Controlling user access with scripting to mitigate cyber-attacks
With the growing threats in the dynamic digital landscape, organizations are grappling with the difficult task of managing cyber-attacks by restricting user accessibility to most communication systems. This study aimed to develop a Linux script as a proactive response to the growing of cyber-attacks...
        Saved in:
      
    
          | Published in | Scientific African Vol. 26; p. e02355 | 
|---|---|
| Main Authors | , , , | 
| Format | Journal Article | 
| Language | English | 
| Published | 
            Elsevier B.V
    
        01.12.2024
     Elsevier  | 
| Subjects | |
| Online Access | Get full text | 
| ISSN | 2468-2276 2468-2276  | 
| DOI | 10.1016/j.sciaf.2024.e02355 | 
Cover
| Abstract | With the growing threats in the dynamic digital landscape, organizations are grappling with the difficult task of managing cyber-attacks by restricting user accessibility to most communication systems. This study aimed to develop a Linux script as a proactive response to the growing of cyber-attacks in organizational settings to prevent attacking vectors based on user negligence. The primary objective was to devise inventive solutions through script automation to restrict user access to the organizational network within predefined time frames, thereby mitigating potential cyber threats. The criteria used to define predefined time frames for user access, include the restriction of users on off duty times, The scripting seeks to address cyber-attacks targeted such as cross-site scripting (XSS) and SQL injection. To achieve the goal of this paper, the necessary steps and logic required to develop the scripts were taken. For instance, there are several suitable languages such as Bash, Python, or Perl, that can be used to write script. The paper selected Bash because it excels at scripting existing command-line tools and utilities, making it a great choice for automating tasks by using Vim text editor tool. The final scripts were run, some errors were identified, and modified as needed to ensure it worked correctly. This phase was necessary to improve the script's performance, readability, and maintainability by refining code, using efficient algorithms, by incorporating best practices. Finally, the various user inputs and scenarios were deployed to put the script into production for user access management. The adopted script metrics deployed such as Script Execution Time, Resources Utilization, Success Rate and Error Rate helped in evaluating the performance, efficiency, and effectiveness of the scripts. The implementation of the script achieved an executive time of 0.032 s, success rate was 1 and error rate was 0. The practical implementation in organizations can be scaled up or down depending on the organization's size and infrastructure. The compatibility of the developed Linux script with different operating systems, hardware platforms and network architectures will have no impact in adapting to various organizational environments. The script did not show any challenges, but real-world deployment may exhibit some potential challenges and limitations that may be associated with implementing the solution, such as resource constraints and legacy system compatibility. | 
    
|---|---|
| AbstractList | With the growing threats in the dynamic digital landscape, organizations are grappling with the difficult task of managing cyber-attacks by restricting user accessibility to most communication systems. This study aimed to develop a Linux script as a proactive response to the growing of cyber-attacks in organizational settings to prevent attacking vectors based on user negligence. The primary objective was to devise inventive solutions through script automation to restrict user access to the organizational network within predefined time frames, thereby mitigating potential cyber threats. The criteria used to define predefined time frames for user access, include the restriction of users on off duty times, The scripting seeks to address cyber-attacks targeted such as cross-site scripting (XSS) and SQL injection. To achieve the goal of this paper, the necessary steps and logic required to develop the scripts were taken. For instance, there are several suitable languages such as Bash, Python, or Perl, that can be used to write script. The paper selected Bash because it excels at scripting existing command-line tools and utilities, making it a great choice for automating tasks by using Vim text editor tool. The final scripts were run, some errors were identified, and modified as needed to ensure it worked correctly. This phase was necessary to improve the script's performance, readability, and maintainability by refining code, using efficient algorithms, by incorporating best practices. Finally, the various user inputs and scenarios were deployed to put the script into production for user access management. The adopted script metrics deployed such as Script Execution Time, Resources Utilization, Success Rate and Error Rate helped in evaluating the performance, efficiency, and effectiveness of the scripts. The implementation of the script achieved an executive time of 0.032 s, success rate was 1 and error rate was 0. The practical implementation in organizations can be scaled up or down depending on the organization's size and infrastructure. The compatibility of the developed Linux script with different operating systems, hardware platforms and network architectures will have no impact in adapting to various organizational environments. The script did not show any challenges, but real-world deployment may exhibit some potential challenges and limitations that may be associated with implementing the solution, such as resource constraints and legacy system compatibility. | 
    
| ArticleNumber | e02355 | 
    
| Author | Gyamfi, Emmanuel Kojo Nyarko-Boateng, Owusu Mensah, Anastasia Akyamaa Nti, Isaac Kofi  | 
    
| Author_xml | – sequence: 1 givenname: Owusu orcidid: 0000-0003-0300-2469 surname: Nyarko-Boateng fullname: Nyarko-Boateng, Owusu email: owusu.nyarko-boateng@uenr.edu.gh organization: University of Cincinnati, OH, USA – sequence: 2 givenname: Isaac Kofi surname: Nti fullname: Nti, Isaac Kofi organization: University of Cincinnati, OH, USA – sequence: 3 givenname: Anastasia Akyamaa surname: Mensah fullname: Mensah, Anastasia Akyamaa organization: University of Energy and Natural Resources, Sunyani, Ghana – sequence: 4 givenname: Emmanuel Kojo surname: Gyamfi fullname: Gyamfi, Emmanuel Kojo organization: University of Cincinnati, OH, USA  | 
    
| BookMark | eNqNkF1LwzAUQINMcM79Al_6BzrztWR9EJThx2Dgiz6H2_R2pnbtSDLH_r3tKuKT-JSQ3HO4nEsyatoGCblmdMYoUzfVLFgH5YxTLmdIuZjPz8iYS7VIOddq9Ot-QaYhVJR2k4xnWo7J3bJtom_r2jWbZB_QJ2AthpAcXHxPgvVuF_uv2CZbF90GIib2mKNPIUawH-GKnJdQB5x-nxPy9vjwunxO1y9Pq-X9OrVCyZhmi0II5DJnACDKnCuqVCYok0rMtSiElplQqHi5EAA5Ssa05HmGuQJZCCUmZDV4ixYqs_NuC_5oWnDm9ND6jQEfna3RKN1ZtBWWloVUhQZaMg0MMswyAVp3Ljm49s0Ojgeo6x8ho6aPaipzimr6qGaI2mFiwKxvQ_BY_pO6HSjs6nw69P0MNhYL59HGbn33J_8FfuOTCQ | 
    
| Cites_doi | 10.1016/j.ijinfomgt.2018.10.017 10.17323/2500-2597.2023.1.89.97 10.3390/fi11030073 10.1109/ACCESS.2022.3231847 10.3390/electronics12061333 10.3390/jcp2030029 10.1016/j.compeleceng.2022.108460 10.3390/s21155119 10.1108/JSIT-02-2018-0028 10.1145/3546580  | 
    
| ContentType | Journal Article | 
    
| Copyright | 2024 The Authors | 
    
| Copyright_xml | – notice: 2024 The Authors | 
    
| DBID | 6I. AAFTH AAYXX CITATION ADTOC UNPAY DOA  | 
    
| DOI | 10.1016/j.sciaf.2024.e02355 | 
    
| DatabaseName | ScienceDirect Open Access Titles Elsevier:ScienceDirect:Open Access CrossRef Unpaywall for CDI: Periodical Content Unpaywall DOAJ Directory of Open Access Journals  | 
    
| DatabaseTitle | CrossRef | 
    
| DatabaseTitleList | |
| Database_xml | – sequence: 1 dbid: DOA name: DOAJ Directory of Open Access Journals url: https://www.doaj.org/ sourceTypes: Open Website – sequence: 2 dbid: UNPAY name: Unpaywall url: https://proxy.k.utb.cz/login?url=https://unpaywall.org/ sourceTypes: Open Access Repository  | 
    
| DeliveryMethod | fulltext_linktorsrc | 
    
| EISSN | 2468-2276 | 
    
| ExternalDocumentID | oai_doaj_org_article_672f87c3c0fd46d7a0f17a1a9e993a77 10.1016/j.sciaf.2024.e02355 10_1016_j_sciaf_2024_e02355 S2468227624002977  | 
    
| GroupedDBID | 0R~ 0SF 6I. AACTN AAEDW AAFTH AALRI AAXUO ABMAC ADBBV ADVLN AEXQZ AFTJW AITUG AKRWK ALMA_UNASSIGNED_HOLDINGS AMRAJ BCNDV EBS FDB GROUPED_DOAJ M41 M~E NCXOZ OK1 ROL SSZ AAYWO AAYXX ACVFH ADCNI AEUPX AFPUW AIGII AKBMS AKYEP APXCP CITATION ADTOC UNPAY  | 
    
| ID | FETCH-LOGICAL-c364t-98d33e24b1aaa3fb260669301463573d374936e62f83aabe411742b9eb6a4d363 | 
    
| IEDL.DBID | DOA | 
    
| ISSN | 2468-2276 | 
    
| IngestDate | Fri Oct 03 12:42:51 EDT 2025 Tue Aug 19 17:22:05 EDT 2025 Wed Oct 01 04:46:06 EDT 2025 Sat Dec 28 15:50:37 EST 2024  | 
    
| IsDoiOpenAccess | true | 
    
| IsOpenAccess | true | 
    
| IsPeerReviewed | true | 
    
| IsScholarly | true | 
    
| Keywords | Cyber threat mitigation and attack surface reduction Cybersecurity automation User access control Linux scripting  | 
    
| Language | English | 
    
| License | This is an open access article under the CC BY-NC-ND license. | 
    
| LinkModel | DirectLink | 
    
| MergedId | FETCHMERGED-LOGICAL-c364t-98d33e24b1aaa3fb260669301463573d374936e62f83aabe411742b9eb6a4d363 | 
    
| ORCID | 0000-0003-0300-2469 | 
    
| OpenAccessLink | https://doaj.org/article/672f87c3c0fd46d7a0f17a1a9e993a77 | 
    
| ParticipantIDs | doaj_primary_oai_doaj_org_article_672f87c3c0fd46d7a0f17a1a9e993a77 unpaywall_primary_10_1016_j_sciaf_2024_e02355 crossref_primary_10_1016_j_sciaf_2024_e02355 elsevier_sciencedirect_doi_10_1016_j_sciaf_2024_e02355  | 
    
| ProviderPackageCode | CITATION AAYXX  | 
    
| PublicationCentury | 2000 | 
    
| PublicationDate | December 2024 2024-12-00 2024-12-01  | 
    
| PublicationDateYYYYMMDD | 2024-12-01 | 
    
| PublicationDate_xml | – month: 12 year: 2024 text: December 2024  | 
    
| PublicationDecade | 2020 | 
    
| PublicationTitle | Scientific African | 
    
| PublicationYear | 2024 | 
    
| Publisher | Elsevier B.V Elsevier  | 
    
| Publisher_xml | – name: Elsevier B.V – name: Elsevier  | 
    
| References | Nifakos, Chandramouli, Nikolaou, Papachristou, Koch, Panaousis, Bonacina (bib0015) 2021; 21 Zwilling, Klien, Lesjak, Wiechetek, Cetin, Basim (bib0023) 2022; 62 Aslan, Aktuğ, Ozkan-Okay, Yilmaz, Akin (bib0005) 2023; 12 Karayat, Jadhav, Kondaka, Nambiar (bib0010) 2022; 1 Naqvi, Batool (bib0013) 2023; 4 Nti, Nyarko-Boateng, Adekoya, Arjun (bib0017) 2021 Yeboah-Ofori, Opoku-Boateng (bib0022) 2023; 5 Ameri, Hempel, Sharif, Lopez, Perumalla (bib0002) 2023; 14 Retrieved on May 30, 2024. Neves, Araujo (bib0014) 2023; 17 Ani, He, Tiwari (bib0003) 2019; 21 Urbini, Venosa, Bazán, Del Río (bib0019) 2022 Falowo, Popoola, Riep, Adewopo, Koch (bib0006) 2022; 10 Haddaji, Ayed, Fourati (bib0007) 2022; 104 Hassan (bib0008) 2022 Appiah, Asante, Nti, Nyarko-Boateng (bib0021) 2019; 15 Appiah, Nti, Nyarko-Boateng (bib0004) 2017; 12 Nti, Narko-Boateng, Adekoya, Somanathan (bib0016) 2022; 19 Nyarko-Boateng, Asante, Nti (bib0018) 2017; 6 Li, He, Xu, Ash, Anwar, Yuan (bib0011) 2019; 45 J. Lau (2023). Triplett (bib0020) 2022; 2 Lehto (bib0012) 2022 Aldawood, Skinner (bib0001) 2019; 11 Aslan (10.1016/j.sciaf.2024.e02355_bib0005) 2023; 12 Nti (10.1016/j.sciaf.2024.e02355_bib0017) 2021 Haddaji (10.1016/j.sciaf.2024.e02355_bib0007) 2022; 104 Nti (10.1016/j.sciaf.2024.e02355_bib0016) 2022; 19 Karayat (10.1016/j.sciaf.2024.e02355_bib0010) 2022; 1 Appiah (10.1016/j.sciaf.2024.e02355_bib0021) 2019; 15 Zwilling (10.1016/j.sciaf.2024.e02355_bib0023) 2022; 62 Li (10.1016/j.sciaf.2024.e02355_bib0011) 2019; 45 Naqvi (10.1016/j.sciaf.2024.e02355_bib0013) 2023; 4 Hassan (10.1016/j.sciaf.2024.e02355_bib0008) 2022 10.1016/j.sciaf.2024.e02355_bib0009 Triplett (10.1016/j.sciaf.2024.e02355_bib0020) 2022; 2 Appiah (10.1016/j.sciaf.2024.e02355_bib0004) 2017; 12 Lehto (10.1016/j.sciaf.2024.e02355_bib0012) 2022 Nyarko-Boateng (10.1016/j.sciaf.2024.e02355_bib0018) 2017; 6 Falowo (10.1016/j.sciaf.2024.e02355_bib0006) 2022; 10 Ameri (10.1016/j.sciaf.2024.e02355_bib0002) 2023; 14 Ani (10.1016/j.sciaf.2024.e02355_bib0003) 2019; 21 Yeboah-Ofori (10.1016/j.sciaf.2024.e02355_bib0022) 2023; 5 Aldawood (10.1016/j.sciaf.2024.e02355_bib0001) 2019; 11 Neves (10.1016/j.sciaf.2024.e02355_bib0014) 2023; 17 Nifakos (10.1016/j.sciaf.2024.e02355_bib0015) 2021; 21 Urbini (10.1016/j.sciaf.2024.e02355_bib0019) 2022  | 
    
| References_xml | – start-page: 1 year: 2022 end-page: 9 ident: bib0008 article-title: Leveraging apache guacamole, Linux LXD and Docker containers to deliver a secure online lab for a large cybersecurity course publication-title: 2022 IEEE Frontiers in Education Conference (FIE) – volume: 5 start-page: 53 year: 2023 end-page: 78 ident: bib0022 article-title: Mitigating cybercrimes in an evolving organizational landscape publication-title: Continuity Resil. Rev. – volume: 6 start-page: 88 year: 2017 end-page: 94 ident: bib0018 article-title: Implementation of advanced encryption standard algorithm with key length of 256 bits for preventing data loss in an organization publication-title: Int. J. Sci. Eng. Appl. – reference: J. Lau (2023). – volume: 11 start-page: 73 year: 2019 ident: bib0001 article-title: Reviewing cyber security social engineering training and awareness programs—Pitfalls and ongoing issues publication-title: Future Internet – volume: 14 start-page: 1 year: 2023 end-page: 35 ident: bib0002 article-title: Design of a novel information system for semi-automated management of cybersecurity in industrial control systems publication-title: ACM Trans. Manag. Inf. Syst. – volume: 1 start-page: 1392 year: 2022 end-page: 1397 ident: bib0010 article-title: Web application penetration testing & patch development using kali Linux publication-title: 2022 8th International Conference on Advanced Computing and Communication Systems (ICACCS) – start-page: 1 year: 2021 end-page: 11 ident: bib0017 article-title: Network intrusion detection with StackNet: a phi coefficient based weak learner selection approach publication-title: 2021 22nd International Arab Conference on Information Technology (ACIT) – reference: . Retrieved on May 30, 2024. – start-page: 3 year: 2022 end-page: 42 ident: bib0012 article-title: Cyber-attacks against critical infrastructure publication-title: Cyber Security: Critical Infrastructure Protection – volume: 15 start-page: 1341 year: 2019 end-page: 1354 ident: bib0021 article-title: Survey of websites and web application security threats using vulnerability assessment publication-title: J. Comput. Sci. – volume: 62 start-page: 82 year: 2022 end-page: 97 ident: bib0023 article-title: Cyber security awareness, knowledge and behavior: a comparative study publication-title: J. Comput. Inf. Syst. – volume: 21 start-page: 5119 year: 2021 ident: bib0015 article-title: Influence of human factors on cyber security within healthcare organizations: a systematic review publication-title: Sensors – volume: 12 start-page: 10 year: 2017 end-page: 15 ident: bib0004 article-title: Investigating websites and web application vulnerabilities: webmaster’s perspective publication-title: Int. J. Appl. Inf. Syst. (IJAIS) – volume: 21 start-page: 2 year: 2019 end-page: 35 ident: bib0003 article-title: Human factor security: evaluating the cybersecurity capacity of the industrial workforce publication-title: J. Syst. Inf. Technol. – volume: 12 start-page: 1333 year: 2023 ident: bib0005 article-title: A comprehensive review of cyber security vulnerabilities, threats, attacks, and solutions publication-title: Electronics – volume: 2 start-page: 573 year: 2022 end-page: 586 ident: bib0020 article-title: Addressing human factors in cybersecurity leadership publication-title: J. Cybersecur. Privacy – volume: 10 start-page: 134038 year: 2022 end-page: 134051 ident: bib0006 article-title: Threat actors’ tenacity to disrupt: examination of major cybersecurity incidents publication-title: IEEE Access – volume: 104 year: 2022 ident: bib0007 article-title: Artificial intelligence techniques to mitigate cyber-attacks within vehicular networks: survey publication-title: Comput. Electr. Eng. – start-page: 1 year: 2022 end-page: 6 ident: bib0019 article-title: Distributed cybersecurity strategy, applying the intelligence operations theory publication-title: 2022 17th Iberian Conference on Information Systems and Technologies (CISTI) – volume: 4 start-page: 326 year: 2023 end-page: 332 ident: bib0013 article-title: A comparative analysis between general data protection regulations and California Consumer privacy act publication-title: J. Comput. Sci., Inf. Technol. Telecommun. Eng. – volume: 45 start-page: 13 year: 2019 end-page: 24 ident: bib0011 article-title: Investigating the impact of cybersecurity policy awareness on employees’ cybersecurity behavior publication-title: Int. J. Inf. Manag. – volume: 17 start-page: 89 year: 2023 end-page: 97 ident: bib0014 article-title: Smart automation for enhancing cybersecurity publication-title: Foresight STI Gov. (Foresight-Russia till No. 3/2015) – volume: 19 start-page: 478 year: 2022 end-page: 490 ident: bib0016 article-title: Stacknet based decision fusion classifier for network intrusion detection publication-title: Int. Arab J. Inf. Technol. – volume: 12 start-page: 10 issue: 3 year: 2017 ident: 10.1016/j.sciaf.2024.e02355_bib0004 article-title: Investigating websites and web application vulnerabilities: webmaster’s perspective publication-title: Int. J. Appl. Inf. Syst. (IJAIS) – volume: 5 start-page: 53 issue: 1 year: 2023 ident: 10.1016/j.sciaf.2024.e02355_bib0022 article-title: Mitigating cybercrimes in an evolving organizational landscape publication-title: Continuity Resil. Rev. – ident: 10.1016/j.sciaf.2024.e02355_bib0009 – volume: 45 start-page: 13 year: 2019 ident: 10.1016/j.sciaf.2024.e02355_bib0011 article-title: Investigating the impact of cybersecurity policy awareness on employees’ cybersecurity behavior publication-title: Int. J. Inf. Manag. doi: 10.1016/j.ijinfomgt.2018.10.017 – volume: 6 start-page: 88 issue: 3 year: 2017 ident: 10.1016/j.sciaf.2024.e02355_bib0018 article-title: Implementation of advanced encryption standard algorithm with key length of 256 bits for preventing data loss in an organization publication-title: Int. J. Sci. Eng. Appl. – start-page: 1 year: 2022 ident: 10.1016/j.sciaf.2024.e02355_bib0019 article-title: Distributed cybersecurity strategy, applying the intelligence operations theory – start-page: 3 year: 2022 ident: 10.1016/j.sciaf.2024.e02355_bib0012 article-title: Cyber-attacks against critical infrastructure – volume: 17 start-page: 89 issue: 1 year: 2023 ident: 10.1016/j.sciaf.2024.e02355_bib0014 article-title: Smart automation for enhancing cybersecurity publication-title: Foresight STI Gov. (Foresight-Russia till No. 3/2015) doi: 10.17323/2500-2597.2023.1.89.97 – volume: 11 start-page: 73 issue: 3 year: 2019 ident: 10.1016/j.sciaf.2024.e02355_bib0001 article-title: Reviewing cyber security social engineering training and awareness programs—Pitfalls and ongoing issues publication-title: Future Internet doi: 10.3390/fi11030073 – volume: 10 start-page: 134038 year: 2022 ident: 10.1016/j.sciaf.2024.e02355_bib0006 article-title: Threat actors’ tenacity to disrupt: examination of major cybersecurity incidents publication-title: IEEE Access doi: 10.1109/ACCESS.2022.3231847 – volume: 12 start-page: 1333 issue: 6 year: 2023 ident: 10.1016/j.sciaf.2024.e02355_bib0005 article-title: A comprehensive review of cyber security vulnerabilities, threats, attacks, and solutions publication-title: Electronics doi: 10.3390/electronics12061333 – volume: 4 start-page: 326 issue: 1 year: 2023 ident: 10.1016/j.sciaf.2024.e02355_bib0013 article-title: A comparative analysis between general data protection regulations and California Consumer privacy act publication-title: J. Comput. Sci., Inf. Technol. Telecommun. Eng. – start-page: 1 year: 2021 ident: 10.1016/j.sciaf.2024.e02355_bib0017 article-title: Network intrusion detection with StackNet: a phi coefficient based weak learner selection approach – volume: 1 start-page: 1392 year: 2022 ident: 10.1016/j.sciaf.2024.e02355_bib0010 article-title: Web application penetration testing & patch development using kali Linux – volume: 2 start-page: 573 issue: 3 year: 2022 ident: 10.1016/j.sciaf.2024.e02355_bib0020 article-title: Addressing human factors in cybersecurity leadership publication-title: J. Cybersecur. Privacy doi: 10.3390/jcp2030029 – start-page: 1 year: 2022 ident: 10.1016/j.sciaf.2024.e02355_bib0008 article-title: Leveraging apache guacamole, Linux LXD and Docker containers to deliver a secure online lab for a large cybersecurity course – volume: 62 start-page: 82 year: 2022 ident: 10.1016/j.sciaf.2024.e02355_bib0023 article-title: Cyber security awareness, knowledge and behavior: a comparative study publication-title: J. Comput. Inf. Syst. – volume: 104 year: 2022 ident: 10.1016/j.sciaf.2024.e02355_bib0007 article-title: Artificial intelligence techniques to mitigate cyber-attacks within vehicular networks: survey publication-title: Comput. Electr. Eng. doi: 10.1016/j.compeleceng.2022.108460 – volume: 21 start-page: 5119 year: 2021 ident: 10.1016/j.sciaf.2024.e02355_bib0015 article-title: Influence of human factors on cyber security within healthcare organizations: a systematic review publication-title: Sensors doi: 10.3390/s21155119 – volume: 21 start-page: 2 year: 2019 ident: 10.1016/j.sciaf.2024.e02355_bib0003 article-title: Human factor security: evaluating the cybersecurity capacity of the industrial workforce publication-title: J. Syst. Inf. Technol. doi: 10.1108/JSIT-02-2018-0028 – volume: 19 start-page: 478 issue: 3 A year: 2022 ident: 10.1016/j.sciaf.2024.e02355_bib0016 article-title: Stacknet based decision fusion classifier for network intrusion detection publication-title: Int. Arab J. Inf. Technol. – volume: 15 start-page: 1341 year: 2019 ident: 10.1016/j.sciaf.2024.e02355_bib0021 article-title: Survey of websites and web application security threats using vulnerability assessment – volume: 14 start-page: 1 issue: 1 year: 2023 ident: 10.1016/j.sciaf.2024.e02355_bib0002 article-title: Design of a novel information system for semi-automated management of cybersecurity in industrial control systems publication-title: ACM Trans. Manag. Inf. Syst. doi: 10.1145/3546580  | 
    
| SSID | ssj0002412974 | 
    
| Score | 2.285451 | 
    
| Snippet | With the growing threats in the dynamic digital landscape, organizations are grappling with the difficult task of managing cyber-attacks by restricting user... | 
    
| SourceID | doaj unpaywall crossref elsevier  | 
    
| SourceType | Open Website Open Access Repository Index Database Publisher  | 
    
| StartPage | e02355 | 
    
| SubjectTerms | Cyber threat mitigation and attack surface reduction Cybersecurity automation Linux scripting User access control  | 
    
| SummonAdditionalLinks | – databaseName: Unpaywall dbid: UNPAY link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LS8NAEF60PXjygYoVlRw8mpLsbnaTm7VYimDxYKGewuwjUK211BSpv96dPIoVkXpNNpthZrPzzWbmG0IuDbdZEEvldj9Ofc6z2I8jE_pUZ4hutXOZGCjeD0R_yO9G0aji2cZamLX_90UelvMEgFyblLctkrNE26QpIge8G6Q5HDx0nrB9HNYPUSpFzSv0-5Nrvqeg6F9zQTuL6QyWHzCZfHMxvb2ydvu9YCbEzJKX9iJXbf35g7dxQ-n3yW4FNb1OuTYOyJadHpLrbpmbjlXoHp5QeFC0TPTwQNar9hB3K3_zXscF_4b19FLZuQ95jvX4R2TYu33s9v2qi4KvmeC5n8SGMUu5CgGAZYpiyJJgJIVUdMwwyRMmrKBZzACU5aELUqhKrBLADRPsmDSmb1N7QjzklldhYKLQRtxKqgDcZBRUYHUUGNYiV7V-01lJlpHWWWTPaaGKFFWRlqpokRu0wWooMl0XF5wK0-rDSYV0gknNdJAZLoyEIAslhJBYh6xAyhYRtQXTCjSUYMBNNf777f7K3ptIe_rP8Wekkc8X9txhllxdVGv1C10l6E8 priority: 102 providerName: Unpaywall  | 
    
| Title | Controlling user access with scripting to mitigate cyber-attacks | 
    
| URI | https://dx.doi.org/10.1016/j.sciaf.2024.e02355 https://doi.org/10.1016/j.sciaf.2024.e02355 https://doaj.org/article/672f87c3c0fd46d7a0f17a1a9e993a77  | 
    
| UnpaywallVersion | publishedVersion | 
    
| Volume | 26 | 
    
| hasFullText | 1 | 
    
| inHoldings | 1 | 
    
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVAON databaseName: DOAJ Directory of Open Access Journals customDbUrl: eissn: 2468-2276 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0002412974 issn: 2468-2276 databaseCode: DOA dateStart: 20180101 isFulltext: true titleUrlDefault: https://www.doaj.org/ providerName: Directory of Open Access Journals – providerCode: PRVHPJ databaseName: ROAD: Directory of Open Access Scholarly Resources customDbUrl: eissn: 2468-2276 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0002412974 issn: 2468-2276 databaseCode: M~E dateStart: 20180101 isFulltext: true titleUrlDefault: https://road.issn.org providerName: ISSN International Centre – providerCode: PRVLSH databaseName: Elsevier Journals customDbUrl: mediaType: online eissn: 2468-2276 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0002412974 issn: 2468-2276 databaseCode: AKRWK dateStart: 20181201 isFulltext: true providerName: Library Specific Holdings  | 
    
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1NS8NAEF2kHvQiior1o-Tg0Wiyu9kkN2uxFItFxGI9LbPZDVRqW0qK9N-7s0mkvagHj_lgM7wJ82aWmbeEXGpu8iCJlY1-nPqc54mfRDr0aZZjdptZysRC8XEgekP-MIpGa0d9YU9YKQ9cAncjYponccayINdc6BiCPIwhhNRYZoXYzZEHSbpWTGEMtrxEbaZcywy5hi5LKYCinZRfG1R5iTaoyCn2bzDSznI6h9UnTCZrjNPdJ3tVqui1SxMPyJaZHpLbTtlbjlPkHu4weOCOPPRwQ9WrYoB9VMy8j7HTzzBetlJm4UNR4Dz9ERl27186Pb86BcHPmOCFnyaaMUO5CgGA5YpiyZFiJYRSckyzmKdMGGFhYgDK8NAWGVSlRgngmgl2TBrT2dScEA-14VUY6Cg0ETcxVQB2MQoqMFkUaNYkVzUgcl6KXci6C-xdOvwk4idL_JrkDkH7fhWVqt0N6z9Z-U_-5r8mETXksiL9ksztUuOfv-5_O-gv1p7-h7VnZBeXLPtZzkmjWCzNhc1KCtUi2-3-82u_5X5EezUcPLXfvgDN-eG0 | 
    
| linkProvider | Directory of Open Access Journals | 
    
| linkToUnpaywall | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LS8NAEF60PXjygYoVlRw8mpLsbnaTm7VYimDxYKGewuwjUK211BSpv96dPIoVkXpNNpthZrPzzWbmG0IuDbdZEEvldj9Ofc6z2I8jE_pUZ4hutXOZGCjeD0R_yO9G0aji2cZamLX_90UelvMEgFyblLctkrNE26QpIge8G6Q5HDx0nrB9HNYPUSpFzSv0-5Nrvqeg6F9zQTuL6QyWHzCZfHMxvb2ydvu9YCbEzJKX9iJXbf35g7dxQ-n3yW4FNb1OuTYOyJadHpLrbpmbjlXoHp5QeFC0TPTwQNar9hB3K3_zXscF_4b19FLZuQ95jvX4R2TYu33s9v2qi4KvmeC5n8SGMUu5CgGAZYpiyJJgJIVUdMwwyRMmrKBZzACU5aELUqhKrBLADRPsmDSmb1N7QjzklldhYKLQRtxKqgDcZBRUYHUUGNYiV7V-01lJlpHWWWTPaaGKFFWRlqpokRu0wWooMl0XF5wK0-rDSYV0gknNdJAZLoyEIAslhJBYh6xAyhYRtQXTCjSUYMBNNf777f7K3ptIe_rP8Wekkc8X9txhllxdVGv1C10l6E8 | 
    
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Controlling+user+access+with+scripting+to+mitigate+cyber-attacks&rft.jtitle=Scientific+African&rft.au=Owusu+Nyarko-Boateng&rft.au=Isaac+Kofi+Nti&rft.au=Anastasia+Akyamaa+Mensah&rft.au=Emmanuel+Kojo+Gyamfi&rft.date=2024-12-01&rft.pub=Elsevier&rft.eissn=2468-2276&rft.volume=26&rft.spage=e02355&rft_id=info:doi/10.1016%2Fj.sciaf.2024.e02355&rft.externalDBID=DOA&rft.externalDocID=oai_doaj_org_article_672f87c3c0fd46d7a0f17a1a9e993a77 | 
    
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2468-2276&client=summon | 
    
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2468-2276&client=summon | 
    
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2468-2276&client=summon |