digital artifacts

  • 文章类型: Journal Article
    视频会议应用程序Zoom中的与会者后统一资源定位器(URL)功能通常被数字取证专家忽视,认为这是恶意软件传输的潜在风险。然而,能够将网络研讨会参与者重定向到主持人为网络研讨会设置的任何URL,与会者后的URL可能会被不良行为者滥用,以使网络研讨会参与者暴露于恶意网站,或者,在最坏的情况下,强制参与者通过使用直接下载链接URL下载文件。本研究旨在展示如何通过创建一个实验环境来复制此漏洞,该环境涉及四个运行Zoom版本5.7.5的Windows10桌面,并创建一个网络研讨会,其中四个用户帐户充当网络研讨会参与者,并将与会者后URL值设置为包含键盘记录程序的网站的URL。在另一个审判中,利用了相同的实验环境,唯一的区别是设置为将网络研讨会参与者重定向到的下载链接的与会者后URL。jpg文件。在这两种情况下,通过单击在注册网络研讨会后通过电子邮件发送到每个用户帐户的邀请链接加入网络研讨会的每个用户帐户都会重定向到与会者后URL,而不管其用户帐户角色如何。这些结果不仅证明了与会者后URL可以被利用,而且还提供了如何防止这种类型的攻击的见解。
    The post-attendee Uniform Resource Locator (URL) feature within the video conferencing application known as Zoom is often overlooked by digital forensic experts as a potential risk for malware transmission. However, with the ability to redirect webinar participants to any URL set by the host for the webinar, the post-attendee URL can be abused by bad actors to expose webinar participants to malicious websites or, in the worst-case scenario, force participants to download a file through the use of a direct download link URL. This study aims to showcase how this exploit can be replicated by creating an experimental environment involving four Windows 10 desktops running Zoom version 5.7.5 and creating a webinar with four user accounts acting as webinar participants and setting the post-attendee URL value to the URL of a website that contained a keylogger. In another trial, the same experimental environment was utilized, with the only difference being the post-attendee URL that was set to redirect webinar participants to a download link for a .jpg file. In both instances, every user account that joined the webinar via clicking on the invitation link that was emailed to each user account after registering for the webinar was redirected to the post-attendee URL regardless of their user account role. These results not only prove that the post-attendee URL can be exploited, but also provide insight as to how this type of attack can be prevented.
    导出

    更多引用

    收藏

    翻译标题摘要

    我要上传

    求助全文

  • 文章类型: Journal Article
    Electronic health records contain the patient\'s sensitive information. If these data are acquired by a malicious user, it will not only cause the pilferage of the patient\'s personal data but also affect the diagnosis and treatment. One of the most challenging tasks in cloud-based healthcare systems is to provide security and privacy to electronic health records. Various probabilistic data structures and watermarking techniques were used in the cloud-based healthcare systems to secure patient\'s data. Most of the existing studies focus on cuckoo and bloom filters, without considering their throughputs. In this research, a novel cloud security mechanism is introduced, which supersedes the shortcomings of existing approaches. The proposed solution enhances security with methods such as fragile watermark, least significant bit replacement watermarking, class reliability factor, and Morton filters included in the formation of the security mechanism. A Morton filter is an approximate set membership data structure (ASMDS) that proves many improvements to other data structures, such as cuckoo, bloom, semi-sorting cuckoo, and rank and select quotient filters. The Morton filter improves security; it supports insertions, deletions, and lookups operations and improves their respective throughputs by 0.9× to 15.5×, 1.3× to 1.6×, and 1.3× to 2.5×, when compared to cuckoo filters. We used Hadoop version 0.20.3, and the platform was Red Hat Enterprise Linux 6; we executed five experiments, and the average of the results has been taken. The results of the simulation work show that our proposed security mechanism provides an effective solution for secure data storage in cloud-based healthcare systems, with a load factor of 0.9. Furthermore, to aid cloud security in healthcare systems, we presented the motivation, objectives, related works, major research gaps, and materials and methods; we, thus, presented and implemented a cloud security mechanism, in the form of an algorithm and a set of results and conclusions.
    导出

    更多引用

    收藏

    翻译标题摘要

    我要上传

       PDF(Pubmed)

  • 文章类型: Journal Article
    Recreational and leisure activities offer many meaningful and motivating opportunities for communication and improving quality-of-life. Volunteers in recreation activities have important roles as participation and communication facilitators, while also creating opportunities for learning and social interaction. The aim of this study was to implement a novel photo and video intervention called the CAPTURE & Share Program, and to evaluate its impact on communication opportunities and participation. For the study, five volunteers were assigned to five individuals with complex communication needs. Each dyad took photos and videos during a series of three kayaking lessons. After each lesson, volunteers participated in feedback sessions, while caregivers, support staff, and participants with complex communication needs shared their perspectives during pre- and post-lesson interviews. A thematic analysis, based on the data from the volunteer feedback sessions, revealed five primary themes: Program Components, Modifications, Barriers, Supports, and Benefits. Findings revealed that volunteers supported the individuals with complex communication needs who participated in the study to collect photos and videos as they learned how to use cameras and communicate their preferences for capture. Furthermore, the photos and videos that were collected were shared with family and friends, which encouraged more frequent social interactions and opportunities for communication. Findings suggest that recreational activities were perceived to provide an appropriate infrastructure for photo and video capture and to support opportunities for communication.
    导出

    更多引用

    收藏

    翻译标题摘要

    我要上传

       PDF(Sci-hub)

公众号