Stock Exchange Threat Modeling, EGX as a Case Study View Full Text


Ontology type: schema:Chapter     


Chapter Info

DATE

2018

AUTHORS

Ehab ElShafei , Nashwa AbdelBaki

ABSTRACT

Cyber crime is a growing threat affecting all business sectors. Stock Exchanges, a financial services sector, are not far from it. Trading stocks via Internet exposes the process to cyber threats that might take advantage of a system defect to breach security and cause possible harm. Online Trading websites are protected by various security systems. Digital Certificate, which is based on Secure Socket Layer (SSL) protocol, is an example. This research examines implementation of Digital Certificate in online trading servers. This evaluation helps to identify security weaknesses and take actions for protection improvement. More... »

PAGES

203-212

References to SciGraph publications

  • 2015. Financial Development, Bank Efficiency, and Economic Growth Across the Mediterranean in ECONOMIC AND SOCIAL DEVELOPMENT OF THE SOUTHERN AND EASTERN MEDITERRANEAN COUNTRIES
  • Book

    TITLE

    Proceedings of the International Conference on Advanced Intelligent Systems and Informatics 2017

    ISBN

    978-3-319-64860-6
    978-3-319-64861-3

    Author Affiliations

    Identifiers

    URI

    http://scigraph.springernature.com/pub.10.1007/978-3-319-64861-3_19

    DOI

    http://dx.doi.org/10.1007/978-3-319-64861-3_19

    DIMENSIONS

    https://app.dimensions.ai/details/publication/pub.1091392918


    Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
    Incoming Citations Browse incoming citations for this publication using opencitations.net

    JSON-LD is the canonical representation for SciGraph data.

    TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

    [
      {
        "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
        "about": [
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Data Format", 
            "type": "DefinedTerm"
          }, 
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Information and Computing Sciences", 
            "type": "DefinedTerm"
          }
        ], 
        "author": [
          {
            "affiliation": {
              "alternateName": "Nile University", 
              "id": "https://www.grid.ac/institutes/grid.440877.8", 
              "name": [
                "Nile University"
              ], 
              "type": "Organization"
            }, 
            "familyName": "ElShafei", 
            "givenName": "Ehab", 
            "id": "sg:person.0745032215.16", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.0745032215.16"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "Nile University", 
              "id": "https://www.grid.ac/institutes/grid.440877.8", 
              "name": [
                "Nile University"
              ], 
              "type": "Organization"
            }, 
            "familyName": "AbdelBaki", 
            "givenName": "Nashwa", 
            "id": "sg:person.010062432325.70", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010062432325.70"
            ], 
            "type": "Person"
          }
        ], 
        "citation": [
          {
            "id": "https://doi.org/10.1145/1124772.1124861", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1003721226"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1145/2508859.2516694", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1026535238"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-319-11122-3_14", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1026566090", 
              "https://doi.org/10.1007/978-3-319-11122-3_14"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1016/j.jeconbus.2014.03.002", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1026621435"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/mic.2014.86", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1061404320"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.2139/ssrn.2912908", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1090424726"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/iscc.2015.7405513", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1094931914"
            ], 
            "type": "CreativeWork"
          }
        ], 
        "datePublished": "2018", 
        "datePublishedReg": "2018-01-01", 
        "description": "Cyber crime is a growing threat affecting all business sectors. Stock Exchanges, a financial services sector, are not far from it. Trading stocks via Internet exposes the process to cyber threats that might take advantage of a system defect to breach security and cause possible harm. Online Trading websites are protected by various security systems. Digital Certificate, which is based on Secure Socket Layer (SSL) protocol, is an example. This research examines implementation of Digital Certificate in online trading servers. This evaluation helps to identify security weaknesses and take actions for protection improvement.", 
        "editor": [
          {
            "familyName": "Hassanien", 
            "givenName": "Aboul Ella", 
            "type": "Person"
          }, 
          {
            "familyName": "Shaalan", 
            "givenName": "Khaled", 
            "type": "Person"
          }, 
          {
            "familyName": "Gaber", 
            "givenName": "Tarek", 
            "type": "Person"
          }, 
          {
            "familyName": "Tolba", 
            "givenName": "Mohamed F.", 
            "type": "Person"
          }
        ], 
        "genre": "chapter", 
        "id": "sg:pub.10.1007/978-3-319-64861-3_19", 
        "inLanguage": [
          "en"
        ], 
        "isAccessibleForFree": false, 
        "isPartOf": {
          "isbn": [
            "978-3-319-64860-6", 
            "978-3-319-64861-3"
          ], 
          "name": "Proceedings of the International Conference on Advanced Intelligent Systems and Informatics 2017", 
          "type": "Book"
        }, 
        "name": "Stock Exchange Threat Modeling, EGX as a Case Study", 
        "pagination": "203-212", 
        "productId": [
          {
            "name": "doi", 
            "type": "PropertyValue", 
            "value": [
              "10.1007/978-3-319-64861-3_19"
            ]
          }, 
          {
            "name": "readcube_id", 
            "type": "PropertyValue", 
            "value": [
              "eddf3ef1c71c3a5205370dcfd58813c0c87e9ba2a5824b7e996d08cc9c5455c5"
            ]
          }, 
          {
            "name": "dimensions_id", 
            "type": "PropertyValue", 
            "value": [
              "pub.1091392918"
            ]
          }
        ], 
        "publisher": {
          "location": "Cham", 
          "name": "Springer International Publishing", 
          "type": "Organisation"
        }, 
        "sameAs": [
          "https://doi.org/10.1007/978-3-319-64861-3_19", 
          "https://app.dimensions.ai/details/publication/pub.1091392918"
        ], 
        "sdDataset": "chapters", 
        "sdDatePublished": "2019-04-15T14:29", 
        "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
        "sdPublisher": {
          "name": "Springer Nature - SN SciGraph project", 
          "type": "Organization"
        }, 
        "sdSource": "s3://com-uberresearch-data-dimensions-target-20181106-alternative/cleanup/v134/2549eaecd7973599484d7c17b260dba0a4ecb94b/merge/v9/a6c9fde33151104705d4d7ff012ea9563521a3ce/jats-lookup/v90/0000000001_0000000264/records_8669_00000280.jsonl", 
        "type": "Chapter", 
        "url": "http://link.springer.com/10.1007/978-3-319-64861-3_19"
      }
    ]
     

    Download the RDF metadata as:  json-ld nt turtle xml License info

    HOW TO GET THIS DATA PROGRAMMATICALLY:

    JSON-LD is a popular format for linked data which is fully compatible with JSON.

    curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-64861-3_19'

    N-Triples is a line-based linked data format ideal for batch operations.

    curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-64861-3_19'

    Turtle is a human-readable linked data format.

    curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-64861-3_19'

    RDF/XML is a standard XML format for linked data.

    curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-64861-3_19'


     

    This table displays all metadata directly associated to this object as RDF triples.

    109 TRIPLES      23 PREDICATES      34 URIs      20 LITERALS      8 BLANK NODES

    Subject Predicate Object
    1 sg:pub.10.1007/978-3-319-64861-3_19 schema:about anzsrc-for:08
    2 anzsrc-for:0804
    3 schema:author Nd1be86e573b546908f16c32044b99918
    4 schema:citation sg:pub.10.1007/978-3-319-11122-3_14
    5 https://doi.org/10.1016/j.jeconbus.2014.03.002
    6 https://doi.org/10.1109/iscc.2015.7405513
    7 https://doi.org/10.1109/mic.2014.86
    8 https://doi.org/10.1145/1124772.1124861
    9 https://doi.org/10.1145/2508859.2516694
    10 https://doi.org/10.2139/ssrn.2912908
    11 schema:datePublished 2018
    12 schema:datePublishedReg 2018-01-01
    13 schema:description Cyber crime is a growing threat affecting all business sectors. Stock Exchanges, a financial services sector, are not far from it. Trading stocks via Internet exposes the process to cyber threats that might take advantage of a system defect to breach security and cause possible harm. Online Trading websites are protected by various security systems. Digital Certificate, which is based on Secure Socket Layer (SSL) protocol, is an example. This research examines implementation of Digital Certificate in online trading servers. This evaluation helps to identify security weaknesses and take actions for protection improvement.
    14 schema:editor Na434e343f3294caeba98e307f5dadae7
    15 schema:genre chapter
    16 schema:inLanguage en
    17 schema:isAccessibleForFree false
    18 schema:isPartOf Ned7fbbb3f41c434bb0a363fb324e49a1
    19 schema:name Stock Exchange Threat Modeling, EGX as a Case Study
    20 schema:pagination 203-212
    21 schema:productId N0bc5e609d32c4eed970298fca3db00af
    22 N8d7ecf9a26734c2d872909e9bde6d13e
    23 Nf8b23278f90a48c1a5a887a2bfc5550b
    24 schema:publisher Ncb060739065646859d8b7ff3d4859e3f
    25 schema:sameAs https://app.dimensions.ai/details/publication/pub.1091392918
    26 https://doi.org/10.1007/978-3-319-64861-3_19
    27 schema:sdDatePublished 2019-04-15T14:29
    28 schema:sdLicense https://scigraph.springernature.com/explorer/license/
    29 schema:sdPublisher Nf3c5d6b789dd4144984760273b42267a
    30 schema:url http://link.springer.com/10.1007/978-3-319-64861-3_19
    31 sgo:license sg:explorer/license/
    32 sgo:sdDataset chapters
    33 rdf:type schema:Chapter
    34 N0bc5e609d32c4eed970298fca3db00af schema:name dimensions_id
    35 schema:value pub.1091392918
    36 rdf:type schema:PropertyValue
    37 N2e389417afa840ceb6c9a5ba2b481412 rdf:first sg:person.010062432325.70
    38 rdf:rest rdf:nil
    39 N85e214c6c69b4936a022a179489f7fed schema:familyName Gaber
    40 schema:givenName Tarek
    41 rdf:type schema:Person
    42 N8d7ecf9a26734c2d872909e9bde6d13e schema:name doi
    43 schema:value 10.1007/978-3-319-64861-3_19
    44 rdf:type schema:PropertyValue
    45 Na434e343f3294caeba98e307f5dadae7 rdf:first Nd80164da092b4165bfa67b51678e67c5
    46 rdf:rest Nec8e17c415324085a5548b3fddd4e319
    47 Nad6ef7a39edf4863af585fc732a0feaa schema:familyName Shaalan
    48 schema:givenName Khaled
    49 rdf:type schema:Person
    50 Ncb060739065646859d8b7ff3d4859e3f schema:location Cham
    51 schema:name Springer International Publishing
    52 rdf:type schema:Organisation
    53 Nd1be86e573b546908f16c32044b99918 rdf:first sg:person.0745032215.16
    54 rdf:rest N2e389417afa840ceb6c9a5ba2b481412
    55 Nd80164da092b4165bfa67b51678e67c5 schema:familyName Hassanien
    56 schema:givenName Aboul Ella
    57 rdf:type schema:Person
    58 Ndbe5d3e207a14d13854650ca7c5adf0f rdf:first Nf75c1e6a937b43cc94e2a43ea6108983
    59 rdf:rest rdf:nil
    60 Nec8e17c415324085a5548b3fddd4e319 rdf:first Nad6ef7a39edf4863af585fc732a0feaa
    61 rdf:rest Nf2a3b89d05ea4b9d9feb5b056aa1c305
    62 Ned7fbbb3f41c434bb0a363fb324e49a1 schema:isbn 978-3-319-64860-6
    63 978-3-319-64861-3
    64 schema:name Proceedings of the International Conference on Advanced Intelligent Systems and Informatics 2017
    65 rdf:type schema:Book
    66 Nf2a3b89d05ea4b9d9feb5b056aa1c305 rdf:first N85e214c6c69b4936a022a179489f7fed
    67 rdf:rest Ndbe5d3e207a14d13854650ca7c5adf0f
    68 Nf3c5d6b789dd4144984760273b42267a schema:name Springer Nature - SN SciGraph project
    69 rdf:type schema:Organization
    70 Nf75c1e6a937b43cc94e2a43ea6108983 schema:familyName Tolba
    71 schema:givenName Mohamed F.
    72 rdf:type schema:Person
    73 Nf8b23278f90a48c1a5a887a2bfc5550b schema:name readcube_id
    74 schema:value eddf3ef1c71c3a5205370dcfd58813c0c87e9ba2a5824b7e996d08cc9c5455c5
    75 rdf:type schema:PropertyValue
    76 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
    77 schema:name Information and Computing Sciences
    78 rdf:type schema:DefinedTerm
    79 anzsrc-for:0804 schema:inDefinedTermSet anzsrc-for:
    80 schema:name Data Format
    81 rdf:type schema:DefinedTerm
    82 sg:person.010062432325.70 schema:affiliation https://www.grid.ac/institutes/grid.440877.8
    83 schema:familyName AbdelBaki
    84 schema:givenName Nashwa
    85 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010062432325.70
    86 rdf:type schema:Person
    87 sg:person.0745032215.16 schema:affiliation https://www.grid.ac/institutes/grid.440877.8
    88 schema:familyName ElShafei
    89 schema:givenName Ehab
    90 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.0745032215.16
    91 rdf:type schema:Person
    92 sg:pub.10.1007/978-3-319-11122-3_14 schema:sameAs https://app.dimensions.ai/details/publication/pub.1026566090
    93 https://doi.org/10.1007/978-3-319-11122-3_14
    94 rdf:type schema:CreativeWork
    95 https://doi.org/10.1016/j.jeconbus.2014.03.002 schema:sameAs https://app.dimensions.ai/details/publication/pub.1026621435
    96 rdf:type schema:CreativeWork
    97 https://doi.org/10.1109/iscc.2015.7405513 schema:sameAs https://app.dimensions.ai/details/publication/pub.1094931914
    98 rdf:type schema:CreativeWork
    99 https://doi.org/10.1109/mic.2014.86 schema:sameAs https://app.dimensions.ai/details/publication/pub.1061404320
    100 rdf:type schema:CreativeWork
    101 https://doi.org/10.1145/1124772.1124861 schema:sameAs https://app.dimensions.ai/details/publication/pub.1003721226
    102 rdf:type schema:CreativeWork
    103 https://doi.org/10.1145/2508859.2516694 schema:sameAs https://app.dimensions.ai/details/publication/pub.1026535238
    104 rdf:type schema:CreativeWork
    105 https://doi.org/10.2139/ssrn.2912908 schema:sameAs https://app.dimensions.ai/details/publication/pub.1090424726
    106 rdf:type schema:CreativeWork
    107 https://www.grid.ac/institutes/grid.440877.8 schema:alternateName Nile University
    108 schema:name Nile University
    109 rdf:type schema:Organization
     




    Preview window. Press ESC to close (or click here)


    ...