data compromise
Recently Published Documents


TOTAL DOCUMENTS

7
(FIVE YEARS 2)

H-INDEX

1
(FIVE YEARS 0)

2020 ◽  
Vol 1 (9) ◽  
pp. 59-68
Author(s):  
Ivan Opirskyy ◽  
Andrii Vynar

Phishing, as a type of information attack, has been used by intruders for selfish purposes for quite some time. They are very popular in the criminal world because it is much easier for a person to make certain profitable actions than a program. With the advent of new technologies, this type of attack has gradually adapted to the new conditions of engagement with its victim. Cloud services have become a great modern and widespread tool for phishing campaigns. The use of such services has given to malicious actors a number of significant advantages over the use of their own computing resources. The relative cheapness and ease of exploitation of these technologies has played an important role. The problem of information security with using cloud technologies is that this type of attack is difficult to detect, even more to prevent, without significantly affecting the comfort of using end users of information systems. The article analyzes the relevance of this type of attacks based on real data. We considered the algorithm of their work during a life cycle and analyzes the use of the basic available security methods of protection, their feasibility and problems of use. The analysis showed that not all modern security methods are capable of detecting and preventing phishing attacks, which use public cloud services. Even a combination of several or all methods cannot guarantee high protection for users against phishing threats. In the article were mentioned some examples of phishing campaigns that took place during 2019 and used such popular public cloud services as Azure Blob storage created by Microsoft and Google Drive developed by Google. A basic list of tips was also provided that would increase the level of security for internet users in order to reduce the risk of potential data compromise or its consequences.


Information mined from the single source is analyzed and a report is made using first demand method of reasoning in the present structure. Be that as it may, this structure fails to help between related limit of data. [2 ],[ 4],[6]Consequently, an Interactive examination of data has been proposed, by empowering data to be shortened and seen in different ways. Data that can be shown as estimation attributes and estimated characteristics. Measure characteristics consolidate measure of some regard that can be totaled upon .e.g. the quality number of offers association. Center individual based data compromise count has been executed for hypothesis and disguise of data's in the data stockroom. Exceptional evasion strategy to manage mass data has been sent further in our proposed approach. Chain of significance on estimation characteristics of interrelated data has been proposed where it lets estimations to be seen at different levels of detail. The proposed reasoning is furthermore profitable toward the beginning of the observation strategy. [1],[ 3],[5]


Author(s):  
Said Al- Mahrooqi ◽  
S. Rawahi ◽  
S. Yarubi ◽  
S. Abri ◽  
A. Yahyai ◽  
...  

10.28945/3283 ◽  
2008 ◽  
Author(s):  
Oludele Awodele ◽  
Oghenerukevwe Onoruvie ◽  
Sharon Okoruwa ◽  
Victor Dibia

The ongoing migration of mobile lifestyles and the increasing capabilities of portable systems will continue to drive demand for more flexible and portable battery charging systems (Brown, 2006). The use of computers has been limited due to lack of constant availability of power -issues such as data loss, transaction breakages, data compromise have become major challenges in areas (especially third world countries) where power supply is a problem. Thus there is a need to provide a means of power sharing through USB for computers to share power between two systems (with special emphasis on laptops). Related works/ research has shown that the power sharing between a computer system has only been possible with smaller devices like iPod, since the USB port gives 500mA/ +5V maximum. This paper describes a device that draws similar voltage and current as the iPod for a destination system after an amplification operation has been carried out on the supplied voltage and power. The power being transferred is initiated by the software driver on detection with destination voltage and current 18V-19V/4.5A with female connector. After construction it will be available to notebook computers system specification and very useful in emergencies and available to all due to its ease of use.


1989 ◽  
Vol 102 (2) ◽  
pp. 355-359 ◽  
Author(s):  
H. L. Taylor ◽  
P. P. Mortimer

SUMMARYOf 32983 specimens from 307 sources in England and Wales tested in the Virus Reference Laboratory for anti-HIV between 1984 and 1987, 6491 (20%) were positive. Ninety-five per cent of the positive subjects were male and 44% of them were from three London genito-urinary medicine clinics. In 1987 the numbers of newly diagnosed HIV infections decreased in homosexual men and haemophiliacs and increased in injecting drug abusers; 148/119 (12%) of all the positive findings in 1987 were in females. Between 1984 and 1987 the proportion of anti-HIV positive individuals who were asymptomatic fell by nearly 10% and the proportion with AIDS/ARC rose by nearly 10%. Of the requests leading to positive results 1280 (20%) were recognized as duplicates of previous positive results, while for 34 % of the requests no clinical information was provided. These deficiencies in the data compromise HIV surveillance based on diagnostic testing, and supplementary bias-free data are needed.


Sign in / Sign up

Export Citation Format

Share Document