scholarly journals Numerical Modeling of A New Virtual Trajectory Password Architecture

2021 ◽  
Vol 2068 (1) ◽  
pp. 012013
Author(s):  
Yuanyuan Chen ◽  
Jing Chen ◽  
Mingzhu Li

Abstract With the development of digital technology, Computer technology, communication technology and multimedia technology gradually infiltrate into each other and become the main core of information technology. In information technology, digital, text, graphics, images, sound, video, animation and other information carriers are spread through computers and the Internet. Due to the openness, sharing, dynamic and other characteristics of the Internet, information security is threatened and interfered. Information security has become a strategic issue that people must pay attention to, which is related to social stability, economic development and national security. This paper studies a new kind of virtual track cryptography, which breaks through the traditional character memory method and transforms it into memory graphics by using mathematical modeling, and changes the surface memory method from memorizing numbers and characters to memorizing trajectory graphics, so as to make the traditional process of people memorizing passwords easier.

2008 ◽  
pp. 3542-3549
Author(s):  
Paul Benjamin Lowry ◽  
Jackson Stephens ◽  
Aaron Moyes ◽  
Sean Wilson ◽  
Mark Mitchell

The need for increased security management in organizations has never been greater. With increasing globalization and the spread of the Internet, information-technology (IT) related risks have multiplied, including identity theft, fraudulent transactions, privacy violations, lack of authentication, redirection and spoofing, data sniffing and interception, false identities, and fraud.


Author(s):  
Paul Benjamin Lowry ◽  
Jackson Stephens ◽  
Aaron Moyes ◽  
Sean Wilson ◽  
Mark Mitchell

The need for increased security management in organizations has never been greater. With increasing globalization and the spread of the Internet, information-technology (IT) related risks have multiplied, including identity theft, fraudulent transactions, privacy violations, lack of authentication, redirection and spoofing, data sniffing and interception, false identities, and fraud.


2009 ◽  
pp. 1729-1735
Author(s):  
Myungsook Klassen ◽  
Russell Stockard

The issue of the underrepresentation of women in the information technology workforce has been the subject of a number of studies and the gender gap was an issue when the digital divide dominated discourse about women’s and minority groups’ use of the Internet However, a broader view is needed. That perspective would include the relation of women and IT in the communities in which they live as well as the larger society. The information society that has emerged includes the United States and the globalized economy of which it is an integral part. Women and minorities such as African Americans and Latinos are underrepresented in computer science (CS) and other information technology positions in the United States. In addition, while they areno longer numerically underrepresented in access to computers and the Internet – as of 2000, (Gorski, 2001) - they continue to enjoy fewer benefits available through the medium than white boys and men. The following article explores the diversity within women from the perspectives of race, ethnicity and social class in North America, mainly United States. The technology gender and racial gap persists in education and in the IT workforce. A broader and deeper look at women’s position in relation to the increasingly techno-centric society reveals that women may have reached equality in access, but not equity in academic study and job opportunities.


2013 ◽  
Vol 4 (2) ◽  
pp. 9-18
Author(s):  
Mohd Faiz Hilmi ◽  
Shahrier Pawanchik ◽  
Yanti Mustapha ◽  
Hafizi Muhamad Ali

The advancement of information technology has changed the education landscape. The process of teaching is no longer the same. Information technology has made e-learning possible and available on a large scale. The main component of an e-learning is a learning management system (LMS). LMS has been widely used and are accessible through the Internet. By connected and accessed to the Internet, LMS are exposed to various threats. Proper understanding of these threats combined with strategy and best practices countermeasures will ensure a safe learning environment. Therefore this study will look into the information security aspect of LMS. There are two main purpose of this study. First, this study provides a review of information security in e-learning environments and explains the important of information security. Confidentiality, integrity and availability are considered to be the primary pillars of information security. In addition to these pillars, the International Information Systems Security Certification Consortium introduced a common body of knowledge (CBK) comprised of ten domains relating to specific information security topics. These domains are the foundation of security practices for those involved in information security. In this article, each of these is explained within an e-learning context. It is recommended that institutions employing e-learning adhere to these domains. By applying the principles and practices associated with each domain, e-learning institutions should be able to provide an e-learning system with high confidentiality, integrity and availability. The second purpose of this study is to understand student perception of an information security perspective of an e-learning management system. To achieve this purpose, a survey was conducted targeted at undergraduate students in a distance learning program. 497 students responded to a survey questionnaires. Apart from demographics information, the survey asked the respondent to rate six statements related to how they perceived security of the learning management system which they are currently using. All six statements are rated using a five point Likert scale anchored at 1 (Not at all) to 5 (Very much). Frequencies analysis was conducted to show the profile of the respondent. Overall, respondent has strong positive perceptions towards security of their LMS. This study provides an overall picture of information security elements of a learning management system. It can serve as an introduction which help LMS administrator to understand the issues and possibilities related to the safety of LMS.


2019 ◽  
Vol 265 ◽  
pp. 07014
Author(s):  
Alexander Shiler ◽  
Elizaveta Stepanova

At present, the Internet market of things is constantly expanding; it has covered almost all the most important areas: transport, housing and communal services, industry, agriculture, telecommunications and information technology. In connection with the constant increase in the number of attacks on IoT-devices, the issue of standardization of this technology is quite acute. The features of the of existing solutions and the new proposed Russian NB-Fi standard for IoT are presented in this article from the point of view of information security.


2014 ◽  
Vol 635-637 ◽  
pp. 1628-1631
Author(s):  
Li Juan Zhuang

In the context of the rapid development of Internet technology, information security is particularly important, especially at present there is growing incidence of attack targeting at the host and a variety of attacking means, which does a lot of harm. To do preventive work well is to figure out what risks threatening the host and formulate timely and effective measures to protect the host.The first computer in the world came out in 1946 in the USA. With the birth of this computer, the computer technology of humankind has made spectacular development for more than the last half century and penetrated into all aspects of our lives till today. Compared with traditional means of communication, the Internet has greatly facilitated our lives, which led to the growing dependence on the Internet as well. While technology is a double-edged sword, the Internet information security is also very acute problem, which greatly troubles people’s work and life. As the most fundamental part of a computer system, the host security problem draws people’s attention in particular.


Author(s):  
I Ketut Sudaryana ◽  
Hadi Sanjaya ◽  
Ricky Tjong

The development of this age in the world is characterized by information technology. For a long time, humans can not be separated from technology. The development of Internet information technology effected the creation of the internet. The Internet sends people to communicate and search for information about anyone. How to find existing information is to open websites that exist on the internet. Website is a system where information in the form of text, images, sound, and others are presented in hypertext form. One of the websites that contain information is Versaillus. Versaillus is a website that contains information about a game called Mobile Legends and the manifold of Versaillus is a wiki’s site, but the website is not crowded by people. Therefore, the author will researching the site versaillus by using PIECES method. The results of this study can change the site versaillus to be better and better from PIECES method.


2014 ◽  
Vol 513-517 ◽  
pp. 742-749
Author(s):  
Patricia Ghann ◽  
Chang Da Wang ◽  
Cong Hua Zhou

Computer and information technology has evaded our every aspect of life. Information technology is seen in all aspect of the individual from banking and investing to shopping and communicating through the use of the internet services such as emails and chat rooms. Organizations and industries also utilize computer and information technology to collect information on individuals leading to the creation of warehouse of databases that enable them to achieve their objectives. In a distributed network environment today, information security is a very important issue in ensuring a safe computing environment.


2017 ◽  
Vol 2 (4) ◽  
Author(s):  
Chu Ba Quyet ◽  
Hoang Cao Cuong

E-Commerce is the purchase and sale of goods, services and exchange of information based on communications networks and the Internet. Information, information systems, computers, computer networks, and other electronic means play an especially important role. These objects are valuable assets and targeted attacks by cybercriminals. E-commerce risk management is to protect the development of e-commerce. It includes setting information security objectives, assessing vulnerabilities, threats and attacks, and selecting countermeasures. The paper presents the theory of e-commerce risk management, analysing the Vietnam Airlines e-commerce risk management case, using the DREAD model. The paper provides the discussions and short recommendations to other enterprises in e-commerce risk management nowadays.


Sign in / Sign up

Export Citation Format

Share Document