Technology

Information Security at IgMin Research | Technology Group

Our mission is to foster interdisciplinary dialogue and accelerate the advancement of knowledge across a wide spectrum of scientific domains.

About

Safeguarding the Digital Frontier

In an era where information reigns supreme, Information Security takes center stage as the guardian of digital landscapes. This segment of IgMin Research navigates the intricate landscape of cybersecurity, delving into the tactics that protect digital assets from threats, breaches, and cyberattacks. From encryption to threat intelligence, we explore the evolving battle between security and adversity.

  • Cyber Threat Landscape Analysis
  • Network Security Protocols
  • Cryptography and Data Encryption
  • Vulnerability Assessment and Penetration Testing
  • Data Privacy and Compliance
  • Cloud Security Measures
  • Mobile and App Security
  • Identity and Access Management
  • Secure Software Development
  • Social Engineering and Phishing Countermeasures
  • Incident Response and Recovery
  • Cybersecurity Risk Management
  • IoT Security Considerations
  • Blockchain and Distributed Ledger Security
  • Threat Intelligence and Analysis
  • Artificial Intelligence in Cybersecurity
  • Biometric Security
  • Digital Forensics
  • Industrial Control System Security
  • E-commerce and Payment Security
  • National and International Cybersecurity Policies
  • Dynamic Cybersecurity Strategies
  • Case Studies in Cybersecurity Challenges
  • Emerging Trends in Information Security
  • Cybersecurity for Critical Infrastructure

Technology Group (2)

Research Article Article ID: igmin169
Cite

Open Access Policy refers to a set of principles and guidelines aimed at providing unrestricted access to scholarly research and literature. It promotes the free availability and unrestricted use of research outputs, enabling researchers, students, and the general public to access, read, download, and distribute scholarly articles without financial or legal barriers. In this response, I will provide you with an overview of the history and latest resolutions related to Open Access Policy.

Cyber Threat Analysis (CTA) in Current Conflicts
by Zbigniew Ciekanowski and Sławomir Żurawski

Cyber Threat Analysis (CTA) in current conflicts focuses on identifying, monitoring, and assessing potential cyber threats. The main objective is to understand how the parties to the conflict use information and network technologies to conduct warfare, espionage, disinformation, or attacks on digital infrastructure. Th...is analysis includes the identification of actors involved in conflicts and their targets in cyberspace, as well as the analysis of techniques and tools used in cyber activities. The aim of the article is to identify the role of cyber threat analysis in the context of two current conflicts - the war in Ukraine and the Hamas attack on Israel. The article describes the essence of cyber threat analysis. The research problem focuses on identifying and understanding the role of cyber threat analysis in these conflicts and their potential consequences for international security and regional stability. Through the analysis of reports, online sources, and scientific literature, the article aims to familiarize readers with the role of cyber threat analysis in the context of these conflicts and to propose possible strategies for cyber risk management in the face of contemporary armed conflicts. The results of the analysis of cyber threats (CTA) in current conflicts include the identification of specific actors operating in cyberspace, their modus operandi, their objectives, and the techniques and tools used. In addition, the analysis can reveal existing vulnerabilities in digital security and areas that are particularly vulnerable to attacks. To sum up, it is necessary to create recommendations and directions for changes regarding the strengthening of digital security measures, such as software updates, implementation of network security, and increasing staff awareness of cyber threats. In addition, the CTA may suggest the need for better international cooperation to combat cyber threats and the need to develop strategies to prevent and respond to cyber-attacks.

Information Security Network SecurityTechnology and Society
Mini Review Article ID: igmin137
Cite

Open Access Policy refers to a set of principles and guidelines aimed at providing unrestricted access to scholarly research and literature. It promotes the free availability and unrestricted use of research outputs, enabling researchers, students, and the general public to access, read, download, and distribute scholarly articles without financial or legal barriers. In this response, I will provide you with an overview of the history and latest resolutions related to Open Access Policy.

A Capsule Neural Network (CNN) based Hybrid Approach for Identifying Sarcasm in Reddit Dataset
by Muhammad Faseeh and Harun Jamil

Sarcasm, a standard social media message, delivers the opposite meaning through irony or teasing. Unfortunately, identifying sarcasm in written text is difficult in natural language processing. The work aims to create an effective sarcasm detection model for social media text data, with possible applications in sentime...nt analysis, social media analytics, and online reputation management. A hybrid Deep learning strategy is used to construct an effective sarcasm detection model for written content on social media networks. The design emphasizes feature extraction, selection, and neural network application. Limited research exists on detecting sarcasm in human speech compared to emotion recognition. The study recommends using Word2Vec or TF-IDF for feature extraction to address memory and temporal constraints. Use feature selection techniques like PCA or LDA to enhance model performance by selecting relevant features. A Capsule Neural Network (CNN) and Long Short-Term Memory (LSTM) collect contextual information and sequential dependencies in textual material. We evaluate Reddit datasets with labelled sarcasm data using metrics like Accuracy. Our hybrid method gets 95.60% accuracy on Reddit.

Machine Learning Information SecurityData Science