scholarly journals Cyber terrorism as a trigger for the growing need for security of the system from the dangers that come from the internet

2021 ◽  
Vol 18 (2) ◽  
pp. 247-256
Author(s):  
Sanja Klisarić

In a world of increasingly intense cyber content that relies on new technologies, the security of all systems is at risk. This article will present the danger and security options in order to protect not only data but also the entire system connected to the new technologies. Also, the importance of persons dealing with online security issues will be emphasized. The analysis of the content reveals the possibility for prediction that is presented in the paper, and connected with the conclusion that technology will develop more and more, and thus the danger of cyber attacks will be more and more intense. The paper focuses on the essence of the defense against terrorism that is necessary on the Internet. This indicates those defense options that are in line with the roles of those in charge of Internet security as an open field for terrorist cyber attacks.

Author(s):  
Ana-Maria CERNOV

Network security has become more important to personal computer users, organizations, and the military. With the advent of the internet, security became a major concern and the history of security allows a better understanding of the emergence of security technology. This paper presents the main issues regarding the network security issues and solutions to fight back the cyber-attacks.


Author(s):  
Irvin Renzell Heard ◽  
Norman R Ardila

For nearly two decades, desktops dominated as the primary means of accessing the internet until 2007, the era of mobile phones with touchscreens capability entered the market by Apple Inc. Currently, the high demand of accessibility and mobility through mobile technology is adding more pressure on application developers leaving them to focus more on “meeting deadlines than application security,” which is a critical component as hybrid applications play a significant role in the advancement of IoT and cross-platform compatibility. New technologies are adopting unresolved security issues from the latter. This article aims to initiate discussions within the development and research community regarding hybrid mobile app security, market, role in IoT, advantages, disadvantages, security challenges and the best practices as society enters into a new paradigm envisioned as a ubiquitous global network.


Author(s):  
Isaac Chin Eian ◽  
Ka Yong Lim ◽  
Majesty Xiao Li Yeap ◽  
Hui Qi Yeo ◽  
Fatima Z

In recent years, wireless networks have undoubtedly become a convenient way to connect to the Internet and provide connection to everyone in any corner of the world. In fact, in this era, people are connected to the internet almost everyday and wireless networks give us this privilege in a seamless manner. A wireless network normally consists of access points and nodes where the access points are responsible to amplify the wireless signals, while the nodes are the gadgets that are receiving these signals. However, with such great convenience provided, many challenges are also faced by the users and stakeholders. With no physical connection to devices, wireless networks are evidently more vulnerable to invisible cyber attacks. In this research paper, it the security issues that cause issues in the wireless networks are discussed. Furthermore, an analytical review of privacy challenges found in these networks is performed; these challenges are segregated into security issues and privacy issues. The paper will then present the methods used in conducting a survey and gathering the research results along with further discussion on the results obtained through this study. Finally, a suitable solution is proposed to prevent and overcome the intrusions faced in terms of security and privacy in wireless network scenarios through detection and response mechanism for mitigation of the problems.


Author(s):  
Balkis Hamdane ◽  
Sihem Guemara El Fatmi

The internet was initially proposed to interconnect a few trusted hosts. However, its continued success has caused many security problems. New internet services, such as e-government, must address these security issues. A host-centric security model tied to information location and based on various partial corrections has been proposed. However, this model hasn't brought radical solutions and has largely contributed to architecture ossification. In this context, the idea of a clean slate approach, satisfying the new requirements and without any compatibility obligation, has emerged. The information-centric networking approach represents one of these architectures. Its main idea is to consider the named information as the central element rather than the IP addresses. To ensure security requirements, it adopts an information-centric security. This chapter is a survey on security in the ICN, satisfying the internet security requirements in general and particularly e-government services.


Author(s):  
Arram Sriram ◽  
Adiraju Prashantha Rao

E-commerce is selling and buying products in online shopping through the internet. When purchasing the products using internet, many security issues arise. These issues are to be addressed effectively and to be resolved. The security issue is an essential part of any transaction that takes place over the internet. Security becomes paramount not only for retailers but for any business that operates via the internet as the popularity of online shopping grows. This chapter focuses security protocols and their achievements in providing effective communication between end-users and business people.


Author(s):  
Arram Sriram ◽  
Adiraju Prashantha Rao

E-commerce is selling and buying products in online shopping through the internet. When purchasing the products using internet, many security issues arise. These issues are to be addressed effectively and to be resolved. The security issue is an essential part of any transaction that takes place over the internet. Security becomes paramount not only for retailers but for any business that operates via the internet as the popularity of online shopping grows. This chapter focuses security protocols and their achievements in providing effective communication between end-users and business people.


Author(s):  
Nancy Houston

Perhaps the greatest challenge to cyber security is that people are inherently behind each cyber problem as well as its solution. The reality is that people have been stealing secrets and information and attacking others for thousands of years; the technology of the Internet just allows it to happen at a faster pace and on a larger scale. This chapter describes aspects of human behavior that impact cyber security efforts. Cognitive overload, bias, incentives and behavioral traits all affect the decision making of both those who develop policy and strategy, those who fall victim to cyber attacks, and those who initiate cyber attacks. Although limited research has been completed on the behavioral aspects of cyber security, many behavioral principles and models are applicable to cyber security issues.


Author(s):  
Pauline C. Reich

While the benefits of the Internet and other forms of computer networks are streamlining financial institutions, the same institutions are often among the first institutions to be affected by Cybercrime and Cybersecurity issues due to the financial incentives as well as their strategic place in each nation’s infrastructure and economy. We must look not only at the efficiency, but also at the negative aspects of the use of technology by financial institutions. Consumers as well as business must be well informed about conducting transactions in the safest manner possible. The nature of the Internet is cross-border, and thus Cybercrime and Internet Security issues involving financial institutions should be made known by international organizations, regional organizations and when there have been cross-border law enforcement collaborations in investigations, extraditions, etc. At present, due to the fact that law is generally written at the national (or even state level, as is the case of Identity Theft law in the US), there is a need for reporting of cross-border cases in the literature if such data can be obtained from law enforcement officials by scholars.


Author(s):  
Irvin Renzell Heard ◽  
Norman R Ardila

For nearly two decades, desktops dominated as the primary means of accessing the internet until 2007, the era of mobile phones with touchscreens capability entered the market by Apple Inc. Currently, the high demand of accessibility and mobility through mobile technology is adding more pressure on application developers leaving them to focus more on “meeting deadlines than application security,” which is a critical component as hybrid applications play a significant role in the advancement of IoT and cross-platform compatibility. New technologies are adopting unresolved security issues from the latter. This article aims to initiate discussions within the development and research community regarding hybrid mobile app security, market, role in IoT, advantages, disadvantages, security challenges and the best practices as society enters into a new paradigm envisioned as a ubiquitous global network.


Sign in / Sign up

Export Citation Format

Share Document