To see the other types of publications on this topic, follow the link: Internet – security measures. sears.

Journal articles on the topic 'Internet – security measures. sears'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Internet – security measures. sears.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

McCathie, Andy. "Internet security fears prompt IT security measures." Network Security 2000, no. 5 (2000): 3. http://dx.doi.org/10.1016/s1353-4858(00)05005-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Zhou, Zhong Wei, and Lei Shi. "Security Research and Measures for the Internet of Things." Advanced Materials Research 748 (August 2013): 910–14. http://dx.doi.org/10.4028/www.scientific.net/amr.748.910.

Full text
Abstract:
With the development of Internet of things, the security has become moreand more important. In order to make clear the internet of things existing security threats, provide a theoretical reference for Internet of things Security and privacy protection, this paper summarizes the internet of things security threat and the measures. According to the Internet of things main system frame, research the perception layer, transport layer and application layer seperately, analysis of the network security needs issues, research networking security model, and discuss the content of network security mecha
APA, Harvard, Vancouver, ISO, and other styles
3

Chen, Jing. "Analysis on Network Security and Corresponding Preventive Measures." Applied Mechanics and Materials 241-244 (December 2012): 2312–15. http://dx.doi.org/10.4028/www.scientific.net/amm.241-244.2312.

Full text
Abstract:
Network security is one of the most important issues in the face of Internet development. Major researches are done on improving the current status of the security of internet. This article describes some major factors threatening internet, and analysis the latest security techniques. corresponding strategies are proposed to achieve a safe, worry-free environment online.
APA, Harvard, Vancouver, ISO, and other styles
4

Niu, Minghao, and Hong Dai. "Internet of Things Information Security and Preventive Measures." Academic Journal of Science and Technology 4, no. 2 (2023): 93–96. http://dx.doi.org/10.54097/ajst.v4i2.3977.

Full text
Abstract:
The Internet of Things is the third technological revolution of modern information technology. It is a high integration of various new technologies and concepts of modern information technology. It opens up the channel between the previously unrelated technologies such as electronic technology, automation technology, communication technology, biotechnology, mechanical technology and material technology, and makes these technologies truly integrate into a whole. The communication from person to person to object, object to object expansion is realized. The Internet of Things not only drives the
APA, Harvard, Vancouver, ISO, and other styles
5

Wang, Hongqiao. "On Computer Communication Network Security Maintenance Measures." Studies in Social Science Research 4, no. 3 (2023): p134. http://dx.doi.org/10.22158/sssr.v4n3p134.

Full text
Abstract:
With the rapid development of China’s science and technology, today’s Internet communication technology has also followed the ever-changing, but there is still a certain network communication information security problems, and this problem is not to be underestimated. Network communication security has a close relationship with national important documents and information protection confidentiality, social security and stability, national development, social and economic development. The use of Internet technology to commit crimes generally does not leave traces of the crime, which increases t
APA, Harvard, Vancouver, ISO, and other styles
6

Gupta, Sanjay Kumar, and Sandeep Vanjale. "Cyber Security Measures for Internet of Things Devices." International Journal of Engineering Research and Technology 13, no. 8 (2020): 1830. http://dx.doi.org/10.37624/ijert/13.8.2020.1830-1839.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Sang, Yun Chang, and Xin Gao. "Security Issues and Protective Measures of the Internet of Things Architecture." Advanced Materials Research 765-767 (September 2013): 1007–10. http://dx.doi.org/10.4028/www.scientific.net/amr.765-767.1007.

Full text
Abstract:
With the development of technology and applications of the Internet of Things, Things technology and industry being the attention from the government to enterprises and research institutions at different levels. The guarantee of Things safety is an important prerequisite to promote the healthy development of the Internet of Things. Articles oriented networking current mainstream architecture research from the three levels of perception layer, transport layer and application layer, the security threat of the Internet of Things, and appropriate security measures, provided for the establishment o
APA, Harvard, Vancouver, ISO, and other styles
8

He, Beige. "The Advance of Internet of Things Security Threats and Possible Measures." Highlights in Science, Engineering and Technology 68 (October 9, 2023): 202–11. http://dx.doi.org/10.54097/hset.v68i.12067.

Full text
Abstract:
The Internet of Things (IoT) is a new stage of human informatization development after the Internet. With the IoT, physical devices can seamlessly exchange and process data with each other, further improving the human ability to process information. However, Internet of Things security research is still preliminary despite frequent data breaches and security incidents. This paper starts with the introduction of the IoT and introduces its definition, technical characteristics, and hierarchical architecture of the IoT. After that, the security threats that may be encountered at each layer are di
APA, Harvard, Vancouver, ISO, and other styles
9

Gomes, Leandre, Abhinav Deshmukh, and Nilesh Anute. "Cyber Security and Internet Banking: Issues and Preventive Measures." Journal of Information Technology and Sciences 8, no. 2 (2022): 31–42. http://dx.doi.org/10.46610/joits.2022.v08i02.005.

Full text
Abstract:
The internet brought a new revolution to the financial sector and it has changed the way of operations in the last two decades. Now, people have the option to carry out banking transactions from a place of their choice without having to go to a nearby bank office. E-banking has become an integral part of the banking system and has become a popular method of transaction for the majority of people. A user has a wide range of options for managing his money through numerous internet banking methods. While internet banking is an aid for customers, they still have to be vigilant to keep their accoun
APA, Harvard, Vancouver, ISO, and other styles
10

Минаев, В. А., Б. А. Швырев, and Т. Р. Ромашкин. "INTERNET OF THINGS SECURITY: KEY SOLUTIONS." ИНФОРМАЦИЯ И БЕЗОПАСНОСТЬ 26, no. 2(-) (2023): 163–68. http://dx.doi.org/10.36622/vstu.2023.26.2.001.

Full text
Abstract:
Одной из основных проблем при обеспечении безопасности Интернета вещей (IoT) является, с одной стороны, огромное количество устройств, масштабирующее угрозы и риски безопасности их использования, а с другой – слабая разработанность или даже отсутствие стандартизированных протоколов безопасности. Нередко устройства IoT имеют ограниченную вычислительную мощность и память в угоду цене и коммерческой выгоде, что затрудняет реализацию надежных мер безопасности. Расширение IoT достигло критической инфраструктуры - системы здравоохранения, транспорта и других особо важных отраслей. Поскольку современ
APA, Harvard, Vancouver, ISO, and other styles
11

Du, Yu Lin. "Research on the Information Security of Internet Bank." Applied Mechanics and Materials 687-691 (November 2014): 1925–29. http://dx.doi.org/10.4028/www.scientific.net/amm.687-691.1925.

Full text
Abstract:
In this paper, we focus on the risks and management of the information security, such as computer technology uncertainty,internet viruses and the information security soft outsourcing, then analyze the problems in internet bank information security, we conclude this paper by proposing some measures in controling the information insecurity of internet bank.
APA, Harvard, Vancouver, ISO, and other styles
12

Wang, Xiao Feng. "Research on Security Issues of the Internet of Things." Advanced Materials Research 989-994 (July 2014): 4261–64. http://dx.doi.org/10.4028/www.scientific.net/amr.989-994.4261.

Full text
Abstract:
According to the current mainstream architecture of the Internet of Things, Makes research on security threat of the Internet of things from the perception layer, network layer and application layer, Gives the corresponding security policies and measures. It provides the theoretical reference for security of the Internet of things and privacy protection.
APA, Harvard, Vancouver, ISO, and other styles
13

Chen, Jing. "Analysis on Internet Attack and Security." Advanced Materials Research 605-607 (December 2012): 2387–90. http://dx.doi.org/10.4028/www.scientific.net/amr.605-607.2387.

Full text
Abstract:
The rapid upgrading internet has brought to us many shortcuts and conveniences. Simultaneously, the underlying security problems have surfaced. These include unauthorized access, posing as legitimate users and destroyed data integrity, which interferes with the normal operation of the system. In addition, these computer network invasions are characterized by the focused attacking source, flexible attacking strategies and expanded scope of the attacked target. This paper analyzes the existing network security risks and means of invasion from various aspects; the network security defense measure
APA, Harvard, Vancouver, ISO, and other styles
14

Imdad, Maria, Deden Witarsyah Jacob, Hairulnizam Mahdin, Zirawani Baharum, Shazlyn Milleana Shaharudin, and Mohd Sanusi Azmi. "Internet of things: security requirements, attacks and counter measures." Indonesian Journal of Electrical Engineering and Computer Science 18, no. 3 (2020): 1520. http://dx.doi.org/10.11591/ijeecs.v18.i3.pp1520-1530.

Full text
Abstract:
Internet of Things (IoT) is a network of connected and communicating nodes. Recent developments in IoT have led to advancements like smart home, industrial IoT and smart healthcare etc. This smart life did bring security challenges along with numerous benefits. Monitoring and control in IoT is done using smart phone and web browsers easily. There are different attacks being launched on IoT layers on daily basis and to ensure system security there are seven basic security requirements which must be met. Here we have used these requirements for classification and subdivided them on the basis of
APA, Harvard, Vancouver, ISO, and other styles
15

Kumar Yogi, Manas, Y. Himatej, and M. Mahesh reddy. "IOT Security Challenges and Measures to Mitigate: Novel Perspectives." International Journal of Engineering & Technology 7, no. 2.7 (2018): 854. http://dx.doi.org/10.14419/ijet.v7i2.7.11081.

Full text
Abstract:
The Internet Of Things describes the ever-growing number of intelligent objects that are being connected to the internet and each other, smartphones, tablets, wearable technology and smart home devices are adopted into our everyday lives. The security of IOT is becoming more complex and may have a serious consequence. So, now we have many security challenges like privacy concerns, routine cryptography, passive data collection etc. Many people hide personal data in social media to eliminate these sort of privacy issues but common man nowadays is becoming a passive participant due to lack of sec
APA, Harvard, Vancouver, ISO, and other styles
16

Sharma, Shruti, Rajkumar Saini, Sumit Saini, and Tushar Sharma. "Network Security Essentials: Understanding Its Key Attacks and Potential Security Mechanism." Industrial Engineering Journal 52 (2023): 175–84. http://dx.doi.org/10.36893/iej.2023.v52.174-184.

Full text
Abstract:
Security is an essential component in the field of computing and networking technology. The prioritisation of a robust security policy should be the primary and fundamental concern for the design, planning, construction, and operation of any network. The prioritisation of network security has become increasingly important for individuals utilising personal computers, corporations, and military organisations. The issue of security has become a significant worry since the emergence of the internet. The inherent nature of the internet has facilitated the emergence of a multitude of security conce
APA, Harvard, Vancouver, ISO, and other styles
17

Pratik, P. Watwani. "Security Aspects in Internet and Mobile Communication." INTERNATIONAL JOURNAL OF ENGINEERING DEVELOPMENT AND RESEARCH Pubished in - Volume 4 | Issue 2 | July 2016, Pubished in - Volume 4 | Issue 2 | July 2016 (2017): Page Number(s) — 2123–2132. https://doi.org/10.5281/zenodo.583722.

Full text
Abstract:
Internet and Mobile are an essential part of our daily lives. However, with the growth it has become more difficult to manage our privacy and security online. As the technology advances the underlying infrastructure and technologies that make the internet work and secured become highly complex. This paper discusses some of the difficulties faced on the internet and mobile communication systems, the ambush of the online attacks, their statistical data aspects, as well as some measures of securing the internet and mobile networks
APA, Harvard, Vancouver, ISO, and other styles
18

Wenceslaus Ritte, James. "Security Concerns in Internet of Things." International Journal for Research in Applied Science and Engineering Technology 9, no. VII (2021): 2898–901. http://dx.doi.org/10.22214/ijraset.2021.36977.

Full text
Abstract:
Security Concerns is the among of the significant challenges of Internet of thing (IoT). Lack of proper Device updates, lack of User awareness, Software compatibility issues, service disruption, inability to monitor their current status and software are Among the challenges that IoT is facing. In this work we are going to explore significant areas of IoT applications and security measures and identify management of Machine to Machine(M2M), Platform selection criteria, Knowledge of How data is managed on various IoT applications which includes (i) IoT in healthcare (ii) Blood Banks. In this wor
APA, Harvard, Vancouver, ISO, and other styles
19

Rueda-Rueda, Johan Smith, and Jesus M. T. Portocarrero. "Framework-based security measures for Internet of Thing: A literature review." Open Computer Science 11, no. 1 (2021): 346–54. http://dx.doi.org/10.1515/comp-2020-0220.

Full text
Abstract:
Abstract This paper presents a review of state-of-the-art security frameworks for IoT applications. It aims to find out what alternatives have been proposed to guide IoT application developers in the implementation of security measures through all development phases. In this literature review, we identified 21 security frameworks, and we analyzed them from IoT application domains addressed and IoT elements protected. We find four application domains: generic, smart cities, smart car/VANET, and smart infrastructures. Concerning elements protected, we analyzed the frameworks through protected ap
APA, Harvard, Vancouver, ISO, and other styles
20

VASILE, Cristinel Marius. "Firewall Technologies." International Journal of Information Security and Cybercrime 7, no. 1 (2018): 37–44. http://dx.doi.org/10.19107/ijisc.2018.01.04.

Full text
Abstract:
Today, most businesses are based on a computer system, more or less developed. For daily activities the organization needs to be able to connect to the Internet, possibly from a local area network (LAN). But, once with the benefits of the Internet, there are also security risks that the organization must minimize by measures and appropriate controls. Among security issues arising from using the Internet include hacker attacks, computers infection with viruses, malware and spyware. In theory, hackers can enter inside the organization network and steal confidential data, damaging computers or th
APA, Harvard, Vancouver, ISO, and other styles
21

Zhang, Wen Jie. "Network Security Vulnerabilities and Preventive Measures." Applied Mechanics and Materials 433-435 (October 2013): 1674–78. http://dx.doi.org/10.4028/www.scientific.net/amm.433-435.1674.

Full text
Abstract:
As the arrival times network economy and social networks, computers and computer networks popularity indicates that a ubiquitous network will go into not the state. As the use of network and the virus has become increasingly serious, virus writers from the original to show off to obtain invalid income, the resulting harm is incalculable. This situation not only jeopardize the current development of the Internet but also undermined the reality of social stability and unity, therefore, this paper is on how the network vulnerabilities, how to survive and how to protection, so that there are looph
APA, Harvard, Vancouver, ISO, and other styles
22

BACÎŞ, Irina-Bristena. "Types of Threats and Appropriate Countermeasures for Internet Communications." International Journal of Information Security and Cybercrime 10, no. 1 (2021): 27–37. http://dx.doi.org/10.19107/ijisc.2021.01.03.

Full text
Abstract:
Threats can translate into various types of attacks an intruder can take on entities in a network: flooding the target with protocol messages, smurfing (targeted broadcasting of an ICMP protocol-based messaging protocol), distributed attacks that lead to blocking the service for legitimate users, IP address theft and flooding targets with unsolicited emails, identity theft, or fraudulent routing. Against these threats, a variety of security measures can be implemented, such as: configuration management, firewall installation, intrusion detection system installation. Used separately or together
APA, Harvard, Vancouver, ISO, and other styles
23

KADAM, NILIMA PANDURANG, TRUPTI SANTOSH RAUT, and VIJAY BABAN SHINDE. "NETWORK SECURITY AND SECURITY LAWS AND REGULATIONS LITERATURE REVIEW." JournalNX - A Multidisciplinary Peer Reviewed Journal ICACTM (May 4, 2018): 116–19. https://doi.org/10.5281/zenodo.1410176.

Full text
Abstract:
Today world becomes on internet. Not only all transactions are done on online but communication is also done online, but when data is transmitted on network there are many possibilities of hacking of confidential data and chances of misuse it. Whenever we use internet, network security issue arises. Online a cybercrimes, also leaves physical, electronic evidence, but unless good security measures are taken, it may be difficult to trace the source of cybercrime. In certain e-commerce-related areas, such as networking, data transfer and data storage, researchers applied scanning and testing meth
APA, Harvard, Vancouver, ISO, and other styles
24

Patil, Sambhajiraje, Shitiz Upreti, Anmol Kapoor, and Jyoti Parashar. "Mitigating Risks in the Internet of Things: Contemporary Security Challenges and Defensive Measures." JOURNAL OF INTELLIGENT SYSTEMS AND COMPUTING 4, no. 2 (2023): 14–22. https://doi.org/10.51682/jiscom.v4i2.38.

Full text
Abstract:
This paper contains a surveyas well as an investigation and examination of the present situation statesecurity for the Internet of Things (IoT). The Internet of Things aims to connect anybody with anything, anyplace. In contrast to the fixed Internet, IoT uses multiple wired and wireless networks to connect a large number of machines, limited-resource devices, and sensors. The realization, network, and application layers are the three hypothetical layers that make up an IoT.The security challenges that exist within and across these layers are described in this study. There are also several sec
APA, Harvard, Vancouver, ISO, and other styles
25

Abdurazakov, Adam A., and Milana M. Namaeva. "INFORMATION SECURITY ISSUES IN E-COMMERCE." EKONOMIKA I UPRAVLENIE: PROBLEMY, RESHENIYA 2/5, no. 155 (2025): 77–82. https://doi.org/10.36871/ek.up.p.r.2025.02.05.008.

Full text
Abstract:
The rapid development of the Internet and information technology has made e-commerce an important factor affecting people’s work and lives. It not only increased people’s work efficiency, but also made their lives much easier. The advent of e-commerce not only opens up broader prospects for the development of the Internet, but also opens up a new direction for global product sales. However, it should be recognized that e-commerce has obvious disadvantages. E-commerce is based on the Internet, and all information in the transaction process must be transmitted over the Internet. Therefore, if th
APA, Harvard, Vancouver, ISO, and other styles
26

Maria, Imdad, Witarsyah Jacob Deden, Mahdin Hairulnizam, Baharum Zirawani, Milleana Shaharudin Shazlyn, and Sanusi Azmi Mohd. "Internet of things (IoT); security requirements, attacks and counter measures." Indonesian Journal of Electrical Engineering and Computer Science (IJEECS) 18, no. 3 (2020): 1520–30. https://doi.org/10.11591/ijeecs.v18.i3.pp1520-1530.

Full text
Abstract:
Internet of Things (IoT) is a network of connected and communicating nodes. Recent developments in IoT have led to advancements like smart home, industrial IoT and smart healthcare etc. This smart life did bring security challenges along with numerous benefits. Monitoring and control in IoT is done using smart phone and web browsers easily. There are different attacks being launched on IoT layers on daily basis and to ensure system security there are seven basic security requirements which must be met. Here we have used these requirements for classification and subdivided them on the basis of
APA, Harvard, Vancouver, ISO, and other styles
27

Hiyam Hatem Jabbar. "Identifying Network Security Issues in the Applications of Internet of Things (IoT)." Journal of Information Systems Engineering and Management 10, no. 39s (2025): 998–1012. https://doi.org/10.52783/jisem.v10i39s.7416.

Full text
Abstract:
Current network security solutions face challenges in effectively mitigating issues due to the resource constraints, heterogeneity, and dynamic behavior of IoT networks .There is a growing need to enhance measures to counteract cyber threats, as cybercrime becomes more widespread. The importance of network security is highlighted by the constant connectivity of individuals and organizations, leading to the need for robust security methods against evolving threats . In spite of the presence of various security measures, the failure to implement solutions remains a major challenge in addressing
APA, Harvard, Vancouver, ISO, and other styles
28

Savytska, Liudmyla, Tetiana Korobeinikova, Oleh Kostiuk, Iryna Kolesnyk, and Oleksandr Dudnyk. "INTERNET OF THINGS PROTECTION MEANS IN THE CORPORATE COMPUTER NETWORK." Information technology and computer engineering 59, no. 1 (2024): 83–93. http://dx.doi.org/10.31649/1999-9941-2024-59-1-83-93.

Full text
Abstract:
This work pertains to the analysis and enhancement of security measures for the Internet of Things (IoT) in corporate computer networks. The Internet of Things encompasses a wide range of data, including personal information, making the issue of security during their transmission highly relevant. The primary goal of the research is the development of an advanced technological design for the IoT system to ensure a high level of security and confidentiality of information. The modern world of the Internet of Things demands an analysis and improvement of IoT security in corporate computer network
APA, Harvard, Vancouver, ISO, and other styles
29

Cao, Xiyu. "The application of artificial intelligence in internet security." Applied and Computational Engineering 18, no. 1 (2023): 230–35. http://dx.doi.org/10.54254/2755-2721/18/20230995.

Full text
Abstract:
The global integration of the internet has led to a significant increase in the importance of cybersecurity. Artificial Intelligence (AI) has emerged as a viable solution for enhancing cybersecurity measures. AI has the potential to improve the speed and effectiveness of detecting and responding to cyber threats. This study explores the intersection of network security and AI, with a focus on the various ways in which AI can be used to enhance network security, such as intrusion detection, malware detection, and behavioural analytics. The study also examines the potential risks associated with
APA, Harvard, Vancouver, ISO, and other styles
30

Bashir et. al., Adil. "Internet of Things Security Issues, Threats, Attacks and Counter Measures." International Journal of Computing and Digital Systemss 7, no. 2 (2018): 111–20. http://dx.doi.org/10.12785/ijcds/070206.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Fakiha, Bandr. "Business Organization Security Strategies to Cyber Security Threats." International Journal of Safety and Security Engineering 11, no. 1 (2021): 101–4. http://dx.doi.org/10.18280/ijsse.110111.

Full text
Abstract:
It is argued that the advancement of Information, Communication and Technology went hand in hand with the emergence of certain threats and vulnerabilities to cybersecurity. In several cases, cyber attacks have targeted the information, communication and infrastructure networks of numerous organizations. Today, hackers and intruders have advanced technology within their scope that lets them access the organizational information system. The present study highlights numerous internet security related problems, it offers a broad-based overview of internet threats from the perspective of business e
APA, Harvard, Vancouver, ISO, and other styles
32

Witczyńska, Katarzyna. "Network security - security methods in transnational corporations (TNC)." Logistics and Transport 45, no. 1 (2020): 55–58. http://dx.doi.org/10.26411/83-1734-2015-1-45-4-20.

Full text
Abstract:
Modern times are associated with a huge increase in the number of security breaches in transnational corporations. The conclusion is that all preventive measures should be taken to stop the growing online crime in globalizing economies. Nowadays, when the Internet is becoming more and more common and more people use its resources, security becomes a priority. The use of firewalls, IDS and IPS systems, the implementation of appropriate security rules, the awareness of network users and the continuous deepening of knowledge in this area can significantly contribute to the security of data of tra
APA, Harvard, Vancouver, ISO, and other styles
33

Song, Xinde. "Research on Security Protection Architecture of Energy Internet Information Communication." MATEC Web of Conferences 228 (2018): 02010. http://dx.doi.org/10.1051/matecconf/201822802010.

Full text
Abstract:
The large-scale development and utilization of renewable energy has become a major trend in the development of the global energy sector. Compared with traditional power grids, energy Internet information security has many features and complex technologies, and the hidden dangers of information security risks are more prominent. In the face of various cyber threats, effective measures must be taken to ensure the safe operation of the power information network. This paper introduces the relationship between energy Internet and smart grid, sorts out the current new technology of energy Internet a
APA, Harvard, Vancouver, ISO, and other styles
34

Faiz, Mohammad, and A.K. Daniel. "Threats and Challenges for Security Measures on the Internet of Things." Law, State and Telecommunications Review 14, no. 1 (2022): 71–97. http://dx.doi.org/10.26512/lstr.v14i1.38843.

Full text
Abstract:
[Purpose] The Internet of Things (IoT) has grown rapidly in the past few years and billions of devices are connected to the IoT network for collecting and sharing data globally for various applications. Due to the billions of connected devices, there is a potential risk of data loss, identity theft, device manipulation, trust issues, falsification of data, network/server manipulation, and various impacts in the application of IoT platforms. The IoT-enabled devices are growing rapidly day by day leading to amplify the threats to the reliability of the network. [Methodology/Approach/design] The
APA, Harvard, Vancouver, ISO, and other styles
35

Agarwal, Sanyam, Veer Daksh Agarwal, Vipin Mittal, and Ishaan Agarwal. "Review of Effect of Internet of Things(IoT) in Cybercrime." International Journal for Research in Applied Science and Engineering Technology 11, no. 6 (2023): 4672–78. http://dx.doi.org/10.22214/ijraset.2023.54519.

Full text
Abstract:
Abstract: This review paper examines the impact of the Internet of Things (IoT) in cybercrime. With the rise of IoT devices, cyber-attacks have also increased immensely, leading to new security challenges. IoT devices frequently lack the security of traditional computers, leaving them open to hacking and other forms of online assaults. Attackers can use IoT devices as a way to gain access to networks or other devices, steal data, or launch attacks. This paper gives a broad review of the security issues IoT devices pose and how cybercriminals take advantage of them. It also discusses the measur
APA, Harvard, Vancouver, ISO, and other styles
36

Bu, Bing, Lei Wang, Zhenyang Pi, and Weiguo Fang. "Stackelberg Model of Anti-terrorism Resource Allocation in Express Transportation Security Checks." E3S Web of Conferences 253 (2021): 02020. http://dx.doi.org/10.1051/e3sconf/202125302020.

Full text
Abstract:
The problem of anti-terrorism security checks of express transportation becomes more and more severe under the Internet shopping model. In this paper, a Stackelberg game model of anti-terrorism resource allocation in express transportation security checks is built to discuss, in terms of single and multiple routes, the optimal resource allocation of express company (defender) including physical security measures, in-box sensor technology, non-intrusive security measures at terminal distribution sites and handover course. It shows that, for the single route, express company should trade off the
APA, Harvard, Vancouver, ISO, and other styles
37

Rode, Mrs K. N. "Network Security and Cyber Security: A Review." International Journal for Research in Applied Science and Engineering Technology 10, no. 6 (2022): 3404–7. http://dx.doi.org/10.22214/ijraset.2022.44501.

Full text
Abstract:
Abstract: Secure Network has now become a need of any organization. The security threats are increasing day by day and making high speed wired/wireless network and internet services, insecure and unreliable. Now – a - days security measures works more importantly towards fulfilling the cutting edge demands of today’s growing industries. The need is also induced in to the areas like defense, where secure and authenticated access of resources are the key issues related to information security. In this paper Author has described the important measures and parameters regarding large industry/organ
APA, Harvard, Vancouver, ISO, and other styles
38

Margaret Dumebi Okpor, Kizito Eluemunor Anazia, and Daniel Ukpenusiowho. "A novel hybrid database security management technique." International Journal of Science and Research Archive 11, no. 2 (2024): 1555–65. http://dx.doi.org/10.30574/ijsra.2024.11.2.0652.

Full text
Abstract:
Since the advent of the internet and the digitization of information, more individuals and organizations have gained access to the internet, leading to a significant expansion in the size of our database systems. These databases are relied upon for day-to-day activities by individuals and organizations. Furthermore, the advancements in technology have increased the vulnerability of database management systems and enforcing adequate database security measures is of paramount importance to individuals and organizations. In this study, we deployed a hybrid approach to database security system tha
APA, Harvard, Vancouver, ISO, and other styles
39

Mohammed, Anwar. "Cybersecurity for Internet of Things (IoT): Vulnerabilities and Protection Strategies." Cybersecurity for Internet of Things (IoT): Vulnerabilities and Protection Strategies 7 (September 15, 2021): 1–19. https://doi.org/10.5281/zenodo.14760137.

Full text
Abstract:
<strong>Purpose:&nbsp;</strong>This research aims to<strong>&nbsp;</strong>explore the strategies employed for Internet of things (IoT) to mitigate risks and ensure enhanced security measures. &nbsp; <strong>Methodology</strong>: The study incorporates a comprehensive review of existing literature on IoT, security protocols, its architecture, real-life case studies and practical challenges. It also overviews samples of issues found in existing IoT systems and technology, and explores IoT security threats due to the heterogeneity and heft of IoT system capacity. &nbsp; <strong>Practical Implica
APA, Harvard, Vancouver, ISO, and other styles
40

Zhurylo, Oleh, and Oleksii Liashenko. "Architecture and iot security systems based on fog computing." INNOVATIVE TECHNOLOGIES AND SCIENTIFIC SOLUTIONS FOR INDUSTRIES, no. 1 (27) (July 2, 2024): 54–66. http://dx.doi.org/10.30837/itssi.2024.27.054.

Full text
Abstract:
The subject of the study is is the security architecture of the Internet of Things (IoT) based on fog computing, which allows providing efficient and secure services for many IoT users. The goal is to investigate the security architecture for IoT systems based on fog computing. To achieve the goal, the following tasks were solved: the concept of fog computing is proposed, its architecture is considered and a comparative analysis of fog and cloud computing architectures is made; the principles of designing and implementing the architecture of a fog computing system are outlined; multi-level sec
APA, Harvard, Vancouver, ISO, and other styles
41

Galatenko, V. A., and K. A. Kostyukhin. "IoT Information Security: Fundamental Statements Review." Programmnaya Ingeneria 11, no. 5 (2020): 259–69. http://dx.doi.org/10.17587/prin.11.259-269.

Full text
Abstract:
Internet of things technology is developing at an exceptionally fast pace. This applies to both industrial and consumer Internet. The "things" account for billions, and many areas of application have been formed. At the same time, the state of information security of the Internet of things is not satisfactory, and protective measures are clearly inferior to Commerce. This is especially dangerous because the Internet of things spans two worlds: digital and physical, and security breaches can cause both informational and physical damage. The Internet of things is developing rapidly, so it is nat
APA, Harvard, Vancouver, ISO, and other styles
42

Qi, Kun. "Security Application of 5G Technology in Industrial Internet." Journal of Electronic Research and Application 6, no. 1 (2022): 11–14. http://dx.doi.org/10.26689/jera.v6i1.3545.

Full text
Abstract:
The application of internet in the industrial field has become an inevitable trend in modern society. In the actual operation, there are possible safety risks. To ensure the system’s proper operation, technicians are required to resolve the issues. In this context, the author thoroughly integrated with the present industrial development situation, examined the use of 5G technology in industrial internet security, and desired to leverage the advantageous benefits of 5G technology to boost industrial development. Due to the numerous benefits of 5G technology in security applications, we conducte
APA, Harvard, Vancouver, ISO, and other styles
43

Clark, M'Kaila J., and Lila Rajabion. "A Strategic Approach to IoT Security by Working Towards a Secure IoT Future." International Journal of Hyperconnectivity and the Internet of Things 7, no. 1 (2023): 1–18. http://dx.doi.org/10.4018/ijhiot.317088.

Full text
Abstract:
The internet of things' (IoT) fast-growing development and adoption are undeniable. Although the IoT development is moving at a fast rate, the security of these technologies is not keeping up. Lack of security infrastructure on the internet of things is due to such security measures being excluded from the average company business plan and the lack of security configurations established. The increasing need for robust security architecture is needed to address said vulnerabilities. How do the internet of things companies create a dynamic security approach to defend and combat threats while als
APA, Harvard, Vancouver, ISO, and other styles
44

IBRAHIM ABDUL ABDULRAHMAN, GABRIEL TOSIN AYODELE, GRACE EFAHN EGBEDION, JACOB ALEBIOSU, EZEAGBA JETTA SOMTOCHUKWU, and OMOTOLANI ENIOLA AKINBOLAJO. "Securing Internet of Things (IoT) ecosystems: Addressing scalability, authentication, and privacy challenges." World Journal of Advanced Research and Reviews 26, no. 1 (2025): 523–34. https://doi.org/10.30574/wjarr.2025.26.1.0999.

Full text
Abstract:
The rapid expansion of the Internet of Things (IoT) has revolutionized industries, enhancing automation, connectivity, and data-driven decision-making. However, as IoT ecosystems grow, they face significant security challenges related to scalability, authentication, and privacy. This study explores these challenges, emphasizing the need for robust security measures to protect vast networks of interconnected devices. The research identifies scalability as a major concern, highlighting issues such as managing millions of IoT devices, network congestion, and resource limitations. Authentication m
APA, Harvard, Vancouver, ISO, and other styles
45

Alisultanova, Iman A., Galina A. Ovseenko, and Bella Kh Visaitova. "ANALYSIS OF NETWORK INFORMATION SECURITY STRATEGIES IN HIGHER EDUCATION INSTITUTIONS." EKONOMIKA I UPRAVLENIE: PROBLEMY, RESHENIYA 5/5, no. 146 (2024): 30–35. http://dx.doi.org/10.36871/ek.up.p.r.2024.05.05.005.

Full text
Abstract:
With the advent of the Internet era, computer networks have become widespread in the field of education. Since the management of network information security is of great importance for the development of higher education, large educational institutions should be aware of the importance of managing network information security. The purpose of the article is to solve the main problems faced by the management of network information security, and to take appropriate measures to lay a solid foundation for building a secure Internet environment.
APA, Harvard, Vancouver, ISO, and other styles
46

Nur A'fyfah Zaimy, Mohamad Fadli Zolkipli, and Norliza Katuk. "A review of hacking techniques in IoT systems and future trends of hacking on IoT environment." World Journal of Advanced Research and Reviews 17, no. 2 (2023): 723–31. http://dx.doi.org/10.30574/wjarr.2023.17.2.0310.

Full text
Abstract:
This paper reviews Internet of Things (IoT) security and the rise in security issues due to hardware and software security flaws being exploited. Researching hacking methods in IoT environments is critical, as attacks go beyond technical safeguards. Therefore, this paper aims to provide insights into the future of IoT security and inform the development of effective prevention measures by analyzing hacking techniques and tools. The research highlights the urgency to improve IoT security and focuses on future trends in IoT hacking. It also emphasizes the necessity for robust security measures t
APA, Harvard, Vancouver, ISO, and other styles
47

Nur, A'fyfah Zaimy, Fadli Zolkipli Mohamad, and Katuk Norliza. "A review of hacking techniques in IoT systems and future trends of hacking on IoT environment." World Journal of Advanced Research and Reviews 17, no. 2 (2023): 723–31. https://doi.org/10.5281/zenodo.8109576.

Full text
Abstract:
This paper reviews Internet of Things (IoT) security and the rise in security issues due to hardware and software security flaws being exploited. Researching hacking methods in IoT environments is critical, as attacks go beyond technical safeguards. Therefore, this paper aims to provide insights into the future of IoT security and inform the development of effective prevention measures by analyzing hacking techniques and tools. The research highlights the urgency to improve IoT security and focuses on future trends in IoT hacking. It also emphasizes the necessity for robust security measures t
APA, Harvard, Vancouver, ISO, and other styles
48

Jasim, Wael Abdulateef, Yusra Mohammed Kwyja, Ahmed Mohammed Fadhil Al-Mfarji, Nameer Hashim Qasim, and Moroj Mohammed. "An Exhaustive Examination of Architectural Methods for Hardware Security Mechanisms in IoT Devices." Radioelectronics. Nanosystems. Information Technologies. 16, no. 5 (2024): 643–56. http://dx.doi.org/10.17725/j.rensit.2024.16.643.

Full text
Abstract:
Background: The increasing number of Internet of Things (IoT) devices has raised worries about their susceptibility to different cyber threats. Although there have been improvements in software-level security, hardware measures continue to be essential for strong protection. Objective: The purpose of this study is to thoroughly analyze different architectural methods for ensuring hardware security in IoT devices, assessing how effective and practical they are. Methods: The study conducted a comparative investigation of different hardware security mechanisms, such as Trusted Platform Modules (T
APA, Harvard, Vancouver, ISO, and other styles
49

Debajit, Datta, and J. Dheeba. "Exploration of Various Attacks and Security Measures Related to the Internet of Things." International Journal of Recent Technology and Engineering (IJRTE) 9, no. 2 (2020): 175–84. https://doi.org/10.35940/ijrte.B3353.079220.

Full text
Abstract:
In this era of technological advances, it will be impractical to think of a day without the usage of gadgets. Development and popularity of the Internet of Things have helped mankind a lot in several ways, but at the same time, there has also been an increase in attacks invading the underlying security. Advances in studies have resulted in the development of evolved algorithms that can be used in order to reduce the attacks and threats to the Internet of Things. With several advancements in studies and research works, the security measures on various Internet of Things based components and pro
APA, Harvard, Vancouver, ISO, and other styles
50

Nordin, Siti Aminah, Zakiah Mohd Yusoff, Muhammad Hanif Faisal, and Khairul Kamarudin. "Securing high-value electronic equipment: an internet of things driven approach for camera security." IAES International Journal of Artificial Intelligence (IJ-AI) 13, no. 3 (2024): 2763. http://dx.doi.org/10.11591/ijai.v13.i3.pp2763-2772.

Full text
Abstract:
&lt;p&gt;This article addresses pressing challenge of securing high-value electronic equipment, notably cameras, which face dual threats of damage in high humidity conditions and theft due to their significant market value. To confront these issues, the study introduces innovative internet of things (IoT)-driven approach aimed at strengthening conventional storage box security. Central to this approach is integration of IoT technologies, such as Arduino and ESP32, to develop advanced safety storage box. This enhanced system features essential hardware components, including buzzer, password-pro
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!