首页 > 最新文献

Journal of Cybersecurity and Information Management最新文献

英文 中文
Parasitic overview on different key management schemes for protection of Patients Health Records 对保护患者健康记录的不同密钥管理方案的寄生概述
Pub Date : 1900-01-01 DOI: 10.54216/jcim.060202
Shibin David, K. Sagayam, Ahmed A. Elngar
The main goal of HIPAA (Health Insurance Portability and Accountability Act) is to protect health information of individuals against access without consent or authorization. Security and privacy are the main issues in HIPAA. A compliant key management solution is used to reduce harm and risk while providing cryptographic mechanisms. Using ECC (Elliptic Curve Cryptography) we ensure more security for access of patient’s health records. This provides same level of security for access of patient’s health records. Patient’s health Information is stored in RFID cards. Finally, the proposed method ensures higher level of security than other existing cryptographic techniques. ECC provides more security even with small key sizes. Proposed scheme describes the various counter measures for improving security and a key recovery mechanism for the protection of keys.
HIPAA(健康保险流通与责任法案)的主要目标是保护个人的健康信息,防止未经同意或授权访问。安全和隐私是HIPAA的主要问题。兼容的密钥管理解决方案用于减少危害和风险,同时提供加密机制。采用椭圆曲线加密(ECC)技术,为患者健康记录的访问提供了更高的安全性。这为访问患者的健康记录提供了相同级别的安全性。患者的健康信息存储在RFID卡中。最后,与其他现有的加密技术相比,该方法具有更高的安全性。即使密钥大小较小,ECC也能提供更高的安全性。提出的方案描述了提高安全性的各种对策和密钥恢复机制,以保护密钥。
{"title":"Parasitic overview on different key management schemes for protection of Patients Health Records","authors":"Shibin David, K. Sagayam, Ahmed A. Elngar","doi":"10.54216/jcim.060202","DOIUrl":"https://doi.org/10.54216/jcim.060202","url":null,"abstract":"The main goal of HIPAA (Health Insurance Portability and Accountability Act) is to protect health information of individuals against access without consent or authorization. Security and privacy are the main issues in HIPAA. A compliant key management solution is used to reduce harm and risk while providing cryptographic mechanisms. Using ECC (Elliptic Curve Cryptography) we ensure more security for access of patient’s health records. This provides same level of security for access of patient’s health records. Patient’s health Information is stored in RFID cards. Finally, the proposed method ensures higher level of security than other existing cryptographic techniques. ECC provides more security even with small key sizes. Proposed scheme describes the various counter measures for improving security and a key recovery mechanism for the protection of keys.","PeriodicalId":169383,"journal":{"name":"Journal of Cybersecurity and Information Management","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121611944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Coded DCO-OFDM Techniques in Intensity Modulation/Direct Detection (IM/DD) Systems 强度调制/直接检测(IM/DD)系统中的编码DCO-OFDM技术
Pub Date : 1900-01-01 DOI: 10.54216/jcim.100202
Mohamed Abdelaziz, Essam Abdellatef
Optical wireless communications (OWC) are among the best alternative techniques for transmitting information-laden optical radiation across a free-space channel from one place to another. DC-biased optical OFDM (DCO-OFDM) is a technique that sacrifices the power efficiency to transmit unipolar OFDM signals. The primary drawback with DCO-OFDM is its clipping noise, which causes distortion and lowers the bit error rate (BER). Thus, in this paper, we show the performance of DCO with different coded techniques to improve the BER in additive white Gaussian noise (AWGN) for IMDD systems. The experimental results show that the coded DCO-OFDM has the best performance. Furthermore, turbo coding has the best coding technique added to the DCO-OFDM system.
光无线通信(OWC)是通过自由空间信道将承载信息的光辐射从一个地方传输到另一个地方的最佳替代技术之一。直流偏置OFDM (DCO-OFDM)是一种牺牲功率效率来传输单极OFDM信号的技术。DCO-OFDM的主要缺点是它的削波噪声,它会引起失真并降低误码率。因此,在本文中,我们展示了不同编码技术的DCO性能,以提高IMDD系统在加性高斯白噪声(AWGN)下的误码率。实验结果表明,编码后的DCO-OFDM具有较好的性能。此外,涡轮编码是DCO-OFDM系统中最好的编码技术。
{"title":"Coded DCO-OFDM Techniques in Intensity Modulation/Direct Detection (IM/DD) Systems","authors":"Mohamed Abdelaziz, Essam Abdellatef","doi":"10.54216/jcim.100202","DOIUrl":"https://doi.org/10.54216/jcim.100202","url":null,"abstract":"Optical wireless communications (OWC) are among the best alternative techniques for transmitting information-laden optical radiation across a free-space channel from one place to another. DC-biased optical OFDM (DCO-OFDM) is a technique that sacrifices the power efficiency to transmit unipolar OFDM signals. The primary drawback with DCO-OFDM is its clipping noise, which causes distortion and lowers the bit error rate (BER). Thus, in this paper, we show the performance of DCO with different coded techniques to improve the BER in additive white Gaussian noise (AWGN) for IMDD systems. The experimental results show that the coded DCO-OFDM has the best performance. Furthermore, turbo coding has the best coding technique added to the DCO-OFDM system.","PeriodicalId":169383,"journal":{"name":"Journal of Cybersecurity and Information Management","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130249136","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Audit, Validation, Verification and Assessment for Safety and Security Standards 安全标准的审核、确认、验证和评估
Pub Date : 1900-01-01 DOI: 10.54216/jcim.070103
R. Kemp, Richard Smith
Internal auditing is important for ensuring compliance to multiple safety and security standards. The problem is that although safety and security have similarities when it comes to auditing, they also have differences that makes auditing both areas under the same process difficult. This paper has shown how to overcome those differences and leverage the similarities to create one auditing process for both safety and security. The paper has harmonized the different terminology between safety and security and showed how the new auditing process can allow compliance to IEC 61508, ISO 27001 and IEC 62443.
内部审计对于确保遵守多种安全和保障标准非常重要。问题是,尽管安全性和安全性在审计方面有相似之处,但它们也有不同之处,这使得在同一流程下对两个领域进行审计变得困难。本文展示了如何克服这些差异,并利用相似之处,为安全性和安全性创建一个审计流程。该文件协调了安全和安保之间的不同术语,并展示了新的审核过程如何符合IEC 61508, ISO 27001和IEC 62443。
{"title":"Audit, Validation, Verification and Assessment for Safety and Security Standards","authors":"R. Kemp, Richard Smith","doi":"10.54216/jcim.070103","DOIUrl":"https://doi.org/10.54216/jcim.070103","url":null,"abstract":"Internal auditing is important for ensuring compliance to multiple safety and security standards. The problem is that although safety and security have similarities when it comes to auditing, they also have differences that makes auditing both areas under the same process difficult. This paper has shown how to overcome those differences and leverage the similarities to create one auditing process for both safety and security. The paper has harmonized the different terminology between safety and security and showed how the new auditing process can allow compliance to IEC 61508, ISO 27001 and IEC 62443.","PeriodicalId":169383,"journal":{"name":"Journal of Cybersecurity and Information Management","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133159950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Advancements in Encryption Techniques for Enhanced Data Security Over Cloud 增强云数据安全的加密技术进展
Pub Date : 1900-01-01 DOI: 10.54216/jcim.080202
Rishu, Vijay Kumar Sinha, S. Aggarwal
With the advancements in internet technologies and increased transactions over the internet, the threats for data security increased many folds than ever. Nowadays message application services are in great demand, as they offered end-to-end encryption (E2EE) that is essential to provide security to the users while communication takes place between parties. Today messaging application service is in great use for communication. For making communication over the network. This paper presents that security is essential while communication takes place between users and how E2EE offers security to the users. Consumers' concerns related to the security and privacy of their data are growing day by day with increased inter-connectivity. We examine the existing mobile message service encryption protocols that provide security and the features which preserve privacy for messenger applications and also evaluate the technical challenges involved in its implementations.
随着互联网技术的进步和互联网上交易的增加,数据安全的威胁比以往增加了许多倍。如今,消息应用程序服务需求量很大,因为它们提供端到端加密(E2EE),这对于在各方之间进行通信时向用户提供安全性至关重要。今天,消息传递应用程序服务在通信中有很大的用途。用于通过网络进行通信。本文介绍了在用户之间进行通信时安全性是必不可少的,以及E2EE如何为用户提供安全性。随着互联性的提高,消费者对数据安全和隐私的担忧日益增加。我们研究了现有的移动消息服务加密协议,这些协议为信使应用程序提供安全性和保护隐私的功能,并评估了其实现中涉及的技术挑战。
{"title":"Advancements in Encryption Techniques for Enhanced Data Security Over Cloud","authors":"Rishu, Vijay Kumar Sinha, S. Aggarwal","doi":"10.54216/jcim.080202","DOIUrl":"https://doi.org/10.54216/jcim.080202","url":null,"abstract":"With the advancements in internet technologies and increased transactions over the internet, the threats for data security increased many folds than ever. Nowadays message application services are in great demand, as they offered end-to-end encryption (E2EE) that is essential to provide security to the users while communication takes place between parties. Today messaging application service is in great use for communication. For making communication over the network. This paper presents that security is essential while communication takes place between users and how E2EE offers security to the users. Consumers' concerns related to the security and privacy of their data are growing day by day with increased inter-connectivity. We examine the existing mobile message service encryption protocols that provide security and the features which preserve privacy for messenger applications and also evaluate the technical challenges involved in its implementations.","PeriodicalId":169383,"journal":{"name":"Journal of Cybersecurity and Information Management","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116482007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An analytical approach for evaluating sustainable supply chain solutions during the COVID-19 pandemic: Benefits and better explanations 评估2019冠状病毒病大流行期间可持续供应链解决方案的分析方法:好处和更好的解释
Pub Date : 1900-01-01 DOI: 10.54216/jcim.060204
Mahmoud Ismail, Shereen .., M. Ibrahim
The influence of COVID-19 has been felt in many facets of personal and professional life. As a result of the international economic crisis and the pandemic's consequences, major supply chains (SCs) have been disrupted. Our study intends to examine the effect of COVID-19 on SCs and help organizations choose options depending on their relative relevance. Phase one and phase two of the investigation are the most important. As a first step in strengthening SCs' ability to withstand the pandemic, Phase 2 examines the difficulties, concerns, actions, and solutions that have been encountered so far. As part of this phase, a MARCOS method is proposed to select solutions that address the complex interrelationships that are involved in decision-making. Positive and negative solutions are considered and it is at the start of the creation of a preliminary matrix, utility degree is determined closer to both solutions, a new method of determining utility functions and their aggregates is proposed, and the method is stable enough to take into account a huge list of conditions and alternatives. Using this approach, decision-makers will be able to more properly weigh the relevance and influence of many options before making a final choice. The findings suggest that SCs should continue to rely on innovation to endure potential competition and disasters.
COVID-19的影响已经体现在个人和职业生活的许多方面。由于国际经济危机和大流行的后果,主要供应链已经中断。我们的研究旨在检查COVID-19对SCs的影响,并帮助组织根据其相对相关性选择选项。第一和第二阶段的调查是最重要的。作为加强超级大国抵御大流行能力的第一步,第二阶段审查了迄今为止遇到的困难、关切、行动和解决方案。作为这一阶段的一部分,提出了一种MARCOS方法来选择解决决策中涉及的复杂相互关系的解决方案。考虑了正解和负解,这是在创建初步矩阵的开始,效用度的确定更接近两个解,提出了确定效用函数及其集合的新方法,该方法足够稳定,可以考虑大量的条件和备选方案。使用这种方法,决策者将能够在做出最终选择之前更适当地权衡许多选项的相关性和影响。研究结果表明,SCs应继续依靠创新来应对潜在的竞争和灾难。
{"title":"An analytical approach for evaluating sustainable supply chain solutions during the COVID-19 pandemic: Benefits and better explanations","authors":"Mahmoud Ismail, Shereen .., M. Ibrahim","doi":"10.54216/jcim.060204","DOIUrl":"https://doi.org/10.54216/jcim.060204","url":null,"abstract":"The influence of COVID-19 has been felt in many facets of personal and professional life. As a result of the international economic crisis and the pandemic's consequences, major supply chains (SCs) have been disrupted. Our study intends to examine the effect of COVID-19 on SCs and help organizations choose options depending on their relative relevance. Phase one and phase two of the investigation are the most important. As a first step in strengthening SCs' ability to withstand the pandemic, Phase 2 examines the difficulties, concerns, actions, and solutions that have been encountered so far. As part of this phase, a MARCOS method is proposed to select solutions that address the complex interrelationships that are involved in decision-making. Positive and negative solutions are considered and it is at the start of the creation of a preliminary matrix, utility degree is determined closer to both solutions, a new method of determining utility functions and their aggregates is proposed, and the method is stable enough to take into account a huge list of conditions and alternatives. Using this approach, decision-makers will be able to more properly weigh the relevance and influence of many options before making a final choice. The findings suggest that SCs should continue to rely on innovation to endure potential competition and disasters.","PeriodicalId":169383,"journal":{"name":"Journal of Cybersecurity and Information Management","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124752564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Balancing Security and Information Management in the Digital Workplace 平衡数字化工作场所的安全和信息管理
Pub Date : 1900-01-01 DOI: 10.54216/jcim.110201
Rabah .., Ossama H. Embarak
As the digital workplace becomes more prevalent, organizations are faced with the challenge of balancing security and information management. On one hand, there is a need to protect sensitive data and prevent cyberattacks, while on the other hand, organizations must enable employees to collaborate and share information effectively. Machine learning (ML) is a promising technology that can help organizations address this challenge. By analyzing data patterns and identifying potential security threats, ML algorithms can enhance security measures and mitigate risks. At the same time, ML can also facilitate information management by automating routine tasks and improving the accuracy of data analysis. In this paper, we explore the role of ML in balancing security and information management in the digital workplace. We propose a hybrid ML model that integrates autoencoder and convolutional subnetworks in unified architecture to help capturing and security threats in the digital workplace, without compromising the information management tasks. We also present a case study of a real-world implementation of ML in a digital workplace setting, highlighting the benefits and limitations of this approach. Our findings suggest that ML can be a valuable tool for achieving a balance between security and information management in the digital workplace, but its successful implementation requires careful consideration of organizational context and stakeholder needs.
随着数字化工作场所变得越来越普遍,组织面临着平衡安全和信息管理的挑战。一方面,需要保护敏感数据和防止网络攻击,另一方面,组织必须使员工能够有效地协作和共享信息。机器学习(ML)是一项很有前途的技术,可以帮助组织应对这一挑战。通过分析数据模式和识别潜在的安全威胁,机器学习算法可以增强安全措施并降低风险。同时,ML还可以通过自动化日常任务和提高数据分析的准确性来促进信息管理。在本文中,我们探讨了机器学习在数字工作场所平衡安全和信息管理方面的作用。我们提出了一种混合ML模型,该模型将自动编码器和卷积子网集成在统一架构中,以帮助捕获数字工作场所中的安全威胁,而不会影响信息管理任务。我们还介绍了一个在数字工作场所环境中实现ML的案例研究,强调了这种方法的优点和局限性。我们的研究结果表明,机器学习可以成为在数字工作场所实现安全和信息管理之间平衡的宝贵工具,但其成功实施需要仔细考虑组织背景和利益相关者的需求。
{"title":"Balancing Security and Information Management in the Digital Workplace","authors":"Rabah .., Ossama H. Embarak","doi":"10.54216/jcim.110201","DOIUrl":"https://doi.org/10.54216/jcim.110201","url":null,"abstract":"As the digital workplace becomes more prevalent, organizations are faced with the challenge of balancing security and information management. On one hand, there is a need to protect sensitive data and prevent cyberattacks, while on the other hand, organizations must enable employees to collaborate and share information effectively. Machine learning (ML) is a promising technology that can help organizations address this challenge. By analyzing data patterns and identifying potential security threats, ML algorithms can enhance security measures and mitigate risks. At the same time, ML can also facilitate information management by automating routine tasks and improving the accuracy of data analysis. In this paper, we explore the role of ML in balancing security and information management in the digital workplace. We propose a hybrid ML model that integrates autoencoder and convolutional subnetworks in unified architecture to help capturing and security threats in the digital workplace, without compromising the information management tasks. We also present a case study of a real-world implementation of ML in a digital workplace setting, highlighting the benefits and limitations of this approach. Our findings suggest that ML can be a valuable tool for achieving a balance between security and information management in the digital workplace, but its successful implementation requires careful consideration of organizational context and stakeholder needs.","PeriodicalId":169383,"journal":{"name":"Journal of Cybersecurity and Information Management","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129716899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Plagiarism Detection Algorithm Model Based on NLP Technology 基于NLP技术的抄袭检测算法模型
Pub Date : 1900-01-01 DOI: 10.54216/jcim.050104
Ahmed A. Elngar, Mohamed Gamal, Amar Fathy, Basma Moustafa, Omar Mahmoud, M. Shaban
We can bear in mind that each of us has plagiarized a text without realizing that it was plagiarism, Plagiarism can happen in Articles, Papers, Researches, literature, music, software, scientific, newspapers, websites, Master and PHD Thesis and many other fields, So plagiarism has become serious major problem to teachers, researchers and publishers, There are divergent opinions about how to define plagiarism and what makes plagiarism serious. So, the detecting plagiarism is very important, so in this survey we explicate the concept of ;plagiarism ; and provide an overview of different plagiarism software and tools to solve the plagiarism problem, and will discuss the plagiarism process, types and detection methodologies. We can define that plagiarism is the brief and the description of this sentence ;someone used someone else’s mental product (such as its texts, ideas, or privacy). We suggest that what makes plagiarism so reprehensible is that it distorts scientific credit. In addition, intentional plagiarism indicates dishonesty. Moreover, there are a number of possible negative consequences of plagiarism. So we just create a framework for external plagiarism detection in which a some NLP processes are applied to process a set of suspicious and original documents, we have classified the different plagiarism detection techniques based on Lexical, Semantic, Syntactic and grammar analysis algorithms, And all of these algorithms precedes it NLP processing.
我们可以记住,我们每个人都抄袭了一篇文章,而没有意识到这是抄袭,抄袭可以发生在文章,论文,研究,文学,音乐,软件,科学,报纸,网站,硕士和博士论文和许多其他领域,所以抄袭已经成为教师,研究人员和出版商严重的主要问题,关于如何定义抄袭和什么使抄袭严重的意见分歧。因此,发现抄袭是非常重要的,因此在本调查中,我们阐述了;抄袭;并概述了解决抄袭问题的不同抄袭软件和工具,并将讨论抄袭的过程、类型和检测方法。我们可以将剽窃定义为这句话的简要和描述;某人使用了他人的精神产物(例如其文本、思想或隐私)。我们认为,剽窃之所以应该受到谴责,是因为它扭曲了科学信誉。此外,故意抄袭表明不诚实。此外,抄袭还可能带来一些负面后果。因此,我们只是创建了一个外部抄袭检测框架,在这个框架中,我们应用了一些NLP过程来处理一组可疑的和原始的文档,我们根据词法、语义、句法和语法分析算法对不同的抄袭检测技术进行了分类,所有这些算法都先于NLP处理。
{"title":"Plagiarism Detection Algorithm Model Based on NLP Technology","authors":"Ahmed A. Elngar, Mohamed Gamal, Amar Fathy, Basma Moustafa, Omar Mahmoud, M. Shaban","doi":"10.54216/jcim.050104","DOIUrl":"https://doi.org/10.54216/jcim.050104","url":null,"abstract":"We can bear in mind that each of us has plagiarized a text without realizing that it was plagiarism, Plagiarism can happen in Articles, Papers, Researches, literature, music, software, scientific, newspapers, websites, Master and PHD Thesis and many other fields, So plagiarism has become serious major problem to teachers, researchers and publishers, There are divergent opinions about how to define plagiarism and what makes plagiarism serious. So, the detecting plagiarism is very important, so in this survey we explicate the concept of ;plagiarism ; and provide an overview of different plagiarism software and tools to solve the plagiarism problem, and will discuss the plagiarism process, types and detection methodologies. We can define that plagiarism is the brief and the description of this sentence ;someone used someone else’s mental product (such as its texts, ideas, or privacy). We suggest that what makes plagiarism so reprehensible is that it distorts scientific credit. In addition, intentional plagiarism indicates dishonesty. Moreover, there are a number of possible negative consequences of plagiarism. So we just create a framework for external plagiarism detection in which a some NLP processes are applied to process a set of suspicious and original documents, we have classified the different plagiarism detection techniques based on Lexical, Semantic, Syntactic and grammar analysis algorithms, And all of these algorithms precedes it NLP processing.","PeriodicalId":169383,"journal":{"name":"Journal of Cybersecurity and Information Management","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129202044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
2021-22 Innovative Technologies to Prevent IP Cyber Attacks 2021-22防止IP网络攻击的创新技术
Pub Date : 1900-01-01 DOI: 10.54216/jcim.080205
Mohammed I. Alghamdi
The cyber security risks on Intellectual Property (IP) have unfortunately become the center of media attention quite recently. The cyber domain has risen to the front position of national security policy in the United States. This growth has created room for developing a lot of innovative technologies to prevent IP cyber-attacks. Usually, cyber-attacks target private data. But cyber-attacks have recently expanded their threat level to intellectual property. These threats affect companies, people, and even national security. Cyber threats to IP will be victimized by globalization. Hence, this article is aimed to explore existing innovative technologies used to prevent IP cyber-attacks and their future scope. To find out the existing technologies used in the prevention of cyber-attacks, secondary data will be used from recent reports by various public and government organizations, research papers, and news portals, and other relevant sources. Since cyber threats are increasing, a comprehensive, multinational strategy is needed for making better cyber security infrastructure. This strategy would improve international relations, protect international supply chains, innovation, and reduce financial losses.
最近,知识产权的网络安全风险不幸成为媒体关注的焦点。网络领域已经上升到美国国家安全政策的前沿位置。这种增长为开发许多防止IP网络攻击的创新技术创造了空间。通常,网络攻击的目标是私人数据。但网络攻击最近已经将威胁级别扩大到了知识产权。这些威胁影响到公司、人民,甚至国家安全。对知识产权的网络威胁将成为全球化的受害者。因此,本文旨在探讨用于防止IP网络攻击的现有创新技术及其未来范围。为了找出预防网络攻击的现有技术,将使用二手数据,这些数据来自各种公共和政府机构的最新报告、研究论文、新闻门户网站和其他相关来源。网络威胁日益增加,需要制定全面的多国战略,建设更好的网络安全基础设施。这一战略将改善国际关系,保护国际供应链,促进创新,减少金融损失。
{"title":"2021-22 Innovative Technologies to Prevent IP Cyber Attacks","authors":"Mohammed I. Alghamdi","doi":"10.54216/jcim.080205","DOIUrl":"https://doi.org/10.54216/jcim.080205","url":null,"abstract":"The cyber security risks on Intellectual Property (IP) have unfortunately become the center of media attention quite recently. The cyber domain has risen to the front position of national security policy in the United States. This growth has created room for developing a lot of innovative technologies to prevent IP cyber-attacks. Usually, cyber-attacks target private data. But cyber-attacks have recently expanded their threat level to intellectual property. These threats affect companies, people, and even national security. Cyber threats to IP will be victimized by globalization. Hence, this article is aimed to explore existing innovative technologies used to prevent IP cyber-attacks and their future scope. To find out the existing technologies used in the prevention of cyber-attacks, secondary data will be used from recent reports by various public and government organizations, research papers, and news portals, and other relevant sources. Since cyber threats are increasing, a comprehensive, multinational strategy is needed for making better cyber security infrastructure. This strategy would improve international relations, protect international supply chains, innovation, and reduce financial losses.","PeriodicalId":169383,"journal":{"name":"Journal of Cybersecurity and Information Management","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121306108","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Protecting Smart Home from Cybersecurity Threats Strategies for Homeowners 保护智能家居免受网络安全威胁的策略
Pub Date : 1900-01-01 DOI: 10.54216/jcim.120206
Miguel Botto Botto-Tobar, Sumaiya Rehan, R. Verma
Cyberthreat proliferation parallels the rapid surge in smart home usage. While having everything in one place is convenient, it also increases your home's vulnerability to cyber threats. Such an attack could result in bodily harm, the theft of sensitive information, or both. To mitigate the effects of these threats, owners of smart homes can make efforts to prevent cybercriminals from breaking into their premises starting by updating their firmware to the most recent version, creating secure passwords, and enabling two-factor authentication. Second, people should safeguard their gadgets by creating unique user IDs, disabling unneeded functions, and always keeping a tight eye on them. Finally, they must safeguard the facility where they conduct business by installing surveillance equipment, employing electronic locks, and restricting network access. Individuals must take these safeguards, but they must also stay informed about the most recent threats to home cybersecurity and the best strategies to combat them. Smart home device owners should become acquainted with the risks to which their devices are prone and ensure that their devices are updated to the most recent versions of all available software and security upgrades. Collaboration between homeowners, connected device manufacturers, and internet service providers is required to ensure the security of a smart home. Homeowners should research the security features available in smart home devices and only buy from reputable businesses that value consumer privacy and security. As the Internet of Things (IoT) expands and develops, a data privacy standard that meets the criteria of Data protection is in great demand. Safeguarding smart family apps necessitates a community agreement and specific permission from users to store their personal information in the product's database.
网络威胁的扩散与智能家居使用的快速增长是同步的。虽然把所有东西放在一个地方很方便,但它也增加了你的家面对网络威胁的脆弱性。这样的攻击可能导致人身伤害或敏感信息被盗,或者两者兼而有之。为了减轻这些威胁的影响,智能家居的主人可以通过更新固件到最新版本、创建安全密码和启用双因素身份验证来努力防止网络犯罪分子闯入他们的场所。其次,人们应该通过创建唯一的用户id,禁用不需要的功能,并始终密切关注他们的设备来保护他们。最后,他们必须通过安装监视设备、使用电子锁和限制网络访问来保护他们开展业务的设施。个人必须采取这些保护措施,但他们也必须了解家庭网络安全的最新威胁以及应对这些威胁的最佳策略。智能家居设备的拥有者应该了解他们的设备可能面临的风险,并确保他们的设备更新到所有可用软件和安全升级的最新版本。为了确保智能家居的安全,需要房主、联网设备制造商和互联网服务提供商之间的合作。房主应该研究智能家居设备的安全功能,只从重视消费者隐私和安全的信誉良好的企业购买。随着物联网(IoT)的发展壮大,对符合数据保护标准的数据隐私标准的需求越来越大。保护智能家庭应用程序需要社区协议和用户的特定许可,才能将他们的个人信息存储在产品的数据库中。
{"title":"Protecting Smart Home from Cybersecurity Threats Strategies for Homeowners","authors":"Miguel Botto Botto-Tobar, Sumaiya Rehan, R. Verma","doi":"10.54216/jcim.120206","DOIUrl":"https://doi.org/10.54216/jcim.120206","url":null,"abstract":"Cyberthreat proliferation parallels the rapid surge in smart home usage. While having everything in one place is convenient, it also increases your home's vulnerability to cyber threats. Such an attack could result in bodily harm, the theft of sensitive information, or both. To mitigate the effects of these threats, owners of smart homes can make efforts to prevent cybercriminals from breaking into their premises starting by updating their firmware to the most recent version, creating secure passwords, and enabling two-factor authentication. Second, people should safeguard their gadgets by creating unique user IDs, disabling unneeded functions, and always keeping a tight eye on them. Finally, they must safeguard the facility where they conduct business by installing surveillance equipment, employing electronic locks, and restricting network access. Individuals must take these safeguards, but they must also stay informed about the most recent threats to home cybersecurity and the best strategies to combat them. Smart home device owners should become acquainted with the risks to which their devices are prone and ensure that their devices are updated to the most recent versions of all available software and security upgrades. Collaboration between homeowners, connected device manufacturers, and internet service providers is required to ensure the security of a smart home. Homeowners should research the security features available in smart home devices and only buy from reputable businesses that value consumer privacy and security. As the Internet of Things (IoT) expands and develops, a data privacy standard that meets the criteria of Data protection is in great demand. Safeguarding smart family apps necessitates a community agreement and specific permission from users to store their personal information in the product's database.","PeriodicalId":169383,"journal":{"name":"Journal of Cybersecurity and Information Management","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133565928","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Lightweight Symmetric Encryption and Attribute Based Encryption Method to Increase Information Safety in Wireless Sensor Network 提高无线传感器网络信息安全性的轻量级对称加密和基于属性的加密方法
Pub Date : 1900-01-01 DOI: 10.54216/jcim.100205
R. Pandey
Direct data transmission in a wireless sensor network raises the data transfer cost. In addition, the lifetime of sensor networks is shortened because of the rise in energy required for data exchange. As a result, data aggregation is utilized in WSN to lessen the burden of transmission costs and lengthen the useful life of the sensor networks. The sensor nodes and their collected data are vulnerable to destruction because they are broadcasting in a hostile environment. Therefore, data security is a major topic of study for WSN. Due to the limited resources of the sensor network, conventional wireless network security measures are ineffective. With Speck encryption and CP-ABE, the proposed Lightweight Secured remote Health monitoring System (LSHS) can protect health data and restrict who can access it while using less power. Lightweight block ciphers are optimal for protecting medical records, according to the research. Using the LSHS, we evaluate how well-known lightweight block ciphers like AES, Simon, and Speck perform. Both encrypting and decrypting with the Speck technique require less processing time. Therefore, medical records are encrypted using the Speck algorithm.
在无线传感器网络中,数据的直接传输增加了数据的传输成本。此外,由于数据交换所需的能量增加,传感器网络的寿命缩短。因此,在无线传感器网络中利用数据聚合可以减轻传输成本负担,延长传感器网络的使用寿命。传感器节点及其收集的数据很容易被破坏,因为它们是在敌对环境中广播的。因此,数据安全是无线传感器网络研究的一个重要课题。由于传感器网络的资源有限,传统的无线网络安全措施是无效的。通过Speck加密和CP-ABE,提出的轻量级安全远程健康监测系统(LSHS)可以保护健康数据,并限制谁可以在使用更少的功率的情况下访问它。根据这项研究,轻量级分组密码是保护医疗记录的最佳选择。使用LSHS,我们评估了众所周知的轻量级分组密码(如AES、Simon和Speck)的性能。使用Speck技术进行加密和解密都需要较少的处理时间。因此,医疗记录使用Speck算法进行加密。
{"title":"Lightweight Symmetric Encryption and Attribute Based Encryption Method to Increase Information Safety in Wireless Sensor Network","authors":"R. Pandey","doi":"10.54216/jcim.100205","DOIUrl":"https://doi.org/10.54216/jcim.100205","url":null,"abstract":"Direct data transmission in a wireless sensor network raises the data transfer cost. In addition, the lifetime of sensor networks is shortened because of the rise in energy required for data exchange. As a result, data aggregation is utilized in WSN to lessen the burden of transmission costs and lengthen the useful life of the sensor networks. The sensor nodes and their collected data are vulnerable to destruction because they are broadcasting in a hostile environment. Therefore, data security is a major topic of study for WSN. Due to the limited resources of the sensor network, conventional wireless network security measures are ineffective. With Speck encryption and CP-ABE, the proposed Lightweight Secured remote Health monitoring System (LSHS) can protect health data and restrict who can access it while using less power. Lightweight block ciphers are optimal for protecting medical records, according to the research. Using the LSHS, we evaluate how well-known lightweight block ciphers like AES, Simon, and Speck perform. Both encrypting and decrypting with the Speck technique require less processing time. Therefore, medical records are encrypted using the Speck algorithm.","PeriodicalId":169383,"journal":{"name":"Journal of Cybersecurity and Information Management","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128089161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of Cybersecurity and Information Management
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1