Editorial: Journal of Cyber Security and Risk Auditing
By prof Youakim Badr
Abstract
Dear Readers, It is with great pleasure that we introduce to you our upcoming journal, "Journal of Cyber Security and Risk Auditing." This journal is dedicated to exploring the advancements in the field of cybersecurity and providing a platform for researchers and scholars to exchange ideas, fostering progress in the area of cybersecurity and risk auditing. On behalf of the editorial team, I extend our heartfelt gratitude and a warm welcome to the scholars, experts, researchers, and readers who support and follow our journal. Purpose of the Journal The Journal of Cyber Security and Risk Auditing aims to promote the development of cybersecurity fields, enhance the research level of cybersecurity technologies, and strengthen academic exchanges on an international scale. We are committed to building an open, inclusive, and innovative platform for researchers in the field of cybersecurity to present their findings, share experiences, and exchange ideas.
Towards Trustworthy IoT Systems: Cybersecurity Threats, Frameworks, and Future Directions
By Thanaa Alsalem, Mohammed Amin
Abstract
The Internet of Things (IoT) is becoming increasingly integrated into our daily lives. However, this rapid expansion raises significant concerns about future cybersecurity risks and the trustworthiness of this promising technology. This study aims to consolidate existing knowledge on the various cyberattacks and challenges facing IoT security, as well as to review the frameworks and solutions that have been proposed to address them. Additionally, it explores emerging trends and identifies gaps in the current IoT cybersecurity landscape. The literature review revealed that privacy breaches and cybercrimes remain the most pressing concerns. Artificial intelligence has emerged as a promising approach to enhancing cybersecurity in IoT environments. Nevertheless, several threats such as those targeting confidentiality, authentication, and server connectivity remain insufficiently addressed. This highlights the need for broader research and the application of real-world case studies to evaluate the effectiveness of proposed security measures.
Secure Framework for Land Record Management using Blockchain Technology
By Sarah Alyounis, Muhammad Mehboob Yasin
Abstract
Blockchain technology has become wide usage technology that can be integrated to variety of applications in different sectors to enhance the performance, security or to add a layer of implementation with specific features. In some cases it replaces the traditional type of existed systems to provide a solution to specific concernssuch asthe case with land record system. In this research, we provide a brief introduction of the blockchain technology in land administration, analyzing some of existed and proposed frameworks for land administration systems through a systematic review and summarize the results. Also, we highlighted the main benefits of the blockchain technology and the most important vulnerabilities in blockchain platforms. Also, we proposed a private blockchain framework using Hyper- ledger Fabric and highlighted the main reasons to choose such a platform for our system and how it can solve the double spending and tampering issues. Finally, the objective of this research is to provide mechanisms that solve the security issues to answer the research questions and develop and verify the effectiveness of our proposed framework.
A Systematic Review of Security Risk Management for Banking Systems
By Aitizaz Ali, Rami Shehab
Abstract
This study investigates the critical and recent threats and vulnerabilities of the last three years, from 2021 to 2024. The main objective of this article is to discuss the main threats and vulnerabilities facing banking institutions and analyzing these risks and their impact, the main countermeasures and security controls in banking, while interpreting risk management strategies including: identifying, assessing, and mitigating potential risks. This study also analyzes threats, vulnerabilities, and countermeasures in banking field. This work presents a systematic approach to highlight and assess potential vulnerabilities and threats in the banking systems. By understanding threats, vulnerabilities, and countermeasures developers and defenders can anticipate threats and attacks, take measures against them, and completely mitigate them.