To see the other types of publications on this topic, follow the link: Email Authentication Protocols.

Journal articles on the topic 'Email Authentication Protocols'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 35 journal articles for your research on the topic 'Email Authentication Protocols.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Kim, Tae Jin, Yu Xue Piao, Chang Ho Seo, and Jeong Hyun Yi. "Automatic Email Configuration System Using Multimodal Authentication Interfaces for Smartphones." Applied Mechanics and Materials 411-414 (September 2013): 7–11. http://dx.doi.org/10.4028/www.scientific.net/amm.411-414.7.

Full text
Abstract:
Email services are among the services most frequently utilized by smartphone users. However, setting up a smartphone email service is very frustrating for ordinary users as the process requires knowledge of complicated email server protocols and types of security. To eliminate the inconvenience, a method in which web mail setting information is preconfigured within an app has been applied to representative smartphone email accounts. However, it is not practical nor realistic to store all web mail setting information in the app; furthermore, private server setting information for schools, working areas and so on, has to be separately established by users. In this paper, we propose a system that removes these inconveniences faced when setting up smartphone email services. The proposed system automatically downloads setting information preconfigured on the email server for users.
APA, Harvard, Vancouver, ISO, and other styles
2

Gunn, Lachlan J., Ricardo Vieitez Parra, and N. Asokan. "Circumventing Cryptographic Deniability with Remote Attestation." Proceedings on Privacy Enhancing Technologies 2019, no. 3 (2019): 350–69. http://dx.doi.org/10.2478/popets-2019-0051.

Full text
Abstract:
Abstract Deniable messaging protocols allow two parties to have ‘off-the-record’ conversations without leaving any record that can convince external verifiers about what either of them said during the conversation. Recent events like the Podesta email dump underscore the importance of deniable messaging to politicians, whistleblowers, dissidents and many others. Consequently, messaging protocols like Signal and OTR are designed with cryptographic mechanisms to ensure deniable communication, irrespective of whether the communications partner is trusted. Many commodity devices today support hardware-assisted remote attestation which can be used to convince a remote verifier of some property locally observed on the device. We show how an adversary can use remote attestation to undetectably generate a non-repudiable transcript from any deniable protocol (including messaging protocols) providing sender authentication, proving to skeptical verifiers what was said. We describe a concrete implementation of the technique using the Signal messaging protocol. We then show how to design protocols that are deniable even against an adversary capable of attestation, and in particular how attestation itself can be used to restore deniability by thwarting realistic classes of adversary.
APA, Harvard, Vancouver, ISO, and other styles
3

Nasir, Manir, Danlami Gabi, Salihu Alhassan Libata, and Mujtaba Haruna. "COUNTERMEASURE TO MAN-IN-THE-MIDDLE ATTACK BASED ON EMAIL HIJACKING USING TRY-HYBRID SUPERVISED LEARNING TECHNIQUES." FUDMA JOURNAL OF SCIENCES 9, no. 2 (2025): 66–74. https://doi.org/10.33003/fjs-2025-0902-3062.

Full text
Abstract:
Email communication faces an escalating threat from Man-in-the-Middle (MitM) attacks, which compromise the security and integrity of emails, leading to the risk of data breaches, financial losses, and reputational harm. Traditional email security measures, such as SSL/TLS encryption and authentication protocols (e.g., SPF, DKIM, DMARC), have become increasingly insufficient in countering these advanced MitM attacks. The growing sophistication of MitM techniques, including SSL stripping, DNS spoofing, and session hijacking. This research proposes a countermeasure to MitM attacks based on email hijacking using a try-hybrid supervised learning technique. timestamps, IP addresses, port numbers, packet sizes, and various security-related indicators. The development of the MitM attack detection technique employed a try-hybrid mitm attack detection technique, which combines the strengths of three machine learning algorithms: Random Forest, Gradient Boosting Machine (GBM), and Support Vector Machine (SVM).The results demonstrate the effectiveness of the proposed try-hybrid model, achieving an accuracy of 95.8%, surpassing Benchmark 1 (92.4%) and Benchmark 2 (90.1%). Precision improves to 94.3% compared to Benchmark 1 (91.0%) and Benchmark 2 (88.5%). Similarly, recall is enhanced to 96.5% against Benchmark 1 (89.7%) and Benchmark 2 (87.2%). The F1 score of 95.4% significantly outperforms Benchmark 1 (90.3%) and Benchmark 2 (87.8%). Moreover, the proposed model achieves a lower False Positive Rate (FPR) of 3.2% compared to Benchmark 1 (5.6%) and Benchmark 2 (6.8%).These results highlight the robustness and reliability of the try-hybrid model in enhancing email security by effectively detecting and mitigating advanced MitM attacks.
APA, Harvard, Vancouver, ISO, and other styles
4

Beck, Gabrielle, Arka Rai Choudhuri, Matthew Green, Abhishek Jain, and Pratyush Ranjan Tiwari. "Time-Deniable Signatures." Proceedings on Privacy Enhancing Technologies 2023, no. 3 (2023): 79–102. http://dx.doi.org/10.56553/popets-2023-0071.

Full text
Abstract:
In this work we propose time-deniable signatures (TDS), a new primitive that facilitates deniable authentication in protocols such as DKIM-signed email. As with traditional signatures, TDS provide strong authenticity for message content, at least {\em for a sender-chosen period of time}. Once this time period has elapsed, however, time-deniable signatures can be forged by any party who obtains a signature. This forgery property ensures that signatures serve a useful authentication purpose for a bounded time period, while also allowing signers to plausibly disavow the creation of older signed content. Most critically, and unlike many past proposals for deniable authentication, TDS do not require interaction with the receiver or the deployment of any persistent cryptographic infrastructure or services beyond the signing process ( e.g., APIs to publish secrets or author timestamp certificates.) We first investigate the security definitions for time-deniability, demonstrating that past definition attempts are insufficient (and indeed, allow for broken signature schemes.) We then propose an efficient construction of TDS based on well-studied assumptions.
APA, Harvard, Vancouver, ISO, and other styles
5

Savya, Savya, R. Mohanraj, K. Sharada, Savya Sachi, K. Neelima, and Punyala Ramadevi. "Securing the Digital Commerce Spectrum and Cyber Security Strategies for Web, E-commerce, M-commerce, and E-mail Security." Journal of Cybersecurity and Information Management 14, no. 1 (2024): 34–49. http://dx.doi.org/10.54216/jcim.140103.

Full text
Abstract:
Secure protection of sensitive data and financial transactions is of the utmost importance in the dynamic world of online trade. In this study, we present a full-stack security architecture that uses five separate algorithms: ECF, Transaction Anomaly Detection, Adaptive Threat Intelligence, Behavioral Biometric Authentication, and Dynamic Encryption Protocol. By creating encryption keys on the fly while the user logs in, the DEP method lays a solid groundwork for safe data transfer. Behavioral biometric authentication (BBA) uses DEP output to verify users based on their distinct behavior, which is an extra layer of security. By combining both current and past threat information, the ATI algorithm is able to constantly adjust security protocols, providing a preventative shield against new dangers. TAD is an expert at detecting anomalies in online purchases, which helps keep financial transactions honest. When ECF and DEP work together, they filter email content, making communication more secure. Flowcharts help to illustrate the interactions between various algorithms, which helps to understand their operations in detail. Every algorithm's importance is brought to light by an ablation study, which shows how each one contributes and how they all work together to affect the overall security posture. The suggested security framework outperforms the state-of-the-art in terms of efficacy, adaptability, and usability, according to performance evaluations conducted using a number of metrics. These findings can help decision-makers build a strong security plan that is specific to the challenges of online shopping. To conclude, the suggested framework is an integrated and complementary strategy that will strengthen online trade in the face of several cyber dangers while simultaneously protecting the confidentiality, authenticity, and availability of all associated communications and transactions.
APA, Harvard, Vancouver, ISO, and other styles
6

Guest, Jodie L., Elizabeth Adam, Iaah L. Lucas, et al. "Methods for Authenticating Participants in Fully Web-Based Mobile App Trials from the iReach Project: Cross-sectional Study." JMIR mHealth and uHealth 9, no. 8 (2021): e28232. http://dx.doi.org/10.2196/28232.

Full text
Abstract:
Background Mobile health apps are important interventions that increase the scale and reach of prevention services, including HIV testing and prevention counseling, pre-exposure prophylaxis, condom distribution, and education, of which all are required to decrease HIV incidence rates. The use of these web-based apps as well as fully web-based intervention trials can be challenged by the need to remove fraudulent or duplicate entries and authenticate unique trial participants before randomization to protect the integrity of the sample and trial results. It is critical to ensure that the data collected through this modality are valid and reliable. Objective The aim of this study is to discuss the electronic and manual authentication strategies for the iReach randomized controlled trial that were used to monitor and prevent fraudulent enrollment. Methods iReach is a randomized controlled trial that focused on same-sex attracted, cisgender males (people assigned male at birth who identify as men) aged 13-18 years in the United States and on enrolling people of color and those in rural communities. The data were evaluated by identifying possible duplications in enrollment, identifying potentially fraudulent or ineligible participants through inconsistencies in the data collected at screening and survey data, and reviewing baseline completion times to avoid enrolling bots and those who did not complete the baseline questionnaire. Electronic systems flagged questionable enrollment. Additional manual reviews included the verification of age, IP addresses, email addresses, social media accounts, and completion times for surveys. Results The electronic and manual strategies, including the integration of social media profiles, resulted in the identification and prevention of 624 cases of potential fraudulent, duplicative, or ineligible enrollment. A total of 79% (493/624) of the potentially fraudulent or ineligible cases were identified through electronic strategies, thereby reducing the burden of manual authentication for most cases. A case study with a scenario, resolution, and authentication strategy response was included. Conclusions As web-based trials are becoming more common, methods for handling suspicious enrollments that compromise data quality have become increasingly important for inclusion in protocols. International Registered Report Identifier (IRRID) RR2-10.2196/10174
APA, Harvard, Vancouver, ISO, and other styles
7

Grindrod, Kelly, Jonathan Boersema, Khrystine Waked, Vivian Smith, Jilan Yang, and Catherine Gebotys. "Locking it down." Canadian Pharmacists Journal / Revue des Pharmaciens du Canada 150, no. 1 (2016): 60–66. http://dx.doi.org/10.1177/1715163516680226.

Full text
Abstract:
Objective: To explore the privacy and security of free medication applications (apps) available to Canadian consumers. Methods: The authors searched the Canadian iTunes store for iOS apps and the Canadian Google Play store for Android apps related to medication use and management. Using an Apple iPad Air 2 and a Google Nexus 7 tablet, 2 reviewers generated a list of apps that met the following inclusion criteria: free, available in English, intended for consumer use and related to medication management. Using a standard data collection form, 2 reviewers independently coded each app for the presence/absence of passwords, the storage of personal health information, a privacy statement, encryption, remote wipe and third-party sharing. A Cohen’s Kappa statistic was used to measure interrater agreement. Results: Of the 184 apps evaluated, 70.1% had no password protection or sign-in system. Personal information, including name, date of birth and gender, was requested by 41.8% (77/184) of apps. Contact information, such as address, phone number and email, was requested by 25% (46/184) of apps. Finally, personal health information, other than medication name, was requested by 89.1% (164/184) of apps. Only 34.2% (63/184) of apps had a privacy policy in place. Conclusion: Most free medication apps offer very limited authentication and privacy protocols. As a result, the onus currently falls on patients to input information in these apps selectively and to be aware of the potential privacy issues. Until more secure systems are built, health care practitioners cannot fully support patients wanting to use such apps.
APA, Harvard, Vancouver, ISO, and other styles
8

Musliyana, Zuhar, Andita Ghaitsa Satira, Mahendar Dwipayana, and Ayu Helinda. "Integrated Email Management System Based Google Application Programming Interface Using OAuth 2.0 Authorization Protocol." Elkawnie 6, no. 1 (2020): 109. http://dx.doi.org/10.22373/ekw.v6i1.5545.

Full text
Abstract:
Abstract : Google Apps is a service provided by Google that allows users to use Google products with their own domain names. Among the products offered by Google Apps are email (Gmail), Docs (Google Drive), and Classroom services. In addition, Google Apps also provides Application Programming Interface (API) services that can be used by developers to take advantage of various features provided by Google. Universitas Ubudiyah Indonesia (UUI) is one of the universities that use Google Apps service for managing student emails. At present, UUI student email management through Google Apps is still not integrated with academic information system data. As a result, UUI must allocate special resources for managing student emails manually. Based on these problems, this study proposes an integration system for UUI student email management using the Google Apps API. This system is designed using PHP programming. The Google Apps API authentication method uses OAuth 2.0. The results of this study indicate that student email management on Google Apps can be done through campus academic information systems. With this system, students can activate email independently without having to be registered manually to the Google Apps page by the campus email managers.Abstrak : Google Apps adalah sebuah layanan yang disediakan oleh Google yang memungkinkan pengguna dapat menggunakan produk google dengan nama domain sendiri. Di antaranya produk yang disediakan Google Apps yaitu layanan email (Gmail), dokumen (Google Drive), dan Classroom. Selain itu, Google Apps juga menyediakan layanan Application Programming Interface (API) yang dapat dimanfaatkan oleh pengembang untuk memanfaatkan berbagai layanan yang disediakan oleh Google. Universitas Ubudiyah Indonesia (UUI) merupakan salah satu universitas yang menggunakan layanan Google Apps untuk pengelolaan email mahasiswa. Saat ini pengelolaan email mahasiswa UUI melalui Google Apps masih belum terintegrasi dengan data sistem informasi akademik. Akibatnya UUI harus mengalokasikan sumber daya khusus untuk mengelola email mahasiswa secara manual. Berdasarkan permasalahan tersebut penelitian ini mengusulkan sistem integrasi pengelolaan email mahasiswa UUI menggunakan API Google Apps. Sistem ini dirancang menggunakan pemograman PHP. Metode autentikasi API Google Apps menggunakan OAuth 2.0. Hasil penelitian ini menunjukkan pengelolaan email mahasiswa pada Google Apps dapat dilakukan melalui sistem informasi akademik kampus. Dengan adanya sistem ini mahasiswa dapat melakukan aktivasi email secara mandiri tanpa harus didaftarkan secara manual ke halaman Google Apps oleh pengelola email kampus.
APA, Harvard, Vancouver, ISO, and other styles
9

Khalifa, Othman, Tengku Hanis Sofea Binti Tengku Nor Effendy, Muhammed Zaharadeen Ahmed, Elmahdi El-Khazmi, and Abdelrahim Nasser Esgiar. "Blockchain Based Email Security to Mitigate Phishing Attack." Asian Journal of Electrical and Electronic Engineering 4, no. 2 (2024): 77–86. https://doi.org/10.69955/ajoeee.2024.v4i2.73.

Full text
Abstract:
Due to the rapid development of research in blockchain technology and cryptocurrencies, all sectors of an economy rely on their security essentials to mitigate various patterns of attack on the Internet. The smart contract is a transaction protocol that strengthens, verifies, and automatically enforces agreements after negotiation between multiple untrustworthy blockchain parties. Despite the positive aspects of smart contracts, issues of security risks, weaknesses, and legal challenges continue to undermine their implementation. This paper proposes an enhanced email verification system using blockchain-enabled smart contracts. In this framework, blockchain email enables swift verification of all emails being transmitted by introducing a challenging framework that prevents an internet attacker or cybercriminal from altering the authentication process. An acknowledgement email will be transmitted to the sender upon successful delivery, and the receiver can automatically receive the email with unique credentials. The findings reveal that the proposed system significantly mitigates phishing attacks by ensuring email authenticity and transaction integrity through blockchain hashing techniques, thereby enhancing email security in both online and offline environments.
APA, Harvard, Vancouver, ISO, and other styles
10

Li, Daoming, Qiang Chen, and Lun Wang. "Phishing Attacks: Detection and Prevention Techniques." Journal of Industrial Engineering and Applied Science 2, no. 4 (2024): 48–53. https://doi.org/10.5281/zenodo.12789572.

Full text
Abstract:
Phishing attacks are among the most prevalent and damaging cyber threats faced by individuals and organizations today. These attacks deceive users into revealing sensitive information, leading to significant financial and reputational damage. This paper explores various techniques for detecting and preventing phishing attacks, examining their effectiveness and implementation challenges. Through comprehensive experiments and analysis, we demonstrate the efficacy of different detection methods and propose best practices for mitigating phishing threats. Our study includes a detailed evaluation of machine learning algorithms, heuristic-based approaches, and user education programs, supported by experimental data and real-world case studies.Our research shows that while machine learning algorithms offer high detection accuracy, they require significant computational resources and continuous updates to remain effective against evolving phishing techniques. Heuristic-based approaches, on the other hand, provide quick detection with lower resource demands but may struggle with new or sophisticated attacks. User education programs are essential for long-term phishing prevention, as they empower users to recognize and avoid phishing attempts, significantly reducing the risk of successful attacks. By combining these methods, organizations can develop a robust defense strategy against phishing threats.
APA, Harvard, Vancouver, ISO, and other styles
11

Kerta, Johan Muliadi, Panji Adiprabowo, Eva Kusmiyati, and Sylvia Astri Wulandari Rahardjo. "Penggunaan Single Sign On (SSO) pada Jaringan Internet Badan Pengkajian dan Penerapan Teknologi (BPPT)." ComTech: Computer, Mathematics and Engineering Applications 2, no. 2 (2011): 880. http://dx.doi.org/10.21512/comtech.v2i2.2838.

Full text
Abstract:
Using various applications needs more than one authentication or user and password to login. Users in BPPT found this problem on their network application. Implementation of Single Sign On can help users to use only one authentication for many applications. Therefore a research is conducted to design and implement Single Sign On system that simplify and facilitate the user's email account to access application. Data are collected from literature study, system observation, and interviews while the design uses Network Development Life Cycle (NDLC) method. The research results in a Single Sign On system that utilizez Lightweight Directory Access Protocol (LDAP). In addition, Remote Authentication Dial-In User Service (RADIUS) is managed in accordance with the needs of the institution. Single Sign On system designed runs well and is able to provide conveniences for the user to use the services of existing applications, as it provides a standard email address to the user's identity. It also helps administrators to perform control of users trying to login.
APA, Harvard, Vancouver, ISO, and other styles
12

Zheng, Jiexin, Mudi Xu, Jianqing Li, et al. "STALE: A Scalable and Secure Trans-Border Authentication Scheme Leveraging Email and ECDH Key Exchange." Electronics 14, no. 12 (2025): 2399. https://doi.org/10.3390/electronics14122399.

Full text
Abstract:
In trans-border data (data transferred or accessed across national jurisdictions) exchange scenarios, identity authentication mechanisms serve as critical components for ensuring data security and privacy protection, with their effectiveness directly impacting the compliance and reliability of transnational operations. However, existing identity authentication systems face multiple challenges in trans-border contexts. Firstly, the transnational transfer of identity data struggles to meet the varying data-compliance requirements across different jurisdictions. Secondly, centralized authentication architectures exhibit vulnerabilities in trust chains, where single points of failure may lead to systemic risks. Thirdly, the inefficiency of certificate verification in traditional Public Key Infrastructure (PKI) systems fails to meet the real-time response demands of globalized business operations. These limitations severely constrain real-time identity verification in international business scenarios. To address these issues, this study proposes a trans-border distributed certificate-free identity authentication framework (STALE). The methodology adopts three key innovations. Firstly, it utilizes email addresses as unique user identifiers combined with a Certificateless Public Key Cryptography (CL-PKC) system for key distribution, eliminating both single-point dependency on traditional Certificate Authorities (CAs) and the key escrow issues inherent in Identity-Based Cryptography (IBC). Secondly, an enhanced Elliptic Curve Diffie–Hellman (ECDH) key-exchange protocol is introduced, employing forward-secure session key negotiation to significantly improve communication security in trans-border network environments. Finally, a distributed identity ledger is implemented, using the FISCO BCOS blockchain, enabling decentralized storage and verification of identity information while ensuring data immutability, full traceability, and General Data Protection Regulation (GDPR) compliance. Our experimental results demonstrate that the proposed method exhibits significant advantages in authentication efficiency, communication overhead, and computational cost compared to existing solutions.
APA, Harvard, Vancouver, ISO, and other styles
13

Marzuki, Khairan, Naufal Hanif, and I. Putu Hariyadi. "Application of Domain Keys Identified Mail, Sender Policy Framework, Anti-Spam, and Anti-Virus: The Analysis on Mail Servers." International Journal of Electronics and Communications Systems 2, no. 2 (2022): 65–73. http://dx.doi.org/10.24042/ijecs.v2i2.13543.

Full text
Abstract:
Viruses spread through email are often sent by irresponsible parties that aim to infect email users' servers. This background encouraged the author to analyze the application of DKIM, SPF, anti-spam, and anti-virus to avoid spam, viruses, and spoofing activities. The goal is for the server to prevent spam, spoofing, and viruses to ensure the security and convenience of email users and prevent the impact of losses caused by them. The design and analysis of DKIM, SPF, anti-spam, and anti-virus applications use the NDLC methodology. The process includes designing spam, spoofing, and virus filtering systems and performing installation and configuration simulations. The next stage is implementation, during which the previously developed system is tested on the spam filtering system, spoofing, and viruses. The last stage is the monitoring stage, where supervision is conducted on the approach to determine its success level. This study concludes that applying the DKIM protocol can prevent spoofing through private and public key-matching methods for authentication. Meanwhile, the application of the SPF protocol can prevent spoofing by authorizing the IP address of the sending server. Additionally, SpamAssassin, ClamAV and Amavisd-New can prevent spam and viruses from entering by checking email headers, bodies, and attachments.
APA, Harvard, Vancouver, ISO, and other styles
14

Chen, Hongyi. "Enhancing the Security of Transmission Control Protocol (TCP): Challenges and Solutions for Modern Network Threats." Applied and Computational Engineering 133, no. 1 (2025): 46–53. https://doi.org/10.54254/2755-2721/2025.20599.

Full text
Abstract:
Transmission Control Protocol (TCP), the backbone of internet communication, ensures reliable, connection-oriented data transmission. Despite its widespread use in areas such as email, web browsing, and file transfer, TCP faces significant security vulnerabilities stemming from its design era, which prioritized functionality over security. Common threats include TCP sequence number prediction, session hijacking, SYN flood attacks, and TCP Reset attacks. Existing mitigation strategies, such as TCP-AO, SSL/TLS encryption, and network-based security measures like IDS/IPS, have reduced risks but face challenges like performance overhead and compatibility issues. This study reviews the root causes of TCP vulnerabilities, evaluates existing solutions, and highlights gaps in addressing threats within modern network architectures. While current measures are effective to an extent, future research must explore advanced technologies such as quantum cryptography, blockchain-based authentication, and AI-driven anomaly detection to enhance TCP security and adaptability. This work underscores the urgent need for interdisciplinary collaboration and innovation to secure TCP in evolving digital ecosystems.
APA, Harvard, Vancouver, ISO, and other styles
15

VEERASWAMY, Mr D., ABHILASH DAVARASINGI, M. BALAMURALIKRISHNA, and A. CHAITANYA. "PI GUARD ENHANCED DOOR SECURITY WITH RASPBERRY PI." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 12 (2024): 1–7. https://doi.org/10.55041/ijsrem39891.

Full text
Abstract:
Abstract—There has been a rapid rise in cases of theft; this requires urgent security measures against these crimes. Thieves should be apprehended early and effectively. Here comes a door security system proposed based on Raspberry Pi to handle such matters. It comprises a keypad to provide password authentication, the Pi Camera to take snaps in case of three failures, and a buzzer that is used for sound warnings. In the case of three wrong password attempts, the system captures an intruder’s picture and delivers them via email to the resident along with the nearest police station with the help of SMTP. The buzzer rings out with every incorrect attempt. A solenoid or stepper motor acts as a lock for physical security. This system combines affordability, scalability, and efficiency in enhancing responsiveness and deterrence during unauthorized access at- tempts, providing a practical and modern solution for residential security. Keywords:Internet of Things, Raspberry Pi, SMTP Protocol, Real-Time Surveillance.
APA, Harvard, Vancouver, ISO, and other styles
16

Septiandoko, Try Budi, Desmulyati Desmulyati, and Andi Taufik. "Implementasi Jaringan Internet Site To Site VPN Dengan Metode IPSec Pada PT Telkom Akses." Computer Science (CO-SCIENCE) 1, no. 1 (2021): 18–26. http://dx.doi.org/10.31294/coscience.v1i1.138.

Full text
Abstract:
Virtual Private Network (VPN) is a local communication network that is connected through a public network, with a private data security network, the closure of data transfer from illegal access and network scalability are the main standards in a Virtual Private Network (VPN). In building a VPN at PT. Telkom access is done using the Internet Protocol Security (IP Sec) method. PT Telkom Akses is engaged in the business of providing construction services and managing network infrastructure. At this time PT Telkom Akses sent company data using email, if using company email could not ensure the security of the data sent. PT Telkom, which has many branch offices, is required to have a fast and stable internet connection for transmitting confidential company data. Looking at the existing problems, there are several things that are obtained including, communication between users is still not optimal. Data transmission from branch offices to the head office or vice versa is still not encrypted, which means that data can be viewed or retrieved by unauthorized persons and company confidentiality can be threatened. So creating a VPN network with the IPSEC method will get a more stable and safer connection, files and folders that can be shared by network members, making it easier for network administrators to manage the network if the distance between sites is constrained and the network is well encrypted and already using authentication to connect between sites.
APA, Harvard, Vancouver, ISO, and other styles
17

A., Sabitha Banu, and Dr G. Padmavathi. "Hybrid Detection and Mitigation of DNS Protocol MITM attack based on Firefly algorithm with Elliptical Curve Cryptography." EAI Endorsed Transactions on Pervasive Health and Technology 8, no. 4 (2022): e3. http://dx.doi.org/10.4108/eetpht.v8i4.3081.

Full text
Abstract:
A Domain Name Server is a critical Internet component. It enables users to surf the web and send emails. DNS is a database used by millions ofcomputers to determine which address best answers a user’s query. DNS is an unencrypted protocol that may be exploited in numerous ways. The mostpopular DNS MITM attack uses DNS poisoning to intercept communications and fake them. DNS servers do not verify the IP addresses they forwardtraffic to. In DNS attacks, the attacker either targets the domain name servers or attempts to exploit system weaknesses. The Proposed FFOBLA-ECC model detects the DNS Spoofed nodes in a wireless network using the optimized firefly boosted LSTM with the help of TTL and RTR parametersreceived from the simulation environment and provides authentication between the nodes in order to mitigate it using the Elliptical curve cryptography. The proposed model results are different from the other methods and yield highly accurate results beyond 98% compared with the existing RF, ARF, and KNN methods.
APA, Harvard, Vancouver, ISO, and other styles
18

Sahrin, Muhammad Aditya, Rudi Heriansyah, and Dewi Sartika. "Implementasi Single Sign-On Menggunakan Protokol Openid Connect (OIDC) Pada Virtual Private Server (VPS)." Jurnal Nasional Ilmu Komputer 5, no. 2 (2024): 98–108. http://dx.doi.org/10.47747/jurnalnik.v5i2.1748.

Full text
Abstract:
Single Sign-On (SSO) is an authentication method that allows users to access multiple website services using one account and one login process. OpenID Connect (OIDC) is a protocol based on OAuth 2.0 and provides user identity information through JWT (JSON Web Token) tokens. Virtual Private Server (VPS) is a service that can be configured according to user needs. Internet users have many accounts needed to access various online services such as email, social media, online shopping, and many more. Each online service usually has a different username and password. Users often find it difficult to remember each password needed. In addition, using the same password on each online service is also not recommended because it can increase security risks. Based on this problem, an SSO system is needed that is useful for helping users in logging in. The SSO system will be tested with two Dummy Students and Dummy Elearning clients using Black Box Testing with the Equivalence Partitioning technique. From the test results, it was obtained that the SSO system showed that 83% of the test scenarios were successfully carried out
APA, Harvard, Vancouver, ISO, and other styles
19

A., Sabitha Banu, and G. Padmavathi. "Hybrid Detection and Mitigation of DNS Protocol MITM attack based on Firefly algorithm with Elliptical Curve Cryptography." EAI Endorsed Transactions on Pervasive Health and Technology 9, no. 1 (2023): e2. http://dx.doi.org/10.4108/eetpht.v9i1.3177.

Full text
Abstract:
A Domain Name Server is a critical Internet component. It enables users to surf the web and send emails. DNS is a database used by millions of computers to determine which address best answers a user’s query. DNS is an unencrypted protocol that may be exploited in numerous ways. The most popular DNS MITM attack uses DNS poisoning to intercept communications and fake them. DNS servers do not verify the IP addresses they forward traffic to. In DNS attacks, the attacker either targets the domain name servers or attempts to exploit system weaknesses. The Proposed FFOBLA-ECC model detects the DNS Spoofed nodes in a wireless network using the optimized firefly boosted LSTM with the help of TTL and RTR parameters received from the simulation environment and provides authentication between the nodes in order to mitigate it using the Elliptical curve cryptography. The proposed model results are different from the other methods and yield highly accurate results beyond 98% compared with the existing RF, ARF, and KNN methods.
APA, Harvard, Vancouver, ISO, and other styles
20

Ansari, Md Hussain. "Enhancing ATM Security: A Smart Approach." Advancement of IoT in Blockchain Technology and its Applications 3, no. 1 (2024): 14–19. http://dx.doi.org/10.46610/aibtia.2024.v03i01.002.

Full text
Abstract:
Typically, in ATM transactions, unauthorized individuals can easily withdraw cash merely by obtaining someone's PIN. To bolster the security of transactions and ensure they occur under the account holder's knowledge and consent, we've implemented RF readers for authentication. Our system is equipped with a centralized database containing the RFID of each individual, accompanied by their photograph for verification purposes. When a person presents their RF tag to the RF reader, it activates a camera, capturing the cardholder's image. Subsequently, the system conducts a comparison with the database to verify the ID and match it with the individual's facial features. If the facial recognition fails to align with the original card account holder, the system promptly dispatches an image along with an OTP via email to the account holder, signalling an attempted unauthorized use of their ATM. Access to cash withdrawal is granted only upon successful entry of the OTP, thereby thwarting potential fraud. Conversely, if the account holder initiates a transaction, the system recognizes their face from its database and authorizes direct access to withdraw cash from the ATM without necessitating further verification steps. This comprehensive security protocol significantly mitigates the risk of fraudulent ATM transactions, providing account holders with heightened assurance regarding the safeguarding of their funds and personal information.
APA, Harvard, Vancouver, ISO, and other styles
21

Muzigura, Goodluck, and Respickius Casmir. "Evaluation of Measures Taken by Telecommunication Companies in Preventing Social Engineering Attacks in Tanzania." European Journal of Theoretical and Applied Sciences 1, no. 4 (2023): 1248–59. http://dx.doi.org/10.59324/ejtas.2023.1(4).114.

Full text
Abstract:
This study aimed to evaluate the measures taken by telecommunication companies in preventing social engineering attacks in Tanzania. The study was guided by the deception theory, the researcher employed a descriptive research design and quantitative approach to conduct this study. Data was collected by using a questionnaire administered to the selected telecommunication companies in Tanzania. Furthermore, the obtained findings were as follows; most of the respondents who participated in this study are aware of social engineering and that they experienced social engineering. The study also revealed that there are common social engineering attacks experienced by the respondents such as business collaboration benefits, alleged wrong remittance of money, sim swaps, SMS phishing and fraudulent SMS from lost or stolen phones, password requisitions and links sharing. The findings of this study went further to reveal that social engineering has effects such as loss of sensitive data, financial loss, reputational damage, disruption of operations as well as legal and compliance issue. The general findings of this study show that most of the respondents said that there is a presence of security measures to prevent social engineering such as the provision of the awareness program, enabling the use of multifactor authentication, there is implementation of policies around social media usage, provision of regular software updates, regular review of security protocols, provision of well-known customer care services number. On the other hand, the study also revealed that telecommunication companies use the following ways to minimize social engineering attacks, provision of security awareness training for employees, implementing security policies and procedures, regularly reviewing and updating security protocols, detecting and responding to social engineering attacks, placing limits on the access each member has in the system, always require a username and password to be configured. On the strategies used to prevent social engineering, the finding of this study showed that telecommunication companies should ensure encrypting data, proper verification of emails or instructions sent to customers, ensure that even if hackers intercept communication they can’t access information contained within, use of SSL certificates from trusted authorities, incorporating phishing and malicious detection solutions into security stack. This study concludes that telecommunications ensure routine reviews of security standards, daily notifications for customers and other system users, and the availability of a well-known customer care services number. Due to the difficulties that information system users face, businesses have been using a variety of protection techniques to avoid social engineering, from putting up multifactor authentication for users' accounts to teaching employees how to spot suspect activity. Hence it is recommended that it is necessary to deploy mechanisms like machine learning-based ways to defend against social engineering-based assaults since cybercriminals exploit human activities to breach security as well as using the security features on messages (filter unknown senders) and calls (silence unknown callers).
APA, Harvard, Vancouver, ISO, and other styles
22

Goodluck, Muzigura, and Casmir Respickius. "Evaluation of Measures Taken by Telecommunication Companies in Preventing Social Engineering Attacks in Tanzania." European Jornal of Theoretical and Sciences 1, no. 4 (2023): 1248–59. https://doi.org/10.59324/ejtas.2023.1(4).114.

Full text
Abstract:
This study aimed to evaluate the measures taken by telecommunication companies in preventing social engineering attacks in Tanzania. The study was guided by the deception theory, the researcher employed a descriptive research design and quantitative approach to conduct this study. Data was collected by using a questionnaire administered to the selected telecommunication companies in Tanzania. Furthermore, the obtained findings were as follows; most of the respondents who participated in this study are aware of social engineering and that they experienced social engineering. The study also revealed that there are common social engineering attacks experienced by the respondents such as business collaboration benefits, alleged wrong remittance of money, sim swaps, SMS phishing and fraudulent SMS from lost or stolen phones, password requisitions and links sharing. The findings of this study went further to reveal that social engineering has effects such as loss of sensitive data, financial loss, reputational damage, disruption of operations as well as legal and compliance issue. The general findings of this study show that most of the respondents said that there is a presence of security measures to prevent social engineering such as the provision of the awareness program, enabling the use of multifactor authentication, there is implementation of policies around social media usage, provision of regular software updates, regular review of security protocols, provision of well-known customer care services number. On the other hand, the study also revealed that telecommunication companies use the following ways to minimize social engineering attacks, provision of security awareness training for employees, implementing security policies and procedures, regularly reviewing and updating security protocols, detecting and responding to social engineering attacks, placing limits on the access each member has in the system, always require a username and password to be configured. On the strategies used to prevent social engineering, the finding of this study showed that telecommunication companies should ensure encrypting data, proper verification of emails or instructions sent to customers, ensure that even if hackers intercept communication they can’t access information contained within, use of SSL certificates from trusted authorities, incorporating phishing and malicious detection solutions into security stack. This study concludes that telecommunications ensure routine reviews of security standards, daily notifications for customers and other system users, and the availability of a well-known customer care services number. Due to the difficulties that information system users face, businesses have been using a variety of protection techniques to avoid social engineering, from putting up multifactor authentication for users' accounts to teaching employees how to spot suspect activity. Hence it is recommended that it is necessary to deploy mechanisms like machine learning-based ways to defend against social engineering-based assaults since cybercriminals exploit human activities to breach security as well as using the security features on messages (filter unknown senders) and calls (silence unknown callers).
APA, Harvard, Vancouver, ISO, and other styles
23

Goertzen, Melissa. "Longitudinal Analysis of Undergraduate E-book Use Finds that Knowledge of Local Communities Drives Format Selection and Collection Development Activities." Evidence Based Library and Information Practice 12, no. 1 (2017): 112. http://dx.doi.org/10.18438/b8bw5q.

Full text
Abstract:
A Review of:
 Hobbs, K., & Klare, D. (2016). Are we there yet?: A longitudinal look at e-books through students’ eyes. Journal of Electronic Resources Librarianship, 28(1), 9-24. http://dx.doi.org/10.1080/1941126X.2016.1130451
 
 Abstract
 
 Objective – To determine undergraduate students’ opinions of, use of, and facility with e-books.
 
 Design – A qualitative study that incorporated annual interview and usability sessions over a period of four years. The protocol was informed by interview techniques used in prior studies at Wesleyan University. To supplement the body of qualitative data, the 2014 Measuring Information Service Outcomes (MISO) survey was distributed; the researchers built five campus-specific e-book questions into the survey. 
 
 Setting – A small university in the Northeastern United States of America. 
 Subjects – 28 undergraduate students (7 per year) who attended summer session between the years of 2011-2014 recruited for interview and usability sessions; 700 full-time undergraduate students recruited for the 2014 MISO survey. 
 
 Methods – The method was designed by a library consortium in the Northeastern United States of America. The study itself was conducted by two librarians based at the single university. To recruit students for interview and usability sessions, librarians sent invitations via email to a random list of students enrolled in the university’s summer sessions. Recruitment for the 2014 MISO survey was also conducted via email; the survey was sent to a stratified, random sample of undergraduate students in February 2014. 
 
 Interview sessions were structured around five open-ended questions that examined students’ familiarity with e-books and whether the format supports academic work. These sessions were followed by the students’ evaluation of specific book titles available on MyiLibrary and ebrary, platforms accessible to all libraries in the CTW Consortium. Participants were asked to locate e-books on given topics, answer two research questions using preselected e-books, explain their research process using the above mentioned platforms, and comment on the overall usability experience. Instead of taking notes during interview and usability sessions, the researchers recorded interviews and captured screen activity. Following sessions, they watched recordings, took notes independently, and compared notes to ensure salient points were captured. 
 
 Due to concerns that a small pool of interview and usability candidates might not capture the overall attitude of students towards e-books, the researchers distributed the 2014 MISO survey between the third and fourth interview years. Five additional campus-specific e-book questions were included. The final response rate was 33%.
 
 Main Results – The results of the interviews, usability studies, and MISO survey suggest that although students use print and electronic formats for complementary functions, 86% would still select print if they had to choose between the formats. Findings indicate that e-books promote discovery and convenient access to information, but print supports established and successful study habits, such as adding sticky notes to pages or creating annotations in margins. With that being said, most students do not attempt to locate one specific format over another. Rather, their two central concerns are that content is relevant to search terms and the full-text is readily available. 
 
 Study findings also suggest that students approach content through the lens of a particular assignment. Regardless of format, they want to get in, locate specific information, and move on to the next source. Also, students want all sources – regardless of format – readily at hand and arranged in personal organization systems. PDF files were the preferred electronic format because they best support this research behaviour; content can be arranged in filing systems on personal devices or printed when necessary. Because of these research habits, digital rights management (DRM) restrictions created extreme frustration and were said to impede work. In some cases, students created workarounds for the purpose of accessing information in a usable form. This included visiting file sharing sites like Pirate Bay in order to locate DRM free content.
 
 Findings demonstrated a significant increase in student e-book use over the course of four years. However, this trend did not correspond to increased levels of sophistication in e-book use or facility with build-in functions on e-book platforms. The researchers discovered that students create workarounds instead of seeking out menu options that save time in the long run. This behaviour was consistent across the study group regardless of individual levels of experience working with e-books. Students commented that additional features slow down work rather than creating efficiency. For instance, when keyboard shortcuts used to copy and paste text did not function, students preferred to type out a passage rather than spend time searching for copy functions available on the e-book platform. 
 
 Conclusion – Academic e-books continue to evolve in a fluid and dynamic environment. While the researchers saw improvements over the course of four years (e.g., fewer DRM restrictions) access barriers remain, such as required authentication to access platform content. They also identified areas where training sessions lead by librarians could demonstrate how e-books support student research and learning activities. 
 
 The researchers also found that user experiences are local in nature and specific to campus cultures and expectations. They concluded that knowledge of local user communities should drive book format selection. Whenever possible, libraries should provide access to multiple formats to support a variety of learning needs and research behaviours.
APA, Harvard, Vancouver, ISO, and other styles
24

Tatineni, Sumanth. "Customer Authentication in Mobile Banking-MLOps Practices and AI-Driven Biometric Authentication Systems." Journal of Economics & Management Research, December 31, 2022, 1–5. http://dx.doi.org/10.47363/jesmr/2022(3)201.

Full text
Abstract:
The intersection of customer demands, security, and innovative services in the diverse mobile banking space calls for continuous adaptation by financial institutions. Small challenges such as on-demand customization and scalability are addressed through merging technologies, which is important for smaller institutions undergoing IT modernization. Despite the slow pace of ML adoption in banking, those leveraging ML experience increased their success in this competitive landscape. This article looks at the role of MLOps in overcoming challenges posed by evolving data volumes and complexities in deploying and developing ML models within financial institutions. As online banking authentication holds an important role in securing financial transactions, a historical overview of authentication methods, from biometrics to tokens, creates a chance to delve into the transformative potential of AI-driven biometric authentication. With the increase in mobile banking fraud, the need to safeguard sensitive customer data is met with radical technology. The article examines the varied authentication methods employed in online banking applications and depicts the potential of biometrics, majorly behavioral biometrics, to improve security and user experience. The rise of online mobile banking systems introduces both convenience and security concerns, thus prompting a closer look at the adoption of biometrics to mitigate fraud risks and improve the seamless authentication process throughout the user session. Customers increasingly demand quick and easy mobile payments, so biometrics has become a key fraud prevention and detection solution. By running in the background and eliminating setup authentication and risk-based authentication, behavioral biometrics significantly reduces fraud, thus addressing the limitations of traditional authentication methods like email verification and passwords. The article navigates the evolving mobile banking security space, highlighting the important role of MLOps and the potential of AI-driven biometric authentication in meeting the dual objectives of improving customer experience and strengthening severity protocols.
APA, Harvard, Vancouver, ISO, and other styles
25

Martínez-Ramos, L., L. López-García, and F. Rodríguez-Henríquez. "Achieving Identity-Based Cryptography in a Personal Digital Assistant Device." Journal of Applied Research and Technology 9, no. 03 (2011). http://dx.doi.org/10.22201/icat.16656423.2011.9.03.427.

Full text
Abstract:
Continuous technological advances have allowed that mobile devices, such as Personal Digital Assistants (PDAs), can executesophisticated applications that more often than not must be equipped with a layer of security that should include theconfidentiality and the authentication services within its repertory. Nevertheless, when compared against front-end computingdevices, most PDAs are still seen as constrained devices with limited processing and storage capabilities.In order to achieve Identity-Based Cryptography (IBC), which was an open problem proposed by Adi Shamir in 1984, Bonehand Franklin presented in Crypto 2001, a solution that uses bilinear pairings as its main building block. Since then, IBC hasbecome an active area of investigation where many efficient IBC security protocols are proposed year after year. In this paper, we present a cryptographic application that allows the secure exchange of documents from a Personal Digital Assistant (PDA) that is wirelessly connected to other nodes. The architecture of our application is inspired by the traditional PGP (Pretty Good Privacy) email security protocol. Our application achieves identity-based authentication and confidentiality functionalities at the 80-bit security level through the usage of a cryptographic library that was coded in C++. Our library can perform basic primitives such as bilinear pairings defined over the binary field and the ternary field , as well as other required primitives known as map-to-point hash functions. We report the timings achieved by our application and we show that they compare well against other similar works published in the open literature.
APA, Harvard, Vancouver, ISO, and other styles
26

-, Abdel Saeed I. Sahidjuan, Merjina A. Amin -, Lina I. Ahaja -, et al. "Understanding the Impact of Phishing Attacks on Organizational Security and Trust." International Journal For Multidisciplinary Research 6, no. 6 (2024). https://doi.org/10.36948/ijfmr.2024.v06i06.34230.

Full text
Abstract:
Phishing attacks represent a significant and evolving threat to organizational security and trust. This study explores the multifaceted impact of these deceptive tactics, moving beyond the immediate consequences of data breaches to examine the long-term repercussions on an organization's reputation, stakeholder relationships, and overall financial stability. We analyze the various techniques employed by phishers, ranging from mass-distributed emails to highly targeted spear-phishing campaigns designed to exploit specific vulnerabilities within an organization. The research investigates the direct costs associated with data breaches, including financial losses, regulatory penalties, and legal repercussions, as well as the indirect costs stemming from operational disruptions, loss of productivity, and damage to brand reputation. The study highlights the crucial role of human factors in the success of phishing attacks, emphasizing the importance of employee training and awareness programs in mitigating the risk. We examine the effectiveness of different training methodologies, comparing traditional awareness campaigns with more interactive and engaging approaches such as simulated phishing exercises. Furthermore, the research explores the importance of robust security protocols, including multi-factor authentication, strong password policies, and advanced email filtering, in preventing successful attacks. The analysis also considers the critical role of incident response planning, emphasizing the need for clear procedures to detect, contain, and recover from phishing attacks. Our findings underscore the need for a holistic and proactive approach to cyber security, combining technical safeguards with a strong focus on human factors. The study concludes that effectively combating phishing requires a continuous cycle of improvement, adaptation, and vigilance, encompassing regular security awareness training, ongoing updates to security protocols, and proactive collaboration within the industry to share best practices and lessons learned. By adopting a comprehensive and adaptive approach, organizations can significantly reduce their vulnerability to phishing attacks, safeguarding their security, preserving their reputation, and maintaining the trust of their stakeholders.
APA, Harvard, Vancouver, ISO, and other styles
27

Basha, Shaik Hedayath, and Jaison B. "A novel secured Euclidean space points algorithm for blind spatial image watermarking." EURASIP Journal on Image and Video Processing 2022, no. 1 (2022). http://dx.doi.org/10.1186/s13640-022-00590-w.

Full text
Abstract:
AbstractDigital raw images obtained from the data set of various organizations require authentication, copyright protection, and security with simple processing. New Euclidean space point’s algorithm is proposed to authenticate the images by embedding binary logos in the digital images in the spatial domain. Diffie–Hellman key exchange protocol is implemented along with the Euclidean space axioms to maintain security for the proposed work. The proposed watermarking methodology is tested on the standard set of raw grayscale and RGB color images. The watermarked images are sent in the email, WhatsApp, and Facebook and analyzed. Standard watermarking attacks are also applied to the watermarked images and analyzed. The finding shows that there are no image distortions in the communication medium of email and WhatsApp. But in the Facebook platform, raw images experience compression and observed exponential noise on the digital images. The authentication and copyright protection are tested from the processed Facebook images. It is found that the embedded logo could be recovered and seen with added noise distortions. So the proposed method offers authentication and security with compression attacks. Similarly, it is found that the proposed methodology is robust to JPEG compression, image tampering attacks like collage attack, image cropping, rotation, salt-and-pepper noise, sharpening filter, semi-robust to Gaussian filtering, and image resizing, and fragile to other geometrical attacks. The receiver operating characteristics (ROC) curve is drawn and found that the area under the curve is approximately equal to unity and restoration accuracy of [67 to 100]% for various attacks.
APA, Harvard, Vancouver, ISO, and other styles
28

Gorige, Vamshi, Sai Sharath Cherukuri, Shiva Sahithya Sama, and Umadatta Amruthaluru. "Exam Hall Allocation Using Full Stack Integration and Efficient Management." International Journal of Innovative Science and Research Technology, April 17, 2025, 275–79. https://doi.org/10.38124/ijisrt/25apr300.

Full text
Abstract:
Effective management of examinations is important to maintain smooth operations within academic institutions and avoid excessive administrative workload. The project introduces a Smart Invigilation System, an online application built by Python Full Stack with Flask used as the backend framework and MySQL as the database. The system effectively implements automated seating for students and invigilation duty scheduling for teachers, improving the examination process with optimized usage of resources. The application has a user authentication system, where users log in and upload necessary files: classroom information, student information, and teacher information. The system processes these files to create an optimal seating plan for students based on classroom characteristics like the number of benches and seating capacity per bench. Round Robin Algorithm is used to distribute invigilation responsibilities among teachers in a fair manner. After the allocation is done, the system provides an email notification facility with the help of the SMTP protocol to send automated emails to the students and faculty members. Information about their exam time table, classrooms allocated, and seating configuration is communicated to the students, while the faculty members are informed about their invigilation duties. Security measures are adopted by storing the user credentials in the database with the passwords encrypted. By computerizing seating and invigilation assignment, the system greatly eliminates manual labor, mistakes, and administrative workload, rendering examination administration more efficient, transparent, and dependable
APA, Harvard, Vancouver, ISO, and other styles
29

Ononiwu, Martina, Tony Isioma Azonuche, and Joy Onma Enyejo. "Analyzing Email Marketing Impacts on Revenue in Home Food Enterprises using Secure SMTP and Cloud Automation." International Journal of Innovative Science and Research Technology, June 10, 2025, 49–64. https://doi.org/10.38124/ijisrt/25jun286.

Full text
Abstract:
This review paper explores the intersection of secure email marketing, cloud automation, and revenue optimization in home-based food enterprises. As digital transformation reshapes microenterprise operations, email marketing remains a cost-effective and high-ROI strategy for customer engagement, retention, and brand visibility. However, home food businesses often lack the technical infrastructure to maximize these tools securely and efficiently. The study evaluates how integrating Secure Simple Mail Transfer Protocol (SMTP) with cloud-based marketing automation platforms—such as Mailchimp, Klaviyo, and AWS SES—can enhance deliverability, compliance, and personalized outreach. Emphasis is placed on key performance indicators (KPIs) such as click-through rates, conversion rates, customer lifetime value (CLV), and average order value (AOV). The review further investigates the role of automation workflows, behavior-triggered campaigns, A/B testing, and segmentation in driving customer re-engagement and reducing churn. Security considerations including domain authentication (SPF, DKIM, DMARC), data encryption, and compliance with regulations like GDPR and CAN-SPAM are also analyzed. Case studies of successful home food enterprises are reviewed to identify best practices and revenue-growth patterns. The paper concludes by recommending scalable frameworks and secure digital infrastructure that enable small food businesses to harness email marketing technologies while safeguarding customer data and enhancing long-term profitability.
APA, Harvard, Vancouver, ISO, and other styles
30

"Evaluation of Interactive Trade Using MOORA Method." 4 3, no. 4 (2017): 128–34. http://dx.doi.org/10.46632/jemm/3/4/9.

Full text
Abstract:
Phishing websites have become more common in recent years. Online financial services pose a major threat to data security. Common spamming methods (eg, BGP redirects, bots) and how long they last, characteristics of each spamming host and spamming bonnets. Disruptions we model a multi-echelon system that experiences disruptions at any stage. An alternate location in the network should have strategies to meet the demand. Maintain strategic inventory levels and procure or transport materials across alternate locations and network does it. The fastest growing crime on the Internet. Several counter measures have been proposed over the years, one of which is SPEKE, an anti-phishing (APA) based on the Password Authenticated Key Exchange (PAKE) protocol. Features such as mutual authentication, forward secrecy are proposed. The challenge is that data analysts want to infer client-side behaviors from server data. However, a user’s actions a web server must rely on incomplete data because only the region is reached. As a result of the continuous growth of users and the increase in unsolicited emails known as spam, spam filters have been introduced to detect various aspects of server-side and client-side anti-spam emails
APA, Harvard, Vancouver, ISO, and other styles
31

"Assessment of Phishing Website Using Decision-making trial and evaluation laboratory." 4 3, no. 4 (2017): 135–40. http://dx.doi.org/10.46632/jemm/3/4/10.

Full text
Abstract:
Phishing websites have become more common in recent years. Online financial services pose a major threat to data security. Common spamming methods (eg, BGP redirects, bots) and how long they last, characteristics of each spamming host and spamming botnets. Disruptions we model a multi-echelon system that experiences disruptions at any stage. An alternate location in the network should have strategies to meet the demand. Maintain strategic inventory levels and procure or transport materials across alternate locations and network do it. The fastest growing crime on the Internet. Several counter measures have been proposed over the years, one of which is SPEKE, an anti-phishing (APA) based on the Password Authenticated Key Exchange (PAKE) protocol. Features such as mutual authentication, forward secrecy are proposed. The challenge is that data analysts want to infer client-side behaviors from server data. However, a user’s actions a web server must rely on incomplete data because only the region is reached. As a result of the continuous growth of users and the increase in unsolicited emails known as spam, spam filters have been introduced to detect various aspects of server-side and client-side anti-spam emails
APA, Harvard, Vancouver, ISO, and other styles
32

Shimon, K. Modi. "International Journal of Computer Science and Information Security (IJCSIS May 2021)." June 13, 2021. https://doi.org/10.5281/zenodo.4940183.

Full text
Abstract:
<strong>Vol. 19 No. 5 MAY 2021 International Journal of Computer Science and Information Security</strong> <strong>Download Full Journal:&nbsp;[Academia.edu (Full Volume)</strong><strong>&brvbar; Scribd (Full Volume)</strong><strong>&brvbar;&nbsp;Archive (Full Volume)&nbsp;</strong><strong>&brvbar;&nbsp;SlideShare PDF</strong><strong>]</strong> . <em>Copyright &copy; IJCSIS. This is an&nbsp;<strong>open access journal</strong>&nbsp;distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.</em> ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ 1. PaperID 01052108: Stemming Algorithm Optimization Using Big Data Analytics Tools (pp. 1-26) M. Bougar, Dr. El. Ziyati,&nbsp; RITM LABORATORY EST/ENSEM, University Hassan II, Casablanca, Morocco. &nbsp; Full Text: PDF [Academia.edu&nbsp;| Scopus | Scribd | Archive |&nbsp;DOI&nbsp;| Google Scholar] ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ 2. PaperID 01052109: Convolutional Neural Networks and Long Short Term Memory for Phishing Email Classification (pp. 27-35) Regina Eckhardt, Department of Computer Science, University of West Florida, Pensacola, FL, USA. Sikha Bagui, Department of Computer Science, University of West Florida, Pensacola, FL, USA. &nbsp; Full Text: PDF [Academia.edu&nbsp;| Scopus | Scribd | Archive |&nbsp;DOI&nbsp;| Google Scholar] ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ 3. PaperID 01052111: Security Assessment of Authentication Protocols in Mobile Adhoc Networks (pp. 36-40) Megha Soni, Assistance Professor, SVCE, Indore India. Brijendra Kumar Joshi, Professor MCTE, MCTE, Mhow India. &nbsp; Full Text: PDF [Academia.edu&nbsp;| Scopus | Scribd | Archive |&nbsp;DOI&nbsp;| Google Scholar] ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ 4. PaperID 01052117: Prediction of Survival in Breast Cancer Patients using Random Forest Classifier and ReliefF Feature Selection Method (pp. 41-47) Diogo Albino de Queiroz (#*1), Gabriel Sousa Almeida Assun&ccedil;&atilde;o (#2), Kamila Alves da Silva Ferreira (#3), Vilian Veloso de Moura F&eacute; (#4), Vit&oacute;ria Paglione Balestero de Lima (#5), Fernanda Antunes Dias (#6), T&uacute;lio Couto Medeiros (#7), Karen Nayara de Souza Braz (#8), Rodrigo Augusto Rosa Siviero (#9), P&acirc;mela Alegranci (#10), Eveline Aparecida Isquierdo Fonseca de Queiroz (#11) (#) Universidade Federal de Mato Grosso (UFMT), Av. Alexandre Ferronato, 1200, 78550-728 &ndash; Sinop, MT &ndash; Brasil. (*) Escola T&eacute;cnica Estadual de Educa&ccedil;&atilde;o Profissional e Tecnol&oacute;gica, Av. das Sibipirunas, 1681, 78557-673 &ndash; Sinop, MT &ndash; Brasil. &nbsp; Full Text: PDF [Academia.edu&nbsp;| Scopus | Scribd | Archive |&nbsp;DOI&nbsp;| Google Scholar] ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ 5. PaperID 01052123: Computer Aided Diagnostic System for Diabetic Retinopathy Detection using Image Processing and Artificial Intelligence (pp. 48-63) Anitha T Nair, Department of CSE, FISAT, Ernakulam, India. Arun Kumar M N, Department of CSE, FISAT, Ernakulam, India. Anitha M L, Department of CSE, PES College of Engg., Mandya, India. Anil Kumar M N, Department of ECE, FISAT, Ernakulam, India. &nbsp; Full Text: PDF [Academia.edu&nbsp;| Scopus | Scribd | Archive |&nbsp;DOI&nbsp;| Google Scholar] ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ 6. PaperID 01052124: Strategies for Correlating DB2 &amp; CICS SMF Records to aid Problem Determination (pp. 64-67) Dr. Latha Sadanandam, Senior Cloud Modernization Architect, Cloud Centre of Competency, IBM India Pvt Ltd., Bangalore, India. Atul Misra, Executive IT Enterprise Architect, Cloud Center of Competency, IBM India Pvt Ltd., Bangalore, India. James Roca, WW Technology Partner Architect, IBM Cloud &amp; Cognitive Software, IBM Services, Austin, TX, United States. &nbsp; Full Text: PDF [Academia.edu&nbsp;| Scopus | Scribd | Archive |&nbsp;DOI&nbsp;| Google Scholar] ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ 7. PaperID 01052126: Cloud-Based Enterprise Resource Planning for Sustainable Growth of SMEs in Third World Countries (pp. 68-84) Anthony I. Otuonye, Department of Information Technology, Federal University of Technology Owerri, Nigeria. &nbsp; Full Text: PDF [Academia.edu&nbsp;| Scopus | Scribd | Archive |&nbsp;DOI&nbsp;| Google Scholar] ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ 8. PaperID 01052131: PCA, SPCA &amp; Krylov-based PCA for Image and Video Processing (pp. 85-91) (1) Amanda Zeqiri, (2) Markela Muca, (3) Arben Malko (1, 2) Department of Applied Mathematics, Faculty of Natural Science, University of Tirana, Albania Tirana, Albania. (3) Lev Tech, Software Development Company. &nbsp; Full Text: PDF [Academia.edu&nbsp;| Scopus | Scribd | Archive |&nbsp;DOI&nbsp;| Google Scholar] ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ 9. PaperID 01052134: Backpropagation and fuzzy algorithm Modelling to Resolve Blood Supply Chain Issues in the Covid-19 Pandemic (pp. 92-96) Aan Erlansari, Rusdi Efendi, Funny Farady C., Andang Wijanarko, Reza Herliansyah, Boko Susilo Faculty of Engineering, University of Bengkulu, Indonesia. &nbsp; Full Text: PDF [Academia.edu&nbsp;| Scopus | Scribd | Archive |&nbsp;DOI&nbsp;| Google Scholar] ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ 10. PaperID 01052135: Integrating Neurological Examination with Radiology Diagnosis through Ontology (pp. 97-105) Suela Maxhelaku, Computer Science Department, Faculty of Natural Sciences, University of Tirana, Albania. Alda Kika, Computer Science Department, Faculty of Natural Sciences, University of Tirana, Albania. Ridvan Alihmehmeti, Departament of NeuroSciences, University of Medicine, Service of Neurosurgery, University Hospital Center Mother Teresa, Albania. &nbsp; Full Text: PDF [Academia.edu&nbsp;| Scopus | Scribd | Archive |&nbsp;DOI&nbsp;| Google Scholar] ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ <em>The&nbsp;<strong>Journal of Computer Science and Information Security</strong>&nbsp;is an&nbsp;Open Access&nbsp;journal since 2009 with high citations in&nbsp;<strong>Google Scholar</strong>.&nbsp;ESCI - IP &amp; Science -&nbsp;<strong>Thomson Reuters - Web of Science&nbsp;</strong></em><em>(<strong>Indexing in process</strong>) &amp;&nbsp;<strong>Scopus</strong></em><em>.</em> &nbsp; <strong><em>ISSN 1947 5500 Copyright&nbsp;&copy;&nbsp;IJCSIS, USA.</em></strong> ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ &nbsp; Č đ Add files Comments IJCSIS Editor
APA, Harvard, Vancouver, ISO, and other styles
33

Shultz, Mary, and Donna R. Berryman. "Collection practices for nontraditional online resources among academic health sciences libraries." Journal of the Medical Library Association 108, no. 2 (2020). http://dx.doi.org/10.5195/jmla.2020.791.

Full text
Abstract:
Objective: In recent years, individuals and small organizations have developed new online learning and information resources that are often marketed directly to students. In this study, these nontraditional online resources are defined as apps or other online resources that are not available through large and well-known publishers. The purposes of this study are to determine if academic health sciences libraries are licensing nontraditional online resources and to provide a snapshot of current collections practices in this area.Methods: An online survey was designed and distributed to the email lists of the Collection Development Section of the Medical Library Association and Association of Academic Health Sciences Libraries directors. Follow-up phone interviews were conducted with survey participants who volunteered to be contacted.Results: Of the 58 survey respondents, 21 (36.2%) reported that their libraries currently licensed at least 1 nontraditional online resource, and 45 (77.6%) reported receiving requests for these types of resources. The resources listed by respondents included 50 unique titles. Of the 37 (63.8%) respondents whose library did not license nontraditional online resources, major barriers that were noted included a lack of Internet protocol (IP) authentication, licenses that charge per user, and affordable institutional pricing.Conclusions: Evaluation criteria for nontraditional online resources should be developed and refined, and these resources should be examined over time to determine their potential and actual use by students. There is a growing demand for many of these resources among students, but the lack of financial and access models that serve libraries’ needs is an obstacle to institutional licensing.
APA, Harvard, Vancouver, ISO, and other styles
34

M.SUJITHRA1, AND DR G. PADMAVATHI. "BIOMETRIC SYSTEM PENETRATION IN RESOURCE CONSTRAINED MOBILE DEVICE." March 7, 2013. https://doi.org/10.5121/ijbb.2013.3104.

Full text
Abstract:
International Journal on Bioinformatics &amp; Biosciences (IJBB) Vol.3, No.1, March 2013 DOI : 10.5121/ijbb.2013.3104 35 BIOMETRIC SYSTEM PENETRATION IN RESOURCE CONSTRAINED MOBILE DEVICE M.SUJITHRA1 AND DR G. PADMAVATHI 2 1Assistant Professor, Department of Computer Technology &amp; Applications, Coimbatore Institute of Technology, Email: sujisrinithi@gmail.com 2 Professor&amp; Head, Department of Computer Science, Avinashilingam Institute for Home Science and Higher Education for Women, Coimbatore, Tamil Nadu, India. ABSTRACT Over the past few years, the usage of mobile devices to access data has becoming more frequent, and the usage of mobile devices in the applications such as web-browsing, email, multimedia, entertainment applications (games, videos, and audios), navigation, trading stocks, electronic purchase, banking and health care are increased, therefore data security is essential and also it becomes a challenge in securing the data in the mobile device. User authentication schemes such as Password or Personal Identification Number (PIN) based authentication in mobile device is a difficult process for providing safe access to precious, private information or personalized services. To address these problems in the mobile devices, biometric system can be developed which are more secure, affordable and memorable authentication scheme based on graphical assistance, images and audio. We believe that biometric authentication is the most secure approach among other authentication mechanism. This paper discusses the various features of biometrics and mobile device security threats. KEYWORDS Biometrics, Mobile Device, Authentication, Threats, Security. 1. INTRODUCTION As mobile devices continue to evolve in terms of the capabilities and services offered, so they introduce additional demands in terms of security. The need for more security on mobile devices is increasing with new functionalities and features made available. To improve the device security we propose biometric authentication as a protection mechanism. The main reason to use biometrics on the mobile device is to protect the data on the device and to provide secure yet convenient access to the device and to the network it may be connected to. Unfortunately, mobile device theft is on the rise and insurance plans are becoming more expensive. It is very common to lose your mobile phone or have it stolen. The use of biometrics protects the data on the device and serves as a theft deterrent since the device is useless to others when it is protected with biometric security. A good biometric solution makes security convenient. New handsets deploying biometric approaches are being announced regularly, with many based upon fingerprint and voice solutions. Other biometrics however is also being introduced some of which are: facial recognition, signature recognition and newer approaches of iris recognition and gait recognition can be used for mobile device authentication. [1] The remainder of this paper is organized as follows: Section II briefly describes the Mobile Device threats, attacks and their vulnerabilities. Section III presents detailed analysis of Biometric characteristics, its system, including performance evaluation and benefits. Section IV discusses the implementation challenges of biometrics security in mobile devices and Finally Section V concludes this paper. International Journal on Bioinformatics &amp; Biosciences (IJBB) Vol.3, No.1, March 2013 36 2. MOBILE DEVICE THREATS, ATTACKS &amp;VULNERABILITIES The usage of the mobile phone over the last few years has made fundamental changes in our daily life. Mobile devices, namely Personal Digital Assistants (PDAs) and smart phones are containing ever more personal information, including address books, schedules as well as payment information. Smart phones or mobile phones with advanced capabilities like those of personal computers (PCs) are appearing in more people&rsquo;s pockets, purses, and briefcases. Smart phones&rsquo; popularity and relatively lack security have made them attractive targets for attackers. According to a report published earlier this year (2012), smart phones recently outsold PCs for the first time and attackers have been exploiting this expanding market by using old techniques along with new ones. One example is this year&rsquo;s Valentine&rsquo;s Day attack, in which attackers distributed a mobile picture-sharing application that secretly sent premium rate text messages from the user&rsquo;s mobile phone. [2] 2.1 SECURITY THREATS FOR MOBILE PLATFORMS Mobile phones are becoming more and more valuable as targets for attack. People are using smart phones for an increasing number of activities and often store sensitive data, such as email, calendars, contact information and password on the devices. Mobile applications for social networking keep a wealth of personal information. 2.1.1 VULNERABLITY A weakness that is inherent in every network and device. This includes routers, switches, desktops, servers, and even security devices themselves. 2.1.2 THREATS People eager, willing, and qualified to take advantage of each security weakness and they continually search for new exploits and weaknesses. 2.1.3 ATTACKS Threats use a variety of tools, scripts, and programs to launch attacks against networks and network devices. Typically the network devices under attack are the endpoints such as servers and desktops.Table 1 shows the various attacks on mobile devices. [3] Table 1: Various Attacks on Mobile Devices Attacks Causes (Features) Attack Type Mobile Security Affects Mobility Lost or theft device Authentication, Confidentiality Limited resources DoS(Denial of Service) Data Integrity, Confidentiality, Availability Strong Connectivity Requirement Viruses or worms (malware) Data Integrity, Confidentiality, and Charging Several major security issues loom over the use of such devices, including &bull; Mobile devices are often stolen or missing, due to their small size. &bull; The contents in the mobile devices are unencrypted or encrypted under a flawed protocol. &bull; Mobile devices are pron to middle-man attack or viruses attack from wireless connection International Journal on Bioinformatics &amp; Biosciences (IJBB) Vol.3, No.1, March 2013 37 &bull; User authentication is weak or disabled or in a common default mode, the authentication mechanism is single static password authentication can be circumvented easily. Figure 1 illustrates the various threats in mobile environment. To overcome the security problems mentioned above, mobile locks or laptop locks are general solution for better guardian of such devices physically. In order to enhance the security in data, biometrics authentication can be used with complicated algorithms are practiced.[4] Figure 1. Various threats in mobile environment 2.2 VARIOUS MOBILE DEVICE PLATFORMS To protect data on mobile devices, it is important to know about mobile device operating systems that power most of today&#39;s smart phone and tablets. Apple&#39;s iOS: Incredibly popular operating system from Apple, running devices such as the iPhone, iPad, iPod Touch, and Apple TV. Google&#39;s Android: Google&#39;s mobile device operating system, powering devices from several device manufacturers. Microsoft&#39;s Windows Phone: A newer operating system from Microsoft that ships on devices from a variety of vendors. Windows Phone 7 represents a complete redesign of Microsoft&#39;s previous operating system, Windows Mobile 6.5. Blackberry: A long-standing favorite in the enterprise due to security and manageability features. The i-OS and Android platforms have increased in popularity in recent years and have become alternatives to Blackberry in many enterprises. Nokia&#39;s Symbian: Open-source operating system managed by Nokia. In 2011, Nokia announced that it would begin building devices based on the Microsoft Windows Phone operating system, rendering the future of Symbian questionable. [5] 3. BIOMETRIC SYSTEM OVERVIEW Biometrics is a method of recognizing a person based on his/her unique identification. Biometric identification is often used in large-scale systems such as computer systems security, secure E-banking, Mobile devices, smart cards, credit cards, secure access to buildings, health and social services. Biometric system refers to the automatic recognition of individuals based on their physiological and/or behavioral characteristics. It is generally a pattern recognition system that makes a personal identification by establishing the authenticity of an individual. Authentication using biometric characteristics is more convenient because they cannot be forgotten, lost, or stolen which ensures the physical presence of the user while offering a significantly higher security. One individual has three possibilities to prove its identity: a) Something an individual DATA (e.g., a password, Personal ID Number (PIN), the combination to a lock, a set of facts from a person&#39;s background). International Journal on Bioinformatics &amp; Biosciences (IJBB) Vol.3, No.1, March 2013 38 b) Something an individual POSSESSES (e.g., a token or card, a physical key to a lock). c) Something an individual IS (Intermediate System) (e.g., personal characteristics or &quot;biometrics&quot; such as a fingerprint, Iris, voice pattern). Generically biometrics is categorized in two types: physiological and behavioral. Physiological approaches perform authentication based on a physical attribute of a person, such as their fingerprint, face, Iris, Retina, Hand Geometry and Ear. By contrast, behavioral biometrics utilizes distinct features in the behavior of the user to perform the relevant classification, such as their voice, signature, and key stroke. Physiological biometrics tend to be more trustworthy approaches, as the physical features are likely to stay more constant over time and under different conditions, and tend to be more distinct within a large population . For this reason physiological approaches are often used in identification-based systems, whereas behavioral characteristics (which tend not to have such unique characteristics and vary more with time) are therefore mainly used for verification purposes.[6] Figure 2 describes user authentication types. Figure2. User Authentication Mechanism 3.1 CHARACTERISTICS OF A BIOMETRIC SYSTEM As defined by the International Biometric Group (IBG) biometrics is &ldquo;the automated use of physiological or behavioral characteristics to determine or verify identity&rdquo;. As can be seen in the definition, biometrics can be used in two distinct modes: identification to determine identity and verification to verify a claimed identity. Identification: In this mode the biometric system reads a sample from the user and tries to find a match by looking at the entire database of registered users. A 1: N comparison is performed and thus is often more demanding in terms of distinctiveness of the biometric characteristics. Authentication/Verification: In this mode the system tries to verify a claimed identity. The user provides a sample and an identity (e.g. a username). The system retrieves the template that it keeps relative to the claimed identity and checks whether the newly acquired sample matches that template. This is a 1:1 comparison and is in general a much easier procedure to implement as it can be less demanding in both processing and distinctiveness of the features. 3.2 BIOMETRIC SYSTEM METHODOLOGY Regardless of the biometric technique or the comparison mode utilized, the way in which the biometric process takes place is identical. Figure 3 illustrates the generic biometric system where the two key functions of the biometric authentication process are shown enrolment and authentication. International Journal on Bioinformatics &amp; Biosciences (IJBB) Vol.3, No.1, March 2013 39 Figure 3. Biometric System Enrolment represents the procedure where the user provides the biometric information to the system for it to store and generate a reference profile for subsequent authentication. The biometric sample is captured by an appropriate sensor and the reference template is generated through the extraction of features that the system requires to use for authentication. The reference template is then stored to the template database for it to be used in future. Authentication represents the process that takes place when a user requests access to the system. At that time, an identification or verification of his identity must take place in order to be established as a legitimate user. A new sample is acquired from the sensor, which is subsequently compared to the reference template. The result of this comparison goes through the authentication policy of the system which determines whether the sample and template are matched closely enough to recognize the user as legitimate. [7] 3.3 BIOMETRICS PERFORMANCE EVALUATION Biometrics does not operate like passwords, where the correct input of the secret knowledge can assure access to the system with 100% accuracy. With biometrics a legitimate user might provide a sample, but several factors may still cause them to be rejected by the system. These factors might be environmental (e.g. a bad acquisition from a fingerprint sensor due to a cut finger or inadequate lighting for face recognition or too much background noise for voice verification) or related to the underlying uniqueness of the characteristics involved. This might not only lead to rejecting an authorized user but also in accepting an impostor. The quality metrics used to evaluate the performance of the biometric system are as follows: False Acceptance Rate (FAR), which represents the probability of an impostor getting accepted by the system (sometimes referred to as the Impostor Pass Rate). False Rejection Rate (FRR), which represents the probability of falsely rejecting an authorized user (sometimes referred to as the False Alarm Rate). Failure to Enroll Rate (FTE), which refers to situation where the sample is not able to provide enough information to create a template. That can be due to noise from the capture or a lack of features from the user, for example burned fingers. Failure to Acquire Rate (FTA), which refers to the situation where the system is unable to acquire a sample from the user. [8] Capture Authentication Policy Compare Storage Enrolment Authentication    Extract Create Template International Journal on Bioinformatics &amp; Biosciences (IJBB) Vol.3, No.1, March 2013 40 3.4 BIOMETRIC SYSTEM BENEFITS A biometrics security system offers the following benefits: &bull; Guarantees physical location of the user &amp;High-throughput. It can be determined with certainty that the user was that the point when and where the biometric template collected. When there is a need to identify a person from a large population, automatic biometric identification may be the only efficient solution. &bull; Biometric trait is unforgettable, cannot be lost and shared. Unlike the classic passwords that need to be remembered, biometric traits cannot be forgotten because they represent something that the user is: physically or behaviorally. Unlike authentication tokens, ID cards or passwords written on a piece of paper, biometric traits cannot be lost. Due to their nature biometric traits cannot be shared between users. This ensures that the user that logs in the system is the actual user and not a colleague that is trying to help. &bull; It is appealing &amp; cost efficient. Most people find biometric systems appealing because of the ease of use and because it is impressive how a door can be opened by just a swipe of a finger. Sure there will be an upfront cost with the installation of the system and with user&rsquo;s education but in the long run it proves cost efficient due to the benefits listed above. It cannot be shared and it guarantees physical location this way no employee can help-out a colleague that is late by punching-in in the time system on his behalf. And it cannot be lost or forgotten this way costs of reissuing new identification tokens are reduced, the desktop support time is reduced because the need of resetting passwords will be less, if any, and the down-time of the employees because they&rsquo;ve got locked out from the systems is also reduced. &bull; It can provide emergency identification &amp;prevents identity theft. In those cases when a person cannot identify itself, using a biometric system may be the only way to find his identity. In the most cases of identity theft, the impostor used victim&rsquo;s name and personal identification number to create credit card accounts and use those in his behalf. Using biometric security systems makes it practically impossible for impostors to pretend they are somebody else. 4. IMPLEMENTATION CHALLENGES IN MOBILE DEVICE SECURITY In recent years, new mobile device technology has inspired many business mobility initiatives. By providing better information whenever and wherever it&rsquo;s needed, mobility streamlines and accelerates business process, enables businesses to deliver better service, and provides significant competitive advantages. User authentication is the primary line of defense for mobile and handheld devices such as Personal Digital Assistants (PDA). Authentication determines and verifies the identity of the user in the Mobile Device. Because of the limits of mobile devices, implementing mobile security solutions must address the following needs and challenges in building mobile security. [9] &bull; Energy saving security solutions The limited battery life and operation time requires mobile security solutions to be implemented in an energy saving approach. &bull; Limited applications of existing security solutions The limited computing capability and processing power of mobile devices restrict the applications of many existing complex security solutions, which require heavy processors. International Journal on Bioinformatics &amp; Biosciences (IJBB) Vol.3, No.1, March 2013 41 &bull; Restricted size of screen and keyboard It restricts the input and output capabilities of mobile phones, which in turn cause some security related applications, for example, password protection may not be easy for mobile users. Table 2 lists few biometric traits currently available on mobile handsets. Table 2: Biometric Applications on Mobile Handsets Technique Product/vendor Fingerprint NTT DoCoMo Face Omron (Omron), Oki Electric (Biometrics.co.uk) Signature PDALock (PDALock) Iris xVista (Cellular-News) Gait VTT (Young) &bull; Higher portability and inter-operation issues Since mobile devices may be equipped with different mobile platforms and operation environments, mobile security technologies and solutions must be implemented with a higher portability to address interoperation issues. &bull; Mobility &amp; Strong personalization Each device comes with us anywhere we go and therefore, it can be easily stolen or physically tampered, unique owner. &bull; Strong connectivity Smart phone enables a user to send e-mails, to check her online banking account, to access lot of Internet services; in this way, malware can infect the device, either through SMS or MMS or by exploiting the Internet connection. &bull; Technology convergence Single device combines different technologies which may enable an attacker to exploit different routes to perform her attacks. &bull; Reduced capabilities Even if smart phones are like pocket PCs, there are some characteristic features that lack on smart phones, e.g. a fully keyboard. [10] Some examples of future risks associated with smart phones include &bull; Data leakage resulting from device loss or theft. &bull; Unintentional disclosure of data, Attacks on decommissioned devices. &bull; Network spoofing &amp; Surveillance attacks. &bull; Financial malware attacks. &bull; Network congestion. Although biometric technologies provide effective security solutions for mobile accesses, they have some limitations. For example, when thieves cannot get access to secure properties, there is a chance that they will stalk and assault the property owner to gain access [11]. In 2005, Malaysian car thieves cut off the finger of a Mercedes-Benz S-Class owner when attempting to steal the car (see http://en.wikipedia.org/wiki/Biometric).However, we must also consider the above discussed factors when choosing a proper biometric trait for mobile device authentication.[12] International Journal on Bioinformatics &amp; Biosciences (IJBB) Vol.3, No.1, March 2013 42 5. CONCLUSION The growth in the creation and maintenance of secure identities for mobile devices has created challenges for individuals, society and businesses particularly in mobile added value services (mobile banking, mobile check-in, mobile ticket, et. al) and government security services. Although many obstacles remain, the growth in wireless technology, and the improvement of mobile devices will stimulate growth in the mobile biometrics market. Security has been one of the important elements in Mobile environment. The conventional Pin and Password authentication on mobile devices provides lower level security while biometric authentication offers higher level security. Biometric systems are offering a more convenient way to secure private information stored on mobile device. Biometrics systems are also adding security to remote transactions initiated using a mobile device. Due to the strict requirement for security, biometric systems can be used for authentication purpose. It is because biometric systems are the least vulnerable to intrusions. In fact, researches in the field are growing. Therefore, in the future the industry would expect even wider use of biometric systems in the mobile device authentication. 6. REFERENCES [1] Anil K. Jain, Arun Ross and Salil Prabhakar, (2004) &ldquo;An Introduction to Biometric Recognition&rdquo; IEEE Transactions on Circuits and Systems for Video Technologies, vol. 14, no. 1. [2] C.R. Mulliner,(2006) &ldquo;Security of smart phones&rdquo;, Master&rsquo;s thesis submitted to University of California, Santa Barbara. [3] M.Sujithra, Dr. G.Padmavathi, (2012)&rdquo;Mobile Device Security-A survey on Mobile Device Threats, Vulnerabilities and their Defensive Mechanism&rdquo;, International Journal of Computer Applications (IJCA) Volume 56 - Number 14. [4] Anurag Kumar Jain,DevendraShanbhag(2012) &ldquo;Addressing Security and Risks in Mobile Applications&rdquo;. [5] Roberta Cozza, (2011) &ldquo;Forecast: Mobile Communications Devices by Open Operating System, Worldwide, 2008-2015,&rdquo; Gartner. [6] Mathew Kabatoff John Dougman, BioSocieties, (2008) &ldquo;Pattern Recognition: Biometrics, Identity and State &ndash; An Interview with John Dougman&rdquo;, 3, 81, 86, &copy; London School of Economics and Political Science, London UK [7] KresimirDelac, MislavGregic, (2004) &ldquo;A Survey of Biometric Recognition Methods&rdquo;, 46th International Symposium Electronic in Marine, Zadar, Croatia. [8] M.Sujithra, Dr. G.Padmavathi, (2012) &ldquo;Biometrics for Low Power Mobile Devices&rdquo;, International Conference on Mathematical Modelling and Applied Soft Computing (MMASC 2012) (Towards high performance and knowledge optimization) Volume 2, pp1016-1023. [9] Paul Ruggiero and Jon Foote, (2011) &ldquo;Cyber Threats to Mobile&rdquo;, Produced for US-CERT, a government organization, Carnegie Mellon University-US. [10] Tseng,D; Mudanyali, O;,Oztoprak.C;Isikman,S; Sencan,I;Yaglidere,O&amp;Ozcan , A(2010), Lensfree Microscopy on a cell phone.Lab on a chip, vol .10, No.14,pp.1782-1792,ISSN 1473-0197. [11] Racic, R., Ma, D, Chen, H. Exploiting MMS Vulnerabilities to Stealthily.(2011)http://www.cs.ucdavis.edu/~hchen/paper/securecomm06.pdf [12] Mobile Device Security: Securing the Handheld, Securing the Enterprise. (2011)http://www.good.com/media/pdf/enterprise/mobile_device_security_wp.pdf International Journal on Bioinformatics &amp; Biosciences (IJBB) Vol.3, No.1, March 2013 43 Authors M.Sujithra is the Assistant Professor in the Department of Computer Technology and Applications of Coimbatore Institute of Technology, Coimbatore. She is having teaching experience of 9 years. She is pursing PhD in Avinashilingam University for women, Coimbatore. Her areas of interest include Mobile Device Security, Biometrics, Information and communication Security. Dr.G.Padmavathi is the Professor and Head of computer science of Avinashilingam University for women, Coimbatore. She has 25 years of teaching experience and one year of industrial experience. Her areas of interest include Real Time Communication, Network Security and Cryptography. She has 140 publications in her research area. Presently she is guiding PhD&rsquo;s Scholars and M.Phil Researchers. She has been profiled in various Organizations her academic contributions. She has completed four projects funded by UGC and DRDO. She is life member of many preferred organizations of CSI, ISTE, WSEAS, AACE, and ACRS.
APA, Harvard, Vancouver, ISO, and other styles
35

Makoshi, Stephen Mikah. "Cyber Warfare and Nation-State Attack: Investigating Tactics, Techniques, and Procedures (TTPs) of State-Sponsored Cyberattacks and Defense Mechanisms By Stephen Mikah Makoshi May, 2025." May 14, 2025. https://doi.org/10.5281/zenodo.15412985.

Full text
Abstract:
<strong><em>Cyber Warfare and Nation-State Attack: Investigating Tactics, Techniques, and Procedures (TTPs) of State-Sponsored Cyberattacks and Defense Mechanisms</em></strong> <strong>Author</strong>: Stephen Mikah Makoshi <strong>Publication Date</strong>: May 2025 <strong>Overview</strong> The manuscript <em>Cyber Warfare and Nation-State Attack: Investigating Tactics, Techniques, and Procedures (TTPs) of State-Sponsored Cyberattacks and Defense Mechanisms</em>, authored by Stephen Mikah Makoshi, is a rigorous and timely exploration of the escalating domain of cyber warfare, focusing on state-sponsored cyberattacks. As nations increasingly leverage cyberspace to achieve strategic objectives&mdash;ranging from espionage and economic disruption to political influence&mdash;this study provides a comprehensive analysis of the tactics, techniques, and procedures (TTPs) employed by nation-state actors. It also proposes robust defense mechanisms to counter these threats, emphasizing technical, operational, and policy-based solutions. Written in May 2025, the manuscript reflects the latest developments in cybersecurity, drawing on recent high-profile incidents and emerging technologies to offer insights for researchers, policymakers, military planners, and cybersecurity professionals. <strong>Objectives</strong> The manuscript aims to: <strong>Elucidate TTPs</strong>: Detail the specific methods used by nation-states in cyberattacks, including their strategic and operational approaches. <strong>Assess Impacts</strong>: Evaluate the geopolitical, economic, and societal consequences of state-sponsored cyber operations. <strong>Propose Defenses</strong>: Recommend actionable strategies for governments, organizations, and international bodies to mitigate and prevent cyber threats. <strong>Contextualize Trends</strong>: Analyze recent cyber incidents (2024&ndash;2025) to highlight the evolving nature of cyber warfare and the urgency of adaptive defenses. <strong>Content and Structure</strong> The manuscript is structured to provide a logical progression from understanding the threat landscape to proposing solutions, aligning with academic and professional expectations for cybersecurity research. While the full text is not provided, the following structure is inferred based on the title, contemporary cybersecurity literature, and the scope of Springer Nature&rsquo;s <em>Cybersecurity</em> journal: <strong>Introduction</strong> Defines cyber warfare as state-directed actions to disrupt, damage, or manipulate another nation&rsquo;s digital infrastructure, networks, or data for strategic purposes. Highlights the rising prevalence of nation-state cyberattacks, citing their role in modern conflicts and hybrid warfare. Sets the scope: analyzing TTPs, assessing impacts, and proposing defense mechanisms to strengthen global cybersecurity resilience. <strong>Understanding State-Sponsored Cyberattacks</strong> <strong>Definition and Context</strong>: Describes state-sponsored cyberattacks as government-backed operations targeting critical infrastructure (e.g., power grids, financial systems), government networks, or private sectors to achieve political, military, or economic goals. <strong>Historical Evolution</strong>: Traces the development of cyber warfare, referencing landmark attacks like Stuxnet (2010), WannaCry (2017), and SolarWinds (2020) to contextualize current threats. <strong>Recent Incidents (2024&ndash;2025)</strong>: Likely discusses contemporary examples, such as: Algeria&rsquo;s 2025 cyberattack on Morocco&rsquo;s Social Security Fund, disrupting financial services. North Korea&rsquo;s $1.5 billion Ethereum heist from ByBit, showcasing financial cybercrime. Chinese disinformation campaigns on WeChat targeting Canadian officials, illustrating information warfare. Russian cyberattacks on Italian government websites in retaliation for Ukraine support. <strong>Tactics, Techniques, and Procedures (TTPs)</strong> <strong>Tactics</strong>: Outlines strategic objectives, including: <strong>Espionage</strong>: Stealing sensitive data (e.g., Chinese APT groups targeting Latin American networks). <strong>Sabotage</strong>: Disrupting infrastructure (e.g., Russian attacks on Ukrainian power grids). <strong>Financial Gain</strong>: Funding state operations through cybertheft (e.g., North Korean cryptocurrency hacks). <strong>Influence Operations</strong>: Spreading disinformation to shape public opinion or destabilize governments. <strong>Techniques</strong>: Details technical methods, such as: Advanced Persistent Threats (APTs) for long-term network infiltration. Custom malware, backdoors, and zero-day exploits. Social engineering, including phishing and pretexting, to exploit human vulnerabilities. Supply chain attacks, compromising trusted vendors or software updates. <strong>Procedures</strong>: Describes operational workflows, including: Reconnaissance: Gathering intelligence on targets via open-source intelligence (OSINT) or network scanning. Weaponization: Developing tailored malware or exploits. Delivery: Deploying attacks via phishing emails, malicious websites, or compromised devices. Exploitation and Exfiltration: Gaining access and extracting data or disrupting systems. Persistence: Maintaining long-term access for future operations. <strong>Case Studies</strong>: Provides detailed analyses of specific attacks, likely including attribution to groups like Russia&rsquo;s APT28, China&rsquo;s Volt Typhoon, or Iran&rsquo;s Charming Kitten. <strong>Geopolitical and Economic Impacts</strong> Examines how cyberattacks exacerbate geopolitical tensions, such as Russia-Ukraine or China-Taiwan conflicts. Quantifies economic costs, referencing cybercrime&rsquo;s projected $10.5 trillion global impact by 2025. Discusses societal effects, including eroded public trust, disrupted services, and national security risks. Explores hybrid warfare, where cyber operations complement physical conflicts, as seen in Ukraine. <strong>Defense Mechanisms</strong> <strong>Technical Defenses</strong>: Intrusion detection and prevention systems (IDPS) to monitor and block threats. AI-driven anomaly detection to identify unusual network behavior. Multi-factor authentication (MFA), encryption, and endpoint protection to secure systems. Regular security audits, patch management, and penetration testing to address vulnerabilities. <strong>Operational Strategies</strong>: Incident response frameworks with clear escalation and recovery protocols. Threat intelligence sharing through platforms like the Cybersecurity and Infrastructure Security Agency (CISA) or INTERPOL. Building redundancy and resilience in critical systems, particularly for aviation, healthcare, and energy sectors. <strong>Policy and International Cooperation</strong>: Advocates for global norms, such as the UN&rsquo;s Group of Governmental Experts (GGE) framework, despite enforcement challenges. Highlights NATO&rsquo;s Cyber Defence Pledge and exercises like Locked Shields for collective defense. Recommends public-private partnerships, as exemplified by FBI operations against Chinese APTs. Discusses national cybersecurity strategies, such as India&rsquo;s 2013 policy or the U.S.&rsquo;s 2023 National Cybersecurity Strategy. <strong>Challenges and Ethical Considerations</strong> <strong>Attribution</strong>: Notes the difficulty of accurately identifying perpetrators due to anonymization techniques and false flags. <strong>Privacy vs. Security</strong>: Balances the need for surveillance and monitoring with individual privacy rights, addressing concerns raised by programs like PRISM. <strong>Escalation Risks</strong>: Warns that defensive or retaliatory cyber operations could escalate into broader conflicts. <strong>Regulatory Gaps</strong>: Highlights the lack of enforceable international laws governing cyberspace, complicating accountability. <strong>Recommendations</strong> Strengthen national cybersecurity frameworks with mandatory standards for critical infrastructure. Invest in workforce development, promoting cyber hygiene and specialized training for defenders. Enhance global cooperation through NATO, Five Eyes, and bilateral agreements to share intelligence and coordinate responses. Develop advanced technologies, such as AI for predictive threat analysis and quantum-resistant cryptography. Foster public awareness to reduce vulnerabilities exploited through social engineering. <strong>Conclusion</strong> Positions cyberspace as a fifth domain of warfare, alongside land, sea, air, and space. Emphasizes the need for adaptive, multilayered defenses to counter evolving nation-state TTPs. Projects future trends, including increased AI-driven attacks, deepfake-enabled disinformation, and quantum computing threats.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography