Articles de revues sur le sujet « Internet – security measures. sears »

Pour voir les autres types de publications sur ce sujet consultez le lien suivant : Internet – security measures. sears.

Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres

Choisissez une source :

Consultez les 50 meilleurs articles de revues pour votre recherche sur le sujet « Internet – security measures. sears ».

À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.

Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.

Parcourez les articles de revues sur diverses disciplines et organisez correctement votre bibliographie.

1

McCathie, Andy. « Internet security fears prompt IT security measures ». Network Security 2000, no 5 (mai 2000) : 3. http://dx.doi.org/10.1016/s1353-4858(00)05005-4.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

Zhou, Zhong Wei, et Lei Shi. « Security Research and Measures for the Internet of Things ». Advanced Materials Research 748 (août 2013) : 910–14. http://dx.doi.org/10.4028/www.scientific.net/amr.748.910.

Texte intégral
Résumé :
With the development of Internet of things, the security has become moreand more important. In order to make clear the internet of things existing security threats, provide a theoretical reference for Internet of things Security and privacy protection, this paper summarizes the internet of things security threat and the measures. According to the Internet of things main system frame, research the perception layer, transport layer and application layer seperately, analysis of the network security needs issues, research networking security model, and discuss the content of network security mechanisms, gives the corresponding safety measures and recommendations for all kinds of security threats.
Styles APA, Harvard, Vancouver, ISO, etc.
3

Chen, Jing. « Analysis on Network Security and Corresponding Preventive Measures ». Applied Mechanics and Materials 241-244 (décembre 2012) : 2312–15. http://dx.doi.org/10.4028/www.scientific.net/amm.241-244.2312.

Texte intégral
Résumé :
Network security is one of the most important issues in the face of Internet development. Major researches are done on improving the current status of the security of internet. This article describes some major factors threatening internet, and analysis the latest security techniques. corresponding strategies are proposed to achieve a safe, worry-free environment online.
Styles APA, Harvard, Vancouver, ISO, etc.
4

Niu, Minghao, et Hong Dai. « Internet of Things Information Security and Preventive Measures ». Academic Journal of Science and Technology 4, no 2 (4 janvier 2023) : 93–96. http://dx.doi.org/10.54097/ajst.v4i2.3977.

Texte intégral
Résumé :
The Internet of Things is the third technological revolution of modern information technology. It is a high integration of various new technologies and concepts of modern information technology. It opens up the channel between the previously unrelated technologies such as electronic technology, automation technology, communication technology, biotechnology, mechanical technology and material technology, and makes these technologies truly integrate into a whole. The communication from person to person to object, object to object expansion is realized. The Internet of Things not only drives the development of emerging technologies, but also facilitates daily education and management. However, in the environment of the Internet of Things, there are still some problems of information security, information theft, information disclosure and other problems that must be solved in the application of the Internet of Things technology. Based on the architecture, key technologies and applications of the Internet of Things, this paper explores the security problems existing in the Internet of Things environment and puts forward reasonable preventive measures.
Styles APA, Harvard, Vancouver, ISO, etc.
5

Gupta, Sanjay Kumar, et Sandeep Vanjale. « Cyber Security Measures for Internet of Things Devices ». International Journal of Engineering Research and Technology 13, no 8 (31 août 2020) : 1830. http://dx.doi.org/10.37624/ijert/13.8.2020.1830-1839.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
6

Wang, Hongqiao. « On Computer Communication Network Security Maintenance Measures ». Studies in Social Science Research 4, no 3 (24 juillet 2023) : p134. http://dx.doi.org/10.22158/sssr.v4n3p134.

Texte intégral
Résumé :
With the rapid development of China’s science and technology, today’s Internet communication technology has also followed the ever-changing, but there is still a certain network communication information security problems, and this problem is not to be underestimated. Network communication security has a close relationship with national important documents and information protection confidentiality, social security and stability, national development, social and economic development. The use of Internet technology to commit crimes generally does not leave traces of the crime, which increases the chances of using the network to commit crimes.
Styles APA, Harvard, Vancouver, ISO, etc.
7

Sang, Yun Chang, et Xin Gao. « Security Issues and Protective Measures of the Internet of Things Architecture ». Advanced Materials Research 765-767 (septembre 2013) : 1007–10. http://dx.doi.org/10.4028/www.scientific.net/amr.765-767.1007.

Texte intégral
Résumé :
With the development of technology and applications of the Internet of Things, Things technology and industry being the attention from the government to enterprises and research institutions at different levels. The guarantee of Things safety is an important prerequisite to promote the healthy development of the Internet of Things. Articles oriented networking current mainstream architecture research from the three levels of perception layer, transport layer and application layer, the security threat of the Internet of Things, and appropriate security measures, provided for the establishment of the security architecture of the Internet of Things theoretical reference.
Styles APA, Harvard, Vancouver, ISO, etc.
8

Минаев, В. А., Б. А. Швырев et Т. Р. Ромашкин. « INTERNET OF THINGS SECURITY : KEY SOLUTIONS ». ИНФОРМАЦИЯ И БЕЗОПАСНОСТЬ 26, no 2(-) (30 juin 2023) : 163–68. http://dx.doi.org/10.36622/vstu.2023.26.2.001.

Texte intégral
Résumé :
Одной из основных проблем при обеспечении безопасности Интернета вещей (IoT) является, с одной стороны, огромное количество устройств, масштабирующее угрозы и риски безопасности их использования, а с другой – слабая разработанность или даже отсутствие стандартизированных протоколов безопасности. Нередко устройства IoT имеют ограниченную вычислительную мощность и память в угоду цене и коммерческой выгоде, что затрудняет реализацию надежных мер безопасности. Расширение IoT достигло критической инфраструктуры - системы здравоохранения, транспорта и других особо важных отраслей. Поскольку современные устройства IoT имеют доступ к персональной и конфиденциальной информации, нарушения их информационной безопасности могут иметь весьма серьезные последствия, поэтому крайне важно обосновать и реализовать надежные меры безопасности для их защиты от компьютерных атак. Проводится сравнительный анализ основных сетевых протоколов IoT. Выделяются наиболее вероятные компьютерные атаки на устройства IoT: нарушение безопасности сети, нарушение безопасности устройства, физический доступ к устройству, сбои в работе устройства, технологии социальной инженерии. Рассматриваются следующие меры для обеспечения безопасности устройств IoT: совершенствование нормативно-правовой базы; обучение и повышение квалификации сотрудников; развитие взаимодействия с производителями IoT; улучшение мониторинга IoT-устройств; улучшение методов анализа данных, связанных с функционированием IoT. Для реализации предложенных мер приводятся программные и аппаратные решения задач безопасности IoT-устройств. One of the main problems in ensuring the security of the Internet of Things (IoT) is, on the one hand, a huge number of devices that scale the threats and security risks of their use, and on the other hand, weak development or even lack of standardized security protocols. Often, IoT devices have limited computing power and memory for the sake of price and commercial benefits, which makes it difficult to implement reliable security measures. The expansion of IoT has reached critical infrastructure - healthcare, transport and other particularly important areas. Since modern IoT devices have access to personal and confidential information, violations of their information security can have very serious consequences, therefore it is extremely important to justify and implement reliable security measures to protect them from computer attacks. A comparative analysis of the main IoT network protocols is carried out. The most likely computer attacks on IoT devices are highlighted: network security violation, device security violation, physical access to the device, device malfunctions, social engineering technologies. The following measures to ensure the security of IoT devices are considered: improvement of the regulatory and legal framework; training and professional development of employees; development of interaction with IoT manufacturers; improvement of monitoring of IoT devices; improvement of data analysis methods related to the functioning of IoT. To implement the proposed measures, software and hardware solutions to the security problems of IoT devices are provided.
Styles APA, Harvard, Vancouver, ISO, etc.
9

He, Beige. « The Advance of Internet of Things Security Threats and Possible Measures ». Highlights in Science, Engineering and Technology 68 (9 octobre 2023) : 202–11. http://dx.doi.org/10.54097/hset.v68i.12067.

Texte intégral
Résumé :
The Internet of Things (IoT) is a new stage of human informatization development after the Internet. With the IoT, physical devices can seamlessly exchange and process data with each other, further improving the human ability to process information. However, Internet of Things security research is still preliminary despite frequent data breaches and security incidents. This paper starts with the introduction of the IoT and introduces its definition, technical characteristics, and hierarchical architecture of the IoT. After that, the security threats that may be encountered at each layer are discussed, and finally, the ways to enhance the security of IoT. This paper aims to examine the security issues that arise in the IoT system and investigate the security measures that can be employed to serve as security technology guidelines for constructing secure IoT systems.
Styles APA, Harvard, Vancouver, ISO, etc.
10

Gomes, Leandre, Abhinav Deshmukh et Nilesh Anute. « Cyber Security and Internet Banking : Issues and Preventive Measures ». Journal of Information Technology and Sciences 8, no 2 (14 juillet 2022) : 31–42. http://dx.doi.org/10.46610/joits.2022.v08i02.005.

Texte intégral
Résumé :
The internet brought a new revolution to the financial sector and it has changed the way of operations in the last two decades. Now, people have the option to carry out banking transactions from a place of their choice without having to go to a nearby bank office. E-banking has become an integral part of the banking system and has become a popular method of transaction for the majority of people. A user has a wide range of options for managing his money through numerous internet banking methods. While internet banking is an aid for customers, they still have to be vigilant to keep their accounts safe from cybercriminals and hackers, as everything on the internet is prone to security threats. Internet security measures followed by the majority of the bank sites to protect their information are not up-to-date as compared to the dynamic cyber threats. Such problems have made it easy for confidential financial information to fall into the hands of third parties and cybercriminals. Although there are several security measures to stop data breaches, there are still flaws in these systems. The goal of this study article is to look at the number of cyber security issues in internet banking in India and the consumer’s awareness of these issues and preventive measures used by them. Our research is particularly based on primary data.
Styles APA, Harvard, Vancouver, ISO, etc.
11

Chen, Jing. « Analysis on Internet Attack and Security ». Advanced Materials Research 605-607 (décembre 2012) : 2387–90. http://dx.doi.org/10.4028/www.scientific.net/amr.605-607.2387.

Texte intégral
Résumé :
The rapid upgrading internet has brought to us many shortcuts and conveniences. Simultaneously, the underlying security problems have surfaced. These include unauthorized access, posing as legitimate users and destroyed data integrity, which interferes with the normal operation of the system. In addition, these computer network invasions are characterized by the focused attacking source, flexible attacking strategies and expanded scope of the attacked target. This paper analyzes the existing network security risks and means of invasion from various aspects; the network security defense measures are discussed here.
Styles APA, Harvard, Vancouver, ISO, etc.
12

Imdad, Maria, Deden Witarsyah Jacob, Hairulnizam Mahdin, Zirawani Baharum, Shazlyn Milleana Shaharudin et Mohd Sanusi Azmi. « Internet of things : security requirements, attacks and counter measures ». Indonesian Journal of Electrical Engineering and Computer Science 18, no 3 (1 juin 2020) : 1520. http://dx.doi.org/10.11591/ijeecs.v18.i3.pp1520-1530.

Texte intégral
Résumé :
Internet of Things (IoT) is a network of connected and communicating nodes. Recent developments in IoT have led to advancements like smart home, industrial IoT and smart healthcare etc. This smart life did bring security challenges along with numerous benefits. Monitoring and control in IoT is done using smart phone and web browsers easily. There are different attacks being launched on IoT layers on daily basis and to ensure system security there are seven basic security requirements which must be met. Here we have used these requirements for classification and subdivided them on the basis of attacks, followed by degree of their severity, affected system components and respective countermeasures. This work will not only give guidelines regarding detection and removal of attacks but will also highlight the impact of these attacks on system, which will be a decision point to safeguard system from high impact attacks on priority basis.
Styles APA, Harvard, Vancouver, ISO, etc.
13

Du, Yu Lin. « Research on the Information Security of Internet Bank ». Applied Mechanics and Materials 687-691 (novembre 2014) : 1925–29. http://dx.doi.org/10.4028/www.scientific.net/amm.687-691.1925.

Texte intégral
Résumé :
In this paper, we focus on the risks and management of the information security, such as computer technology uncertainty,internet viruses and the information security soft outsourcing, then analyze the problems in internet bank information security, we conclude this paper by proposing some measures in controling the information insecurity of internet bank.
Styles APA, Harvard, Vancouver, ISO, etc.
14

Wang, Xiao Feng. « Research on Security Issues of the Internet of Things ». Advanced Materials Research 989-994 (juillet 2014) : 4261–64. http://dx.doi.org/10.4028/www.scientific.net/amr.989-994.4261.

Texte intégral
Résumé :
According to the current mainstream architecture of the Internet of Things, Makes research on security threat of the Internet of things from the perception layer, network layer and application layer, Gives the corresponding security policies and measures. It provides the theoretical reference for security of the Internet of things and privacy protection.
Styles APA, Harvard, Vancouver, ISO, etc.
15

Wenceslaus Ritte, James. « Security Concerns in Internet of Things ». International Journal for Research in Applied Science and Engineering Technology 9, no VII (30 juillet 2021) : 2898–901. http://dx.doi.org/10.22214/ijraset.2021.36977.

Texte intégral
Résumé :
Security Concerns is the among of the significant challenges of Internet of thing (IoT). Lack of proper Device updates, lack of User awareness, Software compatibility issues, service disruption, inability to monitor their current status and software are Among the challenges that IoT is facing. In this work we are going to explore significant areas of IoT applications and security measures and identify management of Machine to Machine(M2M), Platform selection criteria, Knowledge of How data is managed on various IoT applications which includes (i) IoT in healthcare (ii) Blood Banks. In this work provide valuable insights into issues related to streamline workflows, predict necessary maintenance, analyze usage patterns, auto- mate manufacturing, and much more.
Styles APA, Harvard, Vancouver, ISO, etc.
16

Kumar Yogi, Manas, Y. Himatej et M. Mahesh reddy. « IOT Security Challenges and Measures to Mitigate : Novel Perspectives ». International Journal of Engineering & ; Technology 7, no 2.7 (18 mars 2018) : 854. http://dx.doi.org/10.14419/ijet.v7i2.7.11081.

Texte intégral
Résumé :
The Internet Of Things describes the ever-growing number of intelligent objects that are being connected to the internet and each other, smartphones, tablets, wearable technology and smart home devices are adopted into our everyday lives. The security of IOT is becoming more complex and may have a serious consequence. So, now we have many security challenges like privacy concerns, routine cryptography, passive data collection etc. Many people hide personal data in social media to eliminate these sort of privacy issues but common man nowadays is becoming a passive participant due to lack of security in these IOT devices that are surrounding us.
Styles APA, Harvard, Vancouver, ISO, etc.
17

Rueda-Rueda, Johan Smith, et Jesus M. T. Portocarrero. « Framework-based security measures for Internet of Thing : A literature review ». Open Computer Science 11, no 1 (1 janvier 2021) : 346–54. http://dx.doi.org/10.1515/comp-2020-0220.

Texte intégral
Résumé :
Abstract This paper presents a review of state-of-the-art security frameworks for IoT applications. It aims to find out what alternatives have been proposed to guide IoT application developers in the implementation of security measures through all development phases. In this literature review, we identified 21 security frameworks, and we analyzed them from IoT application domains addressed and IoT elements protected. We find four application domains: generic, smart cities, smart car/VANET, and smart infrastructures. Concerning elements protected, we analyzed the frameworks through protected application resources and we also consider security properties in this paper. Our two principal findings are: (i) Even though there are a wide variety of security frameworks, we did not find a proposal that addresses all the layers of an IoT application (device, network, service and application) and all development phases (analysis, design, implementation, testing, deployment, and maintenance), (ii) Addressing security from the design phase allows IoT developers to have a broader perspective of the system, avoiding massive changes to be made in later stages, saving costs and time. This gap and concerns enable various research on security by design and secure development to be carried out, and proposed frameworks to address the identified problems.
Styles APA, Harvard, Vancouver, ISO, etc.
18

Sharma, Shruti, Rajkumar Saini, Sumit Saini et Tushar Sharma. « Network Security Essentials : Understanding Its Key Attacks and Potential Security Mechanism ». Industrial Engineering Journal 52 (2023) : 175–84. http://dx.doi.org/10.36893/iej.2023.v52.174-184.

Texte intégral
Résumé :
Security is an essential component in the field of computing and networking technology. The prioritisation of a robust security policy should be the primary and fundamental concern for the design, planning, construction, and operation of any network. The prioritisation of network security has become increasingly important for individuals utilising personal computers, corporations, and military organisations. The issue of security has become a significant worry since the emergence of the internet. The inherent nature of the internet has facilitated the emergence of a multitude of security concerns. The growing significance of network security stems from the accessibility of intellectual property through online platforms. A wide range of attack types can be propagated over a network. Understanding various attack techniques is crucial for the effective implementation of appropriate security measures. To safeguard their operations from potential online threats, numerous enterprises employ various measures. There exist various types of network attacks that can be launched. Understanding different attack types enables the development of suitable security measures. Numerous enterprises employ firewalls and encryption technologies as protective measures against potential cyber threats. Networking infrastructures globally include a substantial volume of personal, economic, military, and government information, necessitating diverse security procedures for each category. This paper aims to examine a wide range of attacks and explore several security mechanisms that can be implemented based on the specific requirements and structure of the network.
Styles APA, Harvard, Vancouver, ISO, etc.
19

Zhang, Wen Jie. « Network Security Vulnerabilities and Preventive Measures ». Applied Mechanics and Materials 433-435 (octobre 2013) : 1674–78. http://dx.doi.org/10.4028/www.scientific.net/amm.433-435.1674.

Texte intégral
Résumé :
As the arrival times network economy and social networks, computers and computer networks popularity indicates that a ubiquitous network will go into not the state. As the use of network and the virus has become increasingly serious, virus writers from the original to show off to obtain invalid income, the resulting harm is incalculable. This situation not only jeopardize the current development of the Internet but also undermined the reality of social stability and unity, therefore, this paper is on how the network vulnerabilities, how to survive and how to protection, so that there are loopholes in our network deeper understanding of network vulnerability and protection so that we have a new breakthrough for the network to provide a good environment for development.
Styles APA, Harvard, Vancouver, ISO, etc.
20

Bashir et. al., Adil. « Internet of Things Security Issues, Threats, Attacks and Counter Measures ». International Journal of Computing and Digital Systemss 7, no 2 (1 mars 2018) : 111–20. http://dx.doi.org/10.12785/ijcds/070206.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
21

BACÎŞ, Irina-Bristena. « Types of Threats and Appropriate Countermeasures for Internet Communications ». International Journal of Information Security and Cybercrime 10, no 1 (29 juin 2021) : 27–37. http://dx.doi.org/10.19107/ijisc.2021.01.03.

Texte intégral
Résumé :
Threats can translate into various types of attacks an intruder can take on entities in a network: flooding the target with protocol messages, smurfing (targeted broadcasting of an ICMP protocol-based messaging protocol), distributed attacks that lead to blocking the service for legitimate users, IP address theft and flooding targets with unsolicited emails, identity theft, or fraudulent routing. Against these threats, a variety of security measures can be implemented, such as: configuration management, firewall installation, intrusion detection system installation. Used separately or together, these protection measures can eliminate or even minimize the probability of materializing security threats and preventing attacks on the security features of a system.
Styles APA, Harvard, Vancouver, ISO, etc.
22

Cao, Xiyu. « The application of artificial intelligence in internet security ». Applied and Computational Engineering 18, no 1 (23 octobre 2023) : 230–35. http://dx.doi.org/10.54254/2755-2721/18/20230995.

Texte intégral
Résumé :
The global integration of the internet has led to a significant increase in the importance of cybersecurity. Artificial Intelligence (AI) has emerged as a viable solution for enhancing cybersecurity measures. AI has the potential to improve the speed and effectiveness of detecting and responding to cyber threats. This study explores the intersection of network security and AI, with a focus on the various ways in which AI can be used to enhance network security, such as intrusion detection, malware detection, and behavioural analytics. The study also examines the potential risks associated with AI in cybersecurity, including the possibility of AI being utilized for cyber-attacks. Additionally, the study discusses the challenges associated with implementing AI for network security, such as the lack of available large datasets for AI training, network infrastructure complexity, and the requirement for skilled AI professionals in cybersecurity. Ethical considerations arising from the use of AI in network security are also addressed. The study emphasizes the need for a balanced approach towards integrating AI into cybersecurity measures, taking into account potential benefits and challenges.
Styles APA, Harvard, Vancouver, ISO, etc.
23

VASILE, Cristinel Marius. « Firewall Technologies ». International Journal of Information Security and Cybercrime 7, no 1 (29 juin 2018) : 37–44. http://dx.doi.org/10.19107/ijisc.2018.01.04.

Texte intégral
Résumé :
Today, most businesses are based on a computer system, more or less developed. For daily activities the organization needs to be able to connect to the Internet, possibly from a local area network (LAN). But, once with the benefits of the Internet, there are also security risks that the organization must minimize by measures and appropriate controls. Among security issues arising from using the Internet include hacker attacks, computers infection with viruses, malware and spyware. In theory, hackers can enter inside the organization network and steal confidential data, damaging computers or the entire organization's local area network. In this sense, firewall implementation is a security measure needed to any organization. This paper presents firewall types and technologies, attacks on firewalls and some security measures on the internal network.
Styles APA, Harvard, Vancouver, ISO, etc.
24

Fakiha, Bandr. « Business Organization Security Strategies to Cyber Security Threats ». International Journal of Safety and Security Engineering 11, no 1 (28 février 2021) : 101–4. http://dx.doi.org/10.18280/ijsse.110111.

Texte intégral
Résumé :
It is argued that the advancement of Information, Communication and Technology went hand in hand with the emergence of certain threats and vulnerabilities to cybersecurity. In several cases, cyber attacks have targeted the information, communication and infrastructure networks of numerous organizations. Today, hackers and intruders have advanced technology within their scope that lets them access the organizational information system. The present study highlights numerous internet security related problems, it offers a broad-based overview of internet threats from the perspective of business enterprises, along with prevention measures and enhanced safety strategies. A systematic analysis of secondary literature was introduced by researchers, the study found that it is critical for organizations to choose an IT security management tool that can be categorized as best practices and standards. The Security Incident Event Management (SIEM) framework is one key instrument proposed here. SIEM instruments help security analysts gain insight into the security threats targeting the IT structures of a given organization.
Styles APA, Harvard, Vancouver, ISO, etc.
25

Witczyńska, Katarzyna. « Network security - security methods in transnational corporations (TNC) ». Logistics and Transport 45, no 1 (2020) : 55–58. http://dx.doi.org/10.26411/83-1734-2015-1-45-4-20.

Texte intégral
Résumé :
Modern times are associated with a huge increase in the number of security breaches in transnational corporations. The conclusion is that all preventive measures should be taken to stop the growing online crime in globalizing economies. Nowadays, when the Internet is becoming more and more common and more people use its resources, security becomes a priority. The use of firewalls, IDS and IPS systems, the implementation of appropriate security rules, the awareness of network users and the continuous deepening of knowledge in this area can significantly contribute to the security of data of transnational corporations.
Styles APA, Harvard, Vancouver, ISO, etc.
26

Faiz, Mohammad, et A.K. Daniel. « Threats and Challenges for Security Measures on the Internet of Things ». Law, State and Telecommunications Review 14, no 1 (20 mai 2022) : 71–97. http://dx.doi.org/10.26512/lstr.v14i1.38843.

Texte intégral
Résumé :
[Purpose] The Internet of Things (IoT) has grown rapidly in the past few years and billions of devices are connected to the IoT network for collecting and sharing data globally for various applications. Due to the billions of connected devices, there is a potential risk of data loss, identity theft, device manipulation, trust issues, falsification of data, network/server manipulation, and various impacts in the application of IoT platforms. The IoT-enabled devices are growing rapidly day by day leading to amplify the threats to the reliability of the network. [Methodology/Approach/design] The research work aims to push the present state of the art by identifying privacy and security requirements that IoT is presently needed. [Findings] Various existing solutions for security in IoT and their limitations are addressed. Security issues such as trust based privacy policies for context-awareness, efficient holistic frameworks, and lightweight strategy for system resource constraints are identified. [Practical Implications] The technological age of IoT will be relying on a large number of devices is forecast to expand substantially. Although many of the technology-related privacy and security challenges exist, developers and researchers need to work in collaboration to resolve those threats, as they have accomplished with several other related technologies.
Styles APA, Harvard, Vancouver, ISO, etc.
27

Rode, Mrs K. N. « Network Security and Cyber Security : A Review ». International Journal for Research in Applied Science and Engineering Technology 10, no 6 (30 juin 2022) : 3404–7. http://dx.doi.org/10.22214/ijraset.2022.44501.

Texte intégral
Résumé :
Abstract: Secure Network has now become a need of any organization. The security threats are increasing day by day and making high speed wired/wireless network and internet services, insecure and unreliable. Now – a - days security measures works more importantly towards fulfilling the cutting edge demands of today’s growing industries. The need is also induced in to the areas like defense, where secure and authenticated access of resources are the key issues related to information security. In this paper Author has described the important measures and parameters regarding large industry/organizational requirements for establishing a secure network. Wi-Fi networks are very common in providing wireless network access to different resources and connecting various devices wirelessly. There are need of different requirements to handle Wi-Fi threats and network hacking attempts. This paper explores important security measures related to different network scenarios, so that a fully secured network environment could be established in an organization. Author also has discussed a case study to illustrate the minimal set of measures required for establishing network security in any organization. We will be analyzing a variety of cyber-attacks and different security methods. We aspire to create research into the subject area. This paper explores how cybercrime has become a serious threat in our lives and we are going to look at a few of the different security methods that are being used in this arena and their various weaknesses.
Styles APA, Harvard, Vancouver, ISO, etc.
28

Agarwal, Sanyam, Veer Daksh Agarwal, Vipin Mittal et Ishaan Agarwal. « Review of Effect of Internet of Things(IoT) in Cybercrime ». International Journal for Research in Applied Science and Engineering Technology 11, no 6 (30 juin 2023) : 4672–78. http://dx.doi.org/10.22214/ijraset.2023.54519.

Texte intégral
Résumé :
Abstract: This review paper examines the impact of the Internet of Things (IoT) in cybercrime. With the rise of IoT devices, cyber-attacks have also increased immensely, leading to new security challenges. IoT devices frequently lack the security of traditional computers, leaving them open to hacking and other forms of online assaults. Attackers can use IoT devices as a way to gain access to networks or other devices, steal data, or launch attacks. This paper gives a broad review of the security issues IoT devices pose and how cybercriminals take advantage of them. It also discusses the measures that can be taken to secure IoT devices and protect against cyber-attacks. The discussion of potential future study topics for examining how IoT is affecting cybercrime finishes the paper. Overall, this review paper highlights the importance of understanding the risks associated with IoT devices and implementing appropriate security measures to mitigate them.
Styles APA, Harvard, Vancouver, ISO, etc.
29

Margaret Dumebi Okpor, Kizito Eluemunor Anazia et Daniel Ukpenusiowho. « A novel hybrid database security management technique ». International Journal of Science and Research Archive 11, no 2 (30 avril 2024) : 1555–65. http://dx.doi.org/10.30574/ijsra.2024.11.2.0652.

Texte intégral
Résumé :
Since the advent of the internet and the digitization of information, more individuals and organizations have gained access to the internet, leading to a significant expansion in the size of our database systems. These databases are relied upon for day-to-day activities by individuals and organizations. Furthermore, the advancements in technology have increased the vulnerability of database management systems and enforcing adequate database security measures is of paramount importance to individuals and organizations. In this study, we deployed a hybrid approach to database security system that integrates two techniques: dynamic time-warping algorithm and voice recognition methods. The implementation follows Object-Oriented Analysis and Design procedures, utilizing SQL Management Studio 2014 for the backend and ASP.NET C# for the frontend. Our hybrid approach demonstrates enhanced database security compared to previously employed authentication measures.
Styles APA, Harvard, Vancouver, ISO, etc.
30

Galatenko, V. A., et K. A. Kostyukhin. « IoT Information Security : Fundamental Statements Review ». Programmnaya Ingeneria 11, no 5 (22 octobre 2020) : 259–69. http://dx.doi.org/10.17587/prin.11.259-269.

Texte intégral
Résumé :
Internet of things technology is developing at an exceptionally fast pace. This applies to both industrial and consumer Internet. The "things" account for billions, and many areas of application have been formed. At the same time, the state of information security of the Internet of things is not satisfactory, and protective measures are clearly inferior to Commerce. This is especially dangerous because the Internet of things spans two worlds: digital and physical, and security breaches can cause both informational and physical damage. The Internet of things is developing rapidly, so it is natural that it experiences typical growth diseases-fragmentation and uneven development. The base for ensuring security is mostly formed (but continues to be formed), the question is how quickly there will be a harmonization of approaches, and advanced ideas will be accepted by device manufacturers. Many state and non-state agencies actively promote security tools, inform and train manufacturers and consumers. The article is an overview of the main provisions of information security of the Internet of things. An attempt is made to consider software and technical and legislative levels of Internet of things security. This makes it different from other publications of a similar nature. Only a holistic, integrated approach can improve real information security. Authors outline basic concepts and describe a reference model of Internet of things, draw attention to the peculiarities of the Internet of things that are important from the security point of view, enumerate typical threats for Internet of things. The legislative level of information security, security recommendations for the Internet of things, manufacturers description of usage, and installation of software corrections are considered in detail.
Styles APA, Harvard, Vancouver, ISO, etc.
31

Qi, Kun. « Security Application of 5G Technology in Industrial Internet ». Journal of Electronic Research and Application 6, no 1 (18 janvier 2022) : 11–14. http://dx.doi.org/10.26689/jera.v6i1.3545.

Texte intégral
Résumé :
The application of internet in the industrial field has become an inevitable trend in modern society. In the actual operation, there are possible safety risks. To ensure the system’s proper operation, technicians are required to resolve the issues. In this context, the author thoroughly integrated with the present industrial development situation, examined the use of 5G technology in industrial internet security, and desired to leverage the advantageous benefits of 5G technology to boost industrial development. Due to the numerous benefits of 5G technology in security applications, we conducted an in-depth investigation and described it from the perspectives of relevant concepts, security, and security application guarantee measures, with the goal of achieving the goal of safe industrial internet operation.
Styles APA, Harvard, Vancouver, ISO, etc.
32

Song, Xinde. « Research on Security Protection Architecture of Energy Internet Information Communication ». MATEC Web of Conferences 228 (2018) : 02010. http://dx.doi.org/10.1051/matecconf/201822802010.

Texte intégral
Résumé :
The large-scale development and utilization of renewable energy has become a major trend in the development of the global energy sector. Compared with traditional power grids, energy Internet information security has many features and complex technologies, and the hidden dangers of information security risks are more prominent. In the face of various cyber threats, effective measures must be taken to ensure the safe operation of the power information network. This paper introduces the relationship between energy Internet and smart grid, sorts out the current new technology of energy Internet application, analyzes the risks it faces, and designs the security architecture of energy Internet information communication system.
Styles APA, Harvard, Vancouver, ISO, etc.
33

Bu, Bing, Lei Wang, Zhenyang Pi et Weiguo Fang. « Stackelberg Model of Anti-terrorism Resource Allocation in Express Transportation Security Checks ». E3S Web of Conferences 253 (2021) : 02020. http://dx.doi.org/10.1051/e3sconf/202125302020.

Texte intégral
Résumé :
The problem of anti-terrorism security checks of express transportation becomes more and more severe under the Internet shopping model. In this paper, a Stackelberg game model of anti-terrorism resource allocation in express transportation security checks is built to discuss, in terms of single and multiple routes, the optimal resource allocation of express company (defender) including physical security measures, in-box sensor technology, non-intrusive security measures at terminal distribution sites and handover course. It shows that, for the single route, express company should trade off the security costs among the first, second and third level security measures, and should allocate the same security costs of physical security measures for every distribution site. For the multiple routes, the transportation route that terrorists insert the hazardous materials has the lowest probability of physical security measures, and therefore is utilized by terrorists. Thus, the optimal allocation plan of security resources should be the same security costs of non-intrusive security measures at the final distribution sites (the third level security measure) among each transportation routes.
Styles APA, Harvard, Vancouver, ISO, etc.
34

Rapalus, Patrice. « Security measures for protecting confidential information on the internet and intranets ». Employment Relations Today 24, no 3 (septembre 1997) : 49–58. http://dx.doi.org/10.1002/ert.3910240306.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
35

Zhurylo, Oleh, et Oleksii Liashenko. « Architecture and iot security systems based on fog computing ». INNOVATIVE TECHNOLOGIES AND SCIENTIFIC SOLUTIONS FOR INDUSTRIES, no 1 (27) (2 juillet 2024) : 54–66. http://dx.doi.org/10.30837/itssi.2024.27.054.

Texte intégral
Résumé :
The subject of the study is is the security architecture of the Internet of Things (IoT) based on fog computing, which allows providing efficient and secure services for many IoT users. The goal is to investigate the security architecture for IoT systems based on fog computing. To achieve the goal, the following tasks were solved: the concept of fog computing is proposed, its architecture is considered and a comparative analysis of fog and cloud computing architectures is made; the principles of designing and implementing the architecture of a fog computing system are outlined; multi-level security measures based on fog computing are investigated; and the areas of use of fog computing-based Internet of Things networks are described. When performing the tasks, such research methods were used as: theoretical analysis of literature sources; analysis of the principles of designing and implementing the security architecture of the Internet of Things; analysis of security measures at different levels of the architecture. The following results were obtained: the architecture of fog computing is considered and compared with the cloud architecture; the principles of designing and implementing the architecture of fog computing systems are formulated; multi-level IoT security measures based on fog computing are proposed. Conclusions: research on IoT security systems based on fog computing has important theoretical implications. The fog computing architecture, in contrast to the cloud architecture, better meets the demand for high traffic and low latency of mobile applications, providing more advantages for systems that require real-time information processing. When designing and implementing the architecture of fog computing systems, the factors of memory capacity, latency, and utility should be taken into account to effectively integrate fog technologies with IoT. To ensure a high level of system security, multi-level security measures should be implemented using both software and hardware solutions.
Styles APA, Harvard, Vancouver, ISO, etc.
36

Nakissa, Aria. « Security, Islam, and Indonesia ». Bijdragen tot de taal-, land- en volkenkunde / Journal of the Humanities and Social Sciences of Southeast Asia 176, no 2-3 (11 juin 2020) : 203–39. http://dx.doi.org/10.1163/22134379-bja10004.

Texte intégral
Résumé :
Abstract This article provides an anthropological analysis of counterterrorism in Indonesia. In doing so, it draws on several complementary ideas which have shaped anthropological scholarship on security, addressing ‘states of exception’, ‘securitization’, ‘governmentality’, and ‘human security’. The article develops its analysis through the first ethnographic study of Indonesia’s national counterterrorism agency. Data comes from special access to the agency’s facilities and events as well as interviews with agency personnel and ex-terrorists. The article also argues that post-9/11 security agencies frequently embrace a distinctive ‘Muslim security strategy’ built upon several contestable assumptions. Hence, it is assumed that Islam poses extraordinary threats to physical safety, human rights, and national identity. These threats justify suspending ordinary laws, making enormous investments in security measures, and extending such measures across the globe. It is also assumed that measures to prevent threats should focus on combating radical Islamic ideas, especially in educational institutions and on the Internet.
Styles APA, Harvard, Vancouver, ISO, etc.
37

PYRKOSZ, Aleksandra, et Sabina SZYMONIAK. « Simplifying security processes in large organizations while maintaining an appropriate level of security ». Inżynieria Bezpieczeństwa Obiektów Antropogenicznych, no 2 (10 juin 2024) : 1–8. http://dx.doi.org/10.37105/iboa.186.

Texte intégral
Résumé :
This paper presents an approach to simplifying security in large organizations, ensuring that the work of ordinary employees is more accessible without negatively impacting the organization's security. Access to the Internet is becoming increasingly important in various aspects of human life, including interpersonal communication, professional work, and business operations. Enterprises have digitized information on their devices, which can be of interest to attackers. Incorrect security measures can expose companies to various losses, such as financial costs or image losses. As the number of enterprises connected to the Internet grows, IT system security is gaining importance. Cyberattacks are malicious actions by individuals or organized groups with motives such as financial gain, employee dissatisfaction, or government interference. Attackers aim to access financial data, customer lists, financial data, and customer databases. Cybersecurity should be the basis of every organization, regardless of its size. The number of attacks each year is related to increased investments in cybersecurity strategies and focusing on finding and stopping hackers. Information security protects information to prevent unauthorized access, use, and disclosure. It includes implementing policies and procedures to protect information and prevent data loss or theft. However, implementing security measures can be challenging for ordinary employees, leading to decreased security.
Styles APA, Harvard, Vancouver, ISO, etc.
38

Nordin, Siti Aminah, Zakiah Mohd Yusoff, Muhammad Hanif Faisal et Khairul Kamarudin. « Securing high-value electronic equipment : an internet of things driven approach for camera security ». IAES International Journal of Artificial Intelligence (IJ-AI) 13, no 3 (1 septembre 2024) : 2763. http://dx.doi.org/10.11591/ijai.v13.i3.pp2763-2772.

Texte intégral
Résumé :
<p>This article addresses pressing challenge of securing high-value electronic equipment, notably cameras, which face dual threats of damage in high humidity conditions and theft due to their significant market value. To confront these issues, the study introduces innovative internet of things (IoT)-driven approach aimed at strengthening conventional storage box security. Central to this approach is integration of IoT technologies, such as Arduino and ESP32, to develop advanced safety storage box. This enhanced system features essential hardware components, including buzzer, password-protected keypad, radio frequency identification reader, and DHT11 sensor for humidity monitoring. Additionally, mobile alarm system is incorporated to promptly alert owners of any detected movement vibrations, thereby augmenting security measures. By leveraging these components, proposed methodology seeks to mitigate risks associated with camera theft and fungal contamination, thereby advancing electronic device security. The expected outcome is marked enhancement in protection of high-value electronic equipment, particularly cameras, through continuous real-time monitoring and proactive security measures. This research underscore’s critical role of IoT technologies in fortifying security measures for valuable electronic assets, contributing significantly to ongoing discourse on innovative strategies in field. Through its comprehensive approach, this study aims to offer practical solutions to mitigate security risks and safeguard electronic equipment against potential threats, thereby addressing critical need in realm of electronic device security.</p>
Styles APA, Harvard, Vancouver, ISO, etc.
39

Clark, M'Kaila J., et Lila Rajabion. « A Strategic Approach to IoT Security by Working Towards a Secure IoT Future ». International Journal of Hyperconnectivity and the Internet of Things 7, no 1 (3 février 2023) : 1–18. http://dx.doi.org/10.4018/ijhiot.317088.

Texte intégral
Résumé :
The internet of things' (IoT) fast-growing development and adoption are undeniable. Although the IoT development is moving at a fast rate, the security of these technologies is not keeping up. Lack of security infrastructure on the internet of things is due to such security measures being excluded from the average company business plan and the lack of security configurations established. The increasing need for robust security architecture is needed to address said vulnerabilities. How do the internet of things companies create a dynamic security approach to defend and combat threats while also being flexible to accommodate future technological advancements? This paper will answer this question by addressing the strategic approach to developing a strong IoT security infrastructure that promotes confidentiality, integrity, and availability with dynamic elements that allow for future developments to address new security concerns. This research question will be answered through analysis of extensive thematic literature review.
Styles APA, Harvard, Vancouver, ISO, etc.
40

Alisultanova, Iman A., Galina A. Ovseenko et Bella Kh Visaitova. « ANALYSIS OF NETWORK INFORMATION SECURITY STRATEGIES IN HIGHER EDUCATION INSTITUTIONS ». EKONOMIKA I UPRAVLENIE : PROBLEMY, RESHENIYA 5/5, no 146 (2024) : 30–35. http://dx.doi.org/10.36871/ek.up.p.r.2024.05.05.005.

Texte intégral
Résumé :
With the advent of the Internet era, computer networks have become widespread in the field of education. Since the management of network information security is of great importance for the development of higher education, large educational institutions should be aware of the importance of managing network information security. The purpose of the article is to solve the main problems faced by the management of network information security, and to take appropriate measures to lay a solid foundation for building a secure Internet environment.
Styles APA, Harvard, Vancouver, ISO, etc.
41

Nur A'fyfah Zaimy, Mohamad Fadli Zolkipli et Norliza Katuk. « A review of hacking techniques in IoT systems and future trends of hacking on IoT environment ». World Journal of Advanced Research and Reviews 17, no 2 (28 février 2023) : 723–31. http://dx.doi.org/10.30574/wjarr.2023.17.2.0310.

Texte intégral
Résumé :
This paper reviews Internet of Things (IoT) security and the rise in security issues due to hardware and software security flaws being exploited. Researching hacking methods in IoT environments is critical, as attacks go beyond technical safeguards. Therefore, this paper aims to provide insights into the future of IoT security and inform the development of effective prevention measures by analyzing hacking techniques and tools. The research highlights the urgency to improve IoT security and focuses on future trends in IoT hacking. It also emphasizes the necessity for robust security measures to protect IoT systems and devices from hacking.
Styles APA, Harvard, Vancouver, ISO, etc.
42

ZHU, Yayun, Lin JIANG, Anqi YUAN et Yinghao YUAN. « Security Protection Method of Energy Internet with Android ». Wuhan University Journal of Natural Sciences 27, no 1 (mars 2022) : 11–16. http://dx.doi.org/10.1051/wujns/2022271011.

Texte intégral
Résumé :
As a product of the combination of information and energy technology, the energy internet is enormous and complex, and the absence of security safeguards at any aspect of it can cause incalculable damage. Aiming at the problems that Energy Internet terminals are difficult to be trusted and the integrity of massive terminals cannot be guaranteed, this paper designs and implements a set of comprehensive credibility measures and security protection schemes, isolates various malicious operations, and ensures that the system is always in a credible state. Specifically, we develop a secure TF card control program in the Android terminal application layer to realize the overall security scheme. Experimental results prove that this security protection scheme can effectively detect illegal application packages in energy Internet terminal devices, resist malicious programs, and protect key data from theft at the same time, achieving security protection in the "thing-to-thing" interconnection scenario of the Energy Internet.
Styles APA, Harvard, Vancouver, ISO, etc.
43

M. Radhi, Batool, et Mohammed A. Hussain. « Smart Building Security using ESP32 based AES One Bio-key and Owner's Biometrics Encryption Technology ». 49 49.2, no 2 (30 décembre 2023) : 30–46. http://dx.doi.org/10.56714/bjrs.49.2.4.

Texte intégral
Résumé :
Internet of Things (IoT) connects smart devices to the internet, but it poses significant security challenges. ‘Security measures like access control, authentication, and encryption must be implemented during IoT system development to safeguard sensitive information and ensure secure transmission. Regular security updates, ongoing assessment, and improved measures are necessary to address evolving threats. Data security is crucial for overall IoT system security, given its unique features like perception, transmission, and processing. In this paper, it is suggested using encryption for data sent over Wi-Fi to improve Internet of Things (IoT) security. Advanced Encryption Standard (AES) commonly used encryption standard, and it is the encryption technique employed. AES algorithm uses one bio-key (variable key every minute) to maximize security and the capacity to fend off attacks. It is added the owner's biometric to the bio-key for authentication and security in order to authenticate the system. Our technology stands out with robust encryption and authentication against numerous assaults because the owner's biometrics are encrypted and it is added to the bio-key made up of the minute-by-minute changes to the year, month, day, hour, and minute. The data is encoded in ESP32 and sent to the local server and then stored in a Python language database using the HTTP protocol. The database is hosted on XAMPP, which is a web server package that allows easy database management.
Styles APA, Harvard, Vancouver, ISO, etc.
44

Srhir, Ahmed, Tomader Mazri et Mohammed Benbrahim. « Towards secure smart campus : security requirements, attacks and counter measures ». Indonesian Journal of Electrical Engineering and Computer Science 32, no 2 (1 novembre 2023) : 900. http://dx.doi.org/10.11591/ijeecs.v32.i2.pp900-914.

Texte intégral
Résumé :
<span>The internet of things (IoT) has the potential to significantly impact growth due to the technological revolution, widespread dissemination of information, and emergence of events. Intelligent housing, urban centers, and educational systems are all forms of intelligence. The IoT gs has garnered significant attention from researchers, who claim that this technology will play a pivotal role in determining the future of the Internet, as per the reports of Cisco Inc., in this context, the concept of a smart campus refers to the establishment of a durable and interconnected setting that enhances learning, efficiency, and the overall living experience. Similar to other intelligent environments, the smart campus is susceptible to a variety of risks and threats this situation presents important security-related challenges that have an influence on the advancement of the campus. This article presents an overview of intelligent campuses by emphasizing the primary applications and technologies utilized. It provides an examination and evaluation of the primary security concerns associated with smart campuses, classified based on their respective types and levels of significance, and determines the security requirements, current threats and attacks, and the state of the art in terms of architectural solutions and the prevention of security vulnerabilities.</span>
Styles APA, Harvard, Vancouver, ISO, etc.
45

Kwon, Hyukjin, Youngjoo Shin, Jaeyeong Jeong, Kookjin Kim et Dongkyoo Shin. « Measures to Ensure the Sustainability of Information Systems in the COVID-19 Environment ». Sustainability 15, no 1 (20 décembre 2022) : 35. http://dx.doi.org/10.3390/su15010035.

Texte intégral
Résumé :
National defense requires uninterrupted decision-making, even under direct or indirect impacts of non-traditional threats such as infectious diseases. Since all work utilizes information systems, it is very important to ensure the sustainability and availability of information systems. In particular, in terms of security management, defense work is being performed by dividing the network into a national defense network and a commercial Internet network. This study suggests a work execution plan for sustainability that takes into account the efficiency of work performed on the Internet and the effectiveness of security through effective defense information system operation. It is necessary to minimize the network contact points between the national defense network and the commercial Internet and to select high-priority tasks from various tasks and operate them efficiently. For this purpose, actual cases were investigated for an institution, “Organization A”, and characteristics were presented. Through the targeted tasks and operation plans presented in this paper to improve the effectiveness of defense tasks and ensure security, it will be possible to increase the sustainability and availability of task performance even under non-traditional threats such as infectious diseases.
Styles APA, Harvard, Vancouver, ISO, etc.
46

Thomas, Asha. « Analysis on Cyber Crimes and Preventive Measures ». International Journal for Research in Applied Science and Engineering Technology 11, no 5 (31 mai 2023) : 3738–44. http://dx.doi.org/10.22214/ijraset.2023.52481.

Texte intégral
Résumé :
Abstract: This paper is generally to analyse various cybercrimes and corresponding preventive measures. Cybercrimes refers to criminal activities carried out by means of computer systems or the internet. As Cybercrimes are considered as a great threat in today's world, to the security of nation, to someone's personal data and information, individual security, so there is the need of some basic awareness and security measures, by which people can safeguard themselves from such crime. Cybercrimes are considered as a major risk because they can have devastating effects like financial losses, breaches of sensitive data, failure of systems, and, it can affect an organization's reputation. In this paper, we will discuss more about cybercrimes, and how do they happen. Also, who are Cybercriminals and, the different types of cybercrimes and preventive measures.
Styles APA, Harvard, Vancouver, ISO, etc.
47

Shen, Yang. « Research on Internet Information Security in the Big Data Era ». E3S Web of Conferences 218 (2020) : 04008. http://dx.doi.org/10.1051/e3sconf/202021804008.

Texte intégral
Résumé :
In the era of big data, due to the great influence of big data itself, Internet information security has also become the focus of attention. In order to avoid disturbing people’s lives, this article summarizes the opportunities and challenges in the era of big data based on previous work experience. This article analyzes and studies five aspects including establishing complete laws and regulations, protecting personal information, applying big data technology to public security systems, doing a good job in data management and classification, and ensuring the security of data transmission. The author discusses specific measures for the maintenance of Internet information security in the era of big data from the above five aspects.
Styles APA, Harvard, Vancouver, ISO, etc.
48

Tao, Centong. « Internet Financial Information Security Risk and Prevention in the Age of Artificial Intelligence ». Frontiers in Business, Economics and Management 13, no 3 (6 mars 2024) : 341–44. http://dx.doi.org/10.54097/40w79j67.

Texte intégral
Résumé :
With the progress and development of science and technology, artificial intelligence technology and its convenient, fast, and efficient performance characteristics have been widely applied in various fields, which has brought great changes to the financial industry and unprecedented breakthroughs and development. Although artificial intelligence brings huge development opportunities for the Internet financial industry, it also brings some potential risks and challenges, causing Internet financial information to face severe security risks. How to use artificial intelligence technology to effectively prevent and control financial information security risks is a major problem facing the financial industry. This paper analyzes the security risks of Internet financial information in the era of artificial intelligence and puts forward relevant preventive measures to effectively deal with various security risks, ensure the information security management of financial cloud platforms, and promote the healthy and stable development of the financial industry.
Styles APA, Harvard, Vancouver, ISO, etc.
49

Taji, Khaoula, Badr Elkhalyly, Yassine Taleb Ahmad, Ilyas Ghanimi et Fadoua Ghanimi. « Securing Smart Agriculture : Proposed Hybrid Meta-Model and Certificate-based Cyber Security Approaches ». Data and Metadata 2 (30 décembre 2023) : 155. http://dx.doi.org/10.56294/dm2023155.

Texte intégral
Résumé :
The Internet of Things (IoT) is a decentralized network of physically connected devices that communicate with other systems and devices over the internet. As the number of IoT-based devices continues to grow at an exponential rate, this technology has the potential to improve nearly every aspect of daily life, from smart networks and transportation to home automation and agriculture. However, the absence of adequate security measures on all levels of the IoT poses a significant security risk, with the potential for cyber-attacks and data theft. While scholars have suggested various security measures, there are still gaps that need to be addressed. In this study, we analyzed previous research and proposed metamodels for security, IoT, and machine learning. We then proposed a new IoT-based smart agriculture model with integrated security measures to mitigate cyber- attacks and increase agricultural output. Our model takes into account the unique features of the smart farming domain and offers a framework for securing IoT devices in this specific application area. Moreover, in order to mitigate a range of cyber security attacks across various layers of IoT, we introduced two certificate-based schemes named CBHA and SCKA for smart agriculture. A comparative analysis of their security with existing literature demonstrates their superior robustness against diverse attacks. Additionally, security testing utilizing scyther affirms the resilience and security of both CBHA and SCKA, establishing them as viable options for ensuring security in smart agriculture.
Styles APA, Harvard, Vancouver, ISO, etc.
50

Sun, Yuxuan. « Computer network information security and protection strategies in the era of big data ». Applied and Computational Engineering 4, no 1 (14 juin 2023) : 574–80. http://dx.doi.org/10.54254/2755-2721/4/2023326.

Texte intégral
Résumé :
The Internet has entered the big data era, and as more and more businesses employ big data, cloud computing, the Internet of Things, artificial intelligence, and other technologies, the amount of data on the Internet as a whole has also grown dramatically. While Big Data technology has improved the efficiency of many companies, it has also brought challenges for computer network information security protection technology, including massive data privacy leaks that seriously jeopardize the privacy of Internet users. This paper synthesizes literature review findings proving that computer network information security in the big data era has the characteristics of universality, suddenness, concealment, and intelligence in order to address this issue. It also studies the main network information security technologies, such as network situational awareness, vulnerability scanning, intrusion detection and firewall, and identity authentication. In addition, the paper finds that the current problems of network information security mainly include phishing attacks, computer viruses, ransomware, denial of service attacks, APT attacks and threats from inside the network. Finally, the paper explores a number of protective measures to address existing security issues, including the development of network monitoring and threat intelligence systems, the implementation of access control and authentication technologies, network isolation methods, regular software scanning and updates, and organising internal staff security training. Through this study we are able to fully understand the overall pulse of current computer network information security technology and development trends in the era of Big Data, thus providing a more comprehensive and accurate reference for Big Data-related participants to develop responsive information security protection measures and strategies to provide designation.
Styles APA, Harvard, Vancouver, ISO, etc.
Nous offrons des réductions sur tous les plans premium pour les auteurs dont les œuvres sont incluses dans des sélections littéraires thématiques. Contactez-nous pour obtenir un code promo unique!

Vers la bibliographie