Stock Exchange Threat Modeling, EGX as a Case Study View Full Text


Ontology type: schema:Chapter     


Chapter Info

DATE

2018

AUTHORS

Ehab ElShafei , Nashwa AbdelBaki

ABSTRACT

Cyber crime is a growing threat affecting all business sectors. Stock Exchanges, a financial services sector, are not far from it. Trading stocks via Internet exposes the process to cyber threats that might take advantage of a system defect to breach security and cause possible harm. Online Trading websites are protected by various security systems. Digital Certificate, which is based on Secure Socket Layer (SSL) protocol, is an example. This research examines implementation of Digital Certificate in online trading servers. This evaluation helps to identify security weaknesses and take actions for protection improvement. More... »

PAGES

203-212

References to SciGraph publications

  • 2015. Financial Development, Bank Efficiency, and Economic Growth Across the Mediterranean in ECONOMIC AND SOCIAL DEVELOPMENT OF THE SOUTHERN AND EASTERN MEDITERRANEAN COUNTRIES
  • Book

    TITLE

    Proceedings of the International Conference on Advanced Intelligent Systems and Informatics 2017

    ISBN

    978-3-319-64860-6
    978-3-319-64861-3

    Author Affiliations

    Identifiers

    URI

    http://scigraph.springernature.com/pub.10.1007/978-3-319-64861-3_19

    DOI

    http://dx.doi.org/10.1007/978-3-319-64861-3_19

    DIMENSIONS

    https://app.dimensions.ai/details/publication/pub.1091392918


    Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
    Incoming Citations Browse incoming citations for this publication using opencitations.net

    JSON-LD is the canonical representation for SciGraph data.

    TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

    [
      {
        "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
        "about": [
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Data Format", 
            "type": "DefinedTerm"
          }, 
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Information and Computing Sciences", 
            "type": "DefinedTerm"
          }
        ], 
        "author": [
          {
            "affiliation": {
              "alternateName": "Nile University", 
              "id": "https://www.grid.ac/institutes/grid.440877.8", 
              "name": [
                "Nile University"
              ], 
              "type": "Organization"
            }, 
            "familyName": "ElShafei", 
            "givenName": "Ehab", 
            "id": "sg:person.0745032215.16", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.0745032215.16"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "Nile University", 
              "id": "https://www.grid.ac/institutes/grid.440877.8", 
              "name": [
                "Nile University"
              ], 
              "type": "Organization"
            }, 
            "familyName": "AbdelBaki", 
            "givenName": "Nashwa", 
            "id": "sg:person.010062432325.70", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010062432325.70"
            ], 
            "type": "Person"
          }
        ], 
        "citation": [
          {
            "id": "https://doi.org/10.1145/1124772.1124861", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1003721226"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1145/2508859.2516694", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1026535238"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-319-11122-3_14", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1026566090", 
              "https://doi.org/10.1007/978-3-319-11122-3_14"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1016/j.jeconbus.2014.03.002", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1026621435"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/mic.2014.86", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1061404320"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.2139/ssrn.2912908", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1090424726"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/iscc.2015.7405513", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1094931914"
            ], 
            "type": "CreativeWork"
          }
        ], 
        "datePublished": "2018", 
        "datePublishedReg": "2018-01-01", 
        "description": "Cyber crime is a growing threat affecting all business sectors. Stock Exchanges, a financial services sector, are not far from it. Trading stocks via Internet exposes the process to cyber threats that might take advantage of a system defect to breach security and cause possible harm. Online Trading websites are protected by various security systems. Digital Certificate, which is based on Secure Socket Layer (SSL) protocol, is an example. This research examines implementation of Digital Certificate in online trading servers. This evaluation helps to identify security weaknesses and take actions for protection improvement.", 
        "editor": [
          {
            "familyName": "Hassanien", 
            "givenName": "Aboul Ella", 
            "type": "Person"
          }, 
          {
            "familyName": "Shaalan", 
            "givenName": "Khaled", 
            "type": "Person"
          }, 
          {
            "familyName": "Gaber", 
            "givenName": "Tarek", 
            "type": "Person"
          }, 
          {
            "familyName": "Tolba", 
            "givenName": "Mohamed F.", 
            "type": "Person"
          }
        ], 
        "genre": "chapter", 
        "id": "sg:pub.10.1007/978-3-319-64861-3_19", 
        "inLanguage": [
          "en"
        ], 
        "isAccessibleForFree": false, 
        "isPartOf": {
          "isbn": [
            "978-3-319-64860-6", 
            "978-3-319-64861-3"
          ], 
          "name": "Proceedings of the International Conference on Advanced Intelligent Systems and Informatics 2017", 
          "type": "Book"
        }, 
        "name": "Stock Exchange Threat Modeling, EGX as a Case Study", 
        "pagination": "203-212", 
        "productId": [
          {
            "name": "doi", 
            "type": "PropertyValue", 
            "value": [
              "10.1007/978-3-319-64861-3_19"
            ]
          }, 
          {
            "name": "readcube_id", 
            "type": "PropertyValue", 
            "value": [
              "eddf3ef1c71c3a5205370dcfd58813c0c87e9ba2a5824b7e996d08cc9c5455c5"
            ]
          }, 
          {
            "name": "dimensions_id", 
            "type": "PropertyValue", 
            "value": [
              "pub.1091392918"
            ]
          }
        ], 
        "publisher": {
          "location": "Cham", 
          "name": "Springer International Publishing", 
          "type": "Organisation"
        }, 
        "sameAs": [
          "https://doi.org/10.1007/978-3-319-64861-3_19", 
          "https://app.dimensions.ai/details/publication/pub.1091392918"
        ], 
        "sdDataset": "chapters", 
        "sdDatePublished": "2019-04-15T14:29", 
        "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
        "sdPublisher": {
          "name": "Springer Nature - SN SciGraph project", 
          "type": "Organization"
        }, 
        "sdSource": "s3://com-uberresearch-data-dimensions-target-20181106-alternative/cleanup/v134/2549eaecd7973599484d7c17b260dba0a4ecb94b/merge/v9/a6c9fde33151104705d4d7ff012ea9563521a3ce/jats-lookup/v90/0000000001_0000000264/records_8669_00000280.jsonl", 
        "type": "Chapter", 
        "url": "http://link.springer.com/10.1007/978-3-319-64861-3_19"
      }
    ]
     

    Download the RDF metadata as:  json-ld nt turtle xml License info

    HOW TO GET THIS DATA PROGRAMMATICALLY:

    JSON-LD is a popular format for linked data which is fully compatible with JSON.

    curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-64861-3_19'

    N-Triples is a line-based linked data format ideal for batch operations.

    curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-64861-3_19'

    Turtle is a human-readable linked data format.

    curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-64861-3_19'

    RDF/XML is a standard XML format for linked data.

    curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-64861-3_19'


     

    This table displays all metadata directly associated to this object as RDF triples.

    109 TRIPLES      23 PREDICATES      34 URIs      20 LITERALS      8 BLANK NODES

    Subject Predicate Object
    1 sg:pub.10.1007/978-3-319-64861-3_19 schema:about anzsrc-for:08
    2 anzsrc-for:0804
    3 schema:author Nff97bf5c70874e609c3bd2c26b9c3c5c
    4 schema:citation sg:pub.10.1007/978-3-319-11122-3_14
    5 https://doi.org/10.1016/j.jeconbus.2014.03.002
    6 https://doi.org/10.1109/iscc.2015.7405513
    7 https://doi.org/10.1109/mic.2014.86
    8 https://doi.org/10.1145/1124772.1124861
    9 https://doi.org/10.1145/2508859.2516694
    10 https://doi.org/10.2139/ssrn.2912908
    11 schema:datePublished 2018
    12 schema:datePublishedReg 2018-01-01
    13 schema:description Cyber crime is a growing threat affecting all business sectors. Stock Exchanges, a financial services sector, are not far from it. Trading stocks via Internet exposes the process to cyber threats that might take advantage of a system defect to breach security and cause possible harm. Online Trading websites are protected by various security systems. Digital Certificate, which is based on Secure Socket Layer (SSL) protocol, is an example. This research examines implementation of Digital Certificate in online trading servers. This evaluation helps to identify security weaknesses and take actions for protection improvement.
    14 schema:editor N0211fb333c074871ba1ae3149936fc46
    15 schema:genre chapter
    16 schema:inLanguage en
    17 schema:isAccessibleForFree false
    18 schema:isPartOf N14a34149c9684224b81aa6b96d40a42e
    19 schema:name Stock Exchange Threat Modeling, EGX as a Case Study
    20 schema:pagination 203-212
    21 schema:productId N6443ac925bb64e55802d72c2fcc2ee9c
    22 N857ea2ff84e84f43bc7c64b9eaaa5ff5
    23 Nb8401462c54d4c83a464beaf1553d6d1
    24 schema:publisher N902b02faf32342c38c987feebc3388ec
    25 schema:sameAs https://app.dimensions.ai/details/publication/pub.1091392918
    26 https://doi.org/10.1007/978-3-319-64861-3_19
    27 schema:sdDatePublished 2019-04-15T14:29
    28 schema:sdLicense https://scigraph.springernature.com/explorer/license/
    29 schema:sdPublisher N5ea1efbc0c2d48d7a2f91f5246b4265b
    30 schema:url http://link.springer.com/10.1007/978-3-319-64861-3_19
    31 sgo:license sg:explorer/license/
    32 sgo:sdDataset chapters
    33 rdf:type schema:Chapter
    34 N0211fb333c074871ba1ae3149936fc46 rdf:first N4e0b5475b7524e7e9ef586c10841d3fc
    35 rdf:rest Nd02eddc3a2c84d03a3a9bc436fc770eb
    36 N0842d1830ac241a7a9cf2ae619272e96 rdf:first Nf36058d9a876404d8d7226e2381d2f96
    37 rdf:rest rdf:nil
    38 N14a34149c9684224b81aa6b96d40a42e schema:isbn 978-3-319-64860-6
    39 978-3-319-64861-3
    40 schema:name Proceedings of the International Conference on Advanced Intelligent Systems and Informatics 2017
    41 rdf:type schema:Book
    42 N4e0b5475b7524e7e9ef586c10841d3fc schema:familyName Hassanien
    43 schema:givenName Aboul Ella
    44 rdf:type schema:Person
    45 N5ea1efbc0c2d48d7a2f91f5246b4265b schema:name Springer Nature - SN SciGraph project
    46 rdf:type schema:Organization
    47 N6443ac925bb64e55802d72c2fcc2ee9c schema:name doi
    48 schema:value 10.1007/978-3-319-64861-3_19
    49 rdf:type schema:PropertyValue
    50 N6b348c65de464450b2f34febd60fa289 schema:familyName Shaalan
    51 schema:givenName Khaled
    52 rdf:type schema:Person
    53 N857ea2ff84e84f43bc7c64b9eaaa5ff5 schema:name readcube_id
    54 schema:value eddf3ef1c71c3a5205370dcfd58813c0c87e9ba2a5824b7e996d08cc9c5455c5
    55 rdf:type schema:PropertyValue
    56 N902b02faf32342c38c987feebc3388ec schema:location Cham
    57 schema:name Springer International Publishing
    58 rdf:type schema:Organisation
    59 N9ffb1d5720ae4b53a10912eb84aae316 rdf:first sg:person.010062432325.70
    60 rdf:rest rdf:nil
    61 Nb03a84339f3541feb2603c6b74c3d92b schema:familyName Gaber
    62 schema:givenName Tarek
    63 rdf:type schema:Person
    64 Nb8401462c54d4c83a464beaf1553d6d1 schema:name dimensions_id
    65 schema:value pub.1091392918
    66 rdf:type schema:PropertyValue
    67 Nd02eddc3a2c84d03a3a9bc436fc770eb rdf:first N6b348c65de464450b2f34febd60fa289
    68 rdf:rest Ne7bd401c540c4047bef088d4a820ba7f
    69 Ne7bd401c540c4047bef088d4a820ba7f rdf:first Nb03a84339f3541feb2603c6b74c3d92b
    70 rdf:rest N0842d1830ac241a7a9cf2ae619272e96
    71 Nf36058d9a876404d8d7226e2381d2f96 schema:familyName Tolba
    72 schema:givenName Mohamed F.
    73 rdf:type schema:Person
    74 Nff97bf5c70874e609c3bd2c26b9c3c5c rdf:first sg:person.0745032215.16
    75 rdf:rest N9ffb1d5720ae4b53a10912eb84aae316
    76 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
    77 schema:name Information and Computing Sciences
    78 rdf:type schema:DefinedTerm
    79 anzsrc-for:0804 schema:inDefinedTermSet anzsrc-for:
    80 schema:name Data Format
    81 rdf:type schema:DefinedTerm
    82 sg:person.010062432325.70 schema:affiliation https://www.grid.ac/institutes/grid.440877.8
    83 schema:familyName AbdelBaki
    84 schema:givenName Nashwa
    85 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010062432325.70
    86 rdf:type schema:Person
    87 sg:person.0745032215.16 schema:affiliation https://www.grid.ac/institutes/grid.440877.8
    88 schema:familyName ElShafei
    89 schema:givenName Ehab
    90 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.0745032215.16
    91 rdf:type schema:Person
    92 sg:pub.10.1007/978-3-319-11122-3_14 schema:sameAs https://app.dimensions.ai/details/publication/pub.1026566090
    93 https://doi.org/10.1007/978-3-319-11122-3_14
    94 rdf:type schema:CreativeWork
    95 https://doi.org/10.1016/j.jeconbus.2014.03.002 schema:sameAs https://app.dimensions.ai/details/publication/pub.1026621435
    96 rdf:type schema:CreativeWork
    97 https://doi.org/10.1109/iscc.2015.7405513 schema:sameAs https://app.dimensions.ai/details/publication/pub.1094931914
    98 rdf:type schema:CreativeWork
    99 https://doi.org/10.1109/mic.2014.86 schema:sameAs https://app.dimensions.ai/details/publication/pub.1061404320
    100 rdf:type schema:CreativeWork
    101 https://doi.org/10.1145/1124772.1124861 schema:sameAs https://app.dimensions.ai/details/publication/pub.1003721226
    102 rdf:type schema:CreativeWork
    103 https://doi.org/10.1145/2508859.2516694 schema:sameAs https://app.dimensions.ai/details/publication/pub.1026535238
    104 rdf:type schema:CreativeWork
    105 https://doi.org/10.2139/ssrn.2912908 schema:sameAs https://app.dimensions.ai/details/publication/pub.1090424726
    106 rdf:type schema:CreativeWork
    107 https://www.grid.ac/institutes/grid.440877.8 schema:alternateName Nile University
    108 schema:name Nile University
    109 rdf:type schema:Organization
     




    Preview window. Press ESC to close (or click here)


    ...