Journal of Cybersecurity Research (JCR) http://clutejournals.com/index.php/JCR <p><strong>Published since 2016</strong><br>ISSN 2471-2485 (online)<br>The Journal of Cybersecurity Research (JCR) publishes both theoretical and applied articles that significantly contribute to the understanding of cybersecurity threats for government, education, and business.&nbsp;</p> Clute Institute en-US Journal of Cybersecurity Research (JCR) 2471-2485 Network Malware Laboratory BasedOn Honeypots Technologies http://clutejournals.com/index.php/JCR/article/view/10226 <p>According to studies conducted by researchers across the globe, in recent years there has been an increase in organization and company attacks. Some attacks have been detected, but others, however, were able to bypass the security mechanisms, taking advantage of an unknown vulnerability in security systems. In this context, Honeypots systems aim to collect information on the intruder’s activities and learn about threats and attackers’ behavior. Honeypots systems are not designed to remedy failures or security errors on the network, but are responsible for providing adequate information on potential attackers before compromising real systems. In this paper, a honeypot system was designed to study the techniques used by attackers. We designed and implemented a malware analysis laboratory based on honeypots technology in a controlled environment to analyze various security incidents. The use of honeypots is based on the idea of simulating applications with vulnerabilities and recording all events produced by attackers, so the network administrator can learn about the different types of attacks to protect organizational systems that are being produced. The results have been very important in terms of the number and types of security incidents recorded by the honeypots. Also, an administration interface for controlling and analyzing the gathered information was designed. This system was not only implemented but also tested for several weeks and data was collected from the attacks was analyzed.&nbsp; This led to some interesting statistics and characteristics about attackers and their goals.&nbsp;</p> Georges Bell Bitjoka Antoine Elang ##submission.copyrightStatement## 2018-12-05 2018-12-05 3 1 1 12 10.19030/jcr.v3i1.10226 Policing Cyber Terrorism http://clutejournals.com/index.php/JCR/article/view/10227 <p class="APA"><span lang="X-NONE">In</span><em><span lang="X-NONE"> order to police a crime there must be an act that is considered a crime and punishable under the law. There also must exist the capability to investigate for potential suspects and obtain physical or circumstantial evidence of the crime to be used in criminal proceedings. The act of gaining unauthorized access to a network system is a criminal act under federal law. Several key factors are presented during the course of this discussion and then built upon. Two methods of attack planning are presented. The attack planning cycle for traditional terrorist and then cyber terrorists planning used to penetrate a network system. Supervisory Control and Data Acquisition System (SCADA) are defined and presented as an important critical target within the nation’s infrastructure. Examples of successful attacks are presented. A brief overview is used to present malicious software and the effects of its use against SCADA systems. The path for which data takes through a network is explained. The importance of the data path is vital in understanding the five methods of attribution which serve as methods of investigating cyber terrorism. </span></em></p> <p>&nbsp;</p> Phillip R. Neely, Jr. Michelle T. Allen ##submission.copyrightStatement## 2018-12-05 2018-12-05 3 1 13 18 10.19030/jcr.v3i1.10227