Claim Missing Document
Check
Articles

Found 5 Documents
Search

An Analysis of Phishing Attacks: Information Technology Security: Cybercrime and Its Solutions Abid, Noman
BULLET : Jurnal Multidisiplin Ilmu Vol. 3 No. 5 (2024): BULLET : Jurnal Multidisiplin Ilmu
Publisher : CV. Multi Kreasi Media

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Phishing is one of the most primary and persistent threats when it comes to cybersecurity, and is grounded on deception tropes which try to pry information from individuals or organizations or get unauthorized access to their systems. Phishing, which is discussed in this review, circles around every trick the criminals employ, the collection of intelligence by the attackers and the countermeasures which may be applied to contain the attacks. There are different types of phishing such as spear-phishing, phishing have become popular so have AI-based attacks which shows that one method is not sufficient anymore. The organizations hence need to implement several layers of defense like; Information user awareness, two-factor or mult-factor technique, superior email filtering technique and rigid enforcement of the email verification procedures like SPF, DKIM and DMARC. New chances will be expected from the methods like Machine Learning, Behavioural Biometrics, and Block Chain for efficient detection and control of the phishing. Zero Trust security model, which only periodically validates each access request to reduce the vulnerability of successful cyber-attacks has notes on how to use it. Likewise, there is more sharing of intelligence and working across industry in real time very central in tackling phishing threats. At present, there is a heightened appreciation of better user security, the dangers that require anticipative measures, continuous monitoring, and popularity of use. This paper emphasizes that combat against phishing requires a systematic and timely approach that incorporates technology and user awareness as well as organizational backing. As with the assistance of following what has been described here as best practices and solutions, one and everyone and every company may decrease the probability of being spoofed and the consequences of such spoofing.
Evolution of Cryptographic Techniques: Overview of the Existing Approaches and Trends of the Development Abid, Noman
BULLET : Jurnal Multidisiplin Ilmu Vol. 1 No. 03 (2022): BULLET : Jurnal Multidisiplin Ilmu
Publisher : CV. Multi Kreasi Media

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Cryptography remains to be one of the oldest and indispensable principles of today’s information protection disciplines because it gives indispensable tools for protecting content and messages during the communicational and data transferring actions. This review surveys extant research on possible cryptographic methods and their applications in different fields comprising of conventional key-based and new-complexity key based cryptography, cryptography based on Block chain, Homomorphic Cryptography, Post Quantum Cryptography and other types of cryptography. New complicated threats, emergence of Quantum computing, AI, block chain, and 5G, IoT are posing new threats and challenges and opportunities in cryptography. In this paper, some of these areas to key issues include: problems such as vulnerability of the traditional cryptographic system to brute force attacks, the impact of new developments in quantum computing to current encryption security systems, and the problem of key management, and side channel attacks. This article addresses how cryptography is used in protecting emerging technologies such as how light weight cryptography is incorporated to IoT peripherals, how works cryptography is applied to block chain or crypto currencies, and artificial intelligence systems. While with the arrival of quantum computing capable of threatening the security of classical cryptographic methods, the focus of the cryptographic community shifts to post quantum options like QKD and lattices. The next section of the review also talks about directions for future development direction of cryptography, and emphasizes the importance of creating new cryptographic algorithm that caters for the demand of scalability efficient and security to meet the increasing development in technologies. Cryptology is still needed for protection of relevant information and for proving secure communication for the age of integrated and computer-oriented society. The further evolution of intricate cryptographic methods and their integration into the advanced technologies is useful to combat new threats and guarantee safety of information that is to be necessary in the following years.
Securing Financial Systems with Block chain: A Comprehensive Review of Block chain and Cybersecurity Practices Abid, Noman
International Journal of Multidisciplinary Sciences and Arts Vol. 3 No. 4 (2024): International Journal of Multidisciplinary Sciences and Arts, Article October 2
Publisher : Information Technology and Science (ITScience)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/ijmdsa.v3i4.5104

Abstract

New and innovative block chain technology is becoming the key in enhancing the security, transparency and efficiency in the financial sector. However, as financial applications based on the block chain expand and improve, so do the block chain threats and safety concerns. This paper aims to discuss the aspects of the block chain security with reference to the financial system and its advantages and drawbacks. It embraces major risks like 51% attacks, smart contract exploits, phishing, and data privacy and security issues; new risks from quantum computing and Decentralized finance (DeFi) platforms. Best practices also outlined in the paper include the use of an industry-grade cryptographic algorithm, a robust multi-signature authentication technique, auditing of the block chain application at regular intervals, the adoption of secure, decentralized identity verification and management, as well as compliance with industry standards such as KYC and AML. It also underlines the need to establish effective access controls and to develop capability in scaling solutions and sustained monitoring. Lastly, it can be noted that the acquisition of block chain-based financial applications entails the use of a combination of measures to address existing and future risks. As these best practices are implemented and the threats advance, the financial institutions will be better placed to realize the full value of block chain technology while at the same time protecting the privacy and security of people’s financial transactions.
Securing Financial Systems with Block chain: A Comprehensive Review of Block chain and Cybersecurity Practices Abid, Noman
International Journal of Multidisciplinary Sciences and Arts Vol. 3 No. 4 (2024): International Journal of Multidisciplinary Sciences and Arts, Article October 2
Publisher : Information Technology and Science (ITScience)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/ijmdsa.v3i4.5104

Abstract

New and innovative block chain technology is becoming the key in enhancing the security, transparency and efficiency in the financial sector. However, as financial applications based on the block chain expand and improve, so do the block chain threats and safety concerns. This paper aims to discuss the aspects of the block chain security with reference to the financial system and its advantages and drawbacks. It embraces major risks like 51% attacks, smart contract exploits, phishing, and data privacy and security issues; new risks from quantum computing and Decentralized finance (DeFi) platforms. Best practices also outlined in the paper include the use of an industry-grade cryptographic algorithm, a robust multi-signature authentication technique, auditing of the block chain application at regular intervals, the adoption of secure, decentralized identity verification and management, as well as compliance with industry standards such as KYC and AML. It also underlines the need to establish effective access controls and to develop capability in scaling solutions and sustained monitoring. Lastly, it can be noted that the acquisition of block chain-based financial applications entails the use of a combination of measures to address existing and future risks. As these best practices are implemented and the threats advance, the financial institutions will be better placed to realize the full value of block chain technology while at the same time protecting the privacy and security of people’s financial transactions.
Ransom ware Attacks on Financial Institutions: A Review of the Literature on Cybersecurity Risks and Countermeasures Abid, Noman
International Journal of Multidisciplinary Sciences and Arts Vol. 2 No. 2 (2023): International Journal of Multidisciplinary Sciences and Arts, Article April 202
Publisher : Information Technology and Science (ITScience)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/ijmdsa.v1i2.2198

Abstract

Ransom ware threats have become a new and real threat to financial institutions because they present risks to data integrity, business continuity and consumers’ trust. The current review focuses on the evolution of Ransom ware, such as double and triple extortion, Ransom ware as a service, attacks on the cloud services and targeted financial institutions. Banks therefore are experiencing additional pressures as cyber criminals morph their tactics to target weaknesses in both original legacy and new-age or remote work structures and artificial intelligence. To counter these, the most effective approach involves a number of tiered defense inclusions that includes back up of the data, network separation, and patching and general employee education. Threat monitoring especially at an early stage as well as a solid endpoint security solution is necessary, in addition to a clear-cut Incident Response Plan so as to contain the attack consequences. As far as Ransom ware is concerned more focus should be placed on the latest trends and financial institutions should not stick to traditional threats and should embrace new technologies and advanced disaster recovery solutions. Through exercising a proactive approach towards cybersecurity assessment, financial institutions can build up their defenses to protect their significant assets against growing cybersecurity threats, and maintain operational continuity to run a business.