Online ISSN: 2515-8260

Keywords : cyber security


M.Bommy, Paritala Jhansi Rani, Thomas Abraham J V, Gunjan Chhabra,Suresh Kumar Sharma, MK Jayanthi Kannan

European Journal of Molecular & Clinical Medicine, 2022, Volume 9, Issue 7, Pages 8546-8555

With the growth of the Internet, cyberattacks are evolving quickly, and the state of cyber security is not promising. Cyber security is often an extension of traditional information technology (IT) security that aims to safeguard systems, applications, and data that are vulnerable to various online assaults, such as data theft and espionage as well as data manipulation and denial of service attacks. Due to the losses incurred by countries, companies, and people as a result of numerous cybercrime assaults, there is a need for an increase in cyber security research. This study examines deep learning (DL), watermarking techniques for cyber security applications and illustrates how deep learning and water making is used in cybersecurity and how state-of-the-art solutions may be outperformed by deep learning ones. We advise professionals to think about integrating deep learning into security systems.

Manipulative Cyber Assurance Procedures: The Role of Pre-Communication and Safety Mutuality

Anshey Singh; Anantram .

European Journal of Molecular & Clinical Medicine, 2020, Volume 7, Issue 4, Pages 94-97

Cyber protection is a reasonable technique for digital hazard transfers. In any case, it has been indicated that relying upon the highlights of the hidden condition, it could possibly improve the condition of system security. Present paper considers a solitary benefit expanding guarantor (head) with intentionally partaking protects/customers (specialists). We are especially keen on two unmistakable highlights of digital security and their effect on the agreement plan issue. The first is the related idea of digital security, whereby one substance's condition of security depends on its own venture and exertion, yet additionally the endeavors of others' in the equivalent eco-framework (for example externalities). The second is the way that ongoing advances in Internet estimation joined with AI strategies presently permit us to perform precise quantitative evaluations of security act at a firm level. This can be utilized as an apparatus to play out an underlying security review, or prescreening, of a planned customer to all the more likely empower premium segregation and the structure of altered approaches.


Chystokletov Leontii Grugorovych; Tkachuk Taras Yuriiovych; Komisarov Oleksandr Genadiiovych; Nazar Yuriі Stepanovych; Pavliutin Yurii Mukolaiovych

European Journal of Molecular & Clinical Medicine, 2020, Volume 7, Issue 7, Pages 1-10

The article, based on theoretical discourse, analyses the main approaches to the basic concepts of the information society. It has been proved that the main characteristic of the modern information society is the presence of people capable of critical thinking. Anthropocentrism is seen as an anthropological component of the information society.
It has been substantiated that with the development of information and communication technologies new opportunities for the rooting of democratic values in society appear. At the same time, priority should be given to compliance with the information rights of the individual.
Axiological, epistemological and ontological aspects reveal the philosophical meaning of this definition. The ontological aspect of information security captures the situation created to combat risk, the purpose of which is to ensure the integrity of the object and the stable state of the information environment. The anthropological aspect of the concept reveals the security of the subject of information interaction. The hypothesis that information security is a complex phenomenon of objective development of modern civilization, aimed at promoting the harmonious development of the information society, has been substantiated. Ensuring information security, above all, requires the study of the negative consequences of the process of information technology application, the study of the causes of their manifestation, which will ultimately help to identify the ways to overcome them, thereby forming a secure state of the information environment.

Digital Education In Jammu And Kashmir: Opportunities And Threats

MuzaferRasool Hajam; Dr Manvendra Singh; Waseem Ahmad Rather

European Journal of Molecular & Clinical Medicine, 2020, Volume 7, Issue 7, Pages 6412-6417

Digital education as an emerging concept focuses on digital technology driven operations and management of educational systems, institutions and teaching learning methodologies utilising software packages and codes, hardware infrastructure systems, algorithms and data portals facilitating active interaction and communication between students, educators, policy makers and inter-institutional collaborations. In 21st century age of Information and Technology, educational tools, methodologies and the concept of education itself got rapidly transformed through opportunities provided by digitisation with emphasis on distance learning, flexible timelines, open access to education resources, online teaching modules, real-time assessment, integrated information systems for collaborative research between institutions world over, and proactive policy for approaches for real-timemonitoring, performance review and management of educational institutions. However, this rapid shift towards digital education has posed challenges of data security, personal privacy, cyber bullying, blackmailing and profanity despite presence of robust cyber security mechanisms and stringent cyber laws. The paper explores competitive edge of Digital education, efficacy of its various opportunities, threats of security issues, and need for proactive policy approach for rejuvenation of Digital education in Jammu and Kashmirmore so in view of recent Covid-19 lockdown which led to closing of educational institutions world over thereby mandating exploration of new means of learning.