TITLE:
Cyber Security Crimes, Ethics and a Suggested Algorithm to Overcome Cyber-Physical Systems Problems (CybSec1)
AUTHORS:
Abou_el_ela Abdou Hussien
KEYWORDS:
Cyber Security, Cybercrime, Cyber Ethics, Social Media, Cloud Computing, Android Apps
JOURNAL NAME:
Journal of Information Security,
Vol.12 No.1,
January
15,
2021
ABSTRACT: Digital
systems have changed our world and will continue to change it. Supportive
government policy, a strong research base and history of industrial success
place the benefits of an emerging digital society. Protecting benefits and
minimizing risks requires reliable and robust cyber security, backed by a
robust research and translation system. Trust is essential for growth and
maintenance of participation in the digital community. Organizations gain trust
by acting in a trustworthy way leading to building reliable and secure systems,
treating people, their privacy and their data with respect, and providing
reliable and understandable information to help people understand how safe they
are. Research and revolution in industry and academia will continue to make
important contributions to create flexible and reliable digital environment.
Cyber Security has a main role in the field of information technology because securing
information has become one of the greatest challenges today. When we think
about the cyber security, the first thing that comes to our mind is “cyber
crimes” which are increasing exponentially day by day. Many governments and firms are
taking many measures to prevent these cybercrimes. Besides the various
measures, cyber security remains a major concern. This paper intended to give a deep overview
of the concepts and principles of cyber security that affect the safety and
security in an international context. It mainly focuses on challenges faced by
cyber security on the latest technologies and focuses also on introducing
security types, cyber security techniques, cyber security ethics, trends that
change the face of cyber security and finally attempting to solve one of the
most serious cyber security crimes of violating privacy on the internet by
improving the security of sensitive personal information (SPI) in
Cyber-physical systems using a selected proposed algorithm that analyzes the
user’s information resources and determines the valid data to be encrypted,
then uses adaptive acquisition methods to collect the information and finally a
new cryptographic method is used to complete SPI secure encryption according to
acquisition results as described in details in Section 4.