Design and Development of Cybersecurity Suite

Authors

  • Wan Aiman Wan Ibrahim Deparment of Computer Science, Internataional Islamic University Malaysia, 53100 Kuala Lumpur, Malaysia
  • Ahmad Nazrin Ahmad Khalil Deparment of Computer Science, Internataional Islamic University Malaysia, 53100 Kuala Lumpur, Malaysia
  • Adamu Abubakar Deparment of Computer Science, Internataional Islamic University Malaysia, 53100 Kuala Lumpur, Malaysia

DOI:

https://doi.org/10.31436/ijpcc.v10i2.493

Keywords:

Cybersecurity, Cybersecurity-suite, Phishing detection, Password management

Abstract

Protecting personal, corporate and government data in the digital age requires cybersecurity. Traditional cybersecurity methods sometimes lack comprehensive and dynamic protection mechanisms as cyber-attacks change and become more sophisticated. A new cybersecurity suite is proposed in this study. It integrates various advanced security technologies into a single user-friendly platform interaction. This paper specifically combines techniques for real-time phishing detection, strong password management, safe encryption and decryption services and an interactive module to promote user awareness and behaviours to improve digital security for individuals and organization. Rapid prototyping is used in iterative and incremental development phases to adapt to changing security needs and user input. This method allows the platform to be constantly improved to satisfy the current cybersecurity standards and react to new threats. The prototyped developed provides proactive digital defence, a complete cybersecurity platform that equips users to defend their digital presence. With the intuitive design and advanced feature set, the prototype aspires to democratize cybersecurity. Empirical testing of the prototype revealed that makes an effective protection of a wider audience without the complexities of security software. This paper contributes in the advances cybersecurity technology and shaping the digital protection measures.

References

M.B. Nema, Wally HA. Cybersecurity risks detection and prevention. Al-Mansour Journal. 2019;31(1):65-86.

R. Buch, Ganda D, Kalola P, Borad N. World of cyber security and cybercrime. STM Journal., 2017, 4(2),

I.H. Sarker, Kayes AS, Badsha S, Alqahtani H, Watters P, Ng A. Cybersecurity data science: an overview from machine learning perspective. Journal of Big data. 2020 Dec; 7:1-29.

C. Florackis, Louca C, Michaely R, Weber M. Cybersecurity risk. The Review of Financial Studies. 2023 Jan 1;36(1):351-407.

D.W. Hubbard, Seiersen R. How to measure anything in cybersecurity risk. John Wiley & Sons; 2023 Apr 11.

B. Gumaida, Ibrahim AA. IWDSA: A Hybrid Intelligent Water Drops with a Simulated Annealing for The Localization Improvement in Wireless Sensor Networks. Int. J. Appl. Inf. Technol. Vol. 2024;8(01):15.

B.T. Familoni. Cybersecurity challenges in the age of AI: theoretical approaches and practical solutions. Computer Science & IT Research Journal. 2024 Mar 22;5(3):703-24.

A. Almuqren, Alsuwaelim H, Rahman MH, Ibrahim AA. A Systematic Literature Review on Digital Forensic Investigation on Android Devices. Procedia Computer Science. 2024 Jan 1; 235:1332-52.

D. Craigen, Diakun-Thibault N, Purse R. Defining cybersecurity. Technology innovation management review. 2014;4(10).

A.K. Jain, Gupta BB. Phishing detection: analysis of visual similarity based approaches. Security and Communication Networks. 2017;2017(1):5421046.

R. Goyal, Khurana M. Cryptographic security using various encryption and decryption method. International Journal of Mathematical Sciences and Computing (IJMSC). 2017;3(3):1-1.

A.A. Alarood, Ibrahim AA, Alsubaei FS. Attacks Notification of Differentiated Services Code Point (DSCP) Values Modifications. IEEE Access. 2023 Nov 13;11:126950-66.

D. Goyal, Lavania G, Sharma G. Review of modern web application cybersecurity risks and counter measures. InAIP Conference Proceedings 2023 Jun 15 (Vol. 2782, No. 1). AIP Publishing.

Y. Ma, Twyman, Nathan W., "Cybersecurity: Personal Information and Password Setup" (2018). MWAIS 2018 Proceedings. 20.

S.M. Kennison Chan-Tin E. Taking risks with cybersecurity: Using knowledge and personal characteristics to predict self-reported cybersecurity behaviors. Frontiers in Psychology. 2020 Nov 4;11:546546

Downloads

Published

30-07-2024

How to Cite

Wan Ibrahim, W. A. ., Ahmad Khalil, A. N., & Abubakar, A. (2024). Design and Development of Cybersecurity Suite. International Journal on Perceptive and Cognitive Computing, 10(2), 104–112. https://doi.org/10.31436/ijpcc.v10i2.493

Issue

Section

Articles

Most read articles by the same author(s)