowledge by emphasizing the importance of parental control as a moderating variable in explanatory studies. It also highlights the need for further research in this area to expand the understanding of the importance of cybersecurity and how it can be implemented in specific school environments.</p> 2024-06-10T00:00:00+00:00 Copyright (c) 2024 Hapini Awang, Nur Suhaili Mansor (Author); Mohamad Fadli Zolkipli; Sarkin Tudu Shehu Malami , Khuzairi Mohd Zaini, Yau Ti Dun (Author)