Cyber Security by a New Analogy: "The Allegory of the 'Mobile'Cave"

2018-01-01
Canbek, Gurol
Mobile devices as the most pervasive technology enablers also bring new security risks in cyberspace. However, related cyber security studies mainly focus on technologies and practices rather than fundamentals and root causes. These studies may also omit the current scientific knowledge gained on other relevant or irrelevant domains that may be adapted to cyber security and ignore human nature that is more important than technology and processes. This study surveys and associates all the analogical methods and proposes them to avoid such problems. Several examples on each analogical method are collectively provided to explore cyber/mobile security as a multidisciplinary complex domain and uncover some unknown facts or inconspicuous matters from other domains. As cyber attacks continue globally and effective cyber security could not be established, analogical methods will be method of choice. The study also extends the scientific inquiry with analogy and proposes a new comprehensive allegoric approach that is unprecedented in cyber security literature and questions mobile technologies and their security based on Plato's infamous allegory of the cave.
JOURNAL OF APPLIED SECURITY RESEARCH

Suggestions

Adaptable Safety and Security in V2X Systems
VİLLARREAL VASQUEZ, Miguel; BHARGAVA, Bharat; Angın, Pelin (2017-06-30)
With the advances in the areas of mobile computing and wireless communications, V2X systems have become a promising technology enabling deployment of applications providing road safety, traffic efficiency and infotainment. Due to their increasing popularity, V2X networks have become a major target for attackers, making them vulnerable to security threats and network conditions, and thus affecting the safety of passengers, vehicles and roads. Existing research in V2X does not effectively address the safety, ...
Eye Tracking Scanpath Analysis Techniques on Web Pages: A Survey, Evaluation and Comparison
Eraslan, Sukru; Yesilada, Yeliz; Harper, Simon (2016-01-01)
Eye tracking has commonly been used to investigate how users interact with web pages, with the goal of improving their usability. This article comprehensively revisits the techniques that could be applicable to eye tracking data for analysing user scanpaths on web pages. It also uses a third-party eye tracking study to compare these techniques. This allows researchers to recognise existing techniques for their goals, understand how they work and know their strengths and limitations so that they can make an ...
Safety assessment in megaprojects using artificial intelligence
Ayhan, Bilal Umut; Tokdemir, Onur Behzat (Elsevier BV, 2019-10-01)
Record keeping systems are gaining more importance in addressing safety problems in megaprojects. The information recorded is being converted into large data domains since it has become necessary to examine problems down to the last detail to deal with them properly. Due to a high number of attributes and the type of information, the data has a high level of heterogeneity. The aim of this paper is to propose an innovative safety assessment methodology to predict the possible scenarios and determine preventa...
Performance evaluation of lightweight cryptographic algorithms for internet of things security
Polat, Selahattin; Baykal, Nazife; Department of Cyber Security (2019)
Widespread deployment of mobile and embedded devices in everyday use has brought up not only new concepts and application areas such as Internet-of-Things (IoT) but also several security and privacy problems. In theory, it is possible to mitigate most of these problems by implementing well-known and standardized security algorithms and techniques on IoT devices. However, in practice, it is rather difficult, if not impossible, to implement standard security algorithms on these devices due to their limited re...
Adversarial Attacks on Continuous Authentication Security: A Dynamic Game Approach
Sarıtaş, Serkan; Sandberg, Henrik; Dan, Gyorgy (2019-01-01)
Identity theft through phishing and session hijacking attacks has become a major attack vector in recent years, and is expected to become more frequent due to the pervasive use of mobile devices. Continuous authentication based on the characterization of user behavior, both in terms of user interaction patterns and usage patterns, is emerging as an effective solution for mitigating identity theft, and could become an important component of defense-in-depth strategies in cyber-physical systems as well. In th...
Citation Formats
G. Canbek, “Cyber Security by a New Analogy: “The Allegory of the ’Mobile’Cave”,” JOURNAL OF APPLIED SECURITY RESEARCH, pp. 63–88, 2018, Accessed: 00, 2020. [Online]. Available: https://hdl.handle.net/11511/63808.