Skip to main content
Christos  Beretas
  • (+30) 6938909477

Christos Beretas

Cyber attacks have become a major concern for organizations and individuals a like, as they continue to evolve in sophistication and scale. In response to this growing threat, information systems security has emerged as a critical area of... more
Cyber attacks have become a major concern for organizations and individuals a like, as they continue to evolve in
sophistication and scale. In response to this growing threat, information systems security has emerged as a critical area
of research and practice. The objective of this study is to investigate and analyze various aspects related to information systems
security, detection, and recovery from cyber attacks. The research methodology employed in this study encompasses a
comprehensive literature review, case studies, and interviews with experts in the field, in order to identify key concepts and
best practices in information systems security. The findings of this research reveal that effective measures for protecting
information systems from cyber attacks involve a multi-layered approach, comprising of technical, organizational, and
human factors. Technical measures involve the implementation of robust security systems, such as firewalls, intrusion
detection systems, and encryption protocols, to safeguard against unauthorized access. Furthermore, regular system
updates and patches are crucial in mitigating vulnerabilities and preventing potential breaches.
Recovery from cyber attacks is a critical aspect that organizations should consider. Prompt and effective response is crucial
to minimize the impact of cyber attacks and restore normal operations. This study emphasizes the importance of having a
well-defined incident response plan, which includes steps for containment, eradication, and recovery. Additionally, regular
backups and disaster recovery plans are essential for data and system restoration. This research highlights the importance
of information systems security, detection, and recovery from cyber attacks. It provides insights into the various measures
and strategies that organizations can adopt to protect their systems and data. The findings of this research contribute to
the existing body of knowledge in the field of information systems security and serve as a valuable resource for practitioners
and policymakers. Further research in this area is recommended to address the evolving nature of cyber threats and the
advancements in security technologies.
As the digital landscape continues to evolve, nations like France find themselves on the frontline of an escalating cyber warfare scenario. This abstract provides an insightful overview of the most significant types of cyber attacks that... more
As the digital landscape continues to evolve, nations like France find themselves on the frontline of an escalating cyber warfare scenario. This abstract provides an insightful overview of the most significant types of cyber attacks that France is expected to face in the future, offering a comprehensive analysis based on current trends and emerging technologies. The research delves into the realm of advanced persistent threats (APTs), examining the sophisticated techniques employed by state-sponsored actors and cybercriminal organizations to compromise critical infrastructure, sensitive data, and national security. It explores the evolving landscape of ransomware attacks, focusing on the potential impact on both public and private sectors, and the looming threat of extortion campaigns that could cripple essential services. Furthermore, the abstract sheds light on the rising concern of supply chain attacks, as interconnected global networks make businesses and government entities vulnerable to malicious actors seeking to exploit weaknesses in third-party systems. The research also explores the nuances of social engineering attacks, recognizing the human element as a critical vulnerability that threat actors may exploit through targeted phishing campaigns and manipulation tactics.

In addition, the abstract touches upon the growing menace of Internet of Things (IoT) vulnerabilities, acknowledging the increased interconnectivity of devices and the potential for large-scale disruptions. It also considers the implications of emerging technologies such as artificial intelligence and quantum computing in shaping the future threat landscape. By examining these diverse aspects of cyber threats, this abstract aims to provide a forward-looking perspective on the challenges France is likely to encounter in the digital realm. As cybersecurity becomes an integral component of national defense, understanding these anticipated threats is crucial for policymakers, security experts, and technology professionals seeking to fortify France's resilience against the evolving nature of cyber attacks.
The world of cybersecurity is a dynamic arena where hackers, with their varying intentions and methodologies, play a pivotal role. This abstract provides an overview of the distinction between Black Hat and White Hat hackers, delves into... more
The world of cybersecurity is a dynamic arena where hackers, with their varying intentions and methodologies, play a pivotal role. This
abstract provides an overview of the distinction between Black Hat and White Hat hackers, delves into their techniques, explores the
ethical issues surrounding hacking, and highlights the bug bounty ecosystem as a critical component of modern cybersecurity. Black
Hat hackers are those who engage in illicit activities, seeking to exploit vulnerabilities in computer systems and networks for personal
gain, be it financial, political, or malicious intent. In contrast, White Hat hackers, often referred to as ethical hackers, use their skills to
uncover vulnerabilities, protect systems, and ensure the safety of digital infrastructure. This fundamental division characterizes the
ethical underpinning of the hacker community. Techniques employed by Black Hat hackers encompass a wide range of tactics, such as
malware development, phishing attacks, social engineering, and Distributed Denial of Service (DDoS) attacks. They continually evolve
their strategies to outsmart security measures, posing a significant threat to individuals, organizations, and governments. Conversely,
White Hat hackers employ similar techniques but for defensive purposes. They conduct penetration testing, vulnerability assessments,
and security audits to identify and rectify weaknesses in systems before malicious actors can exploit them. The ethical issues surrounding
hacking are multifaceted. Ethical considerations primarily revolve around the legality and the moral implications of hacking activities.
Black Hat hackers operate outside the bounds of the law, causing harm to individuals and organizations, which raises significant ethical
concerns. On the other hand, White Hat hackers often work under legal frameworks, but the ethical dilemmas arise when they uncover
vulnerabilities and must decide whether to disclose or exploit them for personal gain. The bug bounty ecosystem provides an ethical and
structured approach to addressing vulnerabilities in digital systems. Companies and organizations offer monetary rewards to White Hat
hackers for responsibly disclosing security flaws, thus incentivizing ethical hacking. Bug bounty programs encourage transparency,
collaboration, and the strengthening of cybersecurity defenses, mitigating potential threats posed by Black Hat hackers. The interplay
between Black Hat and White Hat hackers underscores the duality of the cybersecurity landscape. Techniques employed by each group
contribute to the ongoing evolution of the digital security landscape, while ethical issues surrounding hacking remain a critical concern.
The bug bounty ecosystem stands as a vital tool in the arsenal of cybersecurity, encouraging ethical hackers to proactively identify and
remediate vulnerabilities, ultimately fortifying our digital world against malicious threats.
Without a doubt, artificial intelligence in today's era has made tremendous progress, it is all around us in various forms and automations. It is constantly evolving and the goal is to reach a level where it will be very close to human... more
Without a doubt, artificial intelligence in today's era has
made tremendous progress, it is all around us in various
forms and automations. It is constantly evolving and the
goal is to reach a level where it will be very close to
human thought and logic and will be able to perform
processes that were time-consuming, complex, or
thought impossible until now. To implement all of the
above, sophisticated algorithms and a large collection of
data, known as Big Data, are required in order to extract
the necessary information to be used later by the
algorithms. All countries of the world do not apply the
same policy to protect its citizens' personal data, some
countries apply a strict policy and other countries do not
apply any personal data protection policy. Big Data, and
artificial intelligence unfortunately do not discriminate
between countries and the laws applied by country, Big
Data is collected from different sources, in different
ways, and the way of processing varies. Given the
above, it is impossible to apply the GDPR to limit and
control the personal data of European citizens living in
the European Union.
Smart phone surveillance is a sensitive issue, so topical and important, which is about everyday life of all of us, I am talking about the smart phones, small smart phones, these small but powerful computers that everybody use them... more
Smart phone surveillance is a sensitive issue, so topical and
important, which is about everyday life of all of us, I am talking about
the smart phones, small smart phones, these small but powerful
computers that everybody use them everyday by doing more internet
browsing rather than doing calls. The questions that arise about the
security of smart phones are many, for example: may someone watch
us? May the government hear what we saying and what messages we
send? May they know our location? How much important meta-data
is and to what extent it can reveal important information about the
subscribers identity and how it relates to privacy and personal data.
Finally, it is worth mentioning the participation of mobile phone
providers in various government monitoring projects of the citizens
either with targeted software which is not detectable, or with the direct
access to the Servers of the providers for copying sensitive information
without of course the consent of the subscribers. Such projects are the
Carnivore, Prism, and other projects, and the countries involved in
information exchange programs are behind lists identified as 5 Eyes,
9 Eyes, and 14 Eyes.
In recent years the field of information technology and communication has made enormous progress, one characteristic progress is the ease of systems interconnection of different technologies with other systems that are able to operate... more
In recent years the field of information technology and communication has made enormous progress, one characteristic progress is the ease of
systems interconnection of different technologies with other systems that are able to operate automatically and perform automated processes, this
has been greatly helped by the technological evolution data compression, data conversion into other formats which aimed to reduce the volume of
data and lower prices on storage media and create new storage media. Today, the whole life of a person, that is, all his/her activities can be stored
on a CD at an extremely low cost, imagine the usual activities of a person from the moment he/her is born until dies only fit on a CD. The European
Union, realizing the increasing technological progress, implemented various laws for the protection of personal data and human freedom, so after
several laws, it ended up creating the GDPR which is automatically applied to all member states of the European Union as well as in third countries
where personal data of European citizens are processed. The GDPR is opt-in / opt-out in relation to other personal data protection laws such as for
example the CCPA which applies in California and is only opt-out, this is something very important and reinforces the effectiveness of the GDPR as
it limits the use of personal data, but unfortunately there is not always European citizen’s consent.
In recent years, the rapid growth in electronics, computing and the growing needs of people for communication, automation, electronic transactions, and electronic conveniences has helped develop new technologies that have evolved in our... more
In recent years, the rapid growth in electronics, computing and the growing needs of people for communication, automation, electronic transactions, and electronic conveniences has helped develop new technologies that have evolved in our lives to make it easier by simplifying communication with people around us and simplifying various online services. IoT is a trend that has begun with enthusiasm, is currently underway and will continue to evolve over the years. In developed countries in the world, especially in the USA and Europe, there are thousands of online devices that perform specific tasks daily, such as electrical water pumps, statistical data collection, network control, vehicle guidance, food supply, motion sensors, patient monitoring, etc There are so many IoT manufacturers that each manufacturer applies their own security way, or they do not even apply security, considering Android itself is capable of defining and automatically protect the IoT. The scientific community has put the emphasis on upgrading protocols and services, providing more capabilities but significantly ignoring the security of the infrastructure that will be installed  an IoT.
Critical infrastructures are complex operating environments that often require special protection and security. A successful security strategy design should adhere to the principles of durability, integrity, and regularity. In the... more
Critical infrastructures are complex operating environments that often require special protection and security. A successful security strategy design should adhere to the principles of durability, integrity, and regularity. In the European Union, there is a strong interest in the security of critical infrastructures, especially those with interdependence. Given the fact that critical infrastructures play an essential role in a country’s economy, it makes them even more vulnerable. The main aim of this article is to analyze the critical infrastructures’ cyber security policy. The creation of a security strategy requires identification of the needs for equipment, mode of operation, and required security level. It has to establish rules for precise operation and handling of situations. The article tackles the issues of security strategy for critical infrastructures to protect sensitive areas and sectors. In addition, a cybersecurity policy as a countermeasure is discussed.
The principles of confidentiality, integrity and availability of information processing and storing should remain intact. The establishment of a secure electronic environment for the protection of privacy with actions for the protection... more
The principles of confidentiality, integrity and availability of information
processing and storing should remain intact. The establishment of
a secure electronic environment for the protection of privacy with
actions for the protection of critical information infrastructure seems
more than necessary. The USΑ is not prepared as it should have
against a cyber-attack, the reason for this failure is that there is
not a unique and official national cyber security policy or a unique
organization which has the sole responsibility and power to achieve
that. In cyber security sector, federal agencies do not cooperate
sufficiently with each other. This situation in the cyber security field
is no longer acceptable as stake most numerous and important.
It is well known in computer science that a quantitative analysis can reveal information about a future cyber attacks, combining and analyzing elements that are necessary to carry out the analysis and on the other hand are elements that... more
It is well known in computer science that a quantitative analysis can reveal information about a future cyber attacks, combining
and analyzing elements that are necessary to carry out the analysis and on the other hand are elements that substantiate the conclusions and the implementation of the appropriate cyber security methods and policies. Quantitative analysis is necessary in critical areas such as “defence” to deal with threats of cyber attacks on critical infrastructure to predict future situations, intruders, while greatly reducing the degree of uncertainty.
Smart devices, or Internet of Things in other world, are a concept that applies to the electronic objects around us, that is, devices that use built-in sensors to collect data and take action on it within a network. As smart devices... more
Smart devices, or Internet of Things in other world, are a concept that applies to the electronic objects around us, that is, devices that use built-in sensors to collect data and take action on it within a network. As smart devices collect data about its users, smart cities, they are primary targets for hackers.
There are several reports on the web about how vulnerable smart devices are to intrusion and loss of privacy, those online reports also provides details on how routers can be hacked. If the router that connects a smart
device is hacked, all smart systems and devices connected to it can be controlled remotely. Hackers will attack anything, from routers, webcams, security systems, sensors, actuators, data storage places and
databases, to try to do things like locate their users, and monitor their conversations as much as possible. It is clear that today we know better. But, how long will it be before we see a smart city locked by hackers in
demand for ransom? It is not far from happening, it is a matter of time before it happens. Most of smart devices are heavily dependent on Wi-Fi, which remains directly compromised by a person with average hacker skills. This means, that a smart device could easily be compromised through this point, so that someone could enter the internal computer system, could enter at smart device management console, have access to personal data, and application management system. Smart users should ask if smart devices
provide authentication ad what kind of authentication, if the username and password can be changed, if customer support is provided, if the device collects their personal data and if yes in what level, if the manufacturer has compromised data and if encrypts stored data and automatically updates software. In the U.S, some smart devices sold with the promise of a subscription became useless after the company's decision to shut down the central servers used by the devices to operate, therefore, Before a city can be transformed from a classic to a smart one, all the parameters must be taken into account
Smart devices, or Internet of Things in other world, are a concept that applies to the electronic objects around us, that is, devices that use built-in sensors to collect data and take action on it within a network. As smart devices... more
Smart devices, or Internet of Things in other world, are a concept that applies to the electronic objects around us, that is, devices that use built-in sensors to collect data and take action on it within a network. As smart devices collect data about its users, smart cities, they are primary targets for hackers. There are several reports on the web about how vulnerable smart devices
are to intrusion and loss of privacy, those online reports also provides details on how routers can be hacked. If the router that connects a smart device is hacked, all smart systems and devices connected to it can be controlled remotely. Hackers will attack anything, from routers, webcams, security systems, sensors, actuators, data storage places and databases, to try to do things like locate their users, and monitor their conversations as much as possible. It is clear that today we know better. But, how long will it be before we see a smart city locked by hackers in demand for ransom? It is not far from happening, it is a matter of time before it happens. Most of smart devices are heavily dependent on Wi-Fi, which remains directly compromised by a person with average hacker skills. This means, that a smart device could easily be compromised through this point, so that someone
could enter the internal computer system, could enter at smart device management console, have access to personal data, and application management system. Smart users should ask if smart devices provide authentication ad what kind of authentication, if the username and password can be changed, if customer support is provided, if the device collects their personal data and if yes in what level, if the manufacturer has compromised data and if encrypts stored data and automatically updates software. In
the U.S, some smart devices sold with the promise of a subscription became useless after the company’s decision to shut down the central servers used by the devices to operate, therefore, Before a city can be transformed from a classic to a smart one, all the parameters must be taken into account
This article has as a purpose to deal with security and privacy of the data handled daily worldwide. It describes and analyzes the ways of violating private communications that make in various ways such as (Internet activities, smart... more
This article has as a purpose to deal with security and privacy of the data handled daily worldwide. It describes and analyzes the ways of violating
private communications that make in various ways such as (Internet activities, smart phones, viruses, hacking, social media, cloud computing, bots,
mobile applications, internet of things, metadata, and tracking/surveillance). It analyzes the above mentioned and also trying to find countermeasures
to protect the confidentiality and integrity of data. The collection and analysis of information nowadays is becoming more easily in different ways and
from different sources to join all of them the information to create a virtual human profile becoming very easy. The freedoms of individuals have been
reduced significantly in this contributed automated system in most cases without the consent of the users that record, store and process personal data
including files unknowingly. This article aims to highlight the major problem of violation of the electronic data and privacy, to present countermeasures
enriching knowledge from simple user until the advanced professional for the going on around and how it can defend itself.
Undoubtedly is a technological revolution that has certainly focused on the interest of software development companies, companies of IT, hardware design, networks and artificial intelligence. A technological revolution that started a few... more
Undoubtedly is a technological revolution that has certainly focused on the interest of software development companies, companies of IT, hardware design, networks and artificial intelligence. A technological revolution that started a few years ago and has evolved rapidly, thanks to the technological evolution of IT and networks. It is a combination of many communication protocols, sensors and other intelligent technologies, the correlation between smart technologies, networks and services that all together complete processes in order to achieve the result for which they were installed. In advanced technology countries, both simple users and industry use IoT where sensors are simplified and automated at home and in industry, there is continuous monitoring, control and prediction of product failure for the benefit of efficient production of high quality products and control production at each stage of product processing/production. Someone could well think and say that all this is fantastic and that we have solved the problem of organization, easy life without further thoughts and worries since everything is done automatically. An IoT in an intelligent house could literally regulate everything, using sensors and appropriate software could talk with a human person, as well as someone could appropriately entice all that security and literally take full control of the premises of a home with consequences
from minimal to catastrophic including the complete destruction of a home.
The purpose of the present research is to identify security holes in IoT in percentage, according to a research conducted from January 5, 2020 to January 26, 2020 involving a large number of people who are actively involving with IoT.... more
The purpose of the present research is to identify security holes in IoT in percentage, according to a research conducted from January 5, 2020 to January 26, 2020 involving a large number of people who are actively involving with IoT. These people wanted to share their fears and anxieties, expressing their views freely. The majority of participants expressed concerns about IoT security. This research clearly shows the phobias that exist as well as the lack of an IoT protection mechanism considering the restrictions that exist.
The Internet of Things is a concept that has been heard quite a lot in recent years, a concept that slowly emerged, but over time it has experienced a booming growth that was then adopted not only by giant IT companies, offering according... more
The Internet of Things is a concept that has been heard
quite a lot in recent years, a concept that slowly emerged, but
over time it has experienced a booming growth that was then
adopted not only by giant IT companies, offering according to
the directions of each company that adopts the corresponding
services and applications to the end user. Undoubtedly this
technology has come to stay for a long time; it has come to
improve our living conditions and to simplify habits and
functions that required time and many times difficulties.
Industrial control systems (ICS) are critical, as in these systems, cyber threats have the potential to aff ect, disorganize, change their mode of operation, act as an information extraction vehicle, and ultimately turn against itself.... more
Industrial control systems (ICS) are critical, as in these systems, cyber threats have the potential to aff ect, disorganize, change their mode of operation, act as an information extraction vehicle, and ultimately turn against itself. Creating risks to the system itself, infrastructure, downtime, leakage of sensitive data, and even loss of human life. Industrial control systems (ICS) are vital to the operation of all the modern automated infrastructure in the western world, such as power plant and power stations. Industrial control systems (ICS) diff er from the traditional information systems and infrastructures of organizations and companies, a standard
cyber security strategy cannot be implemented but part of it adapting to the real facts and needs of each country, legislation and infrastructure. These systems require continuous operation, reliability and rapid recovery when attacked electronically with automated control, isolation and attack management processes. Incorrect settings and lack of strategic planning can lead to unprotected operation of critical installations, as they do not meet the cyber security requirements. Industrial control systems (ICS) require special protection in their networks, as they should be considered vulnerable in all their areas, they need protection from cyber attacks against ICS, SCADA servers, workstations, PLC automations, etc. Security policies to be implemented should provide protection against cyber threats, and systems recovery without aff ecting the operation and reliability of operating processes. Security policies such as security assessment, smart reporting, vulnerability and threat simulation, integrity control analysis, apply security policy to shared systems, intrusion detection and prevention, and fi nally fi rewall with integrated antivirus and sandbox services should be considered essential entities.
Internet of Things along with Internet Service Providers are a different philosophy and architecture but with a common denominator the Internet access. In both cases, users are unsuspected about the data being transferred but also... more
Internet of Things along with Internet Service Providers are a different philosophy and architecture but with a common denominator the Internet access. In both cases, users are unsuspected about the data being transferred but also collected for further analysis
TOR is a very popular Project, a global anonymity network loved by millions of internet users, used by people who want to express their opinion online, take malicious actions, transfer files from one location to another without these... more
TOR is a very popular Project, a global anonymity network loved by millions of internet users, used by people who want to express their opinion online, take malicious actions, transfer files from one location to another without these files are compromised, their location is not detected, etc. All the above
actions are performed so as not to be detected by ISPs or to log their online data from the websites they want to visit, thus significantly reducing the risk to be detected, although the ISP knows when a user is connecting to the TOR network but without being able to see the contents of the packets. TOR started for another purpose and ended up being used for another purpose. Designed by the U.S Navy for the exchange of confidential data and ended up an open source project, this in itself is questionable and needs a lot of skepticism, how an anonymity project that was designed to be used for the secrecy of communications was left free to users making life difficult for the secret services worldwide to detect dangerous online transactions and prevent malicious actions, isn't that true after all? Did the government create an anonymity project to make its life more difficult? is this whole endeavor a
delusion? Is this whole project deliberately in the interest of governments?
Governments think they have the capacity and ability to control the origin of information and its validity, but no one can guarantee the integrity of the information and how it came about. Many people believe that people who have... more
Governments think they have the capacity and ability to control the origin of information and its validity, but no one can guarantee the integrity of the information and how it came about. Many people believe that people who have authority also have control and power, this is not the case, control, power and authority is given to the one who has the knowledge and information to carry out his/her purpose with the
right choices. Among us there are companies, public and private for different purposes, companies can be set up by non- friendly countries of high interest to gather information. The goal remains the same, the creation of a digital
profile with the habits and needs of people who are in the research and interest field. Of course this is not only possible in the physical world but also in the digital world. In the digital world it is very easy to create a digital human profile when you are even on the government side it is easier because then there is Internet Service Provider (ISP) support so the candidate's digital footprint can be easily searched. But even when you're not on the government side, companies with the right technology can trap the prospective victim to build their profile online. So governments around the world aren't the only ones who want to know the habits of citizens, but what
happens when governments themselves fall victim to it?
Big Data and GDPR are two entities that do not go hand in hand. The systematic collection, storage, processing and analysis of data is a systematic process, which on the one hand is a necessity in artificial intelligence, but on the other... more
Big Data and GDPR are two entities that do not go hand in hand. The systematic collection, storage, processing and analysis of data is a
systematic process, which on the one hand is a necessity in artificial intelligence, but on the other hand it systematically limits personal
data and human freedoms. Each country has different legislation or no legislation that defines and clarifies what personal information is
and how this personal data is protected. The enthusiasm and passion for technological advancement should not affect people’s personal
lives. There are personal data which are of high importance to an individual which should not and is not ethical to be shared freely without
any consent of the concerned individual as well as it is also unethical.
Objective: Pump size exterior artificial pancreas that will keep the glucose between 120 – 150mg/dl. Method: The whole project based on the idea that we should already know one insulin unit how much is able to go down the glucose and one... more
Objective: Pump size exterior artificial pancreas that will keep the glucose between 120 – 150mg/dl. Method: The whole project based on the idea that we should already know one insulin unit how much is able to go down the glucose and one glucagons unit how much is able to increase the glucose. Less than 120 mg/dl it uses glucagons. More than 150 mg/dl it uses insulin. The pump checks the glucose automatically for every 8 minutes.
The pump (which is software decision) will choose between insulin or glucagons base in an internal database table with prerequisite glucose values and the insulin or glucagons units requiring for each glucose value
(adaptive database table for each diabetic). The pump (the software) is able to choose how many insulin or glucagon units it should use (that is not based on what the diabetic will eat, but base on the current glucose level
that received from the sensor which is located in the human body, needle and sensor are one piece). The insulin should have a work duration of 8 minutes and works instantly. Result: I choose 120 mg/dl as the lowest allowance glucose level as this level is secure for the diabetic (there is a time to prevent big hypoglycemia). Conclusion: This project offers to diabetics insulin injections freedom, hypoglycemia prevention, run emergency tests, ideally for all ages, endocrinologists will have the software to adapt the internal database table of the pump for each diabetic needs.
Cyber hybrid warfare has been known since antiquity, it is not a new terminology nor a new practice. It can have an effect even more than a regular conventional war. The implementation of the cyber hybrid war aims to misinform, guide and... more
Cyber hybrid warfare has been known since antiquity, it is not a new terminology nor a new practice. It can have an effect even more than a regular conventional war. The implementation of the cyber hybrid war aims to misinform, guide and manipulate citizens, disorganize the target state, create
panic, overthrow governments, manipulate sensitive situations, intimidate groups, individuals and even shortened groups of the population, and finally to form an opinion according to the enemy’s beliefs. Creating online events designed to stimulate citizens to align with the strategy of governments or the strategy of the enemy government is a form of cyber hybrid warfare. The cyber hybrid warfare falls under the category of asymmetric threats as it is not possible to determine how, and the duration of the cyber invasion. The success or not of a cyber hybrid war depends on the organization, the electronic equipment, and the groups of actions they decide according to the means at their disposal to create the necessary digital entities. Finally, the cyber hybrid warfare is often used to show online military equipment aimed
at downplaying its moral opponent..
Cloud computing is one of the most widespread architectures in recent years, services and applications that rely on it are rapidly deploying smart platforms for implementing information systems where resources can spread something that is... more
Cloud computing is one of the most widespread architectures
in recent years, services and applications that rely on it are rapidly
deploying smart platforms for implementing information systems
where resources can spread something that is extremely important but
also quite different from the existing conventional computer systems.
The difference is felt when one begins to think about the possibilities
offered by modern environments and how they can be modified for
every need. In this new philosophy, subscribers can offer services to
other subscribers. Sharing computing resources globally is the main
trick of a geographic limitation.
Social media has been rumored in recent years, with social media not only referring to the popular but also the less popular, as well as targeted social media, including the collection. and analysis of information which information is... more
Social media has been rumored in recent years, with social media not only referring to the popular but also the less popular, as well as targeted social media, including the collection. and analysis of information which information is then used for other purposes. Social media offers users plenty of features and smart features using artificial intelligence while making the
most of the internet. Through the use of social media, it is possible to manage and view information from smart devices, also known as IoT. This implies on the one hand freedom of interfaces and freedom of operations and on the other hand implies an increased risk of privacy violations combined with the possibility of illegal access and control of smart devices. Various countries around the world have created cyber armies that use a variety of techniques - including social media - to monitor, suspend, and internally influence the functioning of states and directly influence decision-making, and generally intervene in the operation in another country, a typical
example is the deepfake of politicians using social media to influence public opinion.
Smart phone surveillance is a sensitive issue, so topical and im- portant, which is about everyday life of all of us, I am talking about the smart phones, small smart phones, these small but powerful computers that everybody use them... more
Smart phone surveillance is a sensitive issue, so topical and im-
portant, which is about everyday life of all of us, I am talking
about the smart phones, small smart phones, these small but
powerful computers that everybody use them everyday by doing
more internet browsing rather than doing calls. The questions
that arise about the security of smart phones are many, for ex-
ample: may someone watch us? may the government hear what
we saying and what messages we send? may they know our lo-
cation? How much important meta-data is and to what extent it
can reveal important information about the subscribers identi-
ty and how it relates to privacy and personal data. Finally, it is
worth mentioning the participation of mobile phone providers
in various government monitoring projects of the citizens either
with targeted software which is not detectable, or with the direct
access to the Servers of the providers for copying sensitive in-
formation without of course the consent of the subscribers. Such
projects are the Carnivore, Prism, and other projects, and the
countries involved in information exchange programs are behind
lists identified as 5 Eyes, 9 Eyes, and 14 Eyes.
The future of the car is in electrification, electrification is still in its infancy, in relation to the experience that exists with internal combustion engines, but also have a major environmental disadvantage as well as for the... more
The future of the car is in electrification, electrification is still in its infancy, in relation to the experience that exists with internal combustion engines, but also have a major environmental disadvantage as well as for the production of electricity, in various countries carried out either with the use of oil with the combustion of lignite, this has as a consequence the burden on the environment. My research proposal is based on the philosophy that with e-mobility begins a new ecological era, on the one hand can not create ecological cars and on the other hand to burden the environment for the increasing use of energy that will be required when it grows the percentage of use of electric cars. My proposal is to create a servo mechanism, ie the common winder, which will be placed in the charging place of the cars, that is, the usual refueling place of today's cars that use solid fuels. Tuning the winder will activate a mechanism which each time that slowly unwind the winder will generate electricity, the power of the energy produced will be able to move the vehicle autonomously and simultaneously charge its batteries.
It is well known in computer science that a quantitative analysis can reveal information about a future cyber attacks, combining and analyzing elements that are necessary to carry out the analysis and on the other hand are elements that... more
It is well known in computer science that a quantitative analysis can reveal information about a future cyber attacks, combining and analyzing elements that are necessary to carry out the analysis and on the other hand are elements that substantiate the conclusions and the implementation of the appropriate cyber security methods and policies. Quantitative analysis is necessary in critical areas such as “defence” to deal with threats of cyber attacks on critical infra-structure to predict future situations, intruders, while greatly reducing the degree of uncertainty.
Hyperinsulinemia is a metabolic condition that occurs mainly in people with increased body weight, which implies an increased body mass index (BMI) and the consequences it can have in long term. Many people suffer from hyperinsulinemia... more
Hyperinsulinemia is a metabolic condition that occurs mainly in people with increased body weight, which implies an increased body mass index (BMI) and the consequences it can have in long term. Many people suffer from hyperinsulinemia but do not know it, as they ignore their symptoms which are polycystic ovaries, hair loss, difficulty having children, sparse menstruation, etc. Hyperinsulinemia is a metabolic condition due to the fact that the body constantly produces an increased to excessive amount of insulin regardless of the amount of glucose present in the blood. Hyperinsulinemia should not be confused with and directly linked to diabetes, as type 2 diabetes may occur after several years of untreated hyperinsulinemia due to the natural fatigue of the pancreas due to its excessive and uninterrupted production of insulin. Usually people who show symptoms of hyperinsulinemia are predisposed as it can be diagnosed in newborns, it has arisen from other metabolic diseases such as isletoblastoma, liver disease, etc. It can also result from the administration of drugs such as contraceptives where after their cessation the body has returned to normal or unfortunately hyperinsulinemia may remain.

It is a metabolic disease as it directly affects other metabolic factors such as the onset of hypertension due to sodium retention in the kidneys, the manifestation of obesity, and the onset of dyslipidemia. The uninterrupted function of insulin production is confused with the increase in the amount of glucose in the blood, the pancreas is constantly working to regulate the uptake of glucose into the blood to maintain glucose at normal levels. Hyperinsulinemia in a pregnant woman can directly affect the fetus as it creates a state of hyperglycemia which is extremely dangerous as the child may be born overweight, develop diabetes, depending on the history of the father may be born with predisposition or type 1 diabetes. When there are no other health factors and the newborn shows only symptoms of hyperinsulinemia but has the right body weight and there is no aggravated health history in the couple then the symptoms of hyperinsulinemia subside from the newborn within about a week. This article explores all aspects of hyperinsulinemia and its consequences.
It is well known in computer science that a quantitative analysis can reveal information about a future cyber attacks, combining and analyzing elements that are necessary to carry out the analysis and on the other hand are elements that... more
It is well known in computer science that a quantitative analysis can reveal information about a future cyber attacks, combining and analyzing elements that are necessary to carry out the analysis and on the other hand are elements that substantiate the conclusions and the implementation of the appropriate cyber security methods and policies. Quantitative analysis is necessary in critical areas such as “defence” to deal with threats of cyber attacks on critical infrastructure to predict future situations, intruders, while greatly reducing the degree of uncertainty.
Industrial control systems (ICS) are critical, as in these systems, cyber threats have the potential to affect, disorganize, change their mode of operation, act as an information extraction vehicle, and ultimately turn against itself.... more
Industrial control systems (ICS) are critical, as in these systems, cyber threats have the potential to affect, disorganize, change their mode of operation, act as an information extraction vehicle, and ultimately turn against itself. creating risks to the system itself, infrastructure, downtime, leakage of sensitive data, and even loss of human life. Industrial control systems (ICS) are vital to the operation of all the modern automated infrastructure in the western world, such as power plant and power stations. Industrial control systems (ICS) differ from the traditional information systems and infrastructures of organizations and companies, a standard cybersecurity strategy cannot be implemented but part of it adapting to the real facts and needs of each country, legislation and infrastructure. These systems require continuous operation, reliability and rapid recovery when attacked electronically with automated control, isolation and attack management processes. Incorrect settings and lack of strategic planning can lead to unprotected operation of critical installations, as they do not meet the cyber security requirements. Industrial control systems (ICS) require special protection in their networks, as they should be considered vulnerable in all their areas, they need protection from cyber attacks against ICS, SCADA servers, workstations, PLC automations, etc. Security policies to be implemented should provide protection against cyber threats, and systems recovery without affecting the operation and reliability of operating processes. Security policies such as security assessment, smart reporting, vulnerability and threat simulation, integrity control analysis, apply security policy to shared systems, intrusion detection and prevention, and finally firewall with integrated antivirus and sandbox services should be considered essential entities.
The TOR network is an anonymity network whose real power and the vulnerabilities that accompany it only few people known. There are several suspicious Servers worldwide that haunt the operation of TOR, Servers with strange behavior who... more
The TOR network is an anonymity network whose real power and the vulnerabilities that accompany it only few people known. There are several suspicious Servers worldwide that haunt the operation of TOR, Servers with strange behavior who participate in a honeypot programs, not only users who use the TOR network do not enjoy the privileges of real anonymity, on the contrary they are vulnerable and their traces are mapped. There are Active Servers in the TOR network that collect information but also attack the other TOR servers that are active in the network in order to reduce their functionality and then convert a honeypot network while the users are unawareness. It is worth noting that suspicious TOR servers may or may not be on professional infrastructures.
The TOR network is an anonymity network whose real power and the vulnerabilities that accompany it only few people known. There are several suspicious Servers worldwide that haunt the operation of TOR, Servers with strange behavior who... more
The TOR network is an anonymity network whose real power and the vulnerabilities that accompany it only few people known. There are several suspicious Servers worldwide that haunt the operation of TOR, Servers with strange behavior who participate in a honeypot programs, not only users who use the TOR network do not enjoy the privileges of real anonymity, on the contrary they are vulnerable and their traces are mapped. There are Active Servers in the TOR network that collect information but also attack the other TOR servers that are active in the network in order to reduce their functionality and then convert a honeypot network while the users are unawareness. It is worth noting that suspicious TOR servers may or may not be on professional infrastructures.
Smart devices, or Internet of Things in other world, are a concept that applies to the electronic objects around us, that is, devices that use built-in sensors to collect data and take action on it within a network. As smart devices... more
Smart devices, or Internet of Things in other world, are a concept that applies to the electronic objects around us, that is, devices that use built-in sensors to collect data and take action on it within a network. As smart devices collect data about its users, smart cities, they are primary targets for hackers. There are several reports on the web about how vulnerable smart devices are to intrusion and loss of privacy, those online reports also  provides details on how routers can be hacked. If the router that connects a smart device is hacked, all smart systems and devices connected to it can be controlled remotely. Hackers will attack anything, from routers, webcams, security systems, sensors, actuators, data storage places and databases, to try to do things like locate their users, and monitor their conversations as much as possible. It is clear that today we know better. But, how long will it be before we see a smart city locked by hackers in demand for ransom? It is not far from happening, it is a matter of time before it happens. Most of smart devices are heavily dependent on Wi-Fi, which remains directly compromised by a person with average hacker skills. This means, that a smart device could easily be compromised through this point, so that someone could enter the internal computer system, could enter at smart device management console, have access to personal data, and application management system. Smart users should ask if smart devices provide authentication ad what kind of authentication, if the username and password can be changed, if customer support is provided, if the device collects their personal data and if yes in what level, if the manufacturer has compromised data and if encrypts stored data and automatically updates software. In the U.S, some smart devices sold with the promise of a subscription became useless after the company's decision to shut down the central servers used by the devices to operate, therefore, Before a city can be transformed from a classic to a smart one, all the parameters must be taken into account
The technological innovation has led societies to the need to design and create smart applications that are combined with smart devices that interact either automatically or after some action by their operators, Such devices range from... more
The technological innovation has led societies to the need to design and create smart applications that are combined with smart devices that interact either automatically or after some action by their operators, Such devices range from automatic temperature gauges and active watering in public trees with tree planting to locating empty parking spaces on city streets with the help of smart sensors. All of the above seems nice and harmonious if there were no questions such as: is personal data collected by users? Is this data able to create a personal profile of the user regarding his/her daily habits including the location? to what extent is the meta-data collected are capable of violating the privacy of personal life? data related to users of this services where is stored and to what extent is there their encryption? if there is, of course, encryption, which if it does not exist is a tragic lack of security. Are the data collected by users then forwarded to government or private companies for statistical analysis? how are personal data ensured that they will not be forwarded to others for other purposes in the future? How does the use of such services by users, which may include money transactions, ensure that users will not be subject to further financial monitoring? Smart devices are part of a network, which means that an incomplete configuration of a smart device or install a smart device that offers incomplete security features and does not meet security standards is capable of providing remote access to the internal network that is connected, if there is illegal remote access to the internal network to the extent that it will be able to affect the integrity of the data but also the change of use of the operation of the smart device. All of the above are key questions about the integrity of smart devices, but also the level of security they offer that they are called upon to answer in this article.
Cyber hybrid warfare has been known since antiquity, it is not a new terminology nor a new practice. It can have an effect even more than a regular conventional war. The implementation of the cyber hybrid war aims to misinform, guide and... more
Cyber hybrid warfare has been known since antiquity, it is not a new terminology nor a new practice. It can have an effect even more than a regular conventional war. The implementation of the cyber hybrid war aims to misinform, guide and manipulate citizens, disorganize the target state, create panic, overthrow governments, manipulate sensitive situations, intimidate groups, individuals and even shortened groups of the population, and finally to form an opinion according to the enemy's beliefs. Creating online events designed to stimulate citizens to align with the strategy of governments or the strategy of the enemy government is a form of cyber hybrid warfare. The cyber hybrid warfare falls under the category of asymmetric threats as it is not possible to determine how, and the duration of the cyber invasion. The success or not of a cyber hybrid war depends on the organization, the electronic equipment, and the groups of actions they decide according to the means at their disposal to create the necessary digital entities. Finally, the cyber hybrid warfare is often used to show online military equipment aimed at downplaying its moral opponent.
Cyber hybrid warfare has been known since antiquity, it is not a new terminology nor a new practice. It can have an effect even more than a regular conventional war. The implementation of the cyber hybrid war aims to misinform, guide and... more
Cyber hybrid warfare has been known since antiquity, it is not a new terminology nor a new practice. It can have an effect even more than a regular conventional war. The implementation of the cyber hybrid war aims to misinform, guide and manipulate citizens, disorganize the target state, create panic, overthrow governments, manipulate sensitive situations, intimidate groups, individuals and even shortened groups of the population, and finally to form an opinion according to the enemy's beliefs. Creating online events designed to stimulate citizens to align with the strategy of governments or the strategy of the enemy government is a form of cyber hybrid warfare. The cyber hybrid warfare falls under the category of asymmetric threats as it is not possible to determine how, and the duration of the cyber invasion. The success or not of a cyber hybrid war depends on the organization, the electronic equipment, and the groups of actions they decide according to the means at their disposal to create the necessary digital entities. Finally, the cyber hybrid warfare is often used to show online military equipment aimed at downplaying its moral opponent.
We are all living in the last days a state of panic wherever we are in the world. This panic is justified and owe it to the well-known Coronavirus pandemic (COVID-19) as it is officially called. The virus causes from mild to very... more
We are all living in the last days a state of panic wherever we are in the world. This panic is justified and owe it to the well-known  Coronavirus  pandemic  (COVID-19)  as  it  is  officially  called. The virus causes from mild to very severe symptoms, such  as  acute  respiratory  infection,  that  is,  ARF  pneumonia  (Acute Respiratory Failure). Symptoms of the virus start from a cough, fever with tithing slowly, tiredness, and shortness of breath
The purpose of the present research is to identify security holes in IoT in percentage, according to aresearch conducted from January 5, 2020 to January 26, 2020 involving a large number of peoplewho are actively involving with IoT.... more
The purpose of the present research is to identify security holes in IoT in percentage, according to aresearch conducted from January 5, 2020 to January 26, 2020 involving a large number of peoplewho are actively  involving  with  IoT.  These  people  wanted  to  share  their  fears  and  anxieties,expressing  their  views freely.  The  majority  of  participants  expressed  concerns  about  IoT  security. This  research  clearly  shows  the phobias that exist as well as the lack of an IoT protectionmechanism considering the restrictions that exist.
Bronchoscopy has for many years been the only invasive examination used to screen for bronchus in real time, remove objects that have entered the airway, healing properties, and finally a sample including missing tissue for biopsy for the... more
Bronchoscopy has for many years been the only invasive examination used to screen for bronchus in real time, remove objects that have entered the airway, healing properties, and finally a sample including missing tissue for biopsy for the right follow up medical evaluation and treatment. The usual examination is performed by a flexible bronchoscope which does not cause much discomfort to the patient and causes few complications, complications such as bleeding, cardiac arrhythmias, fever, pneumonia, death, introduction and exacerbation of infection, etc.

This short research is about to overturn this nice and enjoyable environment that has been created regarding the safety of this invasive examination that will eventually and happily very soon be replaced. The present short research is here to overthrow the benefits of bronchoscopy and present the reality as this has not been presented to patients before undergoing an invasive examination that may not eventually need to be done.
Undoubtedly is a technological revolution that has certainly focused on the interest of software development companies, companies of IT, hardware design, networks and artificial intelligence. A technological revolution that started a few... more
Undoubtedly is a technological revolution that has certainly focused on the interest of software development companies,
companies of IT, hardware design, networks and artificial intelligence. A technological revolution that started a few years ago and
has evolved rapidly, thanks to the technological evolution of IT and networks. It is a combination of many communication protocols,
sensors and other intelligent technologies, the correlation between smart technologies, networks and services that all together
complete processes in order to achieve the result for which they were installed. In advanced technology countries, both simple
users and industry use IoT where sensors are simplified and automated at home and in industry, there is continuous monitoring,
control and prediction of product failure for the benefit of efficient production of high quality products and control production at
each stage of product processing/production. Someone could well think and say that all this is fantastic and that we have solved
the problem of organization, easy life without further thoughts and worries since everything is done automatically. An IoT in an
intelligent house could literally regulate everything, using sensors and appropriate software could talk with a human person, as well
as someone could appropriately entice all that security and literally take full control of the premises of a home with consequences
from minimal to catastrophic including the complete destruction of a home.
I decided to touch on a sensitive issue, so topical and important, which is about everyday life of all of us, I am talking about the smart phones, small smart phones, these small but powerful computers that everybody use them every day by... more
I decided to touch on a sensitive issue, so topical and important, which is about everyday life of all of us, I am talking about the smart phones, small smart phones, these small but powerful computers that everybody use them every day by doing more internet browsing rather than doing calls. The questions that arise about the security of smart phones are many, for example: may someone watch us? may the government hear what we saying and what messages we send? May they know our position? let’s analyze the issue below.
I decided to touch on a sensitive issue, so topical and important, which is about everyday life of all of us, I am talking about the smart phones, small smart phones, these small but powerful computers that everybody use them every day by... more
I decided to touch on a sensitive issue, so topical and important, which is about everyday life of all of us, I am
talking about the smart phones, small smart phones, these small but powerful computers that everybody use them every
day by doing more internet browsing rather than doing calls. The questions that arise about the security of smart phones
are many, for example: may someone watch us? May the government hear what we saying and what messages we send?
May they know our position?
U.S Cyber Strategy of 2020
Security and Privacy in Data Networks
Internet of Things, Internet Service Providers and Unsuspecting Users
Internet of Things and Privacy
Cloud computing and privacy
Cloud Computing and Privacy
Research Interests:

And 9 more