Applications of cryptography in database: a review

H Xu, K Thakur, AS Kamruzzaman… - 2021 IEEE International …, 2021 - ieeexplore.ieee.org
Cryptography is the foundation and core of network security. Privacy protection, sensitive
information is particularly important, so whether it is system development or app …

Social engineering incidents and preventions

A Kamruzzaman, K Thakur, S Ismat… - 2023 IEEE 13th …, 2023 - ieeexplore.ieee.org
Social Engineering is a technique used to obtain information through tactics using
persuasion, intimidation, coercion, extortion, or blackmail. Social engineers study human …

Challenges of cyber security and the emerging trends

ML Ali, K Thakur, B Atobatele - Proceedings of the 2019 ACM …, 2019 - dl.acm.org
In the field of technology, cybersecurity has a significant role, and the security data become
one between the most critical problems faced in today's world. When there is discussion …

Network packet sniffing and defense

ML Ali, S Ismat, K Thakur… - 2023 IEEE 13th …, 2023 - ieeexplore.ieee.org
A person sits comfortably at home and enjoys the convenience brought by the internet,
enjoys online shopping, receives emails from friends or close acquaintances, and handles …

Brexit impact on cyber security of United Kingdom

M Saleem - 2019 International Conference on Cyber Security …, 2019 - ieeexplore.ieee.org
In 2017, cyber-attacks like mandate alone cost UK businesses£ 32.2 million. Cyber security
is laced with various key social, political and economic challenges of the 21st century. The …

[PDF][PDF] Enhancing Cyber Security Resilience: Phishing Defense and the Importance of Measurement Strategies

F Sharif - 2024 - researchgate.net
In an era marked by increasing digital transformation, phishing attacks have emerged as a
pervasive threat, exploiting human vulnerabilities and technological weaknesses. These …

[PDF][PDF] Phishing Defense Mechanisms: Strategies for Effective Measurement and Cyber Threat Mitigation

J Hera - 2024 - researchgate.net
Phishing attacks continue to represent one of the most prevalent and damaging
cybersecurity threats facing organizations today. These deceptive tactics exploit human …

New approach to risk controlling in information security

G Zolotareva, V Zolotarev, S Filko - Journal of Physics …, 2019 - iopscience.iop.org
At present, current methods and means of enterprise risk management are not integrated
within the framework of a single methodology. Accordingly, they can be used only when …

[PDF][PDF] Threats and Emerging Developments in Cyber Security.

M Murugesan, P Balamurugan, J Santhosh… - …, 2020 - pdfs.semanticscholar.org
Cyber security plays a significant role in science. Data or information security is one of the
crucial issues facing the world, when there is discussion about the rapidly growing …

Impact of Cyber Security on Network Traffic

GT Ayodele - Authorea Preprints, 2024 - techrxiv.org
The importance of cybersecurity in safeguarding network traffic is crucial in our increasingly
interconnected world. Our research investigates the significant impact of cybersecurity on …