Ibrahim et al., 2022 - Google Patents
A review on the mechanism mitigating and eliminating internet crimes using modern technologies: mitigating internet crimes using modern technologiesIbrahim et al., 2022
View PDF- Document ID
- 96653086204522404
- Author
- Ibrahim H
- et al.
- Publication year
- Publication venue
- Wasit Journal of Computer and Mathematics Science
External Links
Snippet
There is no doubting that contemporary technology creates new hazards, and these threats are many and significant, directly harming people's lives and threatening their stability. Because of the increased use of computers and Internet-connected cellphones in recent …
- 230000000116 mitigating 0 title abstract description 7
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/563—Static detection by source code analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1483—Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Shafiq et al. | The rise of “Internet of Things”: review and open research issues related to detection and prevention of IoT‐based security attacks | |
| Tabrizchi et al. | A survey on security challenges in cloud computing: issues, threats, and solutions | |
| Aljumah et al. | Cyber security threats, challenges and defence mechanisms in cloud computing | |
| Jang-Jaccard et al. | A survey of emerging threats in cybersecurity | |
| Ibrahim | A review on the mechanism mitigating and eliminating internet crimes using modern technologies: mitigating internet crimes using modern technologies | |
| Rani et al. | Cyber security techniques, architectures, and design | |
| Kotak et al. | Information security threats and working from home culture: taxonomy, risk assessment and solutions | |
| Abou El Houda | Cyber threat actors review: examining the tactics and motivations of adversaries in the cyber landscape | |
| Jagannath et al. | Browser‐in‐the‐middle attacks: A comprehensive analysis and countermeasures | |
| Stutz et al. | Cyber threat detection and mitigation using artificial intelligence–A cyber‐physical perspective | |
| Lemoudden et al. | A Survey of Cloud Computing Security Overview of Attack Vectors and Defense Mechanisms. | |
| Shah et al. | Appraisal of the Most Prominent Attacks due to vulnerabilities in cloud computing | |
| Kangwa | Prevention of personally identifiable information leakage in ecommerce using offline data minimization and online pseudonymisation. | |
| Ganapathi | A review of machine learning methods applied for handling zero-day attacks in the cloud environment | |
| Ali et al. | Spies in the Bits and Bytes: The Art of Cyber Threat Intelligence | |
| Asija et al. | Cyber security: Emerging trends best practices | |
| Kujo | Implementing zero trust architecture for identities and endpoints with Microsoft tools | |
| Dai et al. | Mitigation of cyber security risk threats during the covid-19 pandemic | |
| Mack | Cyber security | |
| Shaikh et al. | Exploring recent challenges in cyber security and their solutions | |
| Nawaz | Cloud computing services and security challenges: A review | |
| Virvilis-Kollitiris | Detecting advanced persistent threats through deception techniques | |
| Lingamgunta | Cyber Security For Beginners | |
| Birleanu et al. | Malicious and deliberate attacks and power system resiliency | |
| Jawad et al. | Intelligent Cybersecurity Threat Management in Modern Information Technologies Systems |