http://matjournals.co.in/index.php/JCSCS/issue/feed Journal of Cyber Security in Computer System(e-ISSN:2583-4703) 2023-12-20T12:48:55+0530 Open Journal Systems <p><strong>JCSCS</strong> is a peer reviewed journal in the discipline of Computer Science published by the MAT Journals Pvt. Ltd. It is a print and e-journal focused towards the rapid publication of fundamental research papers on all areas of Cyber Security. The Journal aims to promote high quality empirical Research, Review articles, case studies and short communications mainly focused on Cyber Security, Information Technology Security, Network Security, Communication Securtiy, Device, Data Security, Threat Management, Risk Management, Cyber Attacks, Security Products, Server Security, Application security, Operational security, End-user education, Disaster recovery and Business continuity.</p> http://matjournals.co.in/index.php/JCSCS/article/view/4407 Detect Malicious Packets and Malicious Effect to Improve the Confidentiality in Data Security – Awareness 2023-10-25T13:46:21+0530 S. Karthikeyini karthikeyinicse@gmail.com M. Rupa karthikeyinicse@gmail.com M. Ravikumar karthikeyinicse@gmail.com S. Athira karthikeyinicse@gmail.com <p>The phrase 'the earth revolves around data' <br>emphasizes the pivotal role that data plays in <br>today's world. Data drives decision-making <br>processes, propels businesses forward, and <br>shapes our digital landscape. Various entities, <br>including organizations, governments, and <br>individuals, all hold stakes in the data <br>ecosystem. Ensuring the responsible handling, <br>sharing, and protection of data has become a <br>top priority. Hackers leverage their technical <br>expertise to infiltrate websites and databases, <br>often without the owners' awareness. Their <br>activities encompass a wide range, from <br>pilfering sensitive personal data to <br>orchestrating large-scale data breaches. <br>Hacking has become increasingly common, <br>resulting in financial losses and <br>compromising data security. The <br>contemporary challenge lies in finding a <br>balance between unrestricted access to <br>information and safeguarding against its <br>misuse. To address these concerns, cyber<br>security measures, ethical hacking, and data <br>protection regulations have emerged as means <br>to mitigate the risks associated with online <br>data. Encouraging digital literacy and <br>responsible internet usage is vital in <br>equipping individuals with the knowledge <br>needed to safely navigate the digital realm.<br>Preventing spamming and carding attacks <br>requires a multi-faceted approach that <br>involves technology, policy, and user <br>awareness. It's an ongoing battle, as attackers <br>continually evolve their tactics, so it's <br>important to stay up-to-date with the latest <br>threats and mitigation strategies.</p> 2023-10-25T00:00:00+0530 Copyright (c) 2023 Journal of Cyber Security in Computer System(e-ISSN:2583-4703) http://matjournals.co.in/index.php/JCSCS/article/view/4459 Application of Chaos Theory to Cyber Security 2023-11-09T13:49:15+0530 Manas Kumar Yogi manas.yogi@gmail.com <p>The application of Chaos Theory to the field <br>of cyber security represents a compelling <br>frontier in safeguarding the increasingly <br>complex and interconnected digital landscape. <br>Chaos Theory, known for its sensitivity to <br>initial conditions and the unpredictability of <br>dynamic systems, offers a unique lens <br>through which to understand, model, and <br>mitigate cyber threats. This abstract explores <br>the key insights and implications of <br>integrating Chaos Theory into the realm of <br>cyber security. Chaos Theory's fundamental<br>principles of non-linearity, fractal geometry, <br>and the butterfly effect, traditionally used in <br>natural sciences and complex systems, have <br>found resonance in the inherently intricate <br>and ever-evolving world of cyber security. <br>This abstract delves into how Chaos Theory <br>can reveal previously unseen patterns in <br>cyber-attacks, offer early detection of <br>anomalies, and enhance predictive <br>capabilities. The concept of "cyber chaos" <br>emerges as a paradigm shift, advocating for <br>dynamic and adaptive defence mechanisms. <br>The abstract also discusses the practical <br>implications of embracing Chaos Theory, <br>addressing the limitations, and presenting <br>case studies and real-world applications in <br>which this approach has demonstrated its <br>effectiveness. By harnessing Chaos Theory, <br>cyber security practitioners and researchers <br>can adapt to the dynamic cyber landscape, <br>thwart sophisticated attacks, and fortify the <br>digital realm against unpredictable threats. <br>This abstract underscores the need to explore <br>and exploit the chaotic nature of cyberspace <br>to safeguard critical infrastructure and digital <br>assets in an increasingly uncertain world</p> 2023-11-09T00:00:00+0530 Copyright (c) 2023 Journal of Cyber Security in Computer System(e-ISSN:2583-4703) http://matjournals.co.in/index.php/JCSCS/article/view/4649 A Review of Cyber Security in Banking Industry Threats and Vulnerabilities 2023-12-15T17:17:44+0530 Vinay Kumar Singh vkss.vinaykumarsingh@gmail.com Avnish Kumar vks.vinaykumarsingh@gmail.com <p>Data security is becoming a big issue in the<br>modern world. The most entertaining and<br>time-saving things in life are cyber services.<br>However, consumers save their data on cloud<br>servers, which are managed by cybercrime.<br>Cybersecurity is crucial in this situation.<br>Since numerous hackers can target the data<br>and obtain user information via the server,<br>this is an open security challenge. It's not<br>hard to find several examples of cybercrime if<br>we search around. Phishing and scams,<br>identity theft, ransomware attacks, improper<br>use of computer networks, and online fraud<br>are a few examples. Our cloud-based datasets<br>security is now a major concern. Data<br>security, including the detection of potential<br>intruders anywhere in the world, will be the<br>focus of our research, thus safeguarding<br>information from invaders is now a serious<br>problem. If we don't know who the invader is,<br>how will we find out who is taking the data<br>that has been protected by passwords, OTPs,<br>fingerprints, biometric security, and other<br>techniques? To prevent this, we can make use<br>of hybrid techniques, biometric recognition,<br>data learning, and machine learning. These<br>will be the handles of the system, and by<br>employing the greatest optimisation strategies<br>to extract accurate data, they will aid in<br>protecting data from hackers.</p> 2023-12-15T00:00:00+0530 Copyright (c) 2023 Journal of Cyber Security in Computer System(e-ISSN:2583-4703) http://matjournals.co.in/index.php/JCSCS/article/view/4674 Assessing the Threat of Using Portable Devices to Access Banking Services 2023-12-20T11:23:41+0530 Sanjay Singh sanj.ccsss@gmail.com <p>This study examines application security for <br>mobile banking in depth. The authors <br>examined blog comments about mobile <br>banking application security using blog <br>mining as a research method. Security <br>concerns, protection strategies/best practices, <br>to assist banks and customers in lowering the <br>Future security trends and security dangers <br>related to mobile banking services are <br>described.<br>Portable technologies, Smartphones and <br>tablets, for example, have grown to be an <br>essential component of our everyday life in <br>the digital age. These devices give convenience <br>and accessibility, allowing us to complete a <br>range of tasks on the road, including banking. <br>However, with convenience comes the <br>possibility of security risks. It is critical to <br>examine the risks connected with using <br>mobile devices for banking and to take the <br>appropriate safeguards to protect our <br>financial information and transactions. <br>The risks associated with using portable <br>devices are higher for data exposure (sensitive <br>data exposed to the public or a third party <br>without consent), data loss (when a physical <br>device is lost), and increased vulnerability to <br>network-based attacks to and from any <br>system the device is connected to (both <br>directly and via networks over the internet). <br>Cyberattacks on mobile platforms can be <br>carried out more easily on these platforms. <br>This is especially true when cloud services, <br>which serve as hubs for cyber threat actors, <br>are accessed through mobile devices.</p> 2023-12-20T00:00:00+0530 Copyright (c) 2023 Journal of Cyber Security in Computer System(e-ISSN:2583-4703) http://matjournals.co.in/index.php/JCSCS/article/view/4678 Novel Perspectives on Doxing and Its Mitigation 2023-12-20T12:48:55+0530 Dwarampudi Aiswarya aiswarya.d@pragati.ac.in Manas Kumar Yogi aiswarya.d@pragati.ac.in <p><strong>Doxing, the malicious act of exposing an <br>individual's private and sensitive information, <br>has emerged as a significant threat in the <br>digital age. This study explores novel <br>perspectives in understanding doxing, its <br>evolving techniques, and innovative strategies <br>for its mitigation. Our research delves into <br>the intricacies of doxing, shedding light on <br>emerging tactics employed by malicious <br>actors in an era of increased online <br>information sharing. We examine the <br>psychological and sociological factors that <br>drive doxing incidents, providing fresh <br>insights into the motivations behind such <br>attacks. This paper presents a holistic <br>approach to doxing mitigation, incorporating <br>technical, legal, and educational strategies. <br>We discuss the importance of proactive threat <br>intelligence sharing, the development of <br>advanced privacy protection tools, and legal <br>frameworks to hold doxers accountable. <br>Additionally, we emphasize the role of <br>cybersecurity awareness and digital hygiene <br>practices in reducing individual susceptibility <br>to doxing. In a rapidly evolving digital <br>landscape, this research offers a forwardlooking perspective on the challenges posed <br>by doxing and provides valuable guidance for <br>individuals, organizations, and policymakers <br>seeking effective mitigation strategies</strong></p> 2023-12-20T00:00:00+0530 Copyright (c) 2023 Journal of Cyber Security in Computer System(e-ISSN:2583-4703)