Progress in IS, Journal Year: 2024, Volume and Issue: unknown, P. 35 - 54
Published: Jan. 1, 2024
Language: Английский
Progress in IS, Journal Year: 2024, Volume and Issue: unknown, P. 35 - 54
Published: Jan. 1, 2024
Language: Английский
Cyber Security and Applications, Journal Year: 2023, Volume and Issue: 1, P. 100016 - 100016
Published: March 11, 2023
Healthcare information security is becoming a significant responsibility for all healthcare organisations and individuals. Innovative medical equipment apps are vital to patient care, yet they often the target of hackers. Moreover, attackers silently working against data. Once hacker has gained access network, might install ransomware lock down essential services or encrypt files until specified ransom paid. Businesses frequently compelled pay ransom, hoping money eventually recovered since sector time-sensitive. Although less common, network-connected devices can be taken over used distribute incorrect medications alter machine's functionality. So, there need implement cyber in protect information. In comparison other industries, duties industry particularly broad new. This especially true given that data accumulated accessed from various destinations. Data on specific gathered sources, including hospital lab records, insurance fitness apps, trackers gadgets, health portals, many more. It easily protected by using cybersecurity technology. paper briefs about its healthcare. Several tools, traits roles Sector studied. Finally, we identified studied applications For hackers, patient's aggregated regarded as goldmine, providing them with detailed biography an individual, basic information, trends, family history, financial details. The importance emerges numerous endpoints, which weak spots management system also open up infringement infrastructure.
Language: Английский
Citations
115Alexandria Engineering Journal, Journal Year: 2023, Volume and Issue: 81, P. 371 - 383
Published: Sept. 19, 2023
The widespread deployment of the Internet Things (IoT) into critical sectors such as industrial and manufacturing has resulted in Industrial (IIoT). IIoT consists sensors, actuators, smart devices that communicate with one another to optimize processes. Although provides various benefits both service providers consumers, security privacy remain a big challenge. An intrusion detection system (IDS) been utilized mitigate cyberattacks connected network. However, many existing solutions for IDS suffer from lack comprehensiveness types attack network is exposed to, high feature dimension, models built on out-of-date datasets, focus problem imbalanced datasets. To address aforementioned issues, we propose an intelligent identifying IoT networks. proposed model uses singular value decomposition (SVD) technique reduce data features improve results. We use synthetic minority over-sampling (SMOTE) avoid over-fitting under-fitting issues result biased classification. Several machine learning deep algorithms have implemented classify binary multi-class evaluate efficacy ToN_IoT dataset. approach achieved accuracy rate 99.99% reduced error 0.001% classification, 99.98% 0.016%
Language: Английский
Citations
57Published: Nov. 8, 2023
In today's digitally interconnected world, cybersecurity threats have reached unprecedented levels, presenting a pressing concern for individuals, organizations, and governments. This study employs qualitative research approach to comprehensively examine the diverse of their impacts across various sectors. Four primary categories are identified analyzed, encompassing malware attacks, social engineering network vulnerabilities, data breaches. The delves into consequences these on society at large. findings reveal range key emerging in cybersecurity, including advanced persistent threats, ransomware Internet Things (IoT) exploits. Consequently, it is evident that pose substantial risks both organizations individuals. sophistication diversity necessitate multi-layered cybersecurity. should include robust security measures, comprehensive employee training, regular audits. implications extensive, with potential such as financial loss, reputational damage, compromised personal information. emphasizes importance implementing effective measures mitigate threats. It highlights significance using strong passwords, encryption methods, regularly updating software bolster cyber defenses.
Language: Английский
Citations
11International Journal of Online and Biomedical Engineering (iJOE), Journal Year: 2024, Volume and Issue: 20(07), P. 4 - 17
Published: May 6, 2024
This research investigates the integration of blockchain technology in vocational education Indonesia, evaluating its impact on database system learning outcomes. Involving 86 Indonesian students, this study aims to assess effectiveness improving students’ understanding, skills, and academic performance. Using a quasi-experimental design, findings showed significant improvement outcomes, as evidenced by analysis pre-test post-test scores. The measure with substantial increase approximately 46.50%, emphasizes positive influence student achievement systems course. will contribute valuable information educational institutions, policy makers, educators who wish incorporate new technologies such into their systems. implication is provide recommendations optimizing technology, which significantly affects outcomes realized through facilitating fast efficient access materials, fostering more interactive engaging environment, enhancing understanding industry practices. not only improves quality but also equips students for successful career technology.
Language: Английский
Citations
4International Journal of Online and Biomedical Engineering (iJOE), Journal Year: 2024, Volume and Issue: 20(09), P. 4 - 16
Published: June 20, 2024
This research and development project aimed to create learning materials in the form of an Internet Things (IoT) trainer kit specifically designed for Digital Circuit course. The goal was enhance student motivation outcomes by facilitating a comprehensive understanding subject matter. methodology employed (R&D) utilizing Instructional Development Institute (IDI) model, which consists define, develop, evaluate stages. Primary data were gathered from experts instrumentation, media, materials, as well feedback lecturers students. findings revealed high level validity IoT media. Media assigned value 0.93, while material provided 0.86. practicality media confirmed favorable responses lecturers, indicating score 87.31%. Additionally, students’ after trial reflected rating 83.25%. Regarding effectiveness, demonstrated success improving outcomes, with gain 77.25%, affirming its effectiveness. In conclusion, Learning is considered valid, practical, effective teaching digital circuits within Electrical Engineering Study Program at Muhammadiyah University West Sumatra. Its utilization expected boost engagement, creativity, potentially overall quality education.
Language: Английский
Citations
3International Journal of Online and Biomedical Engineering (iJOE), Journal Year: 2023, Volume and Issue: 19(01), P. 38 - 58
Published: Jan. 17, 2023
The advent of blockchain technology in the development and design smart internet things (IoT) systems offers opportunity to secure transfer data flow, preserve its integrity, provide transparent mechanisms for management. Blockchain has actually attracted applications vital fields because it provides many advantages over centralized database such as traceability, confidentiality, availability trust. A private network most peer-restricted environment big specifically IoT ecosystems. An integrated blockchain-IoT ecosystem which three Raspberry Pi 4 nodes communicate interact a closed loop control via an Ethereum platform efficiently emulated is piloted. proposed (BCoT) adds new layer physical, application layers typical architecture. concept fully decentralized BCoT may find several that call removal single-point failure ensures integrity transparency.
Language: Английский
Citations
4International Journal of Online and Biomedical Engineering (iJOE), Journal Year: 2023, Volume and Issue: 19(07), P. 88 - 98
Published: June 13, 2023
Most cybersecurity frameworks are based on three major components such as confidentiality, integrity, and availability. All these have their parameters that used to secure network nodes. But finding the most cyber node in a needs measurement method. The aim of paper is offer model can be find nodes considering parameters. This achieved by modelling numeric values respective weights for applied simulated environment where random standing given 30 wireless an example. Then weighted processed with Python programming language giving according needed components. recommend right deploy services securely while avoiding potential vulnerabilities cyber-attacks.
Language: Английский
Citations
2SSRN Electronic Journal, Journal Year: 2024, Volume and Issue: unknown
Published: Jan. 1, 2024
The Internet of Things, or IoT, may be thought as a network devices that are built with technological components enabling connection to the Internet. While these have positive impacts, they also bring potential security risks possible exploit for malicious cyber actor achieve harm (Ande et al. 2020). Since IoTs vulnerable devices, act additional weak endpoints, which would threaten connected well (2020). Cyber professionals need aware risks, and able mitigate any threats. Research questions should answered by pursuing this topic damage compromise through an IoT occur, whether current risk models adequately consider present threat landscape, effectiveness once employed. research methodology uses quantitative methods follows survey design gathering existing data. This data falls under scope surveying issues wearable smart home cars, followed common threats architectural layers. In doing so, gathered assist in evaluating assessing their relevance environment.
Language: Английский
Citations
0Progress in IS, Journal Year: 2024, Volume and Issue: unknown, P. 35 - 54
Published: Jan. 1, 2024
Language: Английский
Citations
0