CFP last date
20 May 2024
Reseach Article

Security Systems across Diverse Domains a Technical Review

by Abhishek Mazumdar, Chetna Singh
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 183 - Number 10
Year of Publication: 2021
Authors: Abhishek Mazumdar, Chetna Singh
10.5120/ijca2021921403

Abhishek Mazumdar, Chetna Singh . Security Systems across Diverse Domains a Technical Review. International Journal of Computer Applications. 183, 10 ( Jun 2021), 29-36. DOI=10.5120/ijca2021921403

@article{ 10.5120/ijca2021921403,
author = { Abhishek Mazumdar, Chetna Singh },
title = { Security Systems across Diverse Domains a Technical Review },
journal = { International Journal of Computer Applications },
issue_date = { Jun 2021 },
volume = { 183 },
number = { 10 },
month = { Jun },
year = { 2021 },
issn = { 0975-8887 },
pages = { 29-36 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume183/number10/31964-2021921403/ },
doi = { 10.5120/ijca2021921403 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:16:26.192501+05:30
%A Abhishek Mazumdar
%A Chetna Singh
%T Security Systems across Diverse Domains a Technical Review
%J International Journal of Computer Applications
%@ 0975-8887
%V 183
%N 10
%P 29-36
%D 2021
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The Internet is one humongous pool of information. With the advancement of the current digital age , more and more technologies are being developed, launched and used over the internet. But the internet is not a secure space. It is under cyber siege at all times, where attackers have their eyes on this pool of information. These vulnerabilities of the internet are transferred to all the prevalent technologies that use the internet as medium to establish a communication network. This has established a clear concern about the privacy and security risks that entail the Internet. On traversal through several modern age technologies such as Social Media, E-Commerce, Cloud, Internet of Things and Finance, an attempt is made at understanding the vulnerabilities of each of those technologies and the security mechanisms established to mitigate these security threats and concerns. Security Systems and technologies are an important aspect of the Internet that the world is shifting its focus towards this newly found objective as the threats rise day by day.

References
  1. David Hiatt College of Arts & Sciences Regent University Virginia Beach, Virginia,    U.S.A., &  Young B. Choi College of Arts & Sciences Regent University Virginia Beach, Virginia, U.S.A. Role of Security in Social Networking. In (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 7, No. 2, 2016 (Page 12-15)
  2. Wu He, Department of Information Technology and Decision Sciences ,Old Dominion University, Norfolk, Virginia, USA (2012),"A review of social media security risks and mitigation techniques", Journal of Systems and Information Technology, Vol. 14 Iss: 2 pp. 171 - 180
  3. Theresa A. Kraft and Ratika Kakar, School of Computer Science,University of Michigan – Flint,MI 48502, USA. “E-Commerce Security”. In Proc CONISAR 2009, v2 (Washington DC): §3364 (refereed)  c 2009 EDSIG , Sat, Nov 7, 11:30-11:55, Crystal 6 (Pg 1-11)
  4. McAfee. Cloud Computing Security Issues.
  5. Sasko Ristov, Marjan Gusev and Magdalena Kostoska, Faculty of Information Sciences and Computer Engineering, Ss. Cyril and Methodius University, Skopje, Macedonia. “Cloud Computing Security in Business Information Systems”. In International Journal of Network Security & Its Applications (IJNSA), Vol.4, No.2, March 2012 (Pg 75-93)
  6. Shubhashis Sengupta,Vikrant Kaulgud and Vibhu Saujanya Sharma,Accenture Technology Labs.”Cloud Computing Security – Trends and Research Directions”.
  7. Vincent K. Omachonu* Department of Industrial Engineering University of Miami Coral Gables, Florida 33124 USA ,*Corresponding Author and Norman G. Einspruch Department of Electrical and Computer Engineering University of Miami Coral Gables, Florida 33124 USA. “Innovation in Healthcare Delivery Systems: A Conceptual Framework”. In  The Innovation Journal: The Public Sector Innovation Journal, Volume 15(1), 2010, Article 2.
  8. Wipro. What can IoT do for healthcare?
  9. Rwan Mahmoud, Tasneem Yousuf, Fadi Aloul, Imran Zualkernan Department of Computer Science & Engineering American University of Sharjah, UAE. “Internet of Things (IoT) Security: Current Status, Challenges and Prospective Measures ”.
  10. Lobna Yehia, Ayman Khedr, Ashraf Darwish (2015) Hybrid Security Techniques for Internet of Things Healthcare Applications. Advances in Internet of Things, 05,21-25. doi: 10.4236/ait.2015.53004
  11. V. Hassija, V. Chamola, V. Saxena, D. Jain, P. Goyal and B. Sikdar, "A Survey on IoT Security: Application Areas, Security Threats, and Solution Architectures," in IEEE Access, vol. 7, pp. 82721-82743, 2019, doi: 10.1109/ACCESS.2019.2924045
  12. Mishra, Sourav & Kumari, Vasudha & Ojha, Nitish. (2018). Security issues in Blockchain and crypto currency.
  13. Jain, Anil & Sarupria, Apurva. (2019). E- Banking Problems Related to Security and, Privacy  Issues along with the traits of Fraud. 10.13140/RG.2.2.22814.18244.
  14. Kuldeep Kaur , Dr. Ashutosh Pathak , Parminder Kaur , Karamjeet Kaur M.phil in Computer Application (Research Scholar), University College of Computer Application, Guru Kashi University, Talwandi Sabo, Punjab India 2Assitant Professor, University College of Computer Application, Guru Kashi University, Talwandi Sabo, Punjab, India 3Assitant Professor of Computer Sci, S.S Group of Colleges, Bhikhi (Mansa), Punjab, India 4Assitant Professor of Computer Sci, Mata Sahib Kaur Girls College, Talwandi S
  15. Dorri, Ali & Kanhere, Salil & Jurdak, Raja & Gauravaram, Praveen. (2017). Blockchain for IoT Security and Privacy: The Case Study of a Smart Home. 10.1109/PERCOMW.2017.7917634.
  16. Tara Salman, Maede Zolanvari, Aiman Erbad, Mohammed Samaka, Student Member, IEEE, Raj Jain, Fellow, IEEE. “Security Services Using Blockchains: A State of the Art Survey”.
  17. Rajpreet Kaur Jassal1 ,Ravinder Kumar Sehgal2 1 (Assistant Professor,BBSBEC Fatehgarh Sahib,Punjab,India) 2 (Director cum Principal, Jasdev Singh Sandhu Institute of Engg. & Tech.Kauli, Patiala,India). In “Study of Online Banking Security Mechanism in India: Take ICICI Bank as an Example”. In IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661, p- ISSN: 2278-8727Volume 13, Issue 1 (Jul. - Aug. 2013), PP 114-121
  18. Verma, Amit. (2013). A Multi Layer Bank Security System. 914-917. 10.1109/ICGCE.2013.6823565.
  19. J.S Vimali, Senduru Srinivasulu, Gowri. S. “IoT Based Bank Security System”. In International Journal of Recent Technology and Engineering (IJRTE) ISSN: 2277-3878, Volume-8, Issue-2S11, September 2019.
  20. Mahmoud Ammar a,∗ , Giovanni Russello b , Bruno Crispoa a Department of Computer Science, KU Leuven University, Heverlee, 3001, Belgium b Department of Computer Science, University of Auckland, Private Bag 92019, Auckland 1142, New Zealand. “Internet of Things: A survey on the security of IoT frameworks”. In Journal of Information Security and Applications 38 (2018) 8-27.
  21. Rui Zhang, Rui Xue, and Ling Liu. 2019. Security and Privacy on Blockchain. ACM Comput. Surv. 1, 1, Article 1 (January 2019), 35 pages.
Index Terms

Computer Science
Information Sciences

Keywords

Information Security Cloud Security Social Networking E-Commerce IoT Finance FinTech Security Systems Cybersecurity Blockchain Merkle Tree