{"title":"Parasitic overview on different key management schemes for protection of Patients Health Records","authors":"Shibin David, K. Sagayam, Ahmed A. Elngar","doi":"10.54216/jcim.060202","DOIUrl":"https://doi.org/10.54216/jcim.060202","url":null,"abstract":"The main goal of HIPAA (Health Insurance Portability and Accountability Act) is to protect health information of individuals against access without consent or authorization. Security and privacy are the main issues in HIPAA. A compliant key management solution is used to reduce harm and risk while providing cryptographic mechanisms. Using ECC (Elliptic Curve Cryptography) we ensure more security for access of patient’s health records. This provides same level of security for access of patient’s health records. Patient’s health Information is stored in RFID cards. Finally, the proposed method ensures higher level of security than other existing cryptographic techniques. ECC provides more security even with small key sizes. Proposed scheme describes the various counter measures for improving security and a key recovery mechanism for the protection of keys.","PeriodicalId":169383,"journal":{"name":"Journal of Cybersecurity and Information Management","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121611944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Coded DCO-OFDM Techniques in Intensity Modulation/Direct Detection (IM/DD) Systems","authors":"Mohamed Abdelaziz, Essam Abdellatef","doi":"10.54216/jcim.100202","DOIUrl":"https://doi.org/10.54216/jcim.100202","url":null,"abstract":"Optical wireless communications (OWC) are among the best alternative techniques for transmitting information-laden optical radiation across a free-space channel from one place to another. DC-biased optical OFDM (DCO-OFDM) is a technique that sacrifices the power efficiency to transmit unipolar OFDM signals. The primary drawback with DCO-OFDM is its clipping noise, which causes distortion and lowers the bit error rate (BER). Thus, in this paper, we show the performance of DCO with different coded techniques to improve the BER in additive white Gaussian noise (AWGN) for IMDD systems. The experimental results show that the coded DCO-OFDM has the best performance. Furthermore, turbo coding has the best coding technique added to the DCO-OFDM system.","PeriodicalId":169383,"journal":{"name":"Journal of Cybersecurity and Information Management","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130249136","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Audit, Validation, Verification and Assessment for Safety and Security Standards","authors":"R. Kemp, Richard Smith","doi":"10.54216/jcim.070103","DOIUrl":"https://doi.org/10.54216/jcim.070103","url":null,"abstract":"Internal auditing is important for ensuring compliance to multiple safety and security standards. The problem is that although safety and security have similarities when it comes to auditing, they also have differences that makes auditing both areas under the same process difficult. This paper has shown how to overcome those differences and leverage the similarities to create one auditing process for both safety and security. The paper has harmonized the different terminology between safety and security and showed how the new auditing process can allow compliance to IEC 61508, ISO 27001 and IEC 62443.","PeriodicalId":169383,"journal":{"name":"Journal of Cybersecurity and Information Management","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133159950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Advancements in Encryption Techniques for Enhanced Data Security Over Cloud","authors":"Rishu, Vijay Kumar Sinha, S. Aggarwal","doi":"10.54216/jcim.080202","DOIUrl":"https://doi.org/10.54216/jcim.080202","url":null,"abstract":"With the advancements in internet technologies and increased transactions over the internet, the threats for data security increased many folds than ever. Nowadays message application services are in great demand, as they offered end-to-end encryption (E2EE) that is essential to provide security to the users while communication takes place between parties. Today messaging application service is in great use for communication. For making communication over the network. This paper presents that security is essential while communication takes place between users and how E2EE offers security to the users. Consumers' concerns related to the security and privacy of their data are growing day by day with increased inter-connectivity. We examine the existing mobile message service encryption protocols that provide security and the features which preserve privacy for messenger applications and also evaluate the technical challenges involved in its implementations.","PeriodicalId":169383,"journal":{"name":"Journal of Cybersecurity and Information Management","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116482007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An analytical approach for evaluating sustainable supply chain solutions during the COVID-19 pandemic: Benefits and better explanations","authors":"Mahmoud Ismail, Shereen .., M. Ibrahim","doi":"10.54216/jcim.060204","DOIUrl":"https://doi.org/10.54216/jcim.060204","url":null,"abstract":"The influence of COVID-19 has been felt in many facets of personal and professional life. As a result of the international economic crisis and the pandemic's consequences, major supply chains (SCs) have been disrupted. Our study intends to examine the effect of COVID-19 on SCs and help organizations choose options depending on their relative relevance. Phase one and phase two of the investigation are the most important. As a first step in strengthening SCs' ability to withstand the pandemic, Phase 2 examines the difficulties, concerns, actions, and solutions that have been encountered so far. As part of this phase, a MARCOS method is proposed to select solutions that address the complex interrelationships that are involved in decision-making. Positive and negative solutions are considered and it is at the start of the creation of a preliminary matrix, utility degree is determined closer to both solutions, a new method of determining utility functions and their aggregates is proposed, and the method is stable enough to take into account a huge list of conditions and alternatives. Using this approach, decision-makers will be able to more properly weigh the relevance and influence of many options before making a final choice. The findings suggest that SCs should continue to rely on innovation to endure potential competition and disasters.","PeriodicalId":169383,"journal":{"name":"Journal of Cybersecurity and Information Management","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124752564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Balancing Security and Information Management in the Digital Workplace","authors":"Rabah .., Ossama H. Embarak","doi":"10.54216/jcim.110201","DOIUrl":"https://doi.org/10.54216/jcim.110201","url":null,"abstract":"As the digital workplace becomes more prevalent, organizations are faced with the challenge of balancing security and information management. On one hand, there is a need to protect sensitive data and prevent cyberattacks, while on the other hand, organizations must enable employees to collaborate and share information effectively. Machine learning (ML) is a promising technology that can help organizations address this challenge. By analyzing data patterns and identifying potential security threats, ML algorithms can enhance security measures and mitigate risks. At the same time, ML can also facilitate information management by automating routine tasks and improving the accuracy of data analysis. In this paper, we explore the role of ML in balancing security and information management in the digital workplace. We propose a hybrid ML model that integrates autoencoder and convolutional subnetworks in unified architecture to help capturing and security threats in the digital workplace, without compromising the information management tasks. We also present a case study of a real-world implementation of ML in a digital workplace setting, highlighting the benefits and limitations of this approach. Our findings suggest that ML can be a valuable tool for achieving a balance between security and information management in the digital workplace, but its successful implementation requires careful consideration of organizational context and stakeholder needs.","PeriodicalId":169383,"journal":{"name":"Journal of Cybersecurity and Information Management","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129716899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ahmed A. Elngar, Mohamed Gamal, Amar Fathy, Basma Moustafa, Omar Mahmoud, M. Shaban
{"title":"Plagiarism Detection Algorithm Model Based on NLP Technology","authors":"Ahmed A. Elngar, Mohamed Gamal, Amar Fathy, Basma Moustafa, Omar Mahmoud, M. Shaban","doi":"10.54216/jcim.050104","DOIUrl":"https://doi.org/10.54216/jcim.050104","url":null,"abstract":"We can bear in mind that each of us has plagiarized a text without realizing that it was plagiarism, Plagiarism can happen in Articles, Papers, Researches, literature, music, software, scientific, newspapers, websites, Master and PHD Thesis and many other fields, So plagiarism has become serious major problem to teachers, researchers and publishers, There are divergent opinions about how to define plagiarism and what makes plagiarism serious. So, the detecting plagiarism is very important, so in this survey we explicate the concept of ;plagiarism ; and provide an overview of different plagiarism software and tools to solve the plagiarism problem, and will discuss the plagiarism process, types and detection methodologies. We can define that plagiarism is the brief and the description of this sentence ;someone used someone else’s mental product (such as its texts, ideas, or privacy). We suggest that what makes plagiarism so reprehensible is that it distorts scientific credit. In addition, intentional plagiarism indicates dishonesty. Moreover, there are a number of possible negative consequences of plagiarism. So we just create a framework for external plagiarism detection in which a some NLP processes are applied to process a set of suspicious and original documents, we have classified the different plagiarism detection techniques based on Lexical, Semantic, Syntactic and grammar analysis algorithms, And all of these algorithms precedes it NLP processing.","PeriodicalId":169383,"journal":{"name":"Journal of Cybersecurity and Information Management","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129202044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"2021-22 Innovative Technologies to Prevent IP Cyber Attacks","authors":"Mohammed I. Alghamdi","doi":"10.54216/jcim.080205","DOIUrl":"https://doi.org/10.54216/jcim.080205","url":null,"abstract":"The cyber security risks on Intellectual Property (IP) have unfortunately become the center of media attention quite recently. The cyber domain has risen to the front position of national security policy in the United States. This growth has created room for developing a lot of innovative technologies to prevent IP cyber-attacks. Usually, cyber-attacks target private data. But cyber-attacks have recently expanded their threat level to intellectual property. These threats affect companies, people, and even national security. Cyber threats to IP will be victimized by globalization. Hence, this article is aimed to explore existing innovative technologies used to prevent IP cyber-attacks and their future scope. To find out the existing technologies used in the prevention of cyber-attacks, secondary data will be used from recent reports by various public and government organizations, research papers, and news portals, and other relevant sources. Since cyber threats are increasing, a comprehensive, multinational strategy is needed for making better cyber security infrastructure. This strategy would improve international relations, protect international supply chains, innovation, and reduce financial losses.","PeriodicalId":169383,"journal":{"name":"Journal of Cybersecurity and Information Management","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121306108","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Protecting Smart Home from Cybersecurity Threats Strategies for Homeowners","authors":"Miguel Botto Botto-Tobar, Sumaiya Rehan, R. Verma","doi":"10.54216/jcim.120206","DOIUrl":"https://doi.org/10.54216/jcim.120206","url":null,"abstract":"Cyberthreat proliferation parallels the rapid surge in smart home usage. While having everything in one place is convenient, it also increases your home's vulnerability to cyber threats. Such an attack could result in bodily harm, the theft of sensitive information, or both. To mitigate the effects of these threats, owners of smart homes can make efforts to prevent cybercriminals from breaking into their premises starting by updating their firmware to the most recent version, creating secure passwords, and enabling two-factor authentication. Second, people should safeguard their gadgets by creating unique user IDs, disabling unneeded functions, and always keeping a tight eye on them. Finally, they must safeguard the facility where they conduct business by installing surveillance equipment, employing electronic locks, and restricting network access. Individuals must take these safeguards, but they must also stay informed about the most recent threats to home cybersecurity and the best strategies to combat them. Smart home device owners should become acquainted with the risks to which their devices are prone and ensure that their devices are updated to the most recent versions of all available software and security upgrades. Collaboration between homeowners, connected device manufacturers, and internet service providers is required to ensure the security of a smart home. Homeowners should research the security features available in smart home devices and only buy from reputable businesses that value consumer privacy and security. As the Internet of Things (IoT) expands and develops, a data privacy standard that meets the criteria of Data protection is in great demand. Safeguarding smart family apps necessitates a community agreement and specific permission from users to store their personal information in the product's database.","PeriodicalId":169383,"journal":{"name":"Journal of Cybersecurity and Information Management","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133565928","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Lightweight Symmetric Encryption and Attribute Based Encryption Method to Increase Information Safety in Wireless Sensor Network","authors":"R. Pandey","doi":"10.54216/jcim.100205","DOIUrl":"https://doi.org/10.54216/jcim.100205","url":null,"abstract":"Direct data transmission in a wireless sensor network raises the data transfer cost. In addition, the lifetime of sensor networks is shortened because of the rise in energy required for data exchange. As a result, data aggregation is utilized in WSN to lessen the burden of transmission costs and lengthen the useful life of the sensor networks. The sensor nodes and their collected data are vulnerable to destruction because they are broadcasting in a hostile environment. Therefore, data security is a major topic of study for WSN. Due to the limited resources of the sensor network, conventional wireless network security measures are ineffective. With Speck encryption and CP-ABE, the proposed Lightweight Secured remote Health monitoring System (LSHS) can protect health data and restrict who can access it while using less power. Lightweight block ciphers are optimal for protecting medical records, according to the research. Using the LSHS, we evaluate how well-known lightweight block ciphers like AES, Simon, and Speck perform. Both encrypting and decrypting with the Speck technique require less processing time. Therefore, medical records are encrypted using the Speck algorithm.","PeriodicalId":169383,"journal":{"name":"Journal of Cybersecurity and Information Management","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128089161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}