Showing 161 - 180 results of 341 for search '"data breach"', query time: 0.33s Refine Results
  1. 161

    Blockchain-based security for cloud data storage. by Idrus, Mohammad Ariff Zakwan, Abdul Rahman, Farah Diyana, Khalifa, Othman Omran, Md. Yusoff, Nelidya

    Published 2023
    “…The focus to address in this project is the vulnerability of cloud data storage systems to cyber-attacks and data breaches. The design and implementation of a proof-of-concept blockchain-based data storage system, and an evaluation of the system’s security and performance will be presented. …”
    Conference or Workshop Item
  2. 162

    Towards an Intelligent Intrusion Detection System to Detect Malicious Activities in Cloud Computing by Hanaa Attou, Mouaad Mohy-eddine, Azidine Guezzaz, Said Benkirane, Mourade Azrour, Abdulatif Alabdultif, Naif Almusallam

    Published 2023-08-01
    “…CC introduces new vulnerabilities, including unauthorized access, data breaches, and insider threats. The shared infrastructure of cloud systems makes them attractive targets for attackers. …”
    Get full text
    Article
  3. 163

    An enhanced next generation security operation center framework for information system security management by Yau, Ti Dun

    Published 2023
    “…They boost a company's ability to fight against hackers, financial losses, and data breaches when deploy successfully.…”
    Get full text
    Thesis
  4. 164

    Data encryption for bank management system by Asst.Prof.Dr. Abdul Syukor Mohamad

    Published 2022-12-01
    “… Data breaches are perhaps the single most significant risk that banks face today. …”
    Get full text
    Article
  5. 165

    Pragmatic Approach for Online Document Verification Using Block-Chain Technology by Sable Nilesh P., Powar Sachin R., Fernandes Queency, Gade Nikita A., Shingade Akash B.

    Published 2022-01-01
    “…When there is a security risk, block chain comes to mind. When it comes to data breaches, education is also not far away. For attackers, student data with little financial information has become a valuable commodity. …”
    Get full text
    Article
  6. 166

    Input Validation Vulnerabilities in Web Applications: Systematic Review, Classification, and Analysis of the Current State-of-the-Art by Faris Faisal Fadlalla, Huwaida T. Elshoush

    Published 2023-01-01
    “…In recent years, huge increase in attacks and data breaches is noticed. Most of the attacks are performed and focused on the vulnerabilities related to web applications. …”
    Get full text
    Article
  7. 167

    JFinder: A novel architecture for java vulnerability identification based quad self-attention and pre-training mechanism by Jin Wang, Zishan Huang, Hui Xiao, Yinhao Xiao

    Published 2023-12-01
    “…Identifying and addressing security vulnerabilities in a timely manner is crucial to prevent hacking and data breaches. Unfortunately, current vulnerability identification methods, including classical and deep learning-based approaches, exhibit critical drawbacks that prevent them from meeting the demands of the contemporary software industry. …”
    Get full text
    Article
  8. 168

    Are the coronavirus disease 2019 (COVID-19)-themed applications launched during the pandemic sustainable? by Fauzi Budi Satria

    Published 2022-09-01
    “…This is necessary considering the potential dangers arising from App inaccuracies, as well as the potential misuse of user data due to data breaches. With these considerations in mind, we consider that the vaccine passport is an App with a COVID-19 theme that must be refined and applied sustainably amid the ongoing global crisis and the uncertainty of this pandemic.…”
    Get full text
    Article
  9. 169

    Encryption and the Loss of Patient Data by Tucker, Catherine Elizabeth, Miller, Amalia R.

    Published 2013
    “…This is particularly the case in the medical sector, where we find empirical evidence that increased digitization of patient data is associated with more data breaches. The encryption of customer data is often presented as a potential solution, because encryption acts as a disincentive for potential malicious hackers, and can minimize the risk of breached data being put to malicious use. …”
    Get full text
    Get full text
    Article
  10. 170

    Infrastructure, Attitude and Weather: Today’s Threats to Supply Chain Security by Stephen Blank

    Published 2016-06-01
    “…Technology-based threats to supply chains, such as cybercrimes, data breaches and IT failures, now appear more frequently in the literature on supply chain security. …”
    Get full text
    Article
  11. 171

    Role of IoT in protecting wearable gadgets by Sana Fatima, Laviza Falak Naz

    Published 2022-04-01
    “…However, the IoT also brings along a huge flow of privacy and security concerns whilst considering the huge inflow of data breaches and cyberattacks in the network data. The advancements in the security protocols of the data thus bring along a mistrust among the users of IoT networks who might then no longer wish to be a part of this technological revolution. …”
    Get full text
    Article
  12. 172

    How can we know what the public think about administrative data research by Carol Porteous

    Published 2018-06-01
    “…The views of publics are not homogenous, static and also respond to news headlines and data breaches and we can never know the views of 65 million people across the UK, so why do we worry so much about the views of the public and how can we ever know what publics think? …”
    Get full text
    Article
  13. 173

    Infrastructure, Attitude and Weather: Today’s Threats to Supply Chain Security by Stephen Blank

    Published 2016-06-01
    “…Technology-based threats to supply chains, such as cybercrimes, data breaches and IT failures, now appear more frequently in the literature on supply chain security. …”
    Get full text
    Article
  14. 174

    Cybersecurity Risks in a Pandemic by Williams, Christina Meilee, Chaturvedi, Rahul, Chakravarthy, Krishnan

    Published 2020-09-01
    “…This is especially problematic given that 90% of health care providers had already encountered data breaches. Companies must implement well-defined software upgrade procedures, should use secure networks like virtual local area networks, and conduct regular penetration tests of their systems. …”
    Get full text
    Article
  15. 175

    Taxonomy of SQL Injection: ML Trends & Open Challenges by Abobakr Busaeed, Raed Abdullah, Wan Isni Sofiah, Wan Din, Waseem, Quadri, Azlee, Zabidi

    Published 2023
    “…During these attacks, malicious SQL statements are injected into input fields of data-driven systems, leading to unauthorized access and data breaches. Consequently, a need is generated to understand the nature of the attacks, detection, and effective prevention techniques. …”
    Get full text
    Get full text
    Conference or Workshop Item
  16. 176

    An exploratory study of private companies in Malaysia: critical success factors for enterprise IT risk management by Abdul Hamid, Nor Hasnul Azirah, Husain, Fazlin Marini, Ismail, Najiahtul Syafiqah, Mokhtar, Mazita

    Published 2023
    “…However, this reliance exposes organizations to various IT-related risks, including data breaches, system vulnerabilities, and regulatory non-compliance. …”
    Get full text
    Conference or Workshop Item
  17. 177

    Blockchain and the Tokenization of the Individual: Societal Implications by Monique J. Morrow, Mehran Zarrebini

    Published 2019-10-01
    “…Centralization whether in the form of governments, financial institutions, enterprises and organizations is simply being challenged because of the lack of trust associated with data governance often experienced in the form of data breaches or simply a monetization of our data without our permission and/or incentives to participate in this emerging decentralization of structures. …”
    Get full text
    Article
  18. 178

    Exploring the Potential of Blockchain Technology in an IoT-Enabled Environment: A Review by Deepak, Preeti Gulia, Nasib Singh Gill, Mohammad Yahya, Punit Gupta, Prashant Kumar Shukla, Piyush Kumar Shukla

    Published 2024-01-01
    “…However, security concerns in IoT systems are significant, as compromised devices can lead to data breaches and privacy violations. Blockchain technology can enhance IoT security by providing decentralized consensus, immutability, and transparent transaction records, ensuring secure and trustworthy communication and data integrity. …”
    Get full text
    Article
  19. 179

    Demonstration of quantum-digital payments by Peter Schiansky, Julia Kalb, Esther Sztatecsny, Marie-Christine Roehsner, Tobias Guggemos, Alessandro Trenti, Mathieu Bozzio, Philip Walther

    Published 2023-06-01
    “…Similarly to banknotes, they should be easy to use, unique, tamper-resistant and untraceable, but additionally withstand digital attackers and data breaches. Current technology substitutes customers’ sensitive data by randomized tokens, and secures the payment’s uniqueness with a cryptographic function, called a cryptogram. …”
    Get full text
    Article
  20. 180

    Behavioral recommendation engine driven by only non-identifiable user data by Kishor Datta Gupta, Nafiz Sadman, Akib Sadmanee, Md. Kamruzzaman Sarker, Roy George

    Published 2023-03-01
    “…Even though it seems favorable, security risks like data breaches are inevitable. This research proposes a novel reinforcement learning ‘approach’ to recommend users without collecting identifiable data. …”
    Get full text
    Article