Author:
Asaad Renas R.,Saeed Vaman Ashqi
Abstract
Internet security is one of the most pressing concerns in the twenty-first century when taken into consideration with other online concerns. This is because technological progress, the growth of communications, and the development of the cyber-Internet have all led to a revolution in the way information and data is sent, as well as in e-commerce. Because of this, it was important to find ways to protect information and data on the internet, as well as electronic money accounts and electronic wallets. Information security on the Internet, security of electronic operations, network security, and application security are all included under the umbrella term "cybersecurity." Cybersecurity refers to the measures that are taken to protect data and information stored on all electronic devices that are connected to the Internet from malicious attacks, hacking operations, data theft, and sabotage. All electronic activities and applications require some kind of cyber security, including websites, financial institutions (including banks, banks, and bank accounts), satellite operations (including military missions), and drone management.
Publisher
The International Applied Computing & Applications Publisher
Reference22 articles.
1. Zebari, D. A., Haron, H., Zeebaree, S. R., & Zeebaree, D. Q. (2018, October). Multi-level of DNA encryption technique based on DNA arithmetic and biological operations. In 2018 International Conference on Advanced Science and Engineering (ICOASE) (pp. 312-317). IEEE.
2. Ban Al-Omar, A. R. Al-Ali, Rana Ahmed, Taha Landolsi, “Role of Information and Communication Technologies in the Smart Grid”, in Journal of Emerging Trends in Computing and Information Sciences, 3(5), 707-716, 2012.
3. Zebari, D. A., Haron, H., Zeebaree, D. Q., & Zain, A. M. (2019, August). A simultaneous approach for compression and encryption techniques using deoxyribonucleic acid. In 2019 13th International Conference on Software, Knowledge, Information Management and Applications (SKIMA) (pp. 1-6). IEEE.
4. Asaad, R. R. (2021). Penetration Testing: Wireless Network Attacks Method on Kali Linux OS. Academic Journal of Nawroz University, 10(1), 7–12. https://doi.org/10.25007/ajnu.v10n1a9987
5. I. Pearson, “Smart grid cyber security for Europe”, in Energy Policy, 39(9), 5211-5218, September 2011.
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献