
BLDE University Journal of Health Sciences, Journal Year: 2024, Volume and Issue: 9(2), P. 95 - 96
Published: July 1, 2024
Language: Английский
BLDE University Journal of Health Sciences, Journal Year: 2024, Volume and Issue: 9(2), P. 95 - 96
Published: July 1, 2024
Language: Английский
Advances in information security, privacy, and ethics book series, Journal Year: 2024, Volume and Issue: unknown, P. 131 - 164
Published: July 12, 2024
With the rise and development of quantum computing, there is a high scope in encryption methods increasing security integrity data manyfolds. To safeguard user's data, safe cryptography needs to be implemented different aspects transmission data. This study takes algorithms into account that are being used for discusses how they can current industries systems. chapter examines algorithms—lattice-based, hash-based, code-based—assessing their pros cons against threats. It explores impact on finance, healthcare, government, implementation challenges such as performance compatibility. The need global standardization collaboration widespread adoption also explored.
Language: Английский
Citations
9Advances in information security, privacy, and ethics book series, Journal Year: 2024, Volume and Issue: unknown, P. 55 - 74
Published: July 12, 2024
Zero Knowledge Proofs (ZKPs), cryptographic protocols that allow a party to authenticate transaction another without disclosing additional information beyond the authenticity of transaction, continue have significant impact on privacy, security, and integrity in applications. It addresses constraints such as computing costs, trust dimensions, integration complexity, proposes possible methods techniques for future research. emphasizes importance ZKP improving privacy security digital systems highlights, article continuous innovation further development their standardization efforts. (ZKPs) emerged powerful tool cryptography, offering innovative solutions authentication challenges. This provides an in-depth review ZKPs, exploring progress, challenges prospects cryptography. examines basic concepts applications, protocols.
Language: Английский
Citations
7Advances in information security, privacy, and ethics book series, Journal Year: 2024, Volume and Issue: unknown, P. 241 - 269
Published: July 12, 2024
Homomorphic encryption is like a secret code that allows us to do calculations on private information without actually seeing the details. This super important for keeping things while still getting useful insights. chapter discusses how homomorphic can be implemented into smart city infrastructure. Furthermore, research investigates potential of and blockchain technology integration make cities even more secure. explores impact privacy in cities. It examines legal technological factors at play, considering regulations both help hinder use this technology. Ultimately, it argues key balancing utility, essential success initiatives.
Language: Английский
Citations
4Advances in information security, privacy, and ethics book series, Journal Year: 2024, Volume and Issue: unknown, P. 376 - 404
Published: July 12, 2024
In the era of cryptographic advancement, integrating human workflow with technology is a natural progression. Traditionally, advancements have focused on mathematical robustness and computational security. This research delves into combining methods to explore foundations visual cryptography its practical implementation in decrypting sensitive information. Challenges related usability, such as complex concepts, key management, user authentication, cross-platform compatibility, social engineering attacks, balancing privacy functionality, are evaluated proposed solutions across various domains. Additionally, study suggests enhance accessibility tools, including iterative design processes, research, user-friendly interfaces, error handling. Visual cryptography, leveraging capabilities system, presents unique approach data decryption that circumvents traditional reliance algorithms.
Language: Английский
Citations
4IGI Global eBooks, Journal Year: 2025, Volume and Issue: unknown, P. 187 - 212
Published: Feb. 14, 2025
Phishing attacks are a major cybersecurity threat, exploiting human vulnerabilities by manipulating trust to access sensitive information. As phishing tactics evolve, the demand for advanced anti-phishing technologies has surged. This paper examines key measures such as email filters, SSL/TLS certificates, DNS-based authentication, multi-factor and URL filtering protect against phishing. Advanced methods like machine learning, AI-driven analysis, real-time threat detection have improved prevention. It also discusses browser-based, cloud-based, security tools mitigating risks. The highlights challenges evolving tactics, limitations, user negligence, emphasizing need ongoing innovation in strategies. Future trends AI, biometrics, deep learning intelligence explored, showing potential enhance defense. A holistic approach integrating technology, protocols, awareness is advocated combat effectively at both individual organizational levels.
Language: Английский
Citations
0IGI Global eBooks, Journal Year: 2025, Volume and Issue: unknown, P. 197 - 220
Published: Feb. 28, 2025
The rapid advancement of Artificial Intelligence (AI) has transformed social interaction, reshaping communication, relationship-building, and community engagement. This chapter examines AI's multifaceted impact on human dynamics, highlighting both the benefits challenges posed by AI technologies in modern communication tools, media, online platforms. While AI-driven algorithms automated responses personalize interactions, they also raise concerns about authenticity emotional connection, making relationships paradoxically impersonal. explores how enhances efficiency through real-time translation AI-assisted moderation, while addressing ethical dilemmas related to echo chambers, behavior influence, algorithmic bias. By providing a balanced perspective role contexts, advocates for responsible development emphasizes need maintain standards safeguard human-centered values an world.
Language: Английский
Citations
0IGI Global eBooks, Journal Year: 2025, Volume and Issue: unknown, P. 29 - 60
Published: Feb. 28, 2025
The integration of blockchain technology with cryptocurrency has significantly improved security, transparency, and decentralization in digital finance. authors explore the fundamental principles its integral role development operation various cryptocurrencies. They present a comprehensive analysis blockchain's core architecture, including consensus mechanisms such as proof work (PoW) stake (PoS), examine their implications for transaction security efficiency. Through detailed case studies industry examples, study illustrates how addresses issues like double-spending fraud, thereby maintaining trust reliability financial systems. Furthermore, chapter discusses regulatory scalability challenges associated offers insights into future trends advancements. By addressing technical practical aspects technology, highlights it empowers cryptocurrency.
Language: Английский
Citations
0IGI Global eBooks, Journal Year: 2025, Volume and Issue: unknown, P. 149 - 186
Published: Feb. 14, 2025
Phishing attacks are among the most prevalent and dangerous cyber threats, exploiting both technological human vulnerabilities to access sensitive information. As phishing techniques evolve, organizations must implement various detection strategies stay ahead of cybercriminals. This chapter delves into methods, covering traditional approaches like signature-based content filtering, alongside advanced such as heuristic analysis, machine learning, artificial intelligence (AI). It evaluates strengths, limitations, practical applications these methods in real-world scenarios. Additionally, explores emerging technologies Natural Language Processing (NLP), blockchain, behavioral analysis that redefining detection. By combining modern techniques, can enhance their ability identify prevent attacks, strengthening overall cybersecurity.
Language: Английский
Citations
0IGI Global eBooks, Journal Year: 2025, Volume and Issue: unknown, P. 49 - 72
Published: Feb. 14, 2025
Phishing is a dangerous online fraud tactic that tricks individuals into disclosing personal information, like usernames, passwords, and credit card numbers. It often appears through fake emails, messages, or websites designed to lure victims sharing sensitive data. This illegal activity can cause significant financial losses for businesses consumers, while also damaging trust in transactions. Anti-phishing tools, such as SpamTitan Barracuda Sentinel, use advanced algorithms machine learning detect block phishing attempts real time, protecting users from data breaches harm. These solutions offer user training increase awareness of tactics, enhancing defenses. Emphasizing the need comprehensive anti-phishing strategies, it shows how organizations safeguard information maintain customer digital world. explores technologies methods building robust framework against phishing, detailing innovative ways secure communication systems ensure integrity.
Language: Английский
Citations
0IGI Global eBooks, Journal Year: 2025, Volume and Issue: unknown, P. 1 - 24
Published: Feb. 14, 2025
Phishing remains a significant cybersecurity threat, targeting individuals and organizations to access confidential data. As techniques evolve, innovative protective measures are essential. This paper offers detailed overview of phishing defense strategies, focusing on both technological solutions human-centered approaches. Multi-layered defenses, blending traditional security with user education, vital for mitigating risks. Simulated exercises ongoing training empower employees recognize respond threats, strengthening the human aspect cybersecurity. Leadership commitment open communication crucial cultivating strong culture, encouraging staff report suspicious activities. Continuous evaluation updates defenses necessary adapt evolving threats. Real-world case studies, such as 2020 Twitter breach SolarWinds attack, highlight severe impacts phishing, reinforcing need proactive that combines technology, risk management protect digital assets effectively.
Language: Английский
Citations
0