Explore chapters and articles related to this topic
Other Important Sales Topics
Published in Nixon Peter, The Business Developer’s Playbook, 2018
I like my digital newsletter service because it allows me to write a targeted message and send it to my entire database (currently in the thousands) as well as to my Facebook, Twitter, and LinkedIn followers. I like the fact my followers can repost my newsletters to their followers and I like the fact it includes links to my app, e-shop, public workshops, etc. If your newsletter service isn’t linked to social media, it is time to switch. I use Constant Contact which is okay for my needs. One important question to resolve is how you will manage your contact database or address book. It is near impossible to keep this up to date, and unless it is automated you will find yourself struggling to find people wanting to work on this for you. Ensure your website, app, blog, social media, and digital newsletters include an option to sign up for future notifications. It is all about growing your footprint and once you open the door to this, you will no longer know everyone in your database. Do what you can to protect your data and prevent hackers from accessing your address book. Keep your internet security software up to date. Hire help when you need it. Your time is best devoted to selling yourself, your ideas, and your services, not fixing computers and wasting time on software.
Cybersecurity and Risk
Published in Diego Galar Pascual, Pasquale Daponte, Uday Kumar, Handbook of Industry 4.0 and SMART Systems, 2019
Diego Galar Pascual, Pasquale Daponte, Uday Kumar
Internet security is a branch of computer security whose objective is to establish rules and measures to use against attacks over the Internet (Gralla, 2007). The Internet represents an insecure channel for exchanging information, which leads to a high risk of intrusion or fraud, such as phishing (Rhee, 2003), online viruses, trojans, worms and more.
Blockchain Technique-Based Smart Health Record System
Published in Rajdeep Chowdhury, S. K. Niranjan, Advances in Applications of Computational Intelligence and the Internet of Things, 2022
Jayapadmini Kanchan, Madhura N. Hegde, Asha B. Shetty, Rajatha, K. Ganaraj
Security and privacy are the key issues ever since the first two computers were connected to each other. With the commercialization of the internet security, concerns broadened to threats including hacking, phishing, eavesdropping, and attacks like DoS, DDoS, SQL injection, and man-in-the-middle attack.
A survey of phishing attack techniques, defence mechanisms and open research challenges
Published in Enterprise Information Systems, 2022
Phishing is an act of stealing financial and personal information from the Internet users (Gupta, Arachchilage, and Psannis 2018). Phishing attacks may lead to stealing of data especially personal data including login credentials and passwords to different online accounts. User falls into the trap and provides the information through some malicious links or fraud emails. It leads to a loss of a lot of personal information from the user end and can lead to identity theft and many more devastating results (Almomani et al. 2013). Nowadays, phishing attacks are the most serious threat to internet security and lead to lots of economic losses to enterprises every year (Aleroud and Zhou 2017). Phishing attacks encompass more than half of all cyber-crimes that affect genuine users. Phishing attacks also instal malicious software, like, ransomware, Trojan horse, etc., to the user’s system (Phishingpro 2016). Phishing becomes successful because many users lack Internet security knowledge and even the experienced user does not get the training of cyber-attacks (Arachchilagea, Love, and Beznosov 2016). Researchers identified that 52% of users received training no more than two times in a year and 6% users never received the training (Samarati 2020). Therefore, there is a crucial need to create an effective anti-phishing mechanism to defend the enterprises and individual users.
From Editor-in-Chief's Desk
Published in IETE Journal of Education, 2020
Today, the buzz words in Telecommunication and Computer Science are Cloud, Big Data, 5G and Internet Security. The industry requires academic core curricula to integrate such specialized courses in order to make the engineers ready for being profitably employed. Addressing this issue, the paper entitled “A Review of Spatial Big Data Platforms, Opportunities and Challenges” by Swapnil Shrivastava, deals with a topic in Big data in science and engineering. The applications of the described platforms are in the areas of remote sensing technologies, social networks, Internet of Things and spatial data collected by innumerable mobile devices, real time monitoring of pandemic such as COVID-19. The comprehensive review of development in spatial big data storage, processing, analytics and visualization platforms could be very useful for young readers.
Advanced multi-factor user authentication scheme for E-governance applications in smart cities
Published in International Journal of Computers and Applications, 2019
The Automated Validation of Internet Security Protocols and Applications (AVISPA) [43] focuses on evolving a push-button for the evaluation of wide-ranging internet security sensitive protocols and applications. These protocols are coded in a language known as High Level Protocol Specification Language (HLPSL). HLPSL is a powerful language, which is used to model security protocols and communication. It consists of roles for depicting each participant. Each role present in the scenario is separate from other role. The role receives its preliminary information from the parameters, which converses with other roles through channels. HLPSL2IF is a translator that translates a HLPSL protocol to an Intermediate Format (IF) specification. This is given as input to one of the four back-ends, i.e. OFMC (On-the-fly Model-Checker), TA4SP (Tree Automata based on Automatic Approximations for the Analysis of Security Protocols), CL-AtSe (Constraint Logic based Attack Searcher) and SATMC (SAT-based Model-Checker) to generate Output Format (OF) [44]. The proposed scheme is simulated HLSPL code for all the entities in the web-based software available in the link ‘http://www.avispa-project.org/web-interface/basic.php’. The AVISPA software uses the current version (2006/02/13).