Edukimi në sigurinë kibernetike
Abstrakti
Në vitet e fundit, interneti është bërë një element integral i stilit të jetës së përditshme të njerëzve në mbarë botën. Kriminaliteti online, nga ana tjetër, është rritur së bashku me rritjen e aktivitetit në internet. Siguria kibernetike ka përparuar shumë vitet e fundit për të vazhduar me ndryshimet e shpejta që ndodhin në hapësirën kibernetike. Siguria kibernetike i referohet metodave që një vend ose organizatë mund ta përdorë atë për të mbrojtur produktet dhe informacionet në hapësirën kibernetike. Një dekadë më parë, termi “siguri kibernetike” nuk ishte i njohur nga publiku i gjerë ne Shqipëri. Tani siguria kibernetike nuk është vetëm një problem që prek individët, por gjithashtu vlen për një organizatë, biznes ose edhe një istitucion publik, arsimor, ku sulmet kibernetike po ngrenë shqetësime për privatësinë, sigurinë dhe financat. Gjithçka po dixhitalizohet së fundmi, duke përdorur një sërë teknologjish të tilla si cloud kompjuter, telefonat inteligjentë dhe Internetin e Gjërave. Siguria kibernetike është një grup teknologjish, procesesh dhe praktikash që synojnë parandalimin e sulmeve që synojnë, dëmtimin dhe aksesin e paligjshëm në rrjete, kompjuterë, programe dhe të dhëna. Qëllimi kryesor i këtij artikulli është edukimi në kryerjen e një ekzaminimi të plotë të llojeve të sigurisë kibernetike, në kornizën e sigurisë, mjetet e sigurisë dhe vështirësitë në sigurinë kibernetike duke ditur që siguria kibernetike mbron të dhënat dhe integritetin e aseteve informatike që janë pjesë ose të lidhura me rrjetin e një organizate, me qëllim në mbrojtjen e këtyre aseteve nga të gjithë aktorët kërcënues gjatë gjithë ciklit jetësor të një sulmi kibernetik.Fjalët kyçe:
Siguria Kibernetike,, Sulmet Kibernetike,, Krimi Kibernetik,, Siguria e Rrjetit,, Interneti i Gjërave Siguria (IoT),, Kornizat e SigurisëShkarkimet
References
-
Nikhat Akhtar, Firoj Parwej, Yusuf Perwej, “A Perusal of Big Data Classification and Hadoop Technology”, International Transaction of Electrical and Computer Engineers System (ITECES),USA, Volume 4, No. 1, Pages 26-38, 2017 , DOI: 10.12691/iteces-4-1-4
-
Basholli, F.,Mema, B.,& Basholli, A. (2024). Training of information technology personnel through simulations for protection against cyber-attacks. Engineering Applications, 3(1), 45-58
-
Basholli, F.,Hyka,D., Basholli, A.,Daberdini,A.,& Mema,B.(2023). Analysis of cyber-attacks through simulation. Advanced Engineering Days, 7, 120-122
-
B. M. Thuraisingham, “Can AI be for Good in the Midst of Security Attacks and Privacy Violations?”, Proceedings ACM CODASPY, 2020
-
Basholli, F.,Daberdini, A.,& Basholli, A. (2023). Possibility of protection against unauthorized interference in telecommunication systems. Engineering Applications, 2(3), 265-278
-
Hernandez-Suarez, At al.., Social sentiment sensor in Twitter for predicting cyber-attacks using ℓ1regularization. Sensors, 18(5), 1380, 2018
-
Basholli, F.,Daberdini, A.,& Basholli, A. (2023).Detection and prevention of intrusions into computer systems. Advanced Engineering Days, 6, 138-141
-
Basholli, F.,Mezini, R.,& Basholli, A. (2023). Security in the components of information systems. Advanced Engineering Days, 7, 185-187
-
Daberdini, A.,Basholli, F., Metaj, N.& Skenderaj, E. (2022). Cyber security in mail with Forti web and Fortinet for companies and institutions.5thAdvanced Engineering Days, 81-83
-
Basholli, A., Mema, B., Basholli, F., Hyka, D., & Salillari, D. (2023). The role of education in cyber hygiene. Advanced engineering Days, 7, 178-181
-
Firoj Parwej, Nikhat Akhtar, Yusuf Perwej, “A Close-Up View About Spark in Big Data Jurisdiction”, International Journal of Engineering Research and Application (IJERA), Volume 8, Issue 1, (Part-I1), Pages 26-41, January 2018, DOI: 10.9790/9622-0801022641
-
C.M. Williams, R. Chaturvedi and K. Chakravarthy, “Cybersecurity Risks in a Pandemic”, Journal of Medical Internet Res., vol. 22, no. 9, pp. 23692, 2020
-
M. Schwenk Jensen, J. Gruschka and N. Iacono, “On technical security issues in Cloud”, IEEE International Conference on Cloud Computing, pp. 109-16, 2009
-
Yuya Jeremy Ong, Mu Qiao, Ramani Routray and Roger Raphael, “Context-Aware Data Loss Prevention for Cloud Storage Services”, 2017 IEEE 10th International Conference on Cloud Computing (CLOUD), 2017
-
X. Jin, W. Sun, Y. Liang, J. Guo and Z. Xie, “Design and implementation of intranet safety monitoring platform for Power secondary system”, Automation of Electric Power System, pp. 99-104, Aug. 2011
-
Yusuf Perwej, Kashiful Haq, Firoj Parwej, M. M. Mohamed Hassan ,“ The Internet of Things (IoT) and its Application Domains”, International Journal of Computer Applications (IJCA) ,USA , ISSN 0975 – 8887, Volume 182, No.49, Pages 36- 49, April 2019,DOI: 10.5120/ijca2019918763
-
Firoj Parwej, Nikhat Akhtar, Yusuf Perwej, “An Empirical Analysis of Web of Things (WoT)”, International Journal of Advanced Research in Computer Science (IJARCS), Volume 10, No. 3, Pages 32-40, 2019, DOI: 10.26483/ijarcs.v10i3.6434
-
Basholli, F., & Daberdini, A. (2023). Monitoring and assessment of the quality of electricity in a building. Engineering Applications, 2(1), 32-48
-
S. Kowtha, L. A. Nolan and R. A. Daley, “Cyber security operations center characterization model and analysis”, Proc. IEEE Conf. Technol. Homeland Secur. (HST), pp. 470-475, Nov. 2012
-
Pajaziti, A.,Basholli, F.,& Zhaveli, Y. (2023). Identification and classification of fruits through robotic systemby using artificial intelligence. Engineering Applications, 2(2), 154-163
-
Yusuf Perwej, “The Ambient Scrutinize of Scheduling Algorithms in Big Data Territory”,International Journal of Advanced Research (IJAR), ISSN 2320-5407, Volume 6,Issue 3, Pages 241-258, March 2018, DOI: 10.21474/IJAR01/6672
-
Basholli, F., (2022). Cyber warfare, a new aspect of modern warfare. VI International Scientific Conference on Security „CONFSEC 2022”, 52-54, www.researchgate.net
-
F. Pasqualetti, F. Dorfler and F. Bullo, “Attack detection and identification in cyber-physical systems”, IEEE Transactions on Automatic Control, vol. 58, no. 11, pp. 2715-2729, 2013
-
Yusuf Perwej, Bedine Kerim, Mohmed Sirelkhtem Adrees, Osama E. Sheta, “An Empirical Exploration of the Yarn in Big Data”, International Journal of Applied Information Systems (IJAIS)– ISSN: 2249-0868, Foundation of Computer Science FCS, New York, USA, Volume 12, No.9,Pages
-
-29, December 2017, DOI: 10.5120/ijais2017451730
-
Yusuf Perwej, Nikhat Akhtar, Firoj Parwej, “A Technological Perspective of Blockchain Security”,International Journal of Recent Scientific Research (IJRSR), ISSN: 0976-3031, Volume 9, Issue 11,(A), Pages 29472 – 29493, November 2018, DOI: 10.24327/ijrsr.2018.0911.2869
-
Asif Perwej, Dr. Kashiful Haq, Dr. Yusuf Perwej, “Blockchain and its Influence on Market”,International Journal of Computer Science Trends and Technology (IJCST), ISSN 2347 – 8578,Volume 7, Issue 5, Pages 82- 91, Sep – Oct 2019, DOI: 10.33144/23478578/IJCST-V7I5P10
-
Mema, B., & Basholli, F. (2023). Internet of Things in the development of future businesses in Albania. Advanced Engineering Science, 3, 196-205
-
Basholli, F., & Daberdini, A. (2022). Monitoring and evaluation of the quality of electricity in a building.5thAdvanced Engineering Days, 77-80
-
Hyka,D., Hyra,A.,Basholli,F.,Mema,B.,& Basholli,A.(2023). Data Security in Public and Private Administration: Challenges, Trends, and Effective Protection in the Era of Digitalization. Advanced Engineering Days, 7, 125-127
-
Mema, B.,Basholli, F.,& Hyka, D. (2023). ChatGPT in Albanian higher education: Transformation of learning and virtual interaction. Advanced Engineering Days, 8, 23-27
-
Harizaj, M.,Bisha, I., & Basholli, F. (2023). IoT integration in electric car chargers’Infrastructure. Advanced Engineering Days, 6, 152-155
-
Basholli, F.,Minga, J.,& Grepcka, A. (2024). Protection of buildings on a university campus from lightning strikes. Advanced Engineering Days, 8, 35-38
-
Yusuf Perwej, “A Pervasive Review of Blockchain Technology and Its Potential Applications”, Open Science Journal of Electrical and Electronic Engineering (OSJEEE), New York, USA, Volume 5, No. 4, Pages 30 - 43, October, 2018
-
Basholli, F.,Mema, B.,Hyka, D., Basholli, A.,& Daberdini, A. (2023). Analysis of security challenges in SCADA systems, a technical review on automated real-time systems. Advanced Engineering Days, 8, 18-22
-
Basholli, F.(2022). Electronic interference and protection from it.5thAdvanced Engineering Days, 74-76
-
Hyka, D., & Basholli, F. (2023). How secure is our medical data? Is Albania ready for the digitalization of the health care system?. Engineering Applications, 2(3), 235-242
References
Nikhat Akhtar, Firoj Parwej, Yusuf Perwej, “A Perusal of Big Data Classification and Hadoop Technology”, International Transaction of Electrical and Computer Engineers System (ITECES),USA, Volume 4, No. 1, Pages 26-38, 2017 , DOI: 10.12691/iteces-4-1-4
Basholli, F.,Mema, B.,& Basholli, A. (2024). Training of information technology personnel through simulations for protection against cyber-attacks. Engineering Applications, 3(1), 45-58
Basholli, F.,Hyka,D., Basholli, A.,Daberdini,A.,& Mema,B.(2023). Analysis of cyber-attacks through simulation. Advanced Engineering Days, 7, 120-122
B. M. Thuraisingham, “Can AI be for Good in the Midst of Security Attacks and Privacy Violations?”, Proceedings ACM CODASPY, 2020
Basholli, F.,Daberdini, A.,& Basholli, A. (2023). Possibility of protection against unauthorized interference in telecommunication systems. Engineering Applications, 2(3), 265-278
Hernandez-Suarez, At al.., Social sentiment sensor in Twitter for predicting cyber-attacks using ℓ1regularization. Sensors, 18(5), 1380, 2018
Basholli, F.,Daberdini, A.,& Basholli, A. (2023).Detection and prevention of intrusions into computer systems. Advanced Engineering Days, 6, 138-141
Basholli, F.,Mezini, R.,& Basholli, A. (2023). Security in the components of information systems. Advanced Engineering Days, 7, 185-187
Daberdini, A.,Basholli, F., Metaj, N.& Skenderaj, E. (2022). Cyber security in mail with Forti web and Fortinet for companies and institutions.5thAdvanced Engineering Days, 81-83
Basholli, A., Mema, B., Basholli, F., Hyka, D., & Salillari, D. (2023). The role of education in cyber hygiene. Advanced engineering Days, 7, 178-181
Firoj Parwej, Nikhat Akhtar, Yusuf Perwej, “A Close-Up View About Spark in Big Data Jurisdiction”, International Journal of Engineering Research and Application (IJERA), Volume 8, Issue 1, (Part-I1), Pages 26-41, January 2018, DOI: 10.9790/9622-0801022641
C.M. Williams, R. Chaturvedi and K. Chakravarthy, “Cybersecurity Risks in a Pandemic”, Journal of Medical Internet Res., vol. 22, no. 9, pp. 23692, 2020
M. Schwenk Jensen, J. Gruschka and N. Iacono, “On technical security issues in Cloud”, IEEE International Conference on Cloud Computing, pp. 109-16, 2009
Yuya Jeremy Ong, Mu Qiao, Ramani Routray and Roger Raphael, “Context-Aware Data Loss Prevention for Cloud Storage Services”, 2017 IEEE 10th International Conference on Cloud Computing (CLOUD), 2017
X. Jin, W. Sun, Y. Liang, J. Guo and Z. Xie, “Design and implementation of intranet safety monitoring platform for Power secondary system”, Automation of Electric Power System, pp. 99-104, Aug. 2011
Yusuf Perwej, Kashiful Haq, Firoj Parwej, M. M. Mohamed Hassan ,“ The Internet of Things (IoT) and its Application Domains”, International Journal of Computer Applications (IJCA) ,USA , ISSN 0975 – 8887, Volume 182, No.49, Pages 36- 49, April 2019,DOI: 10.5120/ijca2019918763
Firoj Parwej, Nikhat Akhtar, Yusuf Perwej, “An Empirical Analysis of Web of Things (WoT)”, International Journal of Advanced Research in Computer Science (IJARCS), Volume 10, No. 3, Pages 32-40, 2019, DOI: 10.26483/ijarcs.v10i3.6434
Basholli, F., & Daberdini, A. (2023). Monitoring and assessment of the quality of electricity in a building. Engineering Applications, 2(1), 32-48
S. Kowtha, L. A. Nolan and R. A. Daley, “Cyber security operations center characterization model and analysis”, Proc. IEEE Conf. Technol. Homeland Secur. (HST), pp. 470-475, Nov. 2012
Pajaziti, A.,Basholli, F.,& Zhaveli, Y. (2023). Identification and classification of fruits through robotic systemby using artificial intelligence. Engineering Applications, 2(2), 154-163
Yusuf Perwej, “The Ambient Scrutinize of Scheduling Algorithms in Big Data Territory”,International Journal of Advanced Research (IJAR), ISSN 2320-5407, Volume 6,Issue 3, Pages 241-258, March 2018, DOI: 10.21474/IJAR01/6672
Basholli, F., (2022). Cyber warfare, a new aspect of modern warfare. VI International Scientific Conference on Security „CONFSEC 2022”, 52-54, www.researchgate.net
F. Pasqualetti, F. Dorfler and F. Bullo, “Attack detection and identification in cyber-physical systems”, IEEE Transactions on Automatic Control, vol. 58, no. 11, pp. 2715-2729, 2013
Yusuf Perwej, Bedine Kerim, Mohmed Sirelkhtem Adrees, Osama E. Sheta, “An Empirical Exploration of the Yarn in Big Data”, International Journal of Applied Information Systems (IJAIS)– ISSN: 2249-0868, Foundation of Computer Science FCS, New York, USA, Volume 12, No.9,Pages
-29, December 2017, DOI: 10.5120/ijais2017451730
Yusuf Perwej, Nikhat Akhtar, Firoj Parwej, “A Technological Perspective of Blockchain Security”,International Journal of Recent Scientific Research (IJRSR), ISSN: 0976-3031, Volume 9, Issue 11,(A), Pages 29472 – 29493, November 2018, DOI: 10.24327/ijrsr.2018.0911.2869
Asif Perwej, Dr. Kashiful Haq, Dr. Yusuf Perwej, “Blockchain and its Influence on Market”,International Journal of Computer Science Trends and Technology (IJCST), ISSN 2347 – 8578,Volume 7, Issue 5, Pages 82- 91, Sep – Oct 2019, DOI: 10.33144/23478578/IJCST-V7I5P10
Mema, B., & Basholli, F. (2023). Internet of Things in the development of future businesses in Albania. Advanced Engineering Science, 3, 196-205
Basholli, F., & Daberdini, A. (2022). Monitoring and evaluation of the quality of electricity in a building.5thAdvanced Engineering Days, 77-80
Hyka,D., Hyra,A.,Basholli,F.,Mema,B.,& Basholli,A.(2023). Data Security in Public and Private Administration: Challenges, Trends, and Effective Protection in the Era of Digitalization. Advanced Engineering Days, 7, 125-127
Mema, B.,Basholli, F.,& Hyka, D. (2023). ChatGPT in Albanian higher education: Transformation of learning and virtual interaction. Advanced Engineering Days, 8, 23-27
Harizaj, M.,Bisha, I., & Basholli, F. (2023). IoT integration in electric car chargers’Infrastructure. Advanced Engineering Days, 6, 152-155
Basholli, F.,Minga, J.,& Grepcka, A. (2024). Protection of buildings on a university campus from lightning strikes. Advanced Engineering Days, 8, 35-38
Yusuf Perwej, “A Pervasive Review of Blockchain Technology and Its Potential Applications”, Open Science Journal of Electrical and Electronic Engineering (OSJEEE), New York, USA, Volume 5, No. 4, Pages 30 - 43, October, 2018
Basholli, F.,Mema, B.,Hyka, D., Basholli, A.,& Daberdini, A. (2023). Analysis of security challenges in SCADA systems, a technical review on automated real-time systems. Advanced Engineering Days, 8, 18-22
Basholli, F.(2022). Electronic interference and protection from it.5thAdvanced Engineering Days, 74-76
Hyka, D., & Basholli, F. (2023). How secure is our medical data? Is Albania ready for the digitalization of the health care system?. Engineering Applications, 2(3), 235-242