1,222,115 research outputs found

    EFEKTIVITAS KERJASAMA UNITED KINGDOM DAN INDONESIA DALAM MENINGKATKAN DIGITAL SECURITY DI INDONESIA MELALUI UK-INDONESIA TECH HUB

    Get PDF
    The digital ecosystem in Indonesia has been growing in recent years. The Covid-19 pandemic was the point where the number of online application users rose rapidly to 442%. The transformation of digital technology users is in the form of remote working, online shopping, cash-app, and online applications. The increase in user numbers is accompanied by an increase in the number of cyber crimes targeting people by committing acts of data theft. Lack of digital data security education is one of the main factors in the rise of cybercrime. Digital security is the solution that needed for the community to avoid cybercrime and keep data safe. This research focuses on the effectiveness of the UK-Indonesia Tech Hub cooperation in improving the digital ecosystem and security in Indonesia.. This study will use descriptive research in describing the improvement of digital security in Indonesia where data is obtained using library research method. This research found the improvement of digital security is carried out through Campaign programs, Webinars, bootcamps, and experience-based learning.UK-Indonesia Tech Hub is proven to be effective in increasing digital security. structurally the organization has the authority to carry out its goals without any intervention or regime pressure, the organizational structure is flexible, the goals are in line with existing problems, and human and financial resources are fulfilled. In terms of output, the UK-Indonesia Tech Hub has succeeded in organizing various programs with the outcome that people are starting to understand and realize the importance of protecting digital data so that the impact can be seen from the decrease in the number of cyber attack traffic anomalies from 2021 to 2022

    Image encryption system based on a nonlinear joint transform correlator for the simultaneous authentication of two users

    Get PDF
    We propose a new encryption system based on a nonlinear joint transform correlator (JTC) using the information of two biometrics (one digital fingerprint for each user) as security keys of the encryption system. In order to perform the decryption and authentication in a proper way, it is necessary to have the two digital fingerprints from the respective users whose simultaneous authentication is pursued. The proposed security system is developed in the Fourier domain. The nonlinearity of the JTC along with the five security keys given by the three random phase masks and the two digital fingerprints of the two users allow an increase of the system security against brute force and plaintext attacks. The feasibility and validity of this proposal is demonstrated using digital fingerprints as biometrics in numerical experiments.Peer ReviewedPostprint (published version

    European Digital Libraries: Web Security Vulnerabilities

    Get PDF
    Purpose – The purpose of this paper is to investigate the web vulnerability challenges at European library web sites and how these issues can affect the data protection of their patrons. Design/methodology/approach – A web vulnerability testing tool was used to analyze 80 European library sites in four countries to determine how many security vulnerabilities each had and what were the most common types of problems. Findings – Analysis results from surveying the libraries show the majority have serious security flaws in their web applications. The research shows that despite country-specific laws mandating secure sites, system librarians have not implemented appropriate measures to secure their online information systems. Research limitations/implications – Further research on library vulnerability throughout the world can be taken to educate librarians in other countries of the serious nature of protecting their systems. Practical implications – The findings serve to remind librarians of the complexity in providing a secure online environment for their patrons and that a disregard or lack of awareness of securing systems could lead to serious vulnerabilities of the patrons' personal data and systems. Lack of consumer trust may result in a decreased use of online commerce and have serious repercussions for the municipal libraries. Several concrete examples of methods to improve security are provided. Originality/value – The paper serves as a current paper on data security issues at Western European municipal library web sites. It serves as a useful summary regarding technical and managerial measures librarians can take to mitigate inadequacies in their security implementation

    Digital Signature Security in Data Communication

    Full text link
    Authenticity of access in very information are very important in the current era of Internet-based technology, there are many ways to secure information from irresponsible parties with various security attacks, some of technique can use for defend attack from irresponsible parties are using steganography, cryptography or also use digital signatures. Digital signatures could be one of solution where the authenticity of the message will be verified to prove that the received message is the original message without any change, Ong-Schnorr-Shamir is the algorithm are used in this research and the experiment are perform on the digital signature scheme and the hidden channel scheme.Comment: 6 pages, Paper presented at the International Conference on Education and Technology (ICEduTech2017), Novotel Hotel, Balikpapan, Indonesi
    corecore