scholarly journals The Two Newly Proposed Hybrid Approach Based Conscientious Algorithmic Models for Encryption Mechanisms and its Application in Information Security Systems

Author(s):  
Shivankur Thapliyal ◽  
Renu Bahuguna

Cyber and Information Security are one of the most concernable and challenging issues of today’s strengthen Information age. Cyber attackers and Cyber intruders performs and accomplished a very highly powerful and potential Cyber threat in our most sensitive Cyber Space and threaten our Cyber Security. So the need of the hour is that we have some robust and vigorous Cyber Security algorithms which protects our Cyber Space against these cyber Intruders or Cyber Criminals. Because many algorithms, which are currently runs to protect Cyber Space and responsible for potential data encryption and decryption mechanisms during sensitive transactions of data are worked very slow in manner and consume a large size of memory bandwidth and contains a very expensive computational cost and as the technological advancements in our Cyber Space, Cyber Intruder and Cyber Criminal achieved a very high skills mechanisms to breach the securities bridge of that algorithms, and some algorithms which contains a very typical and complex structure taking a lot of time to perform the mechanisms of desired security tasks and very costly rich for computations. So we design two Cyber Security algorithms models, which also contains a very complex and typical structure but never consume a lot of computation power and as well as memory and also contains a least cost for performing computations, these both two algorithms are a fusion of multiple ciphers and some control mechanisms, which are technically very strong as well as redirect to optimality. Randomization are the main theme point of first algorithm that’s why for Cyber Intruders and Cyber Criminals are very hard to find the actual pattern of data or to accomplished any Cyber Attacks. The detailed mechanisms of these algorithms are covers in the next upcoming sections of this research paper.

Author(s):  
E. V. Batueva

The development of ICT and the formation of the global information space changed the agenda of national and international security. Such key characteristics of cyberspace as openness, accessibility, anonymity, and identification complexity determined the rise of actors in cyber space and increased the level of cyber threats. Based on the analyses of the U.S. agencies' approach, the author defines three major groups of threats: use of ICT by states, criminals and terrorists. This concept is shared by the majority of the countries involved in the international dialogue on information security issues and is fundamental for providing cyber security policy on both national and international levels. The United States is developing a complex strategy for cyber space that includes maximization of ICT's advantages in all strategically important fields as well as improvement of national information systems and networks security. On the international level the main task for the American diplomacy is to guarantee the U.S. information dominance. The United States is the only country that takes part practically in all international and regional fora dealing with cyber security issues. However process of the development of a global cyber security regime is not going to be fast due to countries' different approaches to key definitions and lack of joint understanding of cyber security issues as well as due to the position of the countries, among all the United States, that are not interested in any new obligatory international norms and principles. Such American policy aims at saving the possibility of using cyberspace capacity in reaching political and military goals, thus keeping the global leadership.


2018 ◽  
Vol 3 (2) ◽  
pp. 248
Author(s):  
Azernikov A. D. ◽  
Norkina A. N. ◽  
Myseva E. R. ◽  
Chicherov K. A.

So far, development and enhancement of global communication networks, distribution of software, and upgrading of computer systems are accompanied by the evolution of criminal environment, with the latter evolving not only within one particular nation but throughout the international community. New opportunities in cyber crime translate into new threats for global information networks and community as a whole, which in terms of preventing and combating cyber crime requires substantial strengthening of information security measures and an approach that is completely different from that applied to combating common crime. The article presents innovative technologies in combating cyber crime and an ever-increasing significance of information security as a system of protecting private, public and state interests. Keywords: cyber crime, cyber security, Internet, information security, innovative technologies, computer systems, information technologies (IT), cyber threats, cyber space.


Author(s):  
Pavlo Katerynchuk

Cyber security and cyber space of Ukraine remained for a long time out of the attention of domestic researchers and, therefore, civil servants. For more than 20 years, the young Ukrainian state did not waste its efforts on the formation of not only effective and reliable troops, but also information security. The government did not endeavored to strengthen the country’s defense, and only weakened its lack of progress in fighting corruption and the dominance of Russian media and intelligence. As a result, in the spring of 2014, after a long confrontation between the regime of Viktor Yanukovych and the citizens of Ukraine, Russia failed to conduct special operations with the aim of annexing the Crimea and facilitate the war in Donbas. Not the least role in this played a raid for information and factors cyber Russian hackers for the purpose of paralyzing government agencies and influence on public opinion in Ukraine through Russian-controlled media. As a result of prolonged and massive cyber attacks, Ukrainian state structures, the banking system, industrial facilities and private business suffered significant material and reputational losses. At the same time in Ukraine began to realize the seriousness of cyber security as a component of national security and contribute to creating cyber police, national cyber security strategy, acceptance of a number of regulations on cyber security, strengthening public defense for the protection of domestic cyber space. At the moment, Ukraine is on the way to rethinking the role of cyber security and the formation of a national system of protection against cyber threats.


2021 ◽  
Vol 3 (11) ◽  
pp. 6-15
Author(s):  
Valerii Lakhno ◽  
Berik Akhmetov ◽  
Borys Husiev ◽  
Andrii Blozva ◽  
Dmytro Kasatkin ◽  
...  

It is shown that the application of multi-step quality games theory allows financing of various information technologies considering various factors. In particular, there are lots of approaches to building effective information security systems in the enterprise. Using such model will make it possible to develop, based on game models, decision support systems (DSS), for example, software products (PP). Which, in turn, will allow making rational decisions on investing in the development of such technologies. This circumstance makes it necessary and relevant to develop new models and software products that can implement decision support procedures in the process of finding rational investment strategies, including in information security field of enterprises, and obtaining forecast assessment for feasibility of a specific strategy. The model proposed by us is based on analysis of financing process by investors in information technology for protecting information tasks for the case of their multi-factoring in fuzzy setting. The investment process management model is proposed, using the example of investing in the information security of informatization objects taking into account multi-factoring and in fuzzy setting for DSS computational core. The difference between the model and previously developed ones is that it considers the investment process as complex structure, for which it is not enough to model it as a single-factor category. Computational experiments were performed for the developed model. The simulation results are visualized in the Python programming language, which allows you to optimize the procedures for investment process managing.


2020 ◽  
Vol 51 (3) ◽  
pp. 94-102
Author(s):  
MICHAEL M. PUTYATO ◽  
◽  
ALEXANDER S. MAKARYAN ◽  
Keyword(s):  

Author(s):  
Bachujayendra Kumar ◽  
Rajya Lakshmidevi K ◽  
M Verginraja Sarobin

Wireless sensor networks (WSNs) have been used widely in so many applications. It is the most efficient way to monitor the information. There areso many ways to deploy the sensors. Many problems are not identified and solved. The main challenge of WSN is energy efficiency and information security. WSN power consumption is reduced by genetic algorithm-based clustering algorithm. Information from cluster head to base station may have a lot of chances to get hacked. The most reliable way to manage energy consumption is clustering, and encryption will suit best for information security. In this paper, we explain clustering techniques and a new algorithm to encrypt the data in the network.


Symmetry ◽  
2020 ◽  
Vol 12 (4) ◽  
pp. 664 ◽  
Author(s):  
Rajeev Kumar ◽  
Abhishek Kumar Pandey ◽  
Abdullah Baz ◽  
Hosam Alhakami ◽  
Wajdi Alhakami ◽  
...  

Growing concern about healthcare information security in the wake of alarmingly rising cyber-attacks is being given symmetrical priority by current researchers and cyber security experts. Intruders are penetrating symmetrical mechanisms of healthcare information security continuously. In the same league, the paper presents an overview on the current situation of healthcare information and presents a layered model of healthcare information management in organizations. The paper also evaluates the various factors that have a key contribution in healthcare information security breaches through a hybrid fuzzy-based symmetrical methodology of AHP-TOPSIS. Furthermore, for assessing the effect of the calculated results, the authors have tested the results on local hospital software of Varanasi. Tested results of the factors are validated through the comparison and sensitivity analysis in this study. Tabulated results of the proposed study propose a symmetrical mechanism as the most conversant technique which can be employed by the experts and researchers for preparing security guidelines and strategies.


Author(s):  
Tamar Makasarashvili ◽  
Tea Khorguashvili ◽  
Giuli Giguashvili ◽  
Aleksandre Sadagashvili

With the development of Internet technologies, cybercrime has also evolved and diversified. Much of the world's economic and business information comes from electronic information, and the need for remote work caused by the coronavirus (COVID-19) pandemic has further increased demand for e-services, which in turn has contributed to increased technology risks, threats, and incidents. The main task of the states is to actively fight against the negative socio-economic, financial, and political consequences caused by the growth of cybercrime. The main purpose of the study is to assess the negative consequences of cybercrime in Georgia, the main threats to information security, to develop recommendations for the prevention of cybercrime, to improve its legal regulation mechanisms. The fight against cybercrime in Georgia is carried out using criminal norms. The law "On Information Security" is in force in the country, Georgia's cyber security strategy has been developed, but this process needs constant development. The main task of the state is to gradually improve the legislation and bring it in line with modern technologies, to ensure close cooperation between the state and society, to raise the awareness of civil society. It is essential to constantly inform the public and companies about cyber threats, as effective prevention is the best form of crime prevention policy.


2010 ◽  
Vol 4 (12) ◽  
pp. 32-35
Author(s):  
Samir Kumar Bandyopadhyay ◽  
Somaditya Roy

Sign in / Sign up

Export Citation Format

Share Document