Mesopotamian Journal of CyberSecurity https://journals.mesopotamian.press/index.php/CyberSecurity <div class="flex flex-grow flex-col gap-3"> <div class="min-h-[20px] flex flex-col items-start gap-4 whitespace-pre-wrap break-words"> <div class="markdown prose w-full break-words dark:prose-invert light"> <p style="text-align: justify;">Attention cybersecurity scholars and researchers! The Mesopotamian Journal of Cybersecurity has successfully launched and is rapidly gaining recognition in the academic community. With three impactful issues already published, our journal is attracting attention from respected publishers such as Scopus, Taylor &amp; Francis, and others. We invite you to contribute your cutting-edge research and insights to our esteemed publication.</p> </div> </div> </div> en-US Tue, 07 May 2024 08:08:20 +0000 OJS 3.3.0.13 http://blogs.law.harvard.edu/tech/rss 60 Cybersecurity for Sustainable Smart Healthcare: State of the Art, Taxonomy, Mechanisms, and Essential Roles https://journals.mesopotamian.press/index.php/CyberSecurity/article/view/360 <p>Cutting-edge technologies have been widely employed in healthcare delivery, resulting in transformative advances and promising enhanced patient care, operational efficiency, and resource usage. However, the proliferation of networked devices and data-driven systems has created new cybersecurity threats that jeopardize the integrity, confidentiality, and availability of critical healthcare data. This review paper offers a comprehensive evaluation of the current state of cybersecurity in the context of smart healthcare, presenting a structured taxonomy of its existing cyber threats, mechanisms and essential roles. This study explored cybersecurity and smart healthcare systems (SHSs). It identified and discussed the most pressing cyber threats and attacks that SHSs face, including fake base stations, medjacking, and Sybil attacks. This study examined the security measures deployed to combat cyber threats and attacks in SHSs. These measures include cryptographic-based techniques, digital watermarking, digital steganography, and many others. Patient data protection, the prevention of data breaches, and the maintenance of SHS integrity and availability are some of the roles of cybersecurity in ensuring sustainable smart healthcare. The long-term viability of smart healthcare depends on the constant assessment of cyber risks that harm healthcare providers, patients, and professionals. This review aims to inform policymakers, healthcare practitioners, and technology stakeholders about the critical imperatives and best practices for fostering a secure and resilient smart healthcare ecosystem by synthesizing insights from multidisciplinary perspectives, such as cybersecurity, healthcare management, and sustainability research. Understanding the most recent cybersecurity measures is critical for controlling escalating cyber threats and attacks on SHSs and networks and encouraging intelligent healthcare delivery.</p> Guma Ali, Maad M. Mijwil Copyright (c) 2024 Guma Guma, Maad M. Mijwil https://creativecommons.org/licenses/by/4.0 https://journals.mesopotamian.press/index.php/CyberSecurity/article/view/360 Thu, 23 May 2024 00:00:00 +0000 Cybersecurity Awareness among Special Needs Students: The Role of Parental Control https://journals.mesopotamian.press/index.php/CyberSecurity/article/view/259 <p>The awareness of cybersecurity among special needs students is necessary to help them stay safe while using technology. Recently, a good amount of interest has been drawn toward understanding the concepts and awareness of cybersecurity, and institutions have made efforts to help introduce awareness campaigns to help students understand the concepts of cybersafety, particularly for special needs students. The prior literature has focused primarily on exploring students' preferences, readiness, and experiences with cybersecurity. However, little attention has been given to measuring the level of cybersecurity awareness among students with special needs. To bridge this knowledge gap, the present study conducted an online survey to analyse the level of cybersecurity awareness and parental control among secondary school students with special needs aged 13 to 19 years in Malaysia. The study revealed that special needs students have a moderate level of cybersecurity awareness, with no significant difference among genders or academic streams. However, age does play a role in the level of awareness. Students with better cybersecurity knowledge are more satisfied with their online activities. Educating and monitoring special needs students on cyberattacks, password management, and phishing is crucial. In addition, parental control was found to be reasonable for most parents of students with special needs. This study contributes new knowledge by emphasizing the importance of parental control as a moderating variable in explanatory studies. It also highlights the need for further research in this area to expand the understanding of the importance of cybersecurity and how it can be implemented in specific school environments.</p> Hapini Awang, Nur Suhaili Mansor (Author); Mohamad Fadli Zolkipli; Sarkin Tudu Shehu Malami , Khuzairi Mohd Zaini, Yau Ti Dun (Author) Copyright (c) 2024 Hapini Awang, Nur Suhaili Mansor (Author); Mohamad Fadli Zolkipli; Sarkin Tudu Shehu Malami , Khuzairi Mohd Zaini, Yau Ti Dun (Author) https://creativecommons.org/licenses/by/4.0 https://journals.mesopotamian.press/index.php/CyberSecurity/article/view/259 Mon, 10 Jun 2024 00:00:00 +0000 Transaction Security and Management of Blockchain-Based Smart Contracts in E-Banking-Employing Microsegmentation and Yellow Saddle Goatfish https://journals.mesopotamian.press/index.php/CyberSecurity/article/view/281 <p>The process security of money transactions is considered an important issue in e-banking. Additionally, it is an enormous problem if never controlled. particular, security should be a combination of fast and sturdy characteristics, which is the subject of previous studies suffered from. Our research attempts to improve the system in which banks deal with the security of financial transactions. This research leverages the idea of microsegmenting the entire system into designated zones to concentrate on security, where each zone has its own rules and limitations. These rules are managed by a smart contract, which decides whether they have been observed to verify the legitimacy of the customer. First, the two-phase commit algorithm (2PC) was used to specify the type of e-banking request. After this, the microsegmentation principle was applied to isolate each type of e-transaction process alone in a separate segment. Then, the yellow saddle goatfish algorithm (YSGA) was used to determine whether the smart contract conditions were optimized. Finally, if the customer is authorized, then the entire transaction process is saved in the blockchain's main ledger and secured by a unique hash. The blockchain application makes our system capable of dealing with large numbers of users in a decentralized manner. In addition, using a hash with each block prevents fraudulent transactions by adversaries. Our system has been examined against several recent well-known assaults/attacks, such as falsification, advanced persistent threat, bribery, spoofing, double spending, chosen text, race, and transaction replay attacks, and has proven to overcome them. In terms of the performance evaluation, we obtained an execution time of approximately 0.0056 nanoseconds, 3.75% complexity, and 1500 KB of memory and disk drive, which is considered low compared to that of state-of-the-art research. Thus, our proposed system is highly acceptable for banking sector applications.</p> Mishall Al-Zubaidie, Wid Copyright (c) 2024 Mishall Al-Zubaidie, Wid https://creativecommons.org/licenses/by/4.0 https://journals.mesopotamian.press/index.php/CyberSecurity/article/view/281 Thu, 09 May 2024 00:00:00 +0000