[go: up one dir, main page]

Ibrahim et al., 2022 - Google Patents

A review on the mechanism mitigating and eliminating internet crimes using modern technologies: mitigating internet crimes using modern technologies

Ibrahim et al., 2022

View PDF
Document ID
96653086204522404
Author
Ibrahim H
et al.
Publication year
Publication venue
Wasit Journal of Computer and Mathematics Science

External Links

Snippet

There is no doubting that contemporary technology creates new hazards, and these threats are many and significant, directly harming people's lives and threatening their stability. Because of the increased use of computers and Internet-connected cellphones in recent …
Continue reading at wjcm.uowasit.edu.iq (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1483Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing

Similar Documents

Publication Publication Date Title
Shafiq et al. The rise of “Internet of Things”: review and open research issues related to detection and prevention of IoT‐based security attacks
Tabrizchi et al. A survey on security challenges in cloud computing: issues, threats, and solutions
Aljumah et al. Cyber security threats, challenges and defence mechanisms in cloud computing
Jang-Jaccard et al. A survey of emerging threats in cybersecurity
Ibrahim A review on the mechanism mitigating and eliminating internet crimes using modern technologies: mitigating internet crimes using modern technologies
Rani et al. Cyber security techniques, architectures, and design
Kotak et al. Information security threats and working from home culture: taxonomy, risk assessment and solutions
Abou El Houda Cyber threat actors review: examining the tactics and motivations of adversaries in the cyber landscape
Jagannath et al. Browser‐in‐the‐middle attacks: A comprehensive analysis and countermeasures
Stutz et al. Cyber threat detection and mitigation using artificial intelligence–A cyber‐physical perspective
Lemoudden et al. A Survey of Cloud Computing Security Overview of Attack Vectors and Defense Mechanisms.
Shah et al. Appraisal of the Most Prominent Attacks due to vulnerabilities in cloud computing
Kangwa Prevention of personally identifiable information leakage in ecommerce using offline data minimization and online pseudonymisation.
Ganapathi A review of machine learning methods applied for handling zero-day attacks in the cloud environment
Ali et al. Spies in the Bits and Bytes: The Art of Cyber Threat Intelligence
Asija et al. Cyber security: Emerging trends best practices
Kujo Implementing zero trust architecture for identities and endpoints with Microsoft tools
Dai et al. Mitigation of cyber security risk threats during the covid-19 pandemic
Mack Cyber security
Shaikh et al. Exploring recent challenges in cyber security and their solutions
Nawaz Cloud computing services and security challenges: A review
Virvilis-Kollitiris Detecting advanced persistent threats through deception techniques
Lingamgunta Cyber Security For Beginners
Birleanu et al. Malicious and deliberate attacks and power system resiliency
Jawad et al. Intelligent Cybersecurity Threat Management in Modern Information Technologies Systems