2020 8th International Symposium on Digital Forensics and Security (ISDFS) 2020
DOI: 10.1109/isdfs49300.2020.9116446
|View full text |Cite
|
Sign up to set email alerts
|

On the Cyber Security of Lebanon: A Large Scale Empirical Study of Critical Vulnerabilities

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
1
0
2

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 0 publications
0
1
0
2
Order By: Relevance
“…As shown in Table 2, most of the vulnerabilities are in the network equipment generated by Chinese companies, and it also implies that the Mozi makers are familiar with the situation in China. To more clearly analyze the scope of impact of the vulnerability exploited by Mozi, we used the cyberspace search engine FOFA 28 to count the number of online users worldwide according to the characteristics of device fingerprints, as shown in the FOFA column of Table 2. Through statistical data analysis, it is found that the total number of devices with related vulnerabilities is expected to exceed one million, which means that Mozi is likely to control more than million devices.…”
Section: The Operation Of Mozimentioning
confidence: 99%
“…As shown in Table 2, most of the vulnerabilities are in the network equipment generated by Chinese companies, and it also implies that the Mozi makers are familiar with the situation in China. To more clearly analyze the scope of impact of the vulnerability exploited by Mozi, we used the cyberspace search engine FOFA 28 to count the number of online users worldwide according to the characteristics of device fingerprints, as shown in the FOFA column of Table 2. Through statistical data analysis, it is found that the total number of devices with related vulnerabilities is expected to exceed one million, which means that Mozi is likely to control more than million devices.…”
Section: The Operation Of Mozimentioning
confidence: 99%
“…Dimana pada tahun 2018 telah ditemukan kerentanan terkait perangkat Mikrotik yaitu CVE-2018-14847 yang memungkinkan akses ke router Mikrotik. Serangan ini memberikan akses ke file dan akses di rektori, serta memperoleh kredensial akun Administrator [2], [3], [4]. Serangan berikutnya adalah DNS redirection merupakan serangan yang menargetkan cache DNS pada router.…”
Section: Pendahuluanunclassified
“…Penyebab utama yang diidentifikasi ialah kurangnya praktik keamanan inti yakni patch management. Maka perlu ada evaluasi yang perlu melibatkan berbagai pihak dari sektor publik dan swasta untuk melakukan analisis dan mitigasi resiko dengan lebih baik (Fadlallah et al, 2020).…”
Section: Strategi Lebanon Dalam Meningkatkan Keamanan Ruang Siberunclassified