scholarly journals Importance of Cyber Security in Digital Era

Author(s):  
Prof. Ms. Tejaswini Untawale

Abstract: Cyber security acknowledges an enthusiastic job in the space of data innovation. Shielding the data has become a gigantic issue in the current day. The cyber security the primary concern that begins as a top priority is 'digital violations' which are increasing on large scale. Today, network protection is at a critical concern to many. At whatever point we contemplate the network protection the primary thing that rings a bell is 'digital wrongdoings' which are expanding colossally step by step. This paper generally points out on the network protection, cybersecurity and digital psychological warfare. The digital psychological oppression could cause relationship to lose billions of dollars in the area of associations. Keywords: Network, Cyber Security, Digital, Data Security

2015 ◽  
Vol 14 (10) ◽  
pp. 6184-6189
Author(s):  
Himanshu Gupta ◽  
Kapil Chauhan

In today's society, data security is the big problem for every business organization or an individual. Most found threat is theft of personal data and information. With time digital data become more prevalent, personnel try to secure their information by using highly encrypted passwords and authentication identities, but, the misuse and theft of these security measures are rising in lot of theft cases Taking advantage of security flaws in authentication identities ends up in cards being duplicated or counterfeited and hence misused. This increasing fight with cyber security has been the sole reason of  making  biometric security systems, the  important area of concern is that how do  one can implement the biometric security for increasing of data security.  First unique feature which is found different in every human is Fingerprints; Humans have used fingerprints for personal identification. Presently, most of the organisation use  fingerprint recognition for authentication process  it is one of the oldest and most commonly used biometrics, with high accuracy & generally easy and efficient and fast.  In this paper we propose the idea to use fingerprint recognition along with the user authentication password or to access the data or information. Since the only person who can access information is the person linked to it, no thief can gain access. It also makes your data, very hard for cyber criminals to hack into.


Due to the wide application of SCADA systems in national critical infrastructure, their cyber security issues and vulnerabilities have been a primary concern; whereas, the impact and consequences of cyber-attacks to these systems have the potential to result in catastrophic consequences in the physical domain. Therefore, estimating possible attack impacts and identifying system vulnerabilities are major concern in SCADA management and operations. However, it is quite difficult to plan, execute and review vulnerability analysis in critical infrastructure systems as well as in industrial control systems (such as SCADA system) due to its complexity, large-scale and heterogeneity. Consequently, a consistent domain-specific conceptual model is required to establish a generic framework for cyber security analysis to examine and investigate security threats on cyber-physical systems, the role of the entities within the system as well as system operations. The main contribution of this work is to present a multi-facets model to support cyber security analysis practices such as penetration testing, vulnerability assessment and risk analysis. The proposed model presents a common insight among different SCADA configurations, implementations and the employed protocols to handle its complexity, heterogeneous and scale. To demonstrate the usability as a proof of concept and applicability of the proposed model, the paper also presents an example illustrating how the proposed model can be employed to carry out security vulnerability assessment.


Author(s):  
Maria Tereza Sousa Silva ◽  
Erica Louro da Fonseca ◽  
Zulmira Hartz ◽  
Jorge Magalhães

The informational and digital era of big data brings with it the challenge of knowledge management. There is a need for better management, protection, and security of these data, as well as the respective validation. It is imperative to develop new technologies for data security and their respective implementation in any organizations. In this way, this chapter presents a blueprint in a pharmaceutical industry with the aim at proposing a risk analysis of digital data use during quality control. It is worth mentioning the age of knowledge, the intellectual capital plays an important role in economics and business. A key to competitiveness and, therefore, to economic development in technology runs through a robust process that demonstrates perpetual security for its digital transformation and the respective control in a process ensured by quality assurance. Thus, this implies that time and human resources in organizations are not infinite.


Author(s):  
Juveriya Afreen

Abstract-- With increase in complexity of data, security, it is difficult for the individuals to prevent the offence. Thus, by using any automation or software it’s not possible by only using huge fixed algorithms to overcome this. Thus, we need to look for something which is robust and feasible enough. Hence AI plays an epitome role to defense such violations. In this paper we basically look how human reasoning along with AI can be applied to uplift cyber security.


2017 ◽  
Vol 2 (3) ◽  
pp. 1
Author(s):  
Hanane Bennasar ◽  
Mohammad Essaaidi ◽  
Ahmed Bendahmane ◽  
Jalel Benothmane

Cloud computing cyber security is a subject that has been in top flight for a long period and even in near future. However, cloud computing permit to stock up a huge number of data in the cloud stockage, and allow the user to pay per utilization from anywhere via any terminal equipment. Among the major issues related to Cloud Computing security, we can mention data security, denial of service attacks, confidentiality, availability, and data integrity. This paper is dedicated to a taxonomic classification study of cloud computing cyber-security. With the main objective to identify the main challenges and issues in this field, the different approaches and solutions proposed to address them and the open problems that need to be addressed.


Energies ◽  
2021 ◽  
Vol 14 (10) ◽  
pp. 2772
Author(s):  
Vishwas Powar ◽  
Rajendra Singh

Plummeting reserves and increasing demand of freshwater resources have culminated into a global water crisis. Desalination is a potential solution to mitigate the freshwater shortage. However, the process of desalination is expensive and energy-intensive. Due to the water-energy-climate nexus, there is an urgent need to provide sustainable low-cost electrical power for desalination that has the lowest impact on climate and related ecosystem challenges. For a large-scale reverse osmosis desalination plant, we have proposed the design and analysis of a photovoltaics and battery-based stand-alone direct current power network. The design methodology focusses on appropriate sizing, optimum tilt and temperature compensation techniques based on 10 years of irradiation data for the Carlsbad Desalination Plant in California, USA. A decision-tree approach is employed for ensuring hourly load-generation balance. The power flow analysis evaluates self-sufficient generation even during cloud cover contingencies. The primary goal of the proposed system is to maximize the utilization of generated photovoltaic power and battery energy storage with minimal conversions and transmission losses. The direct current based topology includes high-voltage transmission, on-the-spot local inversion, situational awareness and cyber security features. Lastly, economic feasibility of the proposed system is carried out for a plant lifetime of 30 years. The variable effect of utility-scale battery storage costs for 16–18 h of operation is studied. Our results show that the proposed design will provide low electricity costs ranging from 3.79 to 6.43 ¢/kWh depending on the debt rate. Without employing the concept of baseload electric power, photovoltaics and battery-based direct current power networks for large-scale desalination plants can achieve tremendous energy savings and cost reduction with negligible carbon footprint, thereby providing affordable water for all.


2019 ◽  
Vol 2 ◽  
pp. 1-8
Author(s):  
Chih-Wei Chen ◽  
Ching-Yi Lin ◽  
Chine-Hung Tung ◽  
Hsiung-Ming Liao ◽  
Jr-Jie Jang ◽  
...  

<p><strong>Abstract.</strong> Since UN announced 17 SDGs in 2015, many countries around the world have been endeavouring to promote SDGs towards building a sustainable future. Given the disparity of the regional development, national government is suggested to establish localised sustainable vision. Drawing on UN SDGs with targets and corresponding indicators, meanwhile considering local circumstances and sustainable vision, government further seeks to establish localised SDGs with related targets and indicators. Meanwhile, under the digital era, digital technologies have been extensively employed as the smart tool in many fields nowadays, and Geographic Information System (GIS) has been developed as the platform to visualise the SDGs progress in UN and many countries. On the above basis, this paper further demonstrates Taiwan’s efforts to establish localised SDGs, and develop National Geographic Information System (NGIS) to implement the sustainable development in Taiwan, monitor the SDGs progress, and provide feedback to policymakers to further make strategic policies in a top-down approach, meanwhile develop Community Geographic Information System (CGIS) to encourage stakeholders and citizens to harness the concept of CGIS to proactively create and tell their own stories and promote Regional Revitalisation policy in a bottom-up approach. Moreover, GIS could not function well without appropriate data management including massive data and open data policy, well-built digital infrastructure, as well as the selected “right data” and cyber security. Hence, with appropriate data management, GIS as a smart tool could facilitate the promotion and implementation of SDGs in an intuitive manner towards shaping a smart and sustainable future.</p>


2020 ◽  
Vol 11 (2) ◽  
pp. 161-170
Author(s):  
Rochman Hadi Mustofa

AbstractBig Data has become a significant concern of the world, along with the era of digital transformation. However, there are still many young people, especially in developing countries, who are not yet aware of the security of their big data, especially personal data. Misuse of information from big data often results in violations of privacy, security, and cybercrime. This study aims to determine how aware of the younger generation of security and privacy of their big data. Data were collected qualitatively by interviews and focus group discussions (FGD) from. Respondents were undergraduate students who used social media and financial technology applications such as online shopping, digital payments, digital wallet and hotel/transportation booking applications. The results showed that students were not aware enough and understood the security or privacy of their digital data, and some respondents even gave personal data to potentially scam sites. Most students are not careful in providing big data information because they are not aware of the risks behind it, socialization is needed in the future as a step to prevent potential data theft.


E-Management ◽  
2020 ◽  
Vol 3 (1) ◽  
pp. 68-74
Author(s):  
Ya. V. Miller

In the last decade unprecedented technological changes have taken place, resulting in the emergence of a fundamentally new economic model. Based on the widespread spread of smartphones, the world has become more “connected”. The digitalization of demand and supply contributed to the creation of entirely new digital markets managed by platform enterprises based on an open business model, that enabled external consumers and producers to connect and interact with each other. A more interconnected world generates vast amounts of data, allowing platform companies to invest in machine learning and artificial intelligence and ultimately improve their efficiency. Finally, a steady digitalization of business processes, markets and global value chains is observed. In these circumstances, approaches to value addition are fundamentally changing in the context of new dimensions of the digital economy, the analysis of which was the purpose of our study. It has been identified, that in the absence of a standardized international methodology for measuring the digital economy, the latter is so far possible on disparate development-left and national statistics. Initiatives taken at the international level to overcome national differential approaches are still insufficient, as there is a lack of statistics and variables related to digital data. It has been revealed, that the lack of quality statistics on key indicators of the digital economy makes it difficult to assess the value added in the world economy scale and international comparisons. Much of the challenges of measuring value added in the digital economy, as shown in the article, are related to the principle of “scale without mass,” the intangible nature of capital, the intense growth of large-scale cross-border data flows, and the emergence of new sources of value creation.


Sign in / Sign up

Export Citation Format

Share Document