user security
Recently Published Documents


TOTAL DOCUMENTS

93
(FIVE YEARS 23)

H-INDEX

13
(FIVE YEARS 0)

Author(s):  
Nurulmanja Atiqah Maliki ◽  
Anazida Zainal ◽  
Fuad Abdulgaleel Abdoh Ghaleb ◽  
Mohamad Nizam Kassim

2021 ◽  
Vol 11 (13) ◽  
pp. 6070
Author(s):  
Veronika Szücs ◽  
Gábor Arányi ◽  
Ákos Dávid

We live in a world of digital information communication and digital data storage. Following the development of technology, demands from the user side also pose serious challenges for developers, both in the field of hardware and software development. However, the increasing penetration of the Internet, IoT and digital solutions that have become available in almost every segment of life, carries risks as well as benefits. In this study, the authors present the phenomenon of ransomware attacks that appear on a daily basis, which endangers the operation and security of the digital sphere of both small and large enterprises and individuals. An overview of ransomware attacks, the tendency and characteristics of the attacks, which have caused serious financial loss and other damages to the victims, are presented. This manuscript also provides a brief overview of protection against ransomware attacks and the software and hardware options that enhance general user security and their effectiveness as standalone applications. The authors present the results of the study, which aimed to explore how the available software and hardware devices can implement digital user security. Based on the results of the research, the authors propose a complex system that can be used to increase the efficiency of network protection and OS protection tools already available to improve network security, and to detect ransomware attacks early. As a result, the model of the proposed protection system is presented, and it can be stated that the complex system should be able to detect ransomware attacks from either the Internet or the internal network at an early stage, mitigate malicious processes and maintain data in recoverable state.


2021 ◽  
Vol 13 (4) ◽  
pp. 1634
Author(s):  
Hoon Ko ◽  
Isabel Praça

This study proposes a Secure Energy Trading Model design based on a Blockchain is an attempt to overcome the weak security and instability of the current energy trading system. The focal point of the design lies in the user-security features of the model, such as user authentication and identification, and the blockchain that every transaction goes through. The user-security feature provides a safer system for peer-to-peer energy trade, and the blockchain technology ensures the reliability of the trading system. Furthermore, the Secure Energy Trading Model supports a decentralized data control mechanism as a future measure for handling vast amounts of data created by IoT.


Author(s):  
Andi Setiawan ◽  
Ade Irma Purnamasari

Batikkita is an android based application and web framework laravel web service architecture that is used to bring together between craftsmen and consumers of batik Trusmi and batikkita application with the e-commerce model used is business to customer. The backend system interface used is a web framework while the frontend system interface used is android. The problem that arises from the Batikkita application is that the security of users, both as sellers and consumers, is very vulnerable to being hacked, so it is very detrimental to both sellers and buyers. This study aims to implement the JSON Web Token based on the HMAC SHA-512 algorithm in the Batikkita application in order to provide a sense of security for both the seller and the buyer before entering the sales transaction page. The application development method used is Rapid Application Development because the cycle used to develop our batik application is very short so it is very helpful in this research. While the implementation of JSON Web Token with the HMAC SHA-512 algorithm in the Batikkita application is used to improve user security when logging in to the Batikkita application in the form of a token and the password used by the user is wrapped in a token given by the Batikkita application. As a comparison, the HMAC SHA-256 algorithm and the HMAC SHA-384 algorithm are used. The results obtained from testing the implementation of JSON Web Token with the SHA-512 algorithm in our batik application, for an average increase of speed between 138.8 milliseconds for SOAP and 122.7 milliseconds for REST compared to the HMAC SHA-256 algorithm and the HMAC SHA-algorithm. 384. While the required token size is greater between 2.13 kb for SOAP and 2.11 kb for REST compared to the HMAC SHA-256 algorithm and the HMAC SHA-384 algorithm.


Author(s):  
Г.С. Мокану

Угрозы информационной безопасности в компьютерных сетях стали одной из основных проблем для владельцев ПК. При этом особое распространение этих угроз коснулось сетей WI-FI, в которых происходит как несанкционированный доступ к данным, так и только снижение уровня защиты сети. Практически все современные мобильные устройства (смартфоны, планшеты, ноутбуки и нетбуки) имеют возможность подключения к беспроводному Интернету или, точнее, к сети WI-FI, эта функция теперь является стандартной для этих устройств. nformation security threats in computer networks have become one of the main problems for PC owners. At the same time, a particular spread of these threats affected WI-FI networks, in which both unauthorized access to data and only a decrease in the level of network protection occur. Almost all modern mobile devices (smartphones, tablets, laptops and netbooks) have the ability to connect to the wireless Internet or, more precisely, to the WI-FI network, this function is now standard for these devices.


Sign in / Sign up

Export Citation Format

Share Document