{"title":"Secure Digital Signature Using Block Chain Technology","authors":"Manu S, Bhagappa, Suhas G K","doi":"10.46610/jcscs.2024.v03i01.001","DOIUrl":"https://doi.org/10.46610/jcscs.2024.v03i01.001","url":null,"abstract":"The lack of authentication and ant forge mechanisms severely compromises the security details of the authorizations issuing the certification. We employ blockchain technology to verify people in a way that is akin to a digital signature with their identity and access authorization, so resolving the issue of certificate forgery. Blockchain technology is an open distributed ledger that ensures that every transaction cannot be altered and holds unquestionable information in a highly secure and encrypted manner. A high standard for the procedure that may guarantee that the data in such a certificate is authentic indicates that the document is authentic and has not been forged, having come from a reliable source. The interplanetary file system uses the content address as the only means of uniquely identifying every file inside a global namespace that includes all computing devices. A bi-dimensional barcode that provides data as black and white dots is called a Quick Response (QR) code. The system consists of black squares that can be photographed by a camera or other image device, arranged in a square framework on a white background.","PeriodicalId":437457,"journal":{"name":"Journal of Cyber Security in Computer System","volume":"28 11","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139871598","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secure Digital Signature Using Block Chain Technology","authors":"Manu S, Bhagappa, Suhas G K","doi":"10.46610/jcscs.2024.v03i01.001","DOIUrl":"https://doi.org/10.46610/jcscs.2024.v03i01.001","url":null,"abstract":"The lack of authentication and ant forge mechanisms severely compromises the security details of the authorizations issuing the certification. We employ blockchain technology to verify people in a way that is akin to a digital signature with their identity and access authorization, so resolving the issue of certificate forgery. Blockchain technology is an open distributed ledger that ensures that every transaction cannot be altered and holds unquestionable information in a highly secure and encrypted manner. A high standard for the procedure that may guarantee that the data in such a certificate is authentic indicates that the document is authentic and has not been forged, having come from a reliable source. The interplanetary file system uses the content address as the only means of uniquely identifying every file inside a global namespace that includes all computing devices. A bi-dimensional barcode that provides data as black and white dots is called a Quick Response (QR) code. The system consists of black squares that can be photographed by a camera or other image device, arranged in a square framework on a white background.","PeriodicalId":437457,"journal":{"name":"Journal of Cyber Security in Computer System","volume":"27 16","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139811748","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Digital Marketing Security: Risks and Mitigation Strategies","authors":"Preeti Gupta, Shivam Tiwari, Sonal Saubhya","doi":"10.46610/jcscs.2023.v02i01.004","DOIUrl":"https://doi.org/10.46610/jcscs.2023.v02i01.004","url":null,"abstract":"The field of digital marketing has seen rapid growth in recent years, but with this growth comes new security challenges. This review paper examines the current state of digital marketing and the various security risks associated with it. Firstly, it explores the concept of digital marketing and its various components, including search engine optimization (SEO), social media marketing (SMM), and email marketing. Secondly, it delves into the security challenges faced by digital marketers, including data breaches, hacking, and phishing attacks. Additionally, the paper discusses the importance of implementing strong security measures to protect sensitive customer data. This includes the use of encryption, secure socket layer (SSL) certificates, and firewalls. The review also touches on the role of government and other regulatory bodies in ensuring the security of digital marketing practices. The paper concludes by emphasizing the need for continued education and awareness on the topic of digital marketing security. Marketers must stay up-to-date with the latest threats and implement best practices to secure their campaigns and protect their customers ’ information.","PeriodicalId":437457,"journal":{"name":"Journal of Cyber Security in Computer System","volume":"260 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122928751","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Penetration Testing and Data Privacy: An In-Depth Review","authors":"Barkha Bhardwaj, Shivam Tiwari","doi":"10.46610/jcscs.2023.v02i01.003","DOIUrl":"https://doi.org/10.46610/jcscs.2023.v02i01.003","url":null,"abstract":"This research paper provides a comprehensive review of penetration testing and data privacy. Penetration testing is a simulation of an attack on a computer system, network, or web application to identify vulnerabilities and assess the level of security. The objective of this review is to highlight the importance of penetration testing in ensuring the privacy and security of sensitive data. The paper will cover the different types of penetration testing, the processes involved, and the tools and techniques used in the testing. Additionally, the paper will also discuss the various challenges faced by organizations in implementing penetration testing and the measures that can be taken to overcome them. Furthermore, the paper will delve into data privacy and the role of penetration testing in ensuring the confidentiality, integrity, and availability of sensitive data. The review concludes by highlighting the significance of penetration testing in today's increasingly digital world and the need for organizations to invest in it.","PeriodicalId":437457,"journal":{"name":"Journal of Cyber Security in Computer System","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131310483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Survey on Detection of Manipulated Multimedia in Digital Forensics Using Machine Learning","authors":"Anand Gudnavar, Preetam Anvekar, Shraddha Sambrekar, Tejashwini Pallakke","doi":"10.46610/jcscs.2023.v02i01.002","DOIUrl":"https://doi.org/10.46610/jcscs.2023.v02i01.002","url":null,"abstract":"The manipulation of multimedia has increased all over the world. Different tools are used to alter the multimedia and it is difficult to detect genuine and fake media. People are facing problems to detect if the media is real or fake. Due to manipulated media, cybercrime has becomeincreasingly widespread. We believe that personal security and privacy should be carried out easily and intelligently in this digital environment where all fundamental tasks are completed without issue. When we looked into the numbers, we discovered that a sizable proportion of people experience harassment or other forms of abuseregularly. Based on a review of the existing system, we presented an application that would use the CNN (Convolutional Neural Networks) method to distinguish between real and fraudulent media in a single application. CNN performs better with picture and voice or audio inputs than earlier networks and other techniques. CNN hidden extract feature from the input using pixels value and computation based on edges and outline of the inputs using pixels value and computation based on edges and outline of the inputs. The growing use of convolutional neural networks (CNNs) has had a substantial effect on defenders.","PeriodicalId":437457,"journal":{"name":"Journal of Cyber Security in Computer System","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121475455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Learning from Mistakes by SYM (Share Your Mistakes)","authors":"Jyoti Gupta","doi":"10.46610/jcscs.2022.v01i02.005","DOIUrl":"https://doi.org/10.46610/jcscs.2022.v01i02.005","url":null,"abstract":"The motivation driving Project SYM is to confine the missteps in human existence. An extraordinary attestation is \"gain from your missteps'. Notwithstanding, this verbalization is restricted to messes up that we make. All things considered, on the off chance that we are advancing just from our staggers, we are committing another screw up. Why commit slip-ups and gain from them, when we can procure relative portrayal from others' goods additionally? So gain from your staggers as well as gain from others' missteps. In any case, the solicitation emerges where we can track down others' missteps? Considering everything, Project SYM is keeping close by for you. On Project SYM we urge clients to share their slip-ups and the portrayals they obtained from it in an all-around facilitated plan. We moreover reward clients who accomplish more likes on their MisCards. Project SYM is made dealing with all of the best in class highlights of any electronic redirection application. It solidifies posting MisCards, similar to, disdain, remark, recommendation and safe choice. Clients can turn on or off remarks on their MisCards. Follow button is moreover accessible. It moreover solidifies two or three progressed highlights like modified subject age from the MisCards text utilizing LDA (Latent Dirichlet Allocation) AI model. With the assistance of the LDA model the subject age is automated, without this the client should pick the point really.","PeriodicalId":437457,"journal":{"name":"Journal of Cyber Security in Computer System","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130421221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"E-Learning Evolution in Web Technologies","authors":"Akshay Poojari, Sarla Mary Mary","doi":"10.46610/jcscs.2022.v01i03.001","DOIUrl":"https://doi.org/10.46610/jcscs.2022.v01i03.001","url":null,"abstract":"The evolution of E-Learning is taking place in this new period of technological growth thanks to Web3.0. Web technology has experienced major changes with both positive and negative aspects. Web 2.0 is about communication and commerce between creator and stoner. Web3.0 is called a smart web or semantic web with technologies similar to big data, connected data, pall computing, 3D visualization, the unpopular reality of taxpayers we see, and much further to making inactive albums active scholars in the knowledge process. This paper examines the features of different generations of the web and their impact on different generations of E-learning and colourful web-related problems. Eventually, a survey was conducted and published in this paper.","PeriodicalId":437457,"journal":{"name":"Journal of Cyber Security in Computer System","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116490792","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Voter Identification Intelligence System (VIIS)","authors":"Aniket Prakash Raut, Sarala Marry S","doi":"10.46610/jcscs.2022.v01i02.003","DOIUrl":"https://doi.org/10.46610/jcscs.2022.v01i02.003","url":null,"abstract":"These days decision within the world's voting system is based mostly on physical attractiveness. Electronic Voting Machines (EVMs) are becoming increasingly popular in India. are utilized, but there are so numerous discussions being seen as of now in India. So, having just voted in these judgments, we offer new framework called the Framework for VIIS. We provide the finest option for people to modify in order to vote anonymously within the system. booth by addressing all worries about differentiating evidence of citizenship. The proposed work might be a mash-up of retina distinguishing evidence, the skull, and everything else conceivable biometrics parameters to form the signature code that supplies subordinate distinguishing evidence of Aadhar ID number or other distinguishing proof records The Voter Recognizable Proof Insights Framework (VIIS) employing (AI and Blockchain Innovation) will ensure that the present voting process is carried out in a proper, exact, and extremely safe manner.","PeriodicalId":437457,"journal":{"name":"Journal of Cyber Security in Computer System","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123892120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Footprint of cloud computing on banking services","authors":"Asad Nedaria, A. Banubakode","doi":"10.46610/jcscs.2022.v01i02.002","DOIUrl":"https://doi.org/10.46610/jcscs.2022.v01i02.002","url":null,"abstract":"Technological development plays a vital role in the advancement of modern banking. The fintech sector has been impacted by cloud computing due to its strong influence in meeting many of the needs of the financial sector. In terms of security, service, innovation, and scalability, the cloud has provided numerous advantages to the banking zone. Cloud computing is in full swing in the 21st century. 55% of organizations use multiple public clouds to move their infrastructure to the cloud. The bank of 2030 will be significantly distinct from the one we have now. In the face of converting customers’ necessities and developing tech and opportunity enterprise strategies, banks must start making plans now to ensure they are prepared.","PeriodicalId":437457,"journal":{"name":"Journal of Cyber Security in Computer System","volume":"2012 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130634868","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Karunakaran, N. Arun, M. A. Kumar, S. S. Aswiin
{"title":"Cryptography Based Secured Internet Banking Using Multifactor Authentication","authors":"S. Karunakaran, N. Arun, M. A. Kumar, S. S. Aswiin","doi":"10.46610/jcscs.2022.v01i02.001","DOIUrl":"https://doi.org/10.46610/jcscs.2022.v01i02.001","url":null,"abstract":"The progression in the innovation has prompted presentation of numerous famous Internet applications. Portable Banking additionally called as e-banking is one such imperative application which significantly affects our advanced life. Despite the fact that banks firmly urge their clients to do online exchanges and promote it as an extremely free from even a hint of harm method of executing, truly there is a tremendous gamble related. The consistent development of versatile financial application carries with it a few security issues and inflated cost of carrying out higher security frameworks for clients and banks. Versatile financial framework might be compromised in a wide assortment of ways like utilizing Trojan pony, botnets, Phishing and so forth. In spite of the fact that multifaceted confirmation plans exist to check the realness of the client, the disadvantages with these plans is that they work at exchange level as opposed to at the validation level. This clears way for alleged for man in the center assault between the client and security instruments of programs, cell phones and so on. With versatile financial security turning into a basic necessity one requirements to see as better usable and useful arrangement in light of exchange cum verification level. An endeavor has been made in this work to propose a confirmation that improves the security of the internet banking frameworks .We propose the Hybrid one time secret phrase utilizing arbitrary OTP SHA 256 bit.","PeriodicalId":437457,"journal":{"name":"Journal of Cyber Security in Computer System","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124411362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}