Journal of Information Security System and Cyber Criminology Research https://matjournals.net/engineering/index.php/JoISSCCR <p><strong>JoISSCCR</strong> is a peer-reviewed journal in the field of Computer Science published by MAT Journals Pvt. Ltd. It is a print and e-journal dedicated towards the rapid publication of research articles covering every aspect of Cyber Criminology and Information Security. It focuses on topics such as Physical Security, Endpoint Security, Data Encryption, and Network Security, Intrusion Detection, Secure Operating Systems, Database Security, Security Infrastructures, Security Evaluation, Internet Security, Firewalls, Mobile Security, Security Agents, Protocols, Anti-Virus and Anti-Hacker Measures, Software Protection. It also welcomes contributions related to Cyber Criminology, Victimology, Sociology, Internet Science, Cyber Bullying, Cyber Harassment, Cyber Talking, Data Breaches, Online Fraud, Online Child Exploitation, Identity Theft and Dark Web Activities.</p> en-US Mon, 11 May 2026 10:20:09 +0000 OJS 3.3.0.8 http://blogs.law.harvard.edu/tech/rss 60 IoT Threats and Vulnerabilities: Integrated Kali Linux-based Security Framework https://matjournals.net/engineering/index.php/JoISSCCR/article/view/3540 <p><em>The Internet of Things (IoT) is a subdivision of technology nowadays. It connects numerous devices such as sensors, cameras and smart home systems. This simplifies the process of doing things a lot. IoT devices also have some big security issues. The majority of such devices lack security since they are not very strong, and they lack excellent methods of controlling the user. This renders them vulnerable to attack. They allow people to access them without being authorized to steal data and attack the network. To resolve this issue, a new security system was developed named KaliIoTSec+. This system is based on lots of Kali Linux tools to make IoT devices safer. KaliIoTSec+ operates by analyzing the network to identify all the connected devices. Then it watches the data that is being sent. It attempts to identify flaws within the system. This is tested by making the system believe that it is being attacked. This is to observe the functionality of the system. The security is also verified to ensure that the system is secure and no one is attempting to enter the system without authorization. The security checks are similar to door locks. The system must be powerful so that no one can sneak in. The system is very important in the security checks. The performance was satisfactory. The combination of a large number of tools increases the security of IoT devices compared to the security of a single tool. Threats can be detected by KaliIoTSec+. Stop them. This assists in maintaining IoT systems. It further demonstrates that security systems should secure digital systems. Perhaps, one day, one will be able to make KaliIoTSec+ even smarter. This will assist it in detecting threats more quickly and independently.</em></p> L. Savitra Krishna, Aditi H, K. Vennela, Kusuma H, A. Abhirami Copyright (c) 2026 Journal of Information Security System and Cyber Criminology Research https://matjournals.net/engineering/index.php/JoISSCCR/article/view/3540 Mon, 11 May 2026 00:00:00 +0000 A Review on Cryptographic and Federated Approaches for Privacy-preserving Cyber Threat Intelligence Sharing https://matjournals.net/engineering/index.php/JoISSCCR/article/view/3535 <p><em>Cyber threat intelligence (CTI) sharing is now a vital part of modern cybersecurity. It helps organizations detect and reduce new threats more effectively. However, effective cooperation often faces challenges related to data privacy, confidentiality, and trust. This is especially true when sensitive organizational information is involved. This review looks at how CTI sharing can connect with cryptographic techniques and federated learning, highlighting their potential to support secure and privacy-focused collaboration in distributed environments. The study examines current methods, such as open-source intelligence gathering, standardized CTI frameworks, and privacy-focused machine learning models. It points out their shortcomings in promoting secure data sharing between organizations. To tackle these issues, the study proposes a federated threat intelligence sharing (FTIS) framework. This framework combines decentralized federated learning with functional encryption to allow organizations to work together on global threat detection models without revealing raw data. Although the proposed method provides solid privacy protections and enhanced collaboration, challenges like computational demands, varying data quality, and adversarial threats still pose significant obstacles. Yet, the merging of cryptographic strategies and federated systems offers a promising path for creating scalable, secure, and trust-based CTI sharing systems. This work highlights the need to improve privacy-protecting technologies to foster a more coordinated and proactive approach to global cybersecurity. </em></p> Nitin S. Shrirao, Pooja S. Lavande, Dnyaneshwar S. Jadhav Copyright (c) 2026 Journal of Information Security System and Cyber Criminology Research https://matjournals.net/engineering/index.php/JoISSCCR/article/view/3535 Mon, 11 May 2026 00:00:00 +0000