scholarly journals Cyber Insurance

The Information Technology is an essential discipline in our daily activities. We use our mobile phones often to communicate with our loved ones, research over the internet, and much more. Organizations and institutions today solely rely on computers configured over networks in their daily operations. Organizations prefer having their information backed up on virtual servers referred to as cloud computing. Cloud computing is among the safest measures to information security. We often share information either directly using storage media or over the internet. Information shared or stored over the internet is prone to attacks referred to as cyberattacks. Cyberattacks can result in total impairment of an organization’s data, blockage of part or the whole information in the form of a trojan. At this point, the attacker demands payment before they grant you access to your information. Cyberattacks have thus resulted in organizations encrypting their information. However, despite the use of advanced encryption technique, cyber attackers have gone beyond this level of technology to hack into the data by gaining access to the decryption key. Researchers have thus come up with cyber insurance, which offers security to organizations’ and businesses’ information. Cyber insurance uses high-level algorithms that are difficult for the attackers to understand. It minimizes cases of information compromisation.

Author(s):  
Eter Basar ◽  
Ankur Pan Saikia ◽  
L. P. Saikia

Data Technology industry has been utilizing the customary social databases for around 40 years. Be that as it may, in the latest years, there was a generous transformation in the IT business as far as business applications. Remain solitary applications have been supplanted with electronic applications, conferred servers with different proper servers and committed stockpiling with framework stockpiling. Lower expense, adaptability, the model of pay-as-you-go are the fundamental reasons, which caused the conveyed processing are transformed into reality. This is a standout amongst the hugest upsets in Information Technology, after the development of the Internet. Cloud databases, Big Table, Sherpa, and SimpleDB are getting the opportunity to be more natural to groups. They featured the hindrances of current social databases as far as convenience, adaptability, and provisioning. Cloud databases are basically utilized for data raised applications, for example, stockpiling and mining of gigantic information or business information. These applications are adaptable and multipurpose in nature. Various esteem based data organization applications, such as managing an account, online reservation, e-exchange and stock organization, and so on are delivered. Databases with the help of these sorts of uses need to incorporate four essential highlights: Atomicity, Consistency, Isolation, and Durability (ACID), in spite of the fact that utilizing these databases isn't basic for utilizing as a part of the cloud. The objective of this paper is to discover the points of interest and disservices of databases generally utilized in cloud frameworks and to survey the difficulties in creating cloud databases


2018 ◽  
Vol 8 (1) ◽  
pp. 1
Author(s):  
Ikka Puspitasari

<p>Perkembangan teknologi informasi yang sangat pesat telah mempengaruhi seluruh aspek kehidupan termasuk aspek hukum yang berlaku. Kemajuan teknologi informasi tersebut antara lain ditandai dengan maraknya penggunaan media elektronik mulai dari penggunaan handphone hingga komputer yang semakin canggih. Internet yang berkembang demikian pesat sebagai kultur masyarakat modern, karena melalui internet berbagai aktivitas di dunia maya seperti berpikir, berkreasi, dan bertindak dapat diekspresikan didalamnya, kapanpun dan dimanapun. Tidak dapat dipungkiri bahwa kemajuan teknologi dan pengetahuan ini juga berdampak pada berkembangnya tindak kejahatan. Pelaku kejahatan tidak mengenal tempat atau dengan cara apapun selama bisa dijadikan tempat melakukan kejahatan. Kejahatan yang terjadi di dalam Internet dikenal dengan istilah Cyber Crime (kejahatan dalam dunia maya).</p><p><em>The development of rapid information technology has affected all aspects of life including law aspects. Information technology advances, among others, is marked by the rampant use of electronic media ranging from the use of mobile phones to increasingly sophisticated computer.</em> <em>The Internet is growing so rapidly as modern society culture, because through various internet activity on cyber as thinking, creating, and act can be expressed therein, whenever and wherever. It is undeniable that techonology and knowledge also have an impact on the rise of crime. The perpetrator of any crime does not know the place or in any way as long as it can be used as a place of crime. Crimes that occur in the Internet known as Cyber Crime (crime in cyberspace).</em><em></em></p>


2015 ◽  
pp. 782-807
Author(s):  
Yushi Shen ◽  
Yale Li ◽  
Ling Wu ◽  
Shaofeng Liu ◽  
Qian Wen

Cloud-era Information Technology (IT) contains three main themes: The information hub (cloud), network communications (pipes), and intelligent terminals. In this chapter, the developmental stages of these three main components of cloud computing are discussed, with emphasis on future development. The Internet of things is also examined, which is expected to thrive as a direct result of the development of cloud computing.


Author(s):  
Hicham Amellal ◽  
Abdelmajid Meslouhi ◽  
Abderahim El Allati ◽  
Annas El Haddadi

With the advancement of communication and information technology, the internet has become used as a platform for computing and not only a way of communications networks. Accordingly, the large spread of cloud computing led to the emergence of different privacy implications and data security complexities. In order to enhance data security in the cloud, the authors propose in this chapter the use of an encryption box, which includes different cryptosystems. In fact, this step gives the user the opportunities to encrypt data with an unknown algorithm and makes a private key before the storage of data in the host company servers. Moreover, to manage the encryption database, the authors propose a quantum approach in search based on Grover's algorithm.


2012 ◽  
pp. 1609-1620
Author(s):  
Anette Weisbecker

Cloud Computing has become the predominant paradigm in information technology for the use of distributed resources. It enables the Internet of Services where different provider offer services and compose services to new value added services. For the emerging service value chains the quality the services plays an important role. Therefore, beside software engineering methods aspects like quality of services, business models, and the interaction with the customer have to be considered during the development of cloud services. This chapter describes how these aspects can be integrated in the development process by combining software and service engineering methods and considering quality as a critical success factor in the design time.


Author(s):  
N. Raghavendra Rao

Information technology has advanced by delivering an exponential increase in computing power. Telecommunication technology has likewise advanced communicating capabilities. Convergence of these two technologies has become possible due to the rapid advancements made in the respective technology. This convergence is termed as information and communication technology as a discipline. Many concepts are emerging in this discipline. These concepts enable business, government, and human beings to reach new realities in their required activities. Some of these concepts have created various opportunities for designing and manufacturing electronic devices. When these devices are connected to other devices and systems over the internet, this is now known as internet of things (IoT). This chapter gives a brief overview of the concepts such as cloud computing and ubiquitous and pervasive computing in the context of internet of things. Further, this chapter discusses five case illustrations with the relevance of internet of things.


Author(s):  
Maskur .

The development of popular culture, particularly, in the development of information technology such as as television, mobile phones, and the Internet, have an impact on the creation of a new reality called hyper-reality. Media, in this case, is able to reconstruct a new reality through the sophisticated technology. The construction of this medium also penetrates the religious area. This can be seen in the figure of Abdullah Gymnastiar (Aa Gym). Through the medium of information, Aa Gym is not only seen as a religious teacher who offers a depth of spirituality but also as a celebrity through the image formed. This paper aims to identify and describe the phenomenon of celebrity cleric/ ustadz Abdullah Gymnastiar in popular culture, using hyper-semiotics approach of Yasraf Amir Piliang. This paper attempts to explain the new reality of diversity of Abdullah Gymnastiar. Through the hyper-semiotics approach, religious hyper-reality form can be described scientifically.


Author(s):  
Pravin S. Rotkar ◽  
Gayatri Butey

Cloud computing is one of the newest developments in the area of information technology. Cloud computing has developed in recent years from a theoretical term into practical implementations in various industries, such as Healthcare and telecommunications. In order to manage customer data and software, Cloud Computing uses the Internet and remote servers. It offers consumers and companies permission to use software without download to access their personal accounts, data and information with the aid of the internet in every corner of the globe. There are numerous types of software programs operating in cloud computing environments. One of the main cloud computing offerings is e-Commerce. In small and medium-sized businesses, e-commerce needs better facilities to accommodate them. In this study, we examined how cloud computing influences e-commerce businesses. Except that, in the cloud computing era, it studied the driving factors that contributed to improvements in e-commerce. In this article, the cloud computing-based e-commerce application model manages the issue of e-commerce and resource scarcity by developing the cloud computing-based e-commerce application paradigm and how cloud computing affects e-commerce services and applications.


Author(s):  
I Ketut Sudaryana ◽  
Hadi Sanjaya ◽  
Ricky Tjong

The development of this age in the world is characterized by information technology. For a long time, humans can not be separated from technology. The development of Internet information technology effected the creation of the internet. The Internet sends people to communicate and search for information about anyone. How to find existing information is to open websites that exist on the internet. Website is a system where information in the form of text, images, sound, and others are presented in hypertext form. One of the websites that contain information is Versaillus. Versaillus is a website that contains information about a game called Mobile Legends and the manifold of Versaillus is a wiki’s site, but the website is not crowded by people. Therefore, the author will researching the site versaillus by using PIECES method. The results of this study can change the site versaillus to be better and better from PIECES method.


2016 ◽  
pp. 1675-1693
Author(s):  
Osvaldo Ferreira ◽  
Fernando Moreira

The Information Technology (IT) has suffered many advances in recent years due to the development of new hardware and software solutions. These major changes have been noted in recent times in how we interact with applications and services in IT. Cloud computing provides services and applications over the Internet with the promise of infinite capacity and service models of “pay-as-you-go”. In this chapter we describe the main characteristics of Cloud computing, future expectations and analyzes the state of knowledge and implementation in Portuguese companies.


Sign in / Sign up

Export Citation Format

Share Document