Skip to content
2000
image of Real-Time Analysis of Sensitive Data Security in Manuscript Transition

Abstract

Background

Cybersecurity requirements for ensuring data security during research manuscript transit on the journal website require continuous improvement and adherence to best practices. Research data loss can have significant negative consequences across multiple dimensions including time and financial loss. The present research investigates security vulnerabilities during the real-time transit of manuscripts on a journal website.

Material and Methods

Website Access: The journal website was accessed, and manuscript components (main manuscript, figures, tables, graphical abstract, funding sources, suggested reviewer, and cover letter) were uploaded.

Operating system: Kali Linux, designed for penetration testing and security auditing was used.

Tools and software: Nmap (Version 7.95-2) for network discovery and security auditing. Nikto (2.5.0) for web server vulnerability scanning, and Tor (13.0.13) to anonymize web activities. Firefox (127.0.2) as the web browser, and VMware Workstation with Kali Rolling (2023.2 in a virtual environment.

Testing phase: Initial upload of the manuscript and supplementary materials. Upload of figures, tables, and graphical abstract. Inclusion of funding sources, suggested reviewers, and cover letter.

Data Collection and Analysis: Network traffic and potential vulnerabilities were monitored on Nmap, Nikto, and Tor.

Activities were conducted in the virtual environment of VMware Workstation for controlled and replicable setup.

Output measures: Identified and documented potential security gap or vulnerabilities leading to data theft during manuscript transit.

Results

An Nmap scan of XXXXXXXX.com (IP: yyyyyyyyyyy) revealed six open ports: 80 (HTTP Apache), 443 (SSL/SMTP Exim), 587 (SMTP Exim), 993 (IMAPS), and 995 (POP3S). each server showed potential vulnerabilities. The scan took 86.15 seconds.

Conclusion

The results demonstrate a high risk of exposing sensitive information due to open ports, the presence of potentially outdated services, and the possibility of incomplete detection due to filtered ports pose a high risk of sensitive data during manuscript transit on the website of the journal.

Loading

Article metrics loading...

/content/journals/rascs/10.2174/0126662558363436250117171141
2025-01-23
2025-10-22
Loading full text...

Full text loading...

References

  1. Jacob J. Peters M. Yang T.A. Interdisciplinary cybersecurity: Rethinking the approach and the process. National Cyber Summit (NCS) Research Track. Springer 2020 10.1007/978‑3‑030‑31239‑8_6
    [Google Scholar]
  2. Wen G. Yu W. Yu X. Lü J. Complex cyber-physical networks: From cybersecurity to security control. J. Syst. Sci. Complex. 2017 30 1 46 67 10.1007/s11424‑017‑6181‑x
    [Google Scholar]
  3. Chockalingam S. Pieters W. Teixeira A. Gelder v.P. Bayesian network model to distinguish between intentional attacks and accidental technical failures: A case study of floodgates. Cybersecurity 2021 4 1 29 10.1186/s42400‑021‑00086‑6
    [Google Scholar]
  4. Zhao X. Miers I. Green M. Reiser M.J. Modeling the cybersecurity of hospitals in natural and man-made hazards. Sustain. Resilient Infrastruct. 2019 4 1 36 49 10.1080/23789689.2018.1448666
    [Google Scholar]
  5. Hassrick E.M. Holmes L.G. Sosnowy C. Walton J. Carley K. Benefits and risks: A systematic review of information and communication technology use by autistic people. Autism Adulthood 2021 3 1 72 84 10.1089/aut.2020.0048 36601264
    [Google Scholar]
  6. Perera S. Factors affecting reputational damage to organisations due to cyberattacks. Informatics 2022 9 1 28
    [Google Scholar]
  7. Stieglitz S. Wilms K. Mirbabaie M. Hofeditz L. Brenger B. López A. Rehwald S. When are researchers willing to share their data? – Impacts of values and uncertainty on open data in academia. PLoS One 2020 15 7 e0234172 10.1371/journal.pone.0234172 32609767
    [Google Scholar]
  8. Baffy G. Burns M.M. Hoffmann B. Ramani S. Sabharwal S. Borus J.F. Pories S. Quan S.F. Ingelfinger J.R. Scientific authors in a changing world of scholarly communication: What does the future hold? Am. J. Med. 2020 133 1 26 31 10.1016/j.amjmed.2019.07.028 31419421
    [Google Scholar]
  9. Konkol M. Nüst D. Goulier L. Publishing computational research - a review of infrastructures for reproducible and transparent scholarly communication. Res. Integr. Peer Rev. 2020 5 1 10 10.1186/s41073‑020‑00095‑y 32685199
    [Google Scholar]
  10. Gunduz M.Z. Das R. Cyber-security on smart grid: Threats and potential solutions. Comput. Netw. 2020 169 107094 10.1016/j.comnet.2019.107094
    [Google Scholar]
  11. Maghrabi L.A. The threats of data security over the Cloud as perceived by experts and university students. 2014 World Symposium on Computer Applications & Research (WSCAR) Sousse, Tunisia, 18-20 January 2014, pp. 1-6. 10.1109/WSCAR.2014.6916842
    [Google Scholar]
  12. Mawgoud A.A. Taha M.H.N. Khalifa N.E.M. Security threats of social internet of things in the higher education environment. Hassanien A. Bhatnagar R. Khalifa N. Toward Social Internet of Things (SIoT): Enabling Technologies, Architectures and Applications. Studies in Computational Intelligence Springer Cham. 2020 151 171 10.1007/978‑3‑030‑24513‑9_9
    [Google Scholar]
  13. Gulyás O. Kiss G. Impact of cyber-attacks on the financial institutions. Procedia Comput. Sci. 2023 219 84 90 10.1016/j.procs.2023.01.267
    [Google Scholar]
  14. Cyriac N.T. Sadath L. Is Cyber security enough-A study on big data security Breaches in financial institutions. 2019 4th International Conference on Information Systems and Computer Networks (ISCON) Mathura, India, 21-22 November 2019, pp. 380-385. 10.1109/ISCON47742.2019.9036294
    [Google Scholar]
  15. Cremer F. Sheehan B. Mullins M. Fortmann M. Ryan B.J. Materne S. On the insurability of cyber warfare: An investigation into the German cyber insurance market. Comput. Secur. 2024 142 103886 10.1016/j.cose.2024.103886
    [Google Scholar]
  16. Chapman J. How Safe is Your Data?: Cyber-security in Higher Education. Higher Education Policy Institute Oxford 2019 12 1 6
    [Google Scholar]
  17. Akoto W. International trade and cyber conflict: Decomposing the effect of trade on state-sponsored cyber attacks. J. Peace Res. 2021 58 5 1083 1097 10.1177/0022343320964549
    [Google Scholar]
  18. Feith D. The First “State Sponsor of Mass IP Theft”: China, Sovereign Immunity, and Upholding Americans’ Intellectual Property Rights. Columbia Business Law Review 2024 43
    [Google Scholar]
  19. Luo L. On teaching malware analysis on latest windows. J. Coll. Infor. Sys. Sec. Edu. 2022 9 1 7 7 10.53735/cisse.v9i1.152
    [Google Scholar]
  20. Thomas L. A framework for data privacy and security accountability in data breach communications. Comput. Secur. 2022 116 102657 10.1016/j.cose.2022.102657
    [Google Scholar]
  21. Kollepalli R.P.K. Reddy M.J.S. Sai B.L. Natarajan A. Mathi S. Ramalingam V. An experimental study on detecting and mitigating vulnerabilities in web applications. Int. J. Saf. Secur. Eng. 2024 14 2 523 532 10.18280/ijsse.140219
    [Google Scholar]
  22. Rajeh W. Hadoop distributed file system security challenges and examination of unauthorized access issue. J. Informa. Secur. 2022 13 2 23 42 10.4236/jis.2022.132002
    [Google Scholar]
  23. Santoso J.T. Raharjo B. Performance evaluation of penetration testing tools in diverse computer system security scenarios. J. Tecn. Infor. Dan Komu. 2022 13 2 132 159
    [Google Scholar]
  24. Sawadogo A.D. Bissyandé T.F. Moha N. Allix K. Klein J. Li L. Traon L.Y. SSPCatcher: Learning to catch security patches. Empir. Softw. Eng. 2022 27 6 151 10.1007/s10664‑022‑10168‑9
    [Google Scholar]
  25. Uddin R. Kumar S.A.P. Chamola V. Denial of service attacks in edge computing layers: Taxonomy, vulnerabilities, threats and solutions. Ad Hoc Netw. 2024 152 103322 10.1016/j.adhoc.2023.103322
    [Google Scholar]
  26. Anand D. Kaur A. Singh M. Research on internet of medical things: Systematic review, research trends and challenges. Rec. Adv. Comp. Sci. Commu. 2024 17 6 10.2174/0126662558248187231124052846
    [Google Scholar]
  27. Sengupta J. Kosek M. Fries J. Reiter F.S. Bajpai V. On cross-layer interactions of quic, encrypted DNS and HTTP/3: Design, evaluation and dataset. IEEE Trans. Netw. Serv. Manag. 2024 21 3 2992 3007 10.1109/TNSM.2024.3383787
    [Google Scholar]
  28. Hussain A. Enhancing LAN security by mitigating credential threats via http packet analysis with wireshark. J. Comput. Biomed. Informa. 2024 6 02 433 440
    [Google Scholar]
  29. Mayeke N.R. Evolving access control paradigms: A comprehensive multi-dimensional analysis of security risks and system assurance in cyber engineering. SSRN 2024 10.2139/ssrn.4752902
    [Google Scholar]
  30. Good E. Security analysis of a siemens SICAM CMIC remote terminal unit. Santander C.M. S. Galmѐs Gavilánez Y.d.l.N.C. Iomt Data Server Risks And Vulnerabilities. Migration Letters 2020 21 S2 711 728
    [Google Scholar]
  31. Santander C.M. Galmѐs S. Gavilánez Y.N.C. Iomt data server risks and vulnerabilities. Migrat. Lett. 2024 21 S2 711 728
    [Google Scholar]
  32. Orucho D.O. Security threats affecting user-data on transit in mobile banking applications. RE:view 2023 9 1 1 11
    [Google Scholar]
  33. Ferdous J. Islam R. Mahboubi A. Islam M.Z. A review of state-of-the-art malware attack trends and defense mechanisms. IEEE Access 2023 11 121118 121141 10.1109/ACCESS.2023.3328351
    [Google Scholar]
  34. Jagannath R.O. Jain A.K. Browser‐in‐the‐middle attacks: A comprehensive analysis and countermeasures. Secur. Priv. 2024 7 5 e410 10.1002/spy2.410
    [Google Scholar]
  35. Yaacoub J.P.A. Noura H.N. Salman O. Chehab A. Robotics cyber security: Vulnerabilities, attacks, countermeasures, and recommendations. Int. J. Inf. Secur. 2022 21 1 115 158 10.1007/s10207‑021‑00545‑8 33776611
    [Google Scholar]
  36. Kanna R.P. Santhi P. Exploring the landscape of network security: A comparative analysis of attack detection strategies. J. Ambient Intell. Humaniz. Comput. 2024 15 8 3211 3228 10.1007/s12652‑024‑04794‑y
    [Google Scholar]
  37. Andriyani S. Sidiq M.F. Zen B.P. Analisis celah keamanan pada website dengan menggunakan metode penetration testing dan framework issaf pada website smk al-kautsar. LEDGER: J. Infor. Infor.Tech. 2023 2 1 1 13
    [Google Scholar]
  38. Jin H. Pan Y. Lu J. Computer Networks and IoT. Springer Communications in Computer and Information Science 2023 2060 10.1007/978‑981‑97‑1332‑5
    [Google Scholar]
  39. Simpson W.R. Foltz K.E. Ports and protocols extended control for security. IAENG Int. J. Comput. Sci. 2017 44 2
    [Google Scholar]
  40. Alanda A. Satria D. Ardhana M.I. Dahlan A.A. Mooduto H.A. Web application penetration testing using SQL Injection attack. JOIV. JOIV : Inter. J. Infor. Vis. 2021 5 3 320 326 10.30630/joiv.5.3.470
    [Google Scholar]
  41. Aslan Ö. Aktuğ S.S. Okay O.M. Yilmaz A.A. Akin E. A comprehensive review of cyber security vulnerabilities, threats, attacks, and solutions. Electronics (Basel) 2023 12 6 1333 10.3390/electronics12061333
    [Google Scholar]
  42. Naqvi B. Perova K. Farooq A. Makhdoom I. Oyedeji S. Porras J. Mitigation strategies against the phishing attacks: A systematic literature review. Comput. Secur. 2023 132 103387 10.1016/j.cose.2023.103387
    [Google Scholar]
  43. Svenhard P. Radaslic A. A penetration test of an Internet service provider: Computer Forensics and Information Security. Computer Forensics and Information Security Halmstad University Halmstad, Sweden 2012 44
    [Google Scholar]
  44. Abbas S.G. Vaccari I. Hussain F. Zahid S. Fayyaz U.U. Shah G.A. Bakhshi T. Cambiaso E. Identifying and mitigating phishing attack threats in IoT use cases using a threat modelling approach. Sensors 2021 21 14 4816 10.3390/s21144816 34300556
    [Google Scholar]
/content/journals/rascs/10.2174/0126662558363436250117171141
Loading
/content/journals/rascs/10.2174/0126662558363436250117171141
Loading

Data & Media loading...


  • Article Type:
    Research Article
Keywords: data transit ; Cybersecurity ; virtual machine ; real-time ; ports
This is a required field
Please enter a valid email address
Approval was a Success
Invalid data
An Error Occurred
Approval was partially successful, following selected items could not be processed due to error
Please enter a valid_number test