An Innovation of Teaching Information Security: A Lightweight Browser Plug-In for Detecting the Spoofed E-mail

Author(s):  
Alya Geogiana Buja ◽  
MohdTaufik Mishan ◽  
Mohd Syafiq Zolkeply ◽  
Illiasaak Ahmad ◽  
Siti NorfazlinaYusoff ◽  
...  
Author(s):  
Виолетта Богданова

The stages of a pedagogical experiment on teaching information security of future economists are presented from a cybernetic informational perspective. The experimental results were statistically processed, evaluated using the nonparametric Mann-Whitney test and the φ *criterion - Fisher's angular transformation.


Author(s):  
Maulik Desai ◽  
Swati Jaiswal

Mobile devices have upgraded from normal java-based phones whose basic functionality was calling, messaging, and storing contact information to a more adaptive operating system like Symbian, iOS, and Android, which have smart features like e-mail, audio player, camera, etc. Gradually, everyone started relying more and more on these mobile devices. This led to an increase in the number of cell phone hackers. Common ways that a hacker gets access to your phone is via phishing, shoulder surfing, piggybacking, etc. There are countermeasures to this like bookmarking your most visited sites, using VPN, using encryption algorithms. Data theft and identity theft are a new concern for today's user; this chapter is to educate the end user of different ways in which their privacy can be invaded via a mobile phone. This chapter will help the researchers to know the mindset of a cell phone hacker and what are the potential damages that can be caused by them and strategies to prevent them.


IEEE Access ◽  
2019 ◽  
Vol 7 ◽  
pp. 169293-169305
Author(s):  
Mahmoud Mostafa ◽  
Osama S. Faragallah

2019 ◽  
Vol 40 (4) ◽  
pp. 169-182
Author(s):  
Mikhail I. Bocharov ◽  
◽  
Irina V. Simonova ◽  
Maxim S. Mogarov ◽  
◽  
...  

Sign in / Sign up

Export Citation Format

Share Document