We are living in the new era of information, and information is an important aspect of our living. So, the need of security is to ensure that our information remains confidential and only authorized users can access it, and ensuring that no unauthorized user has changed our information, so that it provides full accuracy and efficiency. To be secured, information needs to be hidden from unauthorized access i.e. confidentiality and protected from unauthorized change and also available to an authorized entity when it is needed. Cryptography is a technique that can be employed to ensure the security of transmitted information. This papers reviews existing tecgniques for cryptography and identified salient attributes of each method. Keywords: Cryptography; Symmetric key; ciphered text; Public Key; Private Key; Encryption; Decryption, Security, Transmission, Cyber Security.
Cloud computing is at the heart of modern day computing and thus the rise in malicious attacks are increasing every day towards it. In recent times hackers have been engaging in different string concept on login fields and phishing in order to intrude cloud accounts. This research is proposed to carry out effective security mechanisms on loopholes in cloud data storage. We intend to engage the use of the Advanced Encryption Standard (AES), security Algorithms like Secure Hash Algorithm 1 & 3 (SHA1, SHA 3) and Message-Digest Algorithm (MDS) and the Standard Authentication Scheme (AS) as sure guide against phishing which when implemented can provide various login stages and codes like OTP (One Time Password) to mitigate attacks. With the application of these methods towards securing cloud computing data there will be less intrusion in accounts and loss of files. Keywords: Brute-force, Cracking, Hacking, Advanced Encryption Standard, Authentication Scheme, AES, ES, Security
As the world observes a new pandemic with COVID-19, it is clear that pathogens can spread rapidly and without recognition of borders. Outbreaks will continue to occur, and so the diseases’ transmission method must be thoroughly understood in order to minimize their impact. Some infections, such as influenza, tuberculosis and measles, known to spread through droplets in the air. In a confined space, the concentration can grow as more droplets released. This study examined a simulated confined space modelled as a hospital waiting area, where people who could have underlying conditions congregate and mix with potentially infectious individuals. It further investigated the impact of the volume of the waiting area, the number of people in the room, the placement of them as well as their weight. The simulation is an agent-based model (ABM), a computational model with the purpose of analyzing a system through the actions and cumulative consequences of autonomous agents. The presented ABM features embodied agents with differing body weights that can move, breathe and cough in a ventilated room. An investigation into current epidemiological models lead to the hypothesis that one may implement as a corresponding ABM, where it could possibly, also be improved upon. In this paper, it has shown that, all parameters of the Gammaitoni and Nucci model, been taken into account, in an ABM via the MASON library. In addition, proof produced, suggested that some flaws of the epidemiological model, should be amended in the ABM. It was demonstrated, the constructed model, account for proximity between susceptible people and infectors, an expressed limitation of the original model. KEYWORDS: transmission method, confined space, agent-based model, epidemiological models, Pandemic
The same Information and Communication Technologies (ICT) that have contributed tremendously to the productivity of supply chain companies and governments alike, as well as to the global competitiveness of the European Union, ex- pose modern societies to a range of cyber threats. ICT systems are fundamental to ensure that undisrupted flows of merchandise and critical supplies, such as oil, minerals, rare earths, pharmaceuticals and food are moved in and out of the EU territory. Past events have revealed the vulnerability of global supply chains to crime and terrorism. However, previous research does not highlight how these threats may be affected with the support of cyber-attacks. Hence, by means of a literature review and experts’ validation, this study develops a set of three scenarios that outline how cybercrime could jeopardize security of supply chains and, consequently, the well- being of European citizens. Finally, implications for managers and EU agencies are discussed. Keywords: supply chain security, supply chain crime, cybercrime, cybersecurity, cyber threats. Journal Reference Format: Sarumi, J.A. & Okunoye, A. (2021): An Evaluation of Potential Threats in Supply Chain Cyber Security
As the Internet came into widespread commercial use, the nature of computer crimes began to shift. ‘While in some crimes, one component of the crime may have been committed using an electronic instrument, in other crimes, the crime as a whole is committed in the online or electronic environment. These crimes, known as cybercrimes, generally occur in the virtual community of the Internet or in cyberspace. As a result of this, all innocent internet users should inculcate the habit of continuously updating their knowledge about the ever changing nature of information technologies. We explore the various types of cybercrimes in Nigeria, their causes, effects and perception of cyber crimes and cyber security among users of the cyberspace Keywords: Cyber-crime, Countermeasures, Fraud, Cyber Criminals, Perception, Cyberspace
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.