Information and Computer Security https://ojs.piscomed.com/index.php/ICS <table><tbody><tr style="vertical-align: top;"><td style="text-align: justify;"><p style="text-align: justify;"><em>Information and Computer Security</em> is an international Open Access journal that publishes original research articles and review articles related to all areas of information and computer security. This journal covers education, policies, standards, simulations and control of internet security.</p></td><td><div id="cover_section"><a style="font-size: 10px;" href="/index.php/ics" target="_self"><span style="color: #000000;"> <img id="cover-img" src="/public/journals/43/journalThumbnail_en_US.jpg" alt="" width="200px" align="right" /> </span> </a></div></td></tr></tbody></table> PiscoMed Publishing Pte Ltd en-US Information and Computer Security <p>Authors contributing to this journal agree to publish their articles under the <a href="http://creativecommons.org/licenses/by-nc/4.0" target="_blank">Creative Commons Attribution-Noncommercial 4.0 International License</a>, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit, that the work is not used for commercial purposes, and that in the event of reuse or distribution, the terms of this license are made clear. With this license, the authors hold the copyright without restrictions and are allowed to retain publishing rights without restrictions as long as this journal is the original publisher of the articles.</p><p><img src="/public/site/by-nc.png" alt="" height="30px" /></p> A simple realization of the computer virus https://ojs.piscomed.com/index.php/ICS/article/view/586 A computer virus is a computer program or instruction set that can interfere with the normal operation of the computer and cause the computer hardware and software to malfunction and destroy the computer data. With the computer in various fields of social life widely used, computer virus attack and prevention technology is also constantly expanding, to prevent computer viruses are also more and more attention. This paper starts from the basic theory of script virus and the key technology of scripting virus, and realizes a simple script virus, and deeply analyzes the mechanism and principle of script virus. This paper summarizes the development history and development trend of computer virus, briefly introduces the basic knowledge of VBScript, Windows Script Host (WSH) and registry required to realize script virus. This paper focuses on the working principle of the script virus and the main techniques used in each module. Taking the source code of the script virus as an example, it analyzes the function of design idea, infection module, damage module and tag module, and implements the script virus Recursive algorithm for searching disk mechanisms and infection mechanisms. Qinghong Liang Shangying Cao Zhengan Qi Copyright (c) 2018 INFORMATION AND COMPUTER SECURITY https://creativecommons.org/licenses/by-nc/4.0 2018-02-07 2018-02-07 10.18282/ics.v1i1.586 Analysis of Network Security in Daily Life https://ojs.piscomed.com/index.php/ICS/article/view/587 From the beginning of the new century to the rapid development of global information technology today, with the popularity of the Internet and the rapid construction of information technology, more and more people involved in the use of the Internet. Especially in the past two years, online surfing, e-commerce, online chat, e-government, Internet banking, online shopping transactions, online games, this series of network activities, has become a hot application of today's society. With the increasing reliance on the network and information technology in all aspects of society, the network has become an indispensable part of work and life for most people. The rapid development of the network brings closer the distance between real life and virtual world, changed the way people work, study and live. It can be sure that now the human life becomes more relaxed because of network. However, the network has brought us great convenience, but also brought some difficulties. Due to the design defects of the Internet itself and its complexity, openness and expanding of the software scale, the application is more and more complex, making the hidden danger of the network increased dramatically. Therefore, the security of the network has become one of the important factors hindering the process of information technology. Today, for many users, they know that they are facing a certain network threat. But from where, what will happen, are not very clear for many people. Generally speaking, ordinary network users mainly face Internet security issues. Computer viruses, cyber scams, data loss, botnets, phishing, privacy leaks, are a few example of network security threats. The recent impact of large events, such as: Panda burning incense virus, Trojan industry chain exposure, once macro virus, Trojan horse site-linked malware, makes the network security issues become the focus of attention, even to worldwide audience. Jinliang Shen Shiming Gong Wencong Bao Copyright (c) 2018 INFORMATION AND COMPUTER SECURITY https://creativecommons.org/licenses/by-nc/4.0 2018-02-07 2018-02-07 10.18282/ics.v1i1.587 Analysis on Network Security and Its Countermeasures https://ojs.piscomed.com/index.php/ICS/article/view/588 With the rapid development of computer technology and the popularization of the network, human civilization is undergoing profound changes. The network has become an important resource for the political, economic, military and cultural aspects of the country and has become a symbol of national soft power. With the extensive use of computer networks and the increase in data transmission between networks, network security issues are becoming more prominent. Network security is related to national security, social stability, economic development and cultural construction and other fields, has become a hot topic of global concern. If a country cannot guarantee the security of network information in terms of collection, storage, transmission and authentication, it is impossible to obtain the efficiency and efficiency of information technology. The social and economic life is difficult to be carried out in a healthy and orderly manner. When the status of China's network information security is not optimistic. People should correctly deal with the negative impact caused by the process of information technology, take positive measures to protect the security of China's network information. Qinghua Jiang Lilin Lin Yanhong He Copyright (c) 2018 INFORMATION AND COMPUTER SECURITY https://creativecommons.org/licenses/by-nc/4.0 2018-02-07 2018-02-07 10.18282/ics.v1i1.588 Computer Network Attack and Defense Technology https://ojs.piscomed.com/index.php/ICS/article/view/589 In recent years, the Internet as a symbol of the computer network protocols, standards and application technology development is extremely rapid. But the Internet is like a sharp double-edged sword, it is for the convenience of people at the same time, but also for computer viruses and computer crime to provide the soil, for systems, network protocols and databases, whether it is its own design flaws, or due to human factors caused by a variety of security vulnerabilities, may be some of the other attempts to use hackers and attack, so the establishment of an effective network security system is even more urgent. To ensure network security, reliable, you must be familiar with the general process of hacker network attacks. The only way to do before the hacker attack the necessary precautions is to ensure that the network is safe and reliable operation. This article comprehensively analyzes the steps, methods and common attack tools of network attack, and tells the concrete precautionary measures from several aspects, so that readers have a comprehensive network of knowledge, in the treatment of network threats are well prepared. Xinyue Yang Shujun Zhou Guanghui Ren Yaling Liu Copyright (c) 2018 INFORMATION AND COMPUTER SECURITY https://creativecommons.org/licenses/by-nc/4.0 2018-02-07 2018-02-07 10.18282/ics.v1i1.589 Research on Data Encryption Technology https://ojs.piscomed.com/index.php/ICS/article/view/590 Data cryptography is the core technology of network and information security. Its basic design idea is to use the carrier form (called cipher text) after the various transformations (called encryption algorithm) to send the message (plaintext) For the storage and transmission, the authorized recipient with the corresponding transformation (known as the decryption algorithm) to restore the plaintext, the illegal interceptors are not visible or understand the plaintext, so as to achieve the purpose of information security. Hongjiang Duan Weilong Huang Guangxu Zhu Copyright (c) 2018 INFORMATION AND COMPUTER SECURITY https://creativecommons.org/licenses/by-nc/4.0 2018-02-07 2018-02-07 10.18282/ics.v1i1.590 Facial Authentication as A Possible Solution to the Challenges in User’s Security and Privacy in Web Applications https://ojs.piscomed.com/index.php/ICS/article/view/591 <p><strong>I</strong>n recent years, new technologies have become the focal point of any operation or digital system. Smartphones are increasingly gaining ground as a technological tool that combines a large number of applications and online services. It is an observable reality, as operations are increasingly being carried out in electronic commerce applications, banking transactions, health applications, and distance education. However, the widespread use of these types of practices means that more risks can present themselves through the internet. Therefore, any organization must take into account changes in virtual security, having to face possible cyber attacks or identity theft. Although smartphones have become a powerful tool in daily lives of most people, it is true that it has brought a series of challenges in the security and privacy of users, where facial authentication seems to be a possible solution to this type of problems. This article reviews the most relevant current existing literature about facial authentication as a biometric system, as well as the systems available on the market, so that organizations can use them with its clients or users.</p> Francisco D. Guillén-Gámez1 Iván García-Magariño2,3 Copyright (c) 2018 INFORMATION AND COMPUTER SECURITY https://creativecommons.org/licenses/by-nc/4.0 2018-09-26 2018-09-26 10.18282/ics.v1i1.591 Hiding image into another meaningful images using Richardson-Lucy algorithm with data authentication https://ojs.piscomed.com/index.php/ICS/article/view/592 Image steganography is a technique of embedding sensitive information in images. In literature, research articles proposed different image steganography schemes on cover images based on different algorithms. Withal, stego images have less quality in HVS and lower performance. Another topic in image steganography is the quality of extracted data in receiver side that can be affected by transmission channel options or even by the attacks on stego images in transmission channel. In this paper discrete cosine transform (DCT) function and Motion Blur (based on Richardson-Lucy algorithm) is used for secret image transformation and secured hash file of the transformed image generated with RSA cryptosystem therewith. The randomness property of the resultant image reduces the possibility of its detection by HVS and steganalysis techniques. Image data embedding applied with LSBMR substitution algorithm into another significant image. Image deconvolution addressed in recent articles that used different methods such as edge extractions, Richardson-Lucy algorithm, Regularized filters and etc. We apply the Richardson-Lucy deconvolution basics in final secret image extraction to remove the noise. Several experiments and comparative studies are further presented to verify the effectiveness of the proposed algorithm in terms of performance, stego image quality and secret images quality maintenance. Ali Sheidaee Leyli Mohammad Khanli Copyright (c) 2018 INFORMATION AND COMPUTER SECURITY https://creativecommons.org/licenses/by-nc/4.0 2018-09-26 2018-09-26 10.18282/ics.v1i1.592 Multi-Agent System for an Image Steganalysis https://ojs.piscomed.com/index.php/ICS/article/view/593 <p>Steganography is the science of data concealment, but it can be used by malicious people to use it for destructive purposes. For this reason, the presence of methods detecting Steganography becomes a necessity.</p><p>The science of detecting Steganography is called steganalysis and evolves with new steganographic techniques.</p><p>The purpose of this paper is to present a model for detecting the content of JPEG images that have been steganographed.</p><p>Our work involves applying Multi-Agent Systems (MAS) in image steganalysis where we use ADMs to reduce the complexity of solving a problem by dividing the necessary knowledge into subsets, combining an independent intelligent agent to each of these subsets and coordinating the activity of these agents.</p>We opted for the Java Agent Development Framework (JADE) platform for the development and realization of the inter-operable Multi-Agent System Akram Boukhamla Copyright (c) 2018 INFORMATION AND COMPUTER SECURITY https://creativecommons.org/licenses/by-nc/4.0 2018-09-21 2018-09-21 10.18282/ics.v1i1.593 The method of false vortices in designation problems of targets, road signs, facial features and real vortices in space images https://ojs.piscomed.com/index.php/ICS/article/view/594 <p>An image in one color is a scalar field. The image is associated with its vector gradient field. The analysis of vector fields with the help of single-length vector templates made it possible to indicate in the image such objects as vortices, Road Signs (RS), Facial Features (FF), and so on. The proposed method of indicating local objects using gradient fields turned out to be highly accurate and noise-proof. The presented advantages of the proposed method recommend it as a promising tool in targets designation problems.</p> Evgeni Nikolaevich Terentiev1 I. García-Magariño2 N. E. Shilin-Terentyev3 I. N. Prikhodko1 I. I. Farshakova1 Copyright (c) 2018 Evgeni Nikolaevich Terentiev https://creativecommons.org/licenses/by-nc/4.0 2018-12-03 2018-12-03 10.18282/ics.v1i1.594