A Novel Study of Preventing the Cyber Security Threats

Authors

  • Hussein Hasan Jasim RABAH
  • Asst.Prof.Dr. Sefer Kurnaz Electrical and Computer Engineering,Altinbas university , Istanbul , Turkey.

Keywords:

security, cybercrime, cyber ethics, social media, cloud computing, android apps.

Abstract

Cybersecurity is critical in the field of information technology. Securing information has become one of today's most difficult challenges. When we think of cyber security, the first thing that comes to mind is cybercrime, which is increasing at an alarming rate. Various governments and businesses are taking numerous steps to combat cybercrime. Aside from various measures, many people are still concerned about cyber security. This thesis mainly focuses on challenges faced by cyber security on the latest technologies. It also focuses on latest about the cyber security techniques, ethics and the trends changing the face of cyber security.

References

M. A. Al-Fayoumi and A. Al-Hamdani, "A Novel Framework for Enhancing Security in Cloud Computing," IEEE Access, vol. 9, pp. 30970-30987, 2021.

T. O. Abatan and A. A. Yusuf, "An Improved CBC Mode for DES Encryption Algorithm," International Journal of Emerging Trends in Engineering Research, vol. 7, no. 5, pp. 368-372, 2019.

J. P. Baugh, "MATLAB as an Educational Tool for Cyber Security," in Proceedings of the 2019 IEEE Global Engineering Education Conference (EDUCON), Dubai, United Arab Emirates, 2019, pp. 1314-1319.

S. W. Emam and A. H. Abdullah, "MATLAB Based System for Network Security in Education Sector," in Proceedings of the 2019 2nd International Conference on Electrical, Communication, and Computer Engineering (ICECCE), Baghdad, Iraq, 2019, pp. 152-156.

T. A. Ahmed, A. S. K. Pathan, and S. A. Khayyat, "A Comprehensive Review of Cybersecurity Frameworks," Journal of Cyber Security Technology, vol. 5, no. 2, pp. 109-139, 2021.

H. Alizadeh and A. Fattahi, "A new efficient method for determining the DES key," International Journal of Network Security, vol. 22, no. 5, pp. 847-853, 2020.

Y. Zhang, W. Liu, and D. Qian, "A novel image encryption algorithm based on DES and LFSR," Journal of Visual Communication and Image Representation, vol. 78, pp. 102830, 2021.

F. D'Ambrosio, M. Donadio, and F. Palmieri, "Implementation of a Security Framework for Industrial Control Systems," IEEE Access, vol. 8, pp. 169443-169459, 2020.

S. Bhati and R. Kumar, "A Comprehensive Analysis of Cyber Security Frameworks," in Proceedings of the 2020 5th International Conference on Computing, Communication and Security (ICCCS), Greater Noida, India, 2020, pp. 1-6.

F. Kurniawan, I. Widya, and D. Nurcahyo, "Implementing Elliptic Curve Cryptography for Securing Communication System in Wireless Sensor Network," in Proceedings of the 2019 International Seminar on Application for Technology of Information and Communication (iSemantic), Padang, Indonesia, 2019, pp. 45-49.

M. R. Ismail and M. J. Uddin, "A Comparative Study of Cyber Security Frameworks," in Proceedings of the 2019 4th International Conference on Electrical and Electronic Engineering (ICEEE), Rajshahi, Bangladesh, 2019, pp. 1-5.

M. G. Haque and A. N. M. Jahidul Islam, "An Improved Cipher Block Chaining Mode for Advanced Encryption Standard," Journal of Information Security, vol. 10, no. 4, pp. 245-261, 2019.

S. S. Al-Sabbagh and A. Al-Taee, "An Efficient Encryption Algorithm Using Matrix Key Generator

hang, Y., Zhao, X., Liu, Y., & Li, B. (2020). A Comprehensive Survey on Internet of Things Security. IEEE Access, 8, 44621-44642.

Kshetri, N. (2018). Blockchain’s roles in meeting key supply chain management objectives. International Journal of Information Management, 39, 80-89.

Jindal, A., Verma, S., & Kumar, S. (2021). Mitigating DDoS Attacks in Cloud Computing: A Review. Computer Networks, 195, 108025.

Chowdhury, M. S. H., Mahmud, S. A., & Zulkernine, M. (2018). Intrusion Detection System: A Comprehensive Review. Journal of Network and Computer Applications, 107, 42-57.

Yang, C., Wen, Q., & Wu, M. (2019). A Comprehensive Survey of Blockchain: From Theory to IoT Applications. IEEE Internet of Things Journal, 6(6), 10820-10836.

Kaur, M., & Singh, J. (2021). A Comprehensive Review of Security Challenges in 5G Networks. Journal of Ambient Intelligence and Humanized Computing, 1-17.

Berta, I., Carboni, D., Mureddu, F., Pani, D., & Tuveri, V. (2020). Protecting Critical Infrastructures Against Cyber Attacks: An Overview of Industry 4.0 Security Challenges. Journal of Ambient Intelligence and Humanized Computing, 11(5), 1805-1824.

Bayoumi, M., Abdalla, A., Al-Qutaish, R., & El-Khodary, A. (2020). Internet of Things (IoT) Security: Current Status, Challenges and Countermeasures. Computers & Electrical Engineering, 84, 106654.

Hu, C., & Xu, K. (2019). Cybersecurity in the Era of Industrial Internet of Things. IEEE Transactions on Industrial Informatics, 15(1), 500-508.

Downloads

Published

2023-07-06

How to Cite

Hussein Hasan Jasim RABAH, & Asst.Prof.Dr. Sefer Kurnaz. (2023). A Novel Study of Preventing the Cyber Security Threats. International Journal of Scientific Trends, 2(7), 45–59. Retrieved from https://scientifictrends.org/index.php/ijst/article/view/113

Issue

Section

Articles