english

A Cybersecurity Overview of the Canadian Health Sector

This research report written by Louis Melançon for Serene-risc in August 2020, provides a cybersecurity overview of the Canadian health sector. It looks at the latest statistics concerning the cybersecurity practices of Canadian health businesses. This report also presents each of the five major cyber threats to healthcare and examines the recommended security safeguards and measures. Finally, it covers …

Personalizing Nudges for better decision-making

Nudging has proven itself in various areas such as health, education, finance, security and privacy. Nudging argues that to facilitate decision-making, it is better to make the process easy, more attractive, and socially desirable rather than relying on the establishment of strict policies, prohibitions or even sanctions. Nudging can take several forms, such as labelling …

Sharing is Caring: A collaborative framework for sharing security alerts

A threat detection system that aims to be collaborative and active cannot function without adequate communication between the actors involved. In particular, an exchange of information about responses to security incidents allows better identification and prevention of future incidents while enabling them to be isolated faster. On the other hand, the main problem that seems …

Interplay and psychopathological risk of nomophobia and cyber-bullying

The increase in daily and excessive use of cell phones in the past decade has contributed significantly to the rise in nomophobia. Nomophobia is an indicator of the anxiety experienced by smartphone users (or any technology connected to the Internet) when they face the inability to use these devices. For its part, cyber-bullying consists of …

Social advantages and disadvantages associated with cyber aggression-victimization

According to Schoffstall and Cohen (2011), cyber aggression is defined as behaviour committed with the intent to harm an individual, using a computer, cell phone or other electronic devices. In addition, the authors nuanced that the behaviour must be perceived as aversive by the victim. Cyber victimization is like cyber aggression but includes in its …

Review on the Security Threats of Internet of Things

The Internet of Things (IoT), cloud computing technology, and health technologies are essential tools in 2021 to ensure the well-being and running of individuals and organizations’ activities in our society. However, considering the importance of connected objects and the irreplaceable place they occupy, it is vital to ensure that they are well protected against malware …

Enhancing relationships between criminology and cybersecurity

Considering that cybersecurity and cybercrime are often used in the cyber world, should they be related? Cybercrime represents the study of all “cyber” crimes. When mentioned, it is generally referring to the field of study of traditional offences committed on the Internet, crimes that have been created and which take shape strictly on the Internet …

Passwords and Bicycle attaks

Cybersecurity bicycle attacks consist of data leaks caused by a security weakness related to password length through encrypted traffic. This terminology, coined by Vranken (2016), was created following the observation by this researcher that SSL (unpadded) traffic can allow the disclosure of information about the length of passwords. He named this phenomenon the “bicycle attack,” …