Controlling user access with scripting to mitigate cyber-attacks

With the growing threats in the dynamic digital landscape, organizations are grappling with the difficult task of managing cyber-attacks by restricting user accessibility to most communication systems. This study aimed to develop a Linux script as a proactive response to the growing of cyber-attacks...

Full description

Saved in:
Bibliographic Details
Published inScientific African Vol. 26; p. e02355
Main Authors Nyarko-Boateng, Owusu, Nti, Isaac Kofi, Mensah, Anastasia Akyamaa, Gyamfi, Emmanuel Kojo
Format Journal Article
LanguageEnglish
Published Elsevier B.V 01.12.2024
Elsevier
Subjects
Online AccessGet full text
ISSN2468-2276
2468-2276
DOI10.1016/j.sciaf.2024.e02355

Cover

Abstract With the growing threats in the dynamic digital landscape, organizations are grappling with the difficult task of managing cyber-attacks by restricting user accessibility to most communication systems. This study aimed to develop a Linux script as a proactive response to the growing of cyber-attacks in organizational settings to prevent attacking vectors based on user negligence. The primary objective was to devise inventive solutions through script automation to restrict user access to the organizational network within predefined time frames, thereby mitigating potential cyber threats. The criteria used to define predefined time frames for user access, include the restriction of users on off duty times, The scripting seeks to address cyber-attacks targeted such as cross-site scripting (XSS) and SQL injection. To achieve the goal of this paper, the necessary steps and logic required to develop the scripts were taken. For instance, there are several suitable languages such as Bash, Python, or Perl, that can be used to write script. The paper selected Bash because it excels at scripting existing command-line tools and utilities, making it a great choice for automating tasks by using Vim text editor tool. The final scripts were run, some errors were identified, and modified as needed to ensure it worked correctly. This phase was necessary to improve the script's performance, readability, and maintainability by refining code, using efficient algorithms, by incorporating best practices. Finally, the various user inputs and scenarios were deployed to put the script into production for user access management. The adopted script metrics deployed such as Script Execution Time, Resources Utilization, Success Rate and Error Rate helped in evaluating the performance, efficiency, and effectiveness of the scripts. The implementation of the script achieved an executive time of 0.032 s, success rate was 1 and error rate was 0. The practical implementation in organizations can be scaled up or down depending on the organization's size and infrastructure. The compatibility of the developed Linux script with different operating systems, hardware platforms and network architectures will have no impact in adapting to various organizational environments. The script did not show any challenges, but real-world deployment may exhibit some potential challenges and limitations that may be associated with implementing the solution, such as resource constraints and legacy system compatibility.
AbstractList With the growing threats in the dynamic digital landscape, organizations are grappling with the difficult task of managing cyber-attacks by restricting user accessibility to most communication systems. This study aimed to develop a Linux script as a proactive response to the growing of cyber-attacks in organizational settings to prevent attacking vectors based on user negligence. The primary objective was to devise inventive solutions through script automation to restrict user access to the organizational network within predefined time frames, thereby mitigating potential cyber threats. The criteria used to define predefined time frames for user access, include the restriction of users on off duty times, The scripting seeks to address cyber-attacks targeted such as cross-site scripting (XSS) and SQL injection. To achieve the goal of this paper, the necessary steps and logic required to develop the scripts were taken. For instance, there are several suitable languages such as Bash, Python, or Perl, that can be used to write script. The paper selected Bash because it excels at scripting existing command-line tools and utilities, making it a great choice for automating tasks by using Vim text editor tool. The final scripts were run, some errors were identified, and modified as needed to ensure it worked correctly. This phase was necessary to improve the script's performance, readability, and maintainability by refining code, using efficient algorithms, by incorporating best practices. Finally, the various user inputs and scenarios were deployed to put the script into production for user access management. The adopted script metrics deployed such as Script Execution Time, Resources Utilization, Success Rate and Error Rate helped in evaluating the performance, efficiency, and effectiveness of the scripts. The implementation of the script achieved an executive time of 0.032 s, success rate was 1 and error rate was 0. The practical implementation in organizations can be scaled up or down depending on the organization's size and infrastructure. The compatibility of the developed Linux script with different operating systems, hardware platforms and network architectures will have no impact in adapting to various organizational environments. The script did not show any challenges, but real-world deployment may exhibit some potential challenges and limitations that may be associated with implementing the solution, such as resource constraints and legacy system compatibility.
ArticleNumber e02355
Author Gyamfi, Emmanuel Kojo
Nyarko-Boateng, Owusu
Mensah, Anastasia Akyamaa
Nti, Isaac Kofi
Author_xml – sequence: 1
  givenname: Owusu
  orcidid: 0000-0003-0300-2469
  surname: Nyarko-Boateng
  fullname: Nyarko-Boateng, Owusu
  email: owusu.nyarko-boateng@uenr.edu.gh
  organization: University of Cincinnati, OH, USA
– sequence: 2
  givenname: Isaac Kofi
  surname: Nti
  fullname: Nti, Isaac Kofi
  organization: University of Cincinnati, OH, USA
– sequence: 3
  givenname: Anastasia Akyamaa
  surname: Mensah
  fullname: Mensah, Anastasia Akyamaa
  organization: University of Energy and Natural Resources, Sunyani, Ghana
– sequence: 4
  givenname: Emmanuel Kojo
  surname: Gyamfi
  fullname: Gyamfi, Emmanuel Kojo
  organization: University of Cincinnati, OH, USA
BookMark eNqNkF1LwzAUQINMcM79Al_6BzrztWR9EJThx2Dgiz6H2_R2pnbtSDLH_r3tKuKT-JSQ3HO4nEsyatoGCblmdMYoUzfVLFgH5YxTLmdIuZjPz8iYS7VIOddq9Ot-QaYhVJR2k4xnWo7J3bJtom_r2jWbZB_QJ2AthpAcXHxPgvVuF_uv2CZbF90GIib2mKNPIUawH-GKnJdQB5x-nxPy9vjwunxO1y9Pq-X9OrVCyZhmi0II5DJnACDKnCuqVCYok0rMtSiElplQqHi5EAA5Ssa05HmGuQJZCCUmZDV4ixYqs_NuC_5oWnDm9ND6jQEfna3RKN1ZtBWWloVUhQZaMg0MMswyAVp3Ljm49s0Ojgeo6x8ho6aPaipzimr6qGaI2mFiwKxvQ_BY_pO6HSjs6nw69P0MNhYL59HGbn33J_8FfuOTCQ
Cites_doi 10.1016/j.ijinfomgt.2018.10.017
10.17323/2500-2597.2023.1.89.97
10.3390/fi11030073
10.1109/ACCESS.2022.3231847
10.3390/electronics12061333
10.3390/jcp2030029
10.1016/j.compeleceng.2022.108460
10.3390/s21155119
10.1108/JSIT-02-2018-0028
10.1145/3546580
ContentType Journal Article
Copyright 2024 The Authors
Copyright_xml – notice: 2024 The Authors
DBID 6I.
AAFTH
AAYXX
CITATION
ADTOC
UNPAY
DOA
DOI 10.1016/j.sciaf.2024.e02355
DatabaseName ScienceDirect Open Access Titles
Elsevier:ScienceDirect:Open Access
CrossRef
Unpaywall for CDI: Periodical Content
Unpaywall
DOAJ Directory of Open Access Journals
DatabaseTitle CrossRef
DatabaseTitleList

Database_xml – sequence: 1
  dbid: DOA
  name: DOAJ Directory of Open Access Journals
  url: https://www.doaj.org/
  sourceTypes: Open Website
– sequence: 2
  dbid: UNPAY
  name: Unpaywall
  url: https://proxy.k.utb.cz/login?url=https://unpaywall.org/
  sourceTypes: Open Access Repository
DeliveryMethod fulltext_linktorsrc
EISSN 2468-2276
ExternalDocumentID oai_doaj_org_article_672f87c3c0fd46d7a0f17a1a9e993a77
10.1016/j.sciaf.2024.e02355
10_1016_j_sciaf_2024_e02355
S2468227624002977
GroupedDBID 0R~
0SF
6I.
AACTN
AAEDW
AAFTH
AALRI
AAXUO
ABMAC
ADBBV
ADVLN
AEXQZ
AFTJW
AITUG
AKRWK
ALMA_UNASSIGNED_HOLDINGS
AMRAJ
BCNDV
EBS
FDB
GROUPED_DOAJ
M41
M~E
NCXOZ
OK1
ROL
SSZ
AAYWO
AAYXX
ACVFH
ADCNI
AEUPX
AFPUW
AIGII
AKBMS
AKYEP
APXCP
CITATION
ADTOC
UNPAY
ID FETCH-LOGICAL-c364t-98d33e24b1aaa3fb260669301463573d374936e62f83aabe411742b9eb6a4d363
IEDL.DBID DOA
ISSN 2468-2276
IngestDate Fri Oct 03 12:42:51 EDT 2025
Tue Aug 19 17:22:05 EDT 2025
Wed Oct 01 04:46:06 EDT 2025
Sat Dec 28 15:50:37 EST 2024
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Keywords Cyber threat mitigation and attack surface reduction
Cybersecurity automation
User access control
Linux scripting
Language English
License This is an open access article under the CC BY-NC-ND license.
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c364t-98d33e24b1aaa3fb260669301463573d374936e62f83aabe411742b9eb6a4d363
ORCID 0000-0003-0300-2469
OpenAccessLink https://doaj.org/article/672f87c3c0fd46d7a0f17a1a9e993a77
ParticipantIDs doaj_primary_oai_doaj_org_article_672f87c3c0fd46d7a0f17a1a9e993a77
unpaywall_primary_10_1016_j_sciaf_2024_e02355
crossref_primary_10_1016_j_sciaf_2024_e02355
elsevier_sciencedirect_doi_10_1016_j_sciaf_2024_e02355
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate December 2024
2024-12-00
2024-12-01
PublicationDateYYYYMMDD 2024-12-01
PublicationDate_xml – month: 12
  year: 2024
  text: December 2024
PublicationDecade 2020
PublicationTitle Scientific African
PublicationYear 2024
Publisher Elsevier B.V
Elsevier
Publisher_xml – name: Elsevier B.V
– name: Elsevier
References Nifakos, Chandramouli, Nikolaou, Papachristou, Koch, Panaousis, Bonacina (bib0015) 2021; 21
Zwilling, Klien, Lesjak, Wiechetek, Cetin, Basim (bib0023) 2022; 62
Aslan, Aktuğ, Ozkan-Okay, Yilmaz, Akin (bib0005) 2023; 12
Karayat, Jadhav, Kondaka, Nambiar (bib0010) 2022; 1
Naqvi, Batool (bib0013) 2023; 4
Nti, Nyarko-Boateng, Adekoya, Arjun (bib0017) 2021
Yeboah-Ofori, Opoku-Boateng (bib0022) 2023; 5
Ameri, Hempel, Sharif, Lopez, Perumalla (bib0002) 2023; 14
Retrieved on May 30, 2024.
Neves, Araujo (bib0014) 2023; 17
Ani, He, Tiwari (bib0003) 2019; 21
Urbini, Venosa, Bazán, Del Río (bib0019) 2022
Falowo, Popoola, Riep, Adewopo, Koch (bib0006) 2022; 10
Haddaji, Ayed, Fourati (bib0007) 2022; 104
Hassan (bib0008) 2022
Appiah, Asante, Nti, Nyarko-Boateng (bib0021) 2019; 15
Appiah, Nti, Nyarko-Boateng (bib0004) 2017; 12
Nti, Narko-Boateng, Adekoya, Somanathan (bib0016) 2022; 19
Nyarko-Boateng, Asante, Nti (bib0018) 2017; 6
Li, He, Xu, Ash, Anwar, Yuan (bib0011) 2019; 45
J. Lau (2023).
Triplett (bib0020) 2022; 2
Lehto (bib0012) 2022
Aldawood, Skinner (bib0001) 2019; 11
Aslan (10.1016/j.sciaf.2024.e02355_bib0005) 2023; 12
Nti (10.1016/j.sciaf.2024.e02355_bib0017) 2021
Haddaji (10.1016/j.sciaf.2024.e02355_bib0007) 2022; 104
Nti (10.1016/j.sciaf.2024.e02355_bib0016) 2022; 19
Karayat (10.1016/j.sciaf.2024.e02355_bib0010) 2022; 1
Appiah (10.1016/j.sciaf.2024.e02355_bib0021) 2019; 15
Zwilling (10.1016/j.sciaf.2024.e02355_bib0023) 2022; 62
Li (10.1016/j.sciaf.2024.e02355_bib0011) 2019; 45
Naqvi (10.1016/j.sciaf.2024.e02355_bib0013) 2023; 4
Hassan (10.1016/j.sciaf.2024.e02355_bib0008) 2022
10.1016/j.sciaf.2024.e02355_bib0009
Triplett (10.1016/j.sciaf.2024.e02355_bib0020) 2022; 2
Appiah (10.1016/j.sciaf.2024.e02355_bib0004) 2017; 12
Lehto (10.1016/j.sciaf.2024.e02355_bib0012) 2022
Nyarko-Boateng (10.1016/j.sciaf.2024.e02355_bib0018) 2017; 6
Falowo (10.1016/j.sciaf.2024.e02355_bib0006) 2022; 10
Ameri (10.1016/j.sciaf.2024.e02355_bib0002) 2023; 14
Ani (10.1016/j.sciaf.2024.e02355_bib0003) 2019; 21
Yeboah-Ofori (10.1016/j.sciaf.2024.e02355_bib0022) 2023; 5
Aldawood (10.1016/j.sciaf.2024.e02355_bib0001) 2019; 11
Neves (10.1016/j.sciaf.2024.e02355_bib0014) 2023; 17
Nifakos (10.1016/j.sciaf.2024.e02355_bib0015) 2021; 21
Urbini (10.1016/j.sciaf.2024.e02355_bib0019) 2022
References_xml – start-page: 1
  year: 2022
  end-page: 9
  ident: bib0008
  article-title: Leveraging apache guacamole, Linux LXD and Docker containers to deliver a secure online lab for a large cybersecurity course
  publication-title: 2022 IEEE Frontiers in Education Conference (FIE)
– volume: 5
  start-page: 53
  year: 2023
  end-page: 78
  ident: bib0022
  article-title: Mitigating cybercrimes in an evolving organizational landscape
  publication-title: Continuity Resil. Rev.
– volume: 6
  start-page: 88
  year: 2017
  end-page: 94
  ident: bib0018
  article-title: Implementation of advanced encryption standard algorithm with key length of 256 bits for preventing data loss in an organization
  publication-title: Int. J. Sci. Eng. Appl.
– reference: J. Lau (2023).
– volume: 11
  start-page: 73
  year: 2019
  ident: bib0001
  article-title: Reviewing cyber security social engineering training and awareness programs—Pitfalls and ongoing issues
  publication-title: Future Internet
– volume: 14
  start-page: 1
  year: 2023
  end-page: 35
  ident: bib0002
  article-title: Design of a novel information system for semi-automated management of cybersecurity in industrial control systems
  publication-title: ACM Trans. Manag. Inf. Syst.
– volume: 1
  start-page: 1392
  year: 2022
  end-page: 1397
  ident: bib0010
  article-title: Web application penetration testing & patch development using kali Linux
  publication-title: 2022 8th International Conference on Advanced Computing and Communication Systems (ICACCS)
– start-page: 1
  year: 2021
  end-page: 11
  ident: bib0017
  article-title: Network intrusion detection with StackNet: a phi coefficient based weak learner selection approach
  publication-title: 2021 22nd International Arab Conference on Information Technology (ACIT)
– reference: . Retrieved on May 30, 2024.
– start-page: 3
  year: 2022
  end-page: 42
  ident: bib0012
  article-title: Cyber-attacks against critical infrastructure
  publication-title: Cyber Security: Critical Infrastructure Protection
– volume: 15
  start-page: 1341
  year: 2019
  end-page: 1354
  ident: bib0021
  article-title: Survey of websites and web application security threats using vulnerability assessment
  publication-title: J. Comput. Sci.
– volume: 62
  start-page: 82
  year: 2022
  end-page: 97
  ident: bib0023
  article-title: Cyber security awareness, knowledge and behavior: a comparative study
  publication-title: J. Comput. Inf. Syst.
– volume: 21
  start-page: 5119
  year: 2021
  ident: bib0015
  article-title: Influence of human factors on cyber security within healthcare organizations: a systematic review
  publication-title: Sensors
– volume: 12
  start-page: 10
  year: 2017
  end-page: 15
  ident: bib0004
  article-title: Investigating websites and web application vulnerabilities: webmaster’s perspective
  publication-title: Int. J. Appl. Inf. Syst. (IJAIS)
– volume: 21
  start-page: 2
  year: 2019
  end-page: 35
  ident: bib0003
  article-title: Human factor security: evaluating the cybersecurity capacity of the industrial workforce
  publication-title: J. Syst. Inf. Technol.
– volume: 12
  start-page: 1333
  year: 2023
  ident: bib0005
  article-title: A comprehensive review of cyber security vulnerabilities, threats, attacks, and solutions
  publication-title: Electronics
– volume: 2
  start-page: 573
  year: 2022
  end-page: 586
  ident: bib0020
  article-title: Addressing human factors in cybersecurity leadership
  publication-title: J. Cybersecur. Privacy
– volume: 10
  start-page: 134038
  year: 2022
  end-page: 134051
  ident: bib0006
  article-title: Threat actors’ tenacity to disrupt: examination of major cybersecurity incidents
  publication-title: IEEE Access
– volume: 104
  year: 2022
  ident: bib0007
  article-title: Artificial intelligence techniques to mitigate cyber-attacks within vehicular networks: survey
  publication-title: Comput. Electr. Eng.
– start-page: 1
  year: 2022
  end-page: 6
  ident: bib0019
  article-title: Distributed cybersecurity strategy, applying the intelligence operations theory
  publication-title: 2022 17th Iberian Conference on Information Systems and Technologies (CISTI)
– volume: 4
  start-page: 326
  year: 2023
  end-page: 332
  ident: bib0013
  article-title: A comparative analysis between general data protection regulations and California Consumer privacy act
  publication-title: J. Comput. Sci., Inf. Technol. Telecommun. Eng.
– volume: 45
  start-page: 13
  year: 2019
  end-page: 24
  ident: bib0011
  article-title: Investigating the impact of cybersecurity policy awareness on employees’ cybersecurity behavior
  publication-title: Int. J. Inf. Manag.
– volume: 17
  start-page: 89
  year: 2023
  end-page: 97
  ident: bib0014
  article-title: Smart automation for enhancing cybersecurity
  publication-title: Foresight STI Gov. (Foresight-Russia till No. 3/2015)
– volume: 19
  start-page: 478
  year: 2022
  end-page: 490
  ident: bib0016
  article-title: Stacknet based decision fusion classifier for network intrusion detection
  publication-title: Int. Arab J. Inf. Technol.
– volume: 12
  start-page: 10
  issue: 3
  year: 2017
  ident: 10.1016/j.sciaf.2024.e02355_bib0004
  article-title: Investigating websites and web application vulnerabilities: webmaster’s perspective
  publication-title: Int. J. Appl. Inf. Syst. (IJAIS)
– volume: 5
  start-page: 53
  issue: 1
  year: 2023
  ident: 10.1016/j.sciaf.2024.e02355_bib0022
  article-title: Mitigating cybercrimes in an evolving organizational landscape
  publication-title: Continuity Resil. Rev.
– ident: 10.1016/j.sciaf.2024.e02355_bib0009
– volume: 45
  start-page: 13
  year: 2019
  ident: 10.1016/j.sciaf.2024.e02355_bib0011
  article-title: Investigating the impact of cybersecurity policy awareness on employees’ cybersecurity behavior
  publication-title: Int. J. Inf. Manag.
  doi: 10.1016/j.ijinfomgt.2018.10.017
– volume: 6
  start-page: 88
  issue: 3
  year: 2017
  ident: 10.1016/j.sciaf.2024.e02355_bib0018
  article-title: Implementation of advanced encryption standard algorithm with key length of 256 bits for preventing data loss in an organization
  publication-title: Int. J. Sci. Eng. Appl.
– start-page: 1
  year: 2022
  ident: 10.1016/j.sciaf.2024.e02355_bib0019
  article-title: Distributed cybersecurity strategy, applying the intelligence operations theory
– start-page: 3
  year: 2022
  ident: 10.1016/j.sciaf.2024.e02355_bib0012
  article-title: Cyber-attacks against critical infrastructure
– volume: 17
  start-page: 89
  issue: 1
  year: 2023
  ident: 10.1016/j.sciaf.2024.e02355_bib0014
  article-title: Smart automation for enhancing cybersecurity
  publication-title: Foresight STI Gov. (Foresight-Russia till No. 3/2015)
  doi: 10.17323/2500-2597.2023.1.89.97
– volume: 11
  start-page: 73
  issue: 3
  year: 2019
  ident: 10.1016/j.sciaf.2024.e02355_bib0001
  article-title: Reviewing cyber security social engineering training and awareness programs—Pitfalls and ongoing issues
  publication-title: Future Internet
  doi: 10.3390/fi11030073
– volume: 10
  start-page: 134038
  year: 2022
  ident: 10.1016/j.sciaf.2024.e02355_bib0006
  article-title: Threat actors’ tenacity to disrupt: examination of major cybersecurity incidents
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2022.3231847
– volume: 12
  start-page: 1333
  issue: 6
  year: 2023
  ident: 10.1016/j.sciaf.2024.e02355_bib0005
  article-title: A comprehensive review of cyber security vulnerabilities, threats, attacks, and solutions
  publication-title: Electronics
  doi: 10.3390/electronics12061333
– volume: 4
  start-page: 326
  issue: 1
  year: 2023
  ident: 10.1016/j.sciaf.2024.e02355_bib0013
  article-title: A comparative analysis between general data protection regulations and California Consumer privacy act
  publication-title: J. Comput. Sci., Inf. Technol. Telecommun. Eng.
– start-page: 1
  year: 2021
  ident: 10.1016/j.sciaf.2024.e02355_bib0017
  article-title: Network intrusion detection with StackNet: a phi coefficient based weak learner selection approach
– volume: 1
  start-page: 1392
  year: 2022
  ident: 10.1016/j.sciaf.2024.e02355_bib0010
  article-title: Web application penetration testing & patch development using kali Linux
– volume: 2
  start-page: 573
  issue: 3
  year: 2022
  ident: 10.1016/j.sciaf.2024.e02355_bib0020
  article-title: Addressing human factors in cybersecurity leadership
  publication-title: J. Cybersecur. Privacy
  doi: 10.3390/jcp2030029
– start-page: 1
  year: 2022
  ident: 10.1016/j.sciaf.2024.e02355_bib0008
  article-title: Leveraging apache guacamole, Linux LXD and Docker containers to deliver a secure online lab for a large cybersecurity course
– volume: 62
  start-page: 82
  year: 2022
  ident: 10.1016/j.sciaf.2024.e02355_bib0023
  article-title: Cyber security awareness, knowledge and behavior: a comparative study
  publication-title: J. Comput. Inf. Syst.
– volume: 104
  year: 2022
  ident: 10.1016/j.sciaf.2024.e02355_bib0007
  article-title: Artificial intelligence techniques to mitigate cyber-attacks within vehicular networks: survey
  publication-title: Comput. Electr. Eng.
  doi: 10.1016/j.compeleceng.2022.108460
– volume: 21
  start-page: 5119
  year: 2021
  ident: 10.1016/j.sciaf.2024.e02355_bib0015
  article-title: Influence of human factors on cyber security within healthcare organizations: a systematic review
  publication-title: Sensors
  doi: 10.3390/s21155119
– volume: 21
  start-page: 2
  year: 2019
  ident: 10.1016/j.sciaf.2024.e02355_bib0003
  article-title: Human factor security: evaluating the cybersecurity capacity of the industrial workforce
  publication-title: J. Syst. Inf. Technol.
  doi: 10.1108/JSIT-02-2018-0028
– volume: 19
  start-page: 478
  issue: 3 A
  year: 2022
  ident: 10.1016/j.sciaf.2024.e02355_bib0016
  article-title: Stacknet based decision fusion classifier for network intrusion detection
  publication-title: Int. Arab J. Inf. Technol.
– volume: 15
  start-page: 1341
  year: 2019
  ident: 10.1016/j.sciaf.2024.e02355_bib0021
  article-title: Survey of websites and web application security threats using vulnerability assessment
– volume: 14
  start-page: 1
  issue: 1
  year: 2023
  ident: 10.1016/j.sciaf.2024.e02355_bib0002
  article-title: Design of a novel information system for semi-automated management of cybersecurity in industrial control systems
  publication-title: ACM Trans. Manag. Inf. Syst.
  doi: 10.1145/3546580
SSID ssj0002412974
Score 2.285451
Snippet With the growing threats in the dynamic digital landscape, organizations are grappling with the difficult task of managing cyber-attacks by restricting user...
SourceID doaj
unpaywall
crossref
elsevier
SourceType Open Website
Open Access Repository
Index Database
Publisher
StartPage e02355
SubjectTerms Cyber threat mitigation and attack surface reduction
Cybersecurity automation
Linux scripting
User access control
SummonAdditionalLinks – databaseName: Unpaywall
  dbid: UNPAY
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LS8NAEF60PXjygYoVlRw8mpLsbnaTm7VYimDxYKGewuwjUK211BSpv96dPIoVkXpNNpthZrPzzWbmG0IuDbdZEEvldj9Ofc6z2I8jE_pUZ4hutXOZGCjeD0R_yO9G0aji2cZamLX_90UelvMEgFyblLctkrNE26QpIge8G6Q5HDx0nrB9HNYPUSpFzSv0-5Nrvqeg6F9zQTuL6QyWHzCZfHMxvb2ydvu9YCbEzJKX9iJXbf35g7dxQ-n3yW4FNb1OuTYOyJadHpLrbpmbjlXoHp5QeFC0TPTwQNar9hB3K3_zXscF_4b19FLZuQ95jvX4R2TYu33s9v2qi4KvmeC5n8SGMUu5CgGAZYpiyJJgJIVUdMwwyRMmrKBZzACU5aELUqhKrBLADRPsmDSmb1N7QjzklldhYKLQRtxKqgDcZBRUYHUUGNYiV7V-01lJlpHWWWTPaaGKFFWRlqpokRu0wWooMl0XF5wK0-rDSYV0gknNdJAZLoyEIAslhJBYh6xAyhYRtQXTCjSUYMBNNf777f7K3ptIe_rP8Wekkc8X9txhllxdVGv1C10l6E8
  priority: 102
  providerName: Unpaywall
Title Controlling user access with scripting to mitigate cyber-attacks
URI https://dx.doi.org/10.1016/j.sciaf.2024.e02355
https://doi.org/10.1016/j.sciaf.2024.e02355
https://doaj.org/article/672f87c3c0fd46d7a0f17a1a9e993a77
UnpaywallVersion publishedVersion
Volume 26
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVAON
  databaseName: DOAJ Directory of Open Access Journals
  customDbUrl:
  eissn: 2468-2276
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0002412974
  issn: 2468-2276
  databaseCode: DOA
  dateStart: 20180101
  isFulltext: true
  titleUrlDefault: https://www.doaj.org/
  providerName: Directory of Open Access Journals
– providerCode: PRVHPJ
  databaseName: ROAD: Directory of Open Access Scholarly Resources
  customDbUrl:
  eissn: 2468-2276
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0002412974
  issn: 2468-2276
  databaseCode: M~E
  dateStart: 20180101
  isFulltext: true
  titleUrlDefault: https://road.issn.org
  providerName: ISSN International Centre
– providerCode: PRVLSH
  databaseName: Elsevier Journals
  customDbUrl:
  mediaType: online
  eissn: 2468-2276
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0002412974
  issn: 2468-2276
  databaseCode: AKRWK
  dateStart: 20181201
  isFulltext: true
  providerName: Library Specific Holdings
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1NS8NAEF2kHvQiior1o-Tg0Wiyu9kkN2uxFItFxGI9LbPZDVRqW0qK9N-7s0mkvagHj_lgM7wJ82aWmbeEXGpu8iCJlY1-nPqc54mfRDr0aZZjdptZysRC8XEgekP-MIpGa0d9YU9YKQ9cAncjYponccayINdc6BiCPIwhhNRYZoXYzZEHSbpWTGEMtrxEbaZcywy5hi5LKYCinZRfG1R5iTaoyCn2bzDSznI6h9UnTCZrjNPdJ3tVqui1SxMPyJaZHpLbTtlbjlPkHu4weOCOPPRwQ9WrYoB9VMy8j7HTzzBetlJm4UNR4Dz9ERl27186Pb86BcHPmOCFnyaaMUO5CgGA5YpiyZFiJYRSckyzmKdMGGFhYgDK8NAWGVSlRgngmgl2TBrT2dScEA-14VUY6Cg0ETcxVQB2MQoqMFkUaNYkVzUgcl6KXci6C-xdOvwk4idL_JrkDkH7fhWVqt0N6z9Z-U_-5r8mETXksiL9ksztUuOfv-5_O-gv1p7-h7VnZBeXLPtZzkmjWCzNhc1KCtUi2-3-82u_5X5EezUcPLXfvgDN-eG0
linkProvider Directory of Open Access Journals
linkToUnpaywall http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LS8NAEF60PXjygYoVlRw8mpLsbnaTm7VYimDxYKGewuwjUK211BSpv96dPIoVkXpNNpthZrPzzWbmG0IuDbdZEEvldj9Ofc6z2I8jE_pUZ4hutXOZGCjeD0R_yO9G0aji2cZamLX_90UelvMEgFyblLctkrNE26QpIge8G6Q5HDx0nrB9HNYPUSpFzSv0-5Nrvqeg6F9zQTuL6QyWHzCZfHMxvb2ydvu9YCbEzJKX9iJXbf35g7dxQ-n3yW4FNb1OuTYOyJadHpLrbpmbjlXoHp5QeFC0TPTwQNar9hB3K3_zXscF_4b19FLZuQ95jvX4R2TYu33s9v2qi4KvmeC5n8SGMUu5CgGAZYpiyJJgJIVUdMwwyRMmrKBZzACU5aELUqhKrBLADRPsmDSmb1N7QjzklldhYKLQRtxKqgDcZBRUYHUUGNYiV7V-01lJlpHWWWTPaaGKFFWRlqpokRu0wWooMl0XF5wK0-rDSYV0gknNdJAZLoyEIAslhJBYh6xAyhYRtQXTCjSUYMBNNf777f7K3ptIe_rP8Wekkc8X9txhllxdVGv1C10l6E8
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Controlling+user+access+with+scripting+to+mitigate+cyber-attacks&rft.jtitle=Scientific+African&rft.au=Owusu+Nyarko-Boateng&rft.au=Isaac+Kofi+Nti&rft.au=Anastasia+Akyamaa+Mensah&rft.au=Emmanuel+Kojo+Gyamfi&rft.date=2024-12-01&rft.pub=Elsevier&rft.eissn=2468-2276&rft.volume=26&rft.spage=e02355&rft_id=info:doi/10.1016%2Fj.sciaf.2024.e02355&rft.externalDBID=DOA&rft.externalDocID=oai_doaj_org_article_672f87c3c0fd46d7a0f17a1a9e993a77
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2468-2276&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2468-2276&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2468-2276&client=summon