Results for 'cybersecurity'

109 found
Order:
  1.  50
    Proactive Cybersecurity: Predictive Analytics and Machine Learning for Identity and Threat Management.Sreejith Sreekandan Nair Govindarajan Lakshmikanthan - 2024 - International Journal of Multidisciplinary Research in Science, Engineering and Technology 7 (12):17488-17496.
    Due to the development of advanced identity based attacks and even complex cyber threats, merely possessing defensive cyber security capabilities is not enough today. In this study, we investigate how predictive analytics based machine learning (ML) can be employed for pro-active identity management and threat detection. In this study, the authors assess some models of machine learning – Decision Trees, Random Forests, Support Vector Machines (SVM), and a new hybrid one – to determine which best allows for the detection of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2. Cybersecurity, Trustworthiness and Resilient Systems: Guiding Values for Policy.Adam Henschke & Shannon Ford - 2017 - Journal of Cyber Policy 1 (2).
    Cyberspace relies on information technologies to mediate relations between different people, across different communication networks and is reliant on the supporting technology. These interactions typically occur without physical proximity and those working depending on cybersystems must be able to trust the overall human–technical systems that support cyberspace. As such, detailed discussion of cybersecurity policy would be improved by including trust as a key value to help guide policy discussions. Moreover, effective cybersystems must have resilience designed into them. This paper (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  3.  89
    Artificial Intelligence in Cybersecurity: Revolutionizing Threat Detection and Response.B. Yogeshwari - 2025 - International Journal of Innovative Research in Science Engineering and Technology 14 (3):2217-2223.
    The rapid evolution of cyber threats has made traditional cybersecurity methods increasingly inadequate. Artificial Intelligence (AI) has emerged as a transformative technology in the field of cybersecurity, offering enhanced capabilities for detecting and responding to cyber threats in real time. This paper explores the role of AI in revolutionizing cybersecurity, focusing on its applications in threat detection, anomaly detection, and automated response systems. Through the use of machine learning algorithms, AI can analyze vast amounts of data, identify (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4. A principlist framework for cybersecurity ethics.Paul Formosa, Michael Wilson & Deborah Richards - 2021 - Computers and Security 109.
    The ethical issues raised by cybersecurity practices and technologies are of critical importance. However, there is disagreement about what is the best ethical framework for understanding those issues. In this paper we seek to address this shortcoming through the introduction of a principlist ethical framework for cybersecurity that builds on existing work in adjacent fields of applied ethics, bioethics, and AI ethics. By redeploying the AI4People framework, we develop a domain-relevant specification of five ethical principles in cybersecurity: (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  5. Adaptive Cybersecurity in the Digital Age: Emerging Threat Vectors and Next-Generation Defense Strategies.Harish Kumar Reddy Kommera - 2024 - International Journal for Research in Applied Science and Engineering Technology (Ijraset) 12 (9):558-564.
    This article examines the rapidly evolving landscape of cybersecurity, focusing on emerging threats and innovative defense mechanisms. We analyze four key threat vectors: Advanced Persistent Threats (APTs), ransomware, Internet of Things (IoT) vulnerabilities, and social engineering attacks. These threats pose significant risks to organizations, including data breaches, financial losses, and operational disruptions. In response, we explore cutting-edge defense mechanisms such as Artificial Intelligence and Machine Learning for threat detection, Zero Trust Architecture for access control, blockchain for data integrity, behavioral (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  6.  86
    Cybersecurity Approaches for IoT Devices in Smart City Infrastructures.Sharma Sidharth - 2017 - Journal of Artificial Intelligence and Cyber Security (Jaics) 1 (1):1-5.
    : The rapid proliferation of Internet of Things (IoT) devices in smart cities has introduced numerous benefits, enhancing urban efficiency, sustainability, and automation. However, these interconnected systems also pose significant cybersecurity challenges, including data breaches, unauthorized access, and cyberattacks that can compromise critical infrastructure. This paper explores various cybersecurity strategies tailored for IoT environments in smart cities, focusing on encryption techniques, secure authentication mechanisms, network security protocols, and blockchain-based security models. Additionally, it discusses machine learningbased anomaly detection systems (...)
    Download  
     
    Export citation  
     
    Bookmark   12 citations  
  7. AI and Cybersecurity in 2024: Navigating New Threats and Unseen Opportunities.Tripathi Praveen - 2024 - International Journal of Computer Trends and Technology 72 (8):26-32.
    In 2024, the intersection of artificial intelligence (AI) and cybersecurity presents both unprecedented challenges and significant opportunities. This article explores the evolving landscape of AI-driven cyber threats, the advancements in AI-enabled security measures, and the strategic responses required to navigate these new realities. Leveraging statistics, trends, and expert insights, we delve into how organizations can enhance their cybersecurity posture in the face of sophisticated AI threats.
    Download  
     
    Export citation  
     
    Bookmark   13 citations  
  8.  71
    Proactive Cybersecurity: Predictive Analytics and Machine Learning for Identity and Threat Management.Sreejith Sreekandan Nair Govindarajan Lakshmikanthan - 2024 - International Journal of Multidisciplinary Research in Science, Engineering and Technology 7 (12):17488-17496.
    Due to the development of advanced identity based attacks and even complex cyber threats, merely possessing defensive cyber security capabilities is not enough today. In this study, we investigate how predictive analytics based machine learning (ML) can be employed for pro-active identity management and threat detection. In this study, the authors assess some models of machine learning – Decision Trees, Random Forests, Support Vector Machines (SVM), and a new hybrid one – to determine which best allows for the detection of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9.  57
    Cybersecurity in the Internet of Things (IoT): Challenges and Solutions.R. Surya Kala A. N. Abirama Valli - 2025 - International Journal of Advanced Research in Arts, Science, Engineering and Management (Ijarasem) 12 (1):344-347.
    The Internet of Things (IoT) is revolutionizing industries by connecting everyday objects to the internet, enabling improved functionality and convenience. However, the rapid adoption of IoT devices has raised significant cybersecurity concerns, as the vast number of connected devices presents new vulnerabilities that can be exploited by cybercriminals. These vulnerabilities are often the result of insecure device configurations, weak authentication mechanisms, and inadequate data protection. This paper explores the cybersecurity challenges associated with IoT, such as device security, network (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10.  33
    ADAPTIVE CYBERSECURITY STRATEGIES FOR CLOUD-BASED REAL-TIME DATA ANALYTICS PLATFORMS.Khan Shahnawaz - 2024 - International Journal of Computer Engineering and Technology 15 (5):414-424.
    This article explores the critical intersection of adaptive cybersecurity strategies and cloud-based real-time data analytics platforms, addressing the unique security challenges posed by these dynamic environments. The article presents a comprehensive framework that leverages artificial intelligence, machine learning, and behavioral analytics to create a robust, responsive security infrastructure capable of evolving alongside emerging threats. By integrating zero-trust principles, automated incident response mechanisms, and continuous compliance monitoring, the proposed framework offers a holistic environment. -/- The article examines the multifaceted benefits (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11.  81
    CYBERSECURITY STRATEGIES FOR IOT DEVICES IN SMART CITIES.Sharma Sidharth - 2017 - Journal of Artificial Intelligence and Cyber Security (Jaics) 1 (1):1-6.
    The rapid proliferation of Internet of Things (IoT) devices in smart cities has introduced numerous benefits, enhancing urban efficiency, sustainability, and automation. However, these interconnected systems also pose significant cybersecurity challenges, including data breaches, unauthorized access, and cyberattacks that can compromise critical infrastructure. This paper explores various cybersecurity strategies tailored for IoT environments in smart cities, focusing on encryption techniques, secure authentication mechanisms, network security protocols, and blockchain-based security models. Additionally, it discusses machine learningbased anomaly detection systems to (...)
    Download  
     
    Export citation  
     
    Bookmark   13 citations  
  12. AI-Driven Cybersecurity: Transforming the Prevention of Cyberattacks.Mohammed B. Karaja, Mohammed Elkahlout, Abeer A. Elsharif, Ibtesam M. Dheir, Bassem S. Abu-Nasser & Samy S. Abu-Naser - 2024 - International Journal of Academic Engineering Research(Ijaer) 8 (10):38-44.
    Abstract: As the frequency and sophistication of cyberattacks continue to rise, organizations face increasing challenges in safeguarding their digital infrastructures. Traditional cybersecurity measures often struggle to keep pace with rapidly evolving threats, creating a pressing need for more adaptive and proactive solutions. Artificial Intelligence (AI) has emerged as a transformative force in this domain, offering enhanced capabilities for detecting, analyzing, and preventing cyberattacks in real- time. This paper explores the pivotal role of AI in strengthening cybersecurity defenses by (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  13. Generative AI in EU Law: Liability, Privacy, Intellectual Property, and Cybersecurity.Claudio Novelli, Federico Casolari, Philipp Hacker, Giorgio Spedicato & Luciano Floridi - 2024 - Computer Law and Security Review 55.
    The complexity and emergent autonomy of Generative AI systems introduce challenges in predictability and legal compliance. This paper analyses some of the legal and regulatory implications of such challenges in the European Union context, focusing on four areas: liability, privacy, intellectual property, and cybersecurity. It examines the adequacy of the existing and proposed EU legislation, including the Artificial Intelligence Act (AIA), in addressing the challenges posed by Generative AI in general and LLMs in particular. The paper identifies potential gaps (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  14.  32
    HOLISTIC CYBERSECURITY FRAMEWORKS FOR REAL-TIME DATA ANALYTICS IN CLOUD PLATFORMS: ENSURING END-TO-END PROTECTION.Khan Shahnawaz - 2024 - International Journal of Research in Computer Applications and Information Technology 7 (2):615-622.
    This article explores the critical intersection of cloud computing, real-time data analytics, and cybersecurity in the context of digital transformation. It examines the rapid growth of cloud technologies and their impact on data management across various industries. The article highlights the benefits of real-time data analytics in cloud environments, particularly for sectors like finance, healthcare, and e-commerce. However, it also addresses the unique cybersecurity challenges that arise from this integration, including data breaches, unauthorized access, DDoS attacks, and advanced (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15.  17
    Securing the Digital Frontier: Pega’s Innovations in Cybersecurity and Regulatory Compliance.Munnangi Sivasatyanarayanareddy - 2020 - Neuroquantology 18 (11):1251-1255.
    In an era of unprecedented digital transformation, safeguarding business operations against cyber threats while adhering to stringent regulatory standards is of paramount importance. Pega, a leader in business process automation and customer engagement solutions, has significantly strengthened its platform to tackle the dual challenges of cybersecurity and regulatory compliance. This article explores Pega’s innovative approach to security and compliance, detailing how the platform has integrated cutting-edge security measures such as real-time threat detection, secure data handling, and compliance controls. These (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16.  14
    Cybersecurity in the Era of Quantum Computing: Risks and Mitigation Techniques.Avi Ishwar Bhagat Chhavi Kamal Zaveri - 2025 - International Journal of Computer Technology and Electronics Communication 8 (1).
    The advent of quantum computing represents a revolutionary leap in computing power, offering solutions to problems previously thought intractable. However, it also introduces new challenges and risks, particularly in the realm of cybersecurity. Quantum computers, with their ability to solve certain computational problems exponentially faster than classical computers, pose a significant threat to current cryptographic systems, which are foundational to modern cybersecurity. Algorithms that currently secure everything from banking transactions to personal communications may be rendered obsolete by quantum (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17.  47
    Comprehensive Academic Cybersecurity during Rapid Remote Learning Migration: A Holistic Approach to Security, Privacy, and Accessibility.Lakshmikanthan Govindarajan - 2020 - International Journal of Multidisciplinary Research in Science, Engineering and Technology 3 (1):8-19.
    The rapid transition to remote learning during the early 2020 pandemic has catalyzed unprecedented changes in higher education cybersecurity infrastructure. This white paper presents a comprehensive framework addressing the multifaceted challenges of securing academic environments during this transformation. Our research examines not only traditional security concerns but also emerging challenges in student privacy, mental health considerations, geographical access disparities, and cross-institutional collaboration. Through empirical analysis of implementation across multiple institutions, we demonstrate how universities can adapt their security architectures to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18. Ethical principles shaping values-based cybersecurity decision-making.Joseph Fenech, Deborah Richards & Paul Formosa - 2024 - Computers and Society 140 (103795).
    The human factor in information systems is a large vulnerability when implementing cybersecurity, and many approaches, including technical and policy driven solutions, seek to mitigate this vulnerability. Decisions to apply technical or policy solutions must consider how an individual’s values and moral stance influence their responses to these implementations. Our research aims to evaluate how individuals prioritise different ethical principles when making cybersecurity sensitive decisions and how much perceived choice they have when doing so. Further, we sought to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  19. Advanced Persistent Threats in Cybersecurity – Cyber Warfare.Nicolae Sfetcu - 2024 - Bucharest, Romania: MultiMedia Publishing.
    This book aims to provide a comprehensive analysis of Advanced Persistent Threats (APTs), including their characteristics, origins, methods, consequences, and defense strategies, with a focus on detecting these threats. It explores the concept of advanced persistent threats in the context of cyber security and cyber warfare. APTs represent one of the most insidious and challenging forms of cyber threats, characterized by their sophistication, persistence, and targeted nature. The paper examines the origins, characteristics and methods used by APT actors. It also (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20.  56
    The Great Resignation: Managing Cybersecurity Risks during Workforce Transitions.Govindarajan Lakshmikanthan Sreejith Sreekandan Nair - 2022 - International Journal of Multidisciplinary Research in Science, Engineering and Technology 5 (7):1551-1563.
    Where organizations used to rely on employees tenured with their company, the Great Resignation has presented new problems to organizational structure and fortification. Such a process usually leads to disrupted employee productivity and most importantly, increased vulnerability to cyber threats. Loyal workers, intentionally or unintentionally disloyal workers, and employees who leave the organization can compromise organizational confidential information, such as innovation, customer data, and other data that the organization considers to be highly valuable. Research has also revealed that workforce transition (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21. The Ethics of Cybersecurity: Balancing Privacy and Protection in the Digital Age.Lokhande Tina Kishor - 2025 - International Journal of Multidisciplinary Research in Science, Engineering, Technology and Management (Ijmrsetm) 12 (2):490-494.
    The increasing integration of digital technologies into every aspect of modern life has led to a growing concern over cybersecurity, particularly in the context of privacy. As organizations collect vast amounts of personal and sensitive data, the tension between securing this information and preserving individual privacy has become a critical ethical dilemma. This paper explores the ethical challenges faced by cybersecurity professionals, policymakers, and organizations when balancing the need for protection against the potential risks to personal privacy. It (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22. Emerging Trends in Cybersecurity: Navigating the Future of Digital Protection.Anumiti Jat - 2024 - Idea of Spectrum 1 (12):1-7.
    The increasing sophistication of cyber threats necessitates innovative and proactive cybersecurity measures. This paper explores the latest trends in cybersecurity, focusing on the role of Artificial Intelligence (AI), Zero Trust security, and blockchain technology. A review of the literature highlights significant advancements and persistent challenges, including the security of Internet of Things (IoT) ecosystems and human-centric vulnerabilities. Experiments were conducted to evaluate the efficacy of machine learning-based intrusion detection systems and Zero Trust implementation in a simulated environment. Results (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23. Use of Blockchain in Strengthening Cybersecurity And Protecting Privacy.Arif Sari - 2018 - International Journal of Engineering and Information Systems (IJEAIS) 2 (12):59-66.
    Abstract—The purpose of this study is to highlight and prove the positive impact in which blockchain could have on today’s IoT environment in terms of providing Cybersecurity for not just organizations, but other individuals who share data via the internet. The current IoT environs operates on a centralized cloud based server, meanwhile block chain operates on a decentralized server. The differentiation between the both plays a major role in the level of security they both provide; whereby, decentralized systems are (...)
    Download  
     
    Export citation  
     
    Bookmark  
  24.  29
    Red Team vs. Blue Team: Assessing Cybersecurity Resilience Through Simulated Attacks.Baladari Venkata - 2021 - European Journal of Advances in Engineering and Technology 8 (4):82-87.
    Organizations are now facing more complex cyber threats, prompting them to implement forward-thinking security testing methods to protect their digital systems. The Red Team and Blue Team simulations offer a practical method for evaluating an organization's ability to withstand cyber threats by mimicking actual attacks and the corresponding defensive measures taken in response. These exercises aid in uncovering system weaknesses, boosting threat recognition, and refining incident response capacities. Integrating artificial intelligence-driven threat intelligence, automated security checks, and Zero Trust frameworks enhances (...)
    Download  
     
    Export citation  
     
    Bookmark  
  25.  52
    Securing the Distributed Workforce: A Framework for Enterprise Cybersecurity in the Post-COVID Era.Sreejith Sreekandan Nair Govindarajan Lakshmikanthan - 2022 - International Journal of Advanced Research in Education and Technology 9 (2):594-602.
    COVID-19 is the new standard for forced changes in the workforce, forcing the adoption of remote and hybrid work environments globally. It was in the period of this rapid adoption of distributed work environments that new opportunities for flexibility and productivity were opened up, but fundamental weaknesses of conventional notions of cybersecurity were unveiled. As employees connect to company networks from a plethora of different places and different types of devices, situations were complex at the corporate level to ensure (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26. Building Resilient Digital Insurance Ecosystems: Guidewire, Cloud, And Cybersecurity Strategies.Adavelli Sateesh Reddy - 2022 - Esp Journal of Engineering and Technology Advancements 2 (3):140-153.
    Through a combination of Guidewire platforms, cloud computing and cybersecurity frameworks, the insurance industry in miniature is being transformed into a digitally transformed, ever resilient ecosystem. This ecosystem enables insurers to modernize core operations of policy management, claims processing and billing while continuing to provide secure, scalable and efficient service delivery. Insurers using cloud infrastructure have elastic resources capable of scaling to meet dynamic workloads and can provide high availability and fast disaster recovery. They have liberated data analytics to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  27.  16
    Cloud Infrastructure and Real-Time Data Analytics in Travel: Advancing Sustainability and Cybersecurity.Khan Shahnawaz - 2024 - International Journal of Innovative Research in Science, Engineering and Technology (Ijirset) 13 (9):16646-16651.
    This comprehensive article examines the transformative impact of cloud infrastructure and real-time data analytics on the travel industry, with a particular focus on advancing sustainability and enhancing cybersecurity. The article explores how these technologies are revolutionizing travel operations, from personalized customer experiences to optimized resource allocation and reduced environmental footprints. We delve into the implementation of cloud-based solutions that enable real-time processing of vast data streams, facilitating dynamic adjustments to travel plans and fostering more efficient, eco-friendly practices. The article (...)
    Download  
     
    Export citation  
     
    Bookmark  
  28. Future Proofing Insurance Operations: A Guidewire-Centric Approach to Cloud, Cybersecurity, and Generative AI.Adavelli Sateesh Reddy - 2023 - International Journal of Computer Science and Information Technology Research 4 (2):29-52.
    By integration with cloud computing, cybersecurity and generative AI, the insurance industry is being transformed from high efficiency, low cost, and better customer service. However, these advanced technologies can also be used by insurers to automate and streamline processes like claims handling, underwriting, and policy generation, which are majorly time consuming and error prone. In predictive analytics, fraud detection, and personalized customer experience, generative AI makes it possible for insurers to mitigate risks and, at the same time, provide more (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29.  23
    Behavioural Biometrics for Continuous Authentication in Cybersecurity Systems.Jatin Dinesh Mhatre Ashwin Tanmay Vaidya - 2025 - International Journal of Computer Technology and Electronics Communication 8 (1).
    Behavioral biometrics is an emerging field in cybersecurity that leverages unique patterns of human behavior to continuously authenticate individuals in real-time. Unlike traditional biometrics, such as fingerprints or facial recognition, which are typically used at the point of access, behavioral biometrics continuously monitor and analyze how users interact with devices, systems, and applications. This dynamic approach offers enhanced security by detecting anomalous behaviors that may indicate unauthorized access or suspicious activity, without disrupting the user experience. This paper explores the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  30.  90
    Zero-Day Threat Protection: Advanced Cybersecurity Measures for Cloud-Based Guidewire Implementations.Adavelli Sateesh Reddy - 2023 - International Journal of Science and Research (IJSR) 12 (9):2219-2231.
    The contribution of this paper is a comprehensive cybersecurity framework to secure cloud hosted Guidewire implementations by addressing critical security challenges such as threat detection, incident response, compliance, and system performance. Based on advanced technologies like machine learning, behavioral analytics and auto patching, the framework detects and mitigates known and unknown threats, incidentally zero-day exploit. The system does this through micro segmenting, behavioral anomaly detection, and automated patch orchestration in a way that does not render the system unperforming. Key (...)
    Download  
     
    Export citation  
     
    Bookmark  
  31.  89
    Beyond The Cloud: Mastering Security in the Digital Age.Rupali Sharma Omkar C. Patil, Yash D. Patil - 2025 - International Journal of Advanced Research in Education and Technology 12 (1):240-247.
    As digital transformation accelerates, organizations are increasingly reliant on cloud-based services for flexibility, scalability, and cost-efficiency. However, the proliferation of cloud technologies has introduced new, sophisticated cybersecurity challenges. The traditional perimeter-based security model is no longer sufficient in safeguarding critical data and applications. This paper explores the evolving landscape of cybersecurity in the context of cloud computing and presents strategies for mastering security in the digital age. We discuss the importance of securing cloud-native applications, the role of advanced (...)
    Download  
     
    Export citation  
     
    Bookmark  
  32. Privacy and Digital Ethics After the Pandemic.Carissa Véliz - 2021 - Nature Electronics 4:10-11.
    The increasingly prominent role of digital technologies during the coronavirus pandemic has been accompanied by concerning trends in privacy and digital ethics. But more robust protection of our rights in the digital realm is possible in the future. -/- After surveying some of the challenges we face, I argue for the importance of diplomacy. Democratic countries must try to come together and reach agreements on minimum standards and rules regarding cybersecurity, privacy and the governance of AI.
    Download  
     
    Export citation  
     
    Bookmark  
  33.  40
    Unraveling the 2024 CrowdStrike Incident: How a Security Patch Led to Global System Failure and Blue Screen of Death.Baladari Venkata - 2025 - International Journal of Advanced Research in Science, Communication and Technology 5 (8):171-177.
    The 2024 CrowdStrike Cybersecurity incident resulted in a worldwide IT disruption impacting millions of Microsoft Windows systems. In July 2024, a faulty update of CrowdStrike’s Falcon Endpoint Detection and Response (EDR) software caused widespread system crashes known as the “Blue Screen of Death” (BSOD). The event caused severe disruptions to major industries such as aviation, financial services, healthcare and emergency response systems resulting in operational shutdown, financial setbacks and global safety concerns. This study presents a detailed examination of the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  34. (Abstract) Using Linguistics Corpus Data Analysis to Combat PRC's Cognitive Infiltration.Jr-Jiun Lian - 2024 - 2024 Annual Conference of the Communication Association: International Academic Conference on Communication and Democratic Resilience.
    In light of Taiwan's extensive exposure to the Chinese Communist Party's "cognitive domain infiltration warfare," this paper proposes new response mechanisms and strategies for cybersecurity and national defense. The focus is primarily on assessing the CCP's cognitive infiltration tactics to develop policy recommendations in cybersecurity linguistics. These recommendations are intended to serve as a reference for future national defense and information security policies. Within the constraints of limited resources, this study attempts to provide an integrated analysis method combining (...)
    Download  
     
    Export citation  
     
    Bookmark  
  35. FONDASI KEMANANAN SIBER UNTUK LAYANAN PEMERINTAH.Dhanang Witjaksono & Arimurti Kriswibowo - 2023 - Al-Ijtima`I: International Journal of Government and Social Science 9 (1):21-38.
    The use of the internet in the current government environment continues to grow. The increasingly complex use of the internet can cause vulnerabilities to cyber attacks in information security, which include aspects of confidentiality, integrity, and service availability, so that it can disrupt the performance of public service delivery. The systematic literature review research method was carried out because of the large amount of information and data regarding cyber security strategies. This can be traced through various information in books, scientific (...)
    Download  
     
    Export citation  
     
    Bookmark  
  36.  16
    Zero Trust Security Architecture: A Paradigm Shift in Data Protection and Access Control.Baladari Venkata - 2023 - European Journal of Advances in Engineering and Technology 10 (6):87-94.
    A contemporary cybersecurity strategy known as the Zero Trust Security Model aims to eradicate implicit trust and ensure uninterrupted authentication for every user, device, and application. Zero Trust security models diverge from conventional perimeter-based security by anticipating threats within and beyond the network, necessitating rigorous authentication and limitations on user access privileges. Components like Multi-Factor Authentication (MFA), Zero Trust Network Access (ZTNA), micro-segmentation, and AI-driven threat detection strengthen security by reducing vulnerabilities and stopping unauthorized access. The integration of Artificial (...)
    Download  
     
    Export citation  
     
    Bookmark  
  37. Future-Proofing Healthcare: The Role of AI and Blockchain in Data Security.Nushra Tul Zannat Sabira Arefin - 2025 - International Journal of Multidisciplinary Research in Science, Engineering and Technology 8 (3):1445-1462.
    The heightened digitization of the healthcare industry has led to an exponential increase in sensitive patient data, which requires robust security models to prevent breaches, unauthorized access, and cyber attacks. Traditional security protocols are inadequate, and this has made it imperative to explore Artificial Intelligence (AI) and Blockchain as novel solutions. AI enhances healthcare cybersecurity by facilitating real-time anomaly detection, predictive analysis, and automated threat response, while blockchain offers decentralization, immutability, and secure data sharing. However, blockchain technology faces major (...)
    Download  
     
    Export citation  
     
    Bookmark  
  38.  52
    Ethical Hacking in Network Security: Assessing Vulnerabilities to Improve Defenses.Bellamkonda Srikanth - 2022 - International Journal of Multidisciplinary Research in Science, Engineering and Technology 5 (5):611-619.
    In an era of increasing cyber threats, ethical hacking has emerged as a pivotal practice in strengthening network security. Ethical hacking, also known as penetration testing, involves authorized attempts to breach a network or system to uncover vulnerabilities before malicious actors can exploit them. This research paper delves into the role of ethical hacking in assessing and mitigating network vulnerabilities to fortify defenses against cyberattacks. It emphasizes the strategic importance of ethical hacking in the context of evolving cybersecurity challenges (...)
    Download  
     
    Export citation  
     
    Bookmark  
  39. Securing the Internet of Things: A Study on Machine Learning-Based Solutions for IoT Security and Privacy Challenges.Aziz Ullah Karimy & P. Chandrasekhar Reddy - 2023 - Zkg International 8 (2):30-65.
    The Internet of Things (IoT) is a rapidly growing technology that connects and integrates billions of smart devices, generating vast volumes of data and impacting various aspects of daily life and industrial systems. However, the inherent characteristics of IoT devices, including limited battery life, universal connectivity, resource-constrained design, and mobility, make them highly vulnerable to cybersecurity attacks, which are increasing at an alarming rate. As a result, IoT security and privacy have gained significant research attention, with a particular focus (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40.  52
    Threat Forecasting - Machine Learning Applications in Next-Generation Identity Protection.Sreejith Sreekandan Nair Govindarajan Lakshmikanthan - 2024 - International Journal of Multidisciplinary Research in Science, Engineering and Technology 7 (3):4769-4776.
    Due to the development of advanced identity based attacks and even complex cyber threats, merely possessing defensive cyber security capabilities is not enough today. In this study, we investigate how predictive analytics based machine learning (ML) can be employed for pro-active identity management and threat detection. In this study, the authors assess some models of machine learning – Decision Trees, Random Forests, Support Vector Machines (SVM), and a new hybrid one – to determine which best allows for the detection of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  41.  26
    Automated Cyber Threat Identification and Natural Language Processing.Kuruvamanikindi Venkatesh, M. Sai Kumar, Shaik Mohammed Maaz, Surekari Yashwanth Teja & Dr K. Pavan Kumar - 2025 - International Journal of Scientific Research in Science, Engineering and Technology 12 (3).
    The time window between the disclosure of a new cyber vulnerability and its use by cybercriminals has been getting smaller and smaller over time. Recent episodes, such as the Log4j vulnerability, exemplify this well. Within hours after the exploit being released, attackers started scanning the internet looking for vulnerable hosts to deploy threats like crypto currency miners and ransom ware on vulnerable systems. Thus, it becomes imperative for the cybersecurity defense strategy to detect threats and their capabilities as early (...)
    Download  
     
    Export citation  
     
    Bookmark  
  42. Attack Prevention in IoT through Hybrid Optimization Mechanism and Deep Learning Framework.Regonda Nagaraju, Jupeth Pentang, Shokhjakhon Abdufattokhov, Ricardo Fernando CosioBorda, N. Mageswari & G. Uganya - 2022 - Measurement: Sensors 24:100431.
    The Internet of Things (IoT) connects schemes, programs, data management, and operations, and as they continuously assist in the corporation, they may be a fresh entryway for cyber-attacks. Presently, illegal downloading and virus attacks pose significant threats to IoT security. These risks may acquire confidential material, causing reputational and financial harm. In this paper hybrid optimization mechanism and deep learning,a frame is used to detect the attack prevention in IoT. To develop a cybersecurity warning system in a huge data (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  43.  72
    Just-in-Time Access for Databases: Harnessing AI for Smarter, Safer Permissions.Attaluri Vivekchowdary - 2023 - International Journal of Innovative Research in Science, Engineering and Technology (Ijirset) 12 (4):4702-4712.
    In the evolving landscape of data security, traditional access control mechanisms often fall short in addressing dynamic and context-specific requirements. As data breaches become more sophisticated, organizations require more adaptive and intelligent access control strategies. This paper explores the integration of Artificial Intelligence (AI) into Just-in-Time (JIT) access control models to enhance database security. By leveraging AI, we aim to create adaptive, context-aware permission systems that grant access precisely when needed, reducing the attack surface and mitigating unauthorized access risks. We (...)
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  44. Older adults' safety and security online: A post-pandemic exploration of attitudes and behaviors.Edgar Pacheco - 2024 - Journal of Digital Media and Interaction 7 (17):107-126.
    Older adults’ growing use of the internet and related technologies, further accelerated by the COVID-19 pandemic, has prompted not only a critical examination of their behaviors and attitudes about online threats but also a greater understanding of the roles of specific characteristics within this population group. Based on survey data and using descriptive and inferential statistics, this empirical study delves into this matter. The behaviors and attitudes of a group of older adults aged 60 years and older (n=275) regarding different (...)
    Download  
     
    Export citation  
     
    Bookmark  
  45.  30
    AI Powered SOCs Detect and Respond to Cyber Security Threats in Real Time by using Deep Learning.Jakati Mabu DrK. V. Shiny, Kadari Rohith, Challa Bhargava Rami Reddy, Chitra Ganesh - 2025 - International Journal of Innovative Research in Science Engineering and Technology 14 (4).
    The increasing complexity and volume of cyber threats necessitate a more advanced and proactive approach to cybersecurity. Traditional Security Operations Centers (SOCs) rely on rule-based systems and manual analysis, which are often insufficient to counter evolving attack vectors. Artificial Intelligence (AI), particularly Machine Learning (ML) and Blockchain technology, has emerged as a game-changer in enhancing SOC operations, improving threat detection, response, and mitigation capabilities. Machine Learning algorithms can analyze vast amounts of security data in real time, identifying anomalies and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  46. Cybercrime and Online Safety: Addressing the Challenges and Solutions Related to Cybercrime, Online Fraud, and Ensuring a Safe Digital Environment for All Users— A Case of African States (10th edition).Emmanuel N. Vitus - 2023 - Tijer- International Research Journal 10 (9):975-989.
    The internet has made the world more linked than ever before. While taking advantage of this online transition, cybercriminals target flaws in online systems, networks, and infrastructure. Businesses, government organizations, people, and communities all across the world, particularly in African countries, are all severely impacted on an economic and social level. Many African countries focused more on developing secure electricity and internet networks; yet, cybersecurity usually receives less attention than it should. One of Africa's major issues is the lack (...)
    Download  
     
    Export citation  
     
    Bookmark  
  47.  30
    Mitigating Zero Trust Implementation Challenges in Enterprise Network Security: A 2020 Perspective.Chadalavada Jaswanth - 2021 - International Journal of Advanced Research in Education and Technology 8 (1):453-456.
    With the rise of remote work and cloud-first strategies in 2020, the traditional perimeter-based security model became increasingly obsolete. Zero Trust Architecture (ZTA), which emphasizes “never trust, always verify,” emerged as a strategic framework to mitigate evolving cybersecurity threats, especially those exacerbated by the COVID-19 pandemic. Despite its theoretical robustness, implementing Zero Trust in enterprise environments revealed several technical and organizational roadblocks, including identity-centric access control, network segmentation, legacy system compatibility, and the scalability of real-time monitoring. This paper evaluates (...)
    Download  
     
    Export citation  
     
    Bookmark  
  48.  19
    ENHANCING ENTERPRISE CLOUD SECURITY: PROTECTING CRITICAL DATA AND INFRASTRUCTURE.Baladari Venkata - 2020 - International Journal of Business Quantitative Economics and Applied Management Research 6 (6):85-98.
    The rapid adoption of cloud computing by businesses has led to substantial cybersecurity concerns, necessitating comprehensive security systems to safeguard cloud infrastructure. Cloud environments' multi-tenant nature renders systems vulnerable to threats including unauthorized access, data theft, and distributed denial-of-service (DDoS) attacks. Protecting data confidentiality, privacy, and regulatory adherence requires implementing a combination of encryption, authentication protocols, and intrusion detection measures. These risks have been addressed through the use of sophisticated methods, such as dynamic remote data auditing, decentralized access control, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  49.  18
    Best Practices for Implementing Robust Security Measures.Munnangi Sivasatyanarayanareddy - 2019 - Turkish Journal of Computer and Mathematics Education 10 (2):2032-2037.
    In today’s digital landscape, organizations leveraging Pega Business Process Management (BPM) face significant security challenges as they strive to protect sensitive business processes from evolving cyber threats. This article explores best practices for implementing robust security measures within Pega BPM environments, focusing on secure configuration settings, identity and access management (IAM), encryption standards, and real-time monitoring. By integrating Pega BPM with broader cybersecurity frameworks, organizations can proactively detect and mitigate vulnerabilities, ensuring the integrity and confidentiality of critical business operations. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  50.  86
    Home Depot Breach or The Rise of Ransomware.Vaka Pavan Reddy - 2014 - Neuroquantology 12 (4):485-491.
    The Home Depot data breach, which occurred in 2014, marked a significant turning point in the cybersecurity landscape, drawing attention to the increasing prevalence of ransomware and cyberattacks targeting large-scale retail organizations. This breach exposed the personal and financial information of over 56 million customers and highlighted the vulnerabilities in the systems used by major corporations. The attack was attributed to a sophisticated ransomware operation that gained access through a third-party vendor’s compromised credentials, ultimately enabling cybercriminals to infiltrate Home (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
1 — 50 / 109