fatma A B D A L L A mabrouk | Qassim University (original) (raw)
Uploads
Papers by fatma A B D A L L A mabrouk
Expansion of electronic transaction raised the need for more confidentiality and data protection ... more Expansion of electronic transaction raised the need for more confidentiality and data protection against cybercrime. Cybercrime is defined as a criminal activity that targets internet users. Cybercriminals who commit cybercrime usually aim to make money through this action, but they could also tend to damage computers for reasons other than profit. Cybercriminals could be individuals or organizations. Some cybercriminals are highly technically skilled, well organized, and use advanced techniques. Information technology security specialists have reported a significant increase in cybercrime since early 2001. Cybercrime is expanding because the information technology has become a fundamental part of people's lives. Expansion of cybercrime raised the need t o Cybersecurity and information security. Cybersecurity is defined as the practice of protecting information and data from outside sources on the Internet. Information security is defined as the protection of information and information systems from unauthorized use, assess, modification or removal. In this paper, statistics of Cybercrime has been analyzed from 2016 to the First Half of 2020, beside a summarization of cybersecurity and information security, projecting the difference between cybersecurity and knowledge of security.
Throughout thousand ages the need for secure communication and private conversation has led to th... more Throughout thousand ages the need for secure communication and private conversation has led to the invention of Cryptography. The word Cryptography is combination of the Greek words (kryptó), which means "hidden"; and (graphein), which means "writing", it is the act of having secure communication in the presence of third party called adversary. On the other hand Steganography is to conceal a secret message or image within another message and to extract this secret message only at its destination, the word steganography combines the Greek words (steganos), which means "concealed", and (graphein) which means "writing". While cryptography is the protection of a message contents alone, steganography is concerned with concealing the contents of a secret message, so steganography improves cryptography by hiding an encrypted message so that no one will suspect its existence. The main goal of steganography is to communicate securely in a completely undetectable manner and to avoid drawing suspicion to the transmission of a hidden data. It is not to keep others from knowing the hidden information, but it is to keep others from thinking that the information even exists. Thousands of years ago cryptography began by the application of codes and ciphers to protect secret messages, by the beginning of 20th century the invention of complex machines, such as the Enigma rotor machine, have provided more sophisticated ways of encryption; and subsequently introduction of computer systems has increased the efficiency and complexity of encryption. Nowadays modern digital Steganography became more sophisticated than the cryptography, allowing a user to hide large amounts of information within image or audio files. These forms of steganography are often used in conjunction with cryptography so that the information is doubly protected; first it is encrypted and then hidden so an adversary has to find the information first and then decrypt it. Researches are still underway to develop this technology and use it to protect the information in all fields. This paper is a trial to know and understand the Steganography as a technology and to make a comparison between cryptography and steganography.
Throughout thousand ages the need for secure communication and private conversation has led to th... more Throughout thousand ages the need for secure communication and private conversation has led to the invention of Cryptography. The word Cryptography is combination of the Greek words (kryptó), which means "hidden"; and (graphein), which means "writing", it is the act of having secure communication in the presence of third party called adversary. On the other hand Steganography is to conceal a secret message or image within another message and to extract this secret message only at its destination, the word steganography combines the Greek words (steganos), which means "concealed", and (graphein) which means "writing". While cryptography is the protection of a message contents alone, steganography is concerned with concealing the contents of a secret message, so steganography improves cryptography by hiding an encrypted message so that no one will suspect its existence. The main goal of steganography is to communicate securely in a completely undetectable manner and to avoid drawing suspicion to the transmission of a hidden data. It is not to keep others from knowing the hidden information, but it is to keep others from thinking that the information even exists. Thousands of years ago cryptography began by the application of codes and ciphers to protect secret messages, by the beginning of 20th century the invention of complex machines, such as the Enigma rotor machine, have provided more sophisticated ways of encryption; and subsequently introduction of computer systems has increased the efficiency and complexity of encryption. Nowadays modern digital Steganography became more sophisticated than the cryptography, allowing a user to hide large amounts of information within image or audio files. These forms of steganography are often used in conjunction with cryptography so that the information is doubly protected; first it is encrypted and then hidden so an adversary has to find the information first and then decrypt it. Researches are still underway to develop this technology and use it to protect the information in all fields. This paper is a trial to know and understand the Steganography as a technology and to make a comparison between cryptography and steganography.
Simulating biological systems is a huge assignment in the PC framework exceptionally in a data se... more Simulating biological systems is a huge assignment in the PC framework exceptionally in a data security. It expects to build the secure system and utilize proficient algorithms, data structures, perception and specific devices with the objective of biological modeling of computer systems. It includes the utilization of biological simulations of computer systems, including cell subsystems, to analyze the complex connections of these cellular processes. They are incorporated into the purported called artificial intelligence. [14]. Biomimicry (vital virtualization) is the term given to Observers and dissect the critical systems of animal or plant to find solutions to the complex problems facing us as human beings across the tradition of the ways in which these systems to overcome similar problems faced in natural resources. This paper presents the model for biological systems on the computer system and how they can solve the problems with the optimization results.
Expansion of electronic transaction raised the need for more confidentiality and data protection ... more Expansion of electronic transaction raised the need for more confidentiality and data protection against cybercrime.
IJCSN - International Journal of Computer Science and Network, 2020
Expansion of electronic transaction raised the need for more confidentiality and data protection ... more Expansion of electronic transaction raised the need for more confidentiality and data protection against cybercrime. Cybercrime is defined as a criminal activity that targets internet users. Cybercriminals who commit cybercrime usually aim to make money through this action, but they could also tend to damage computers for reasons other than profit. Cybercriminals could be individuals or organizations. Some cybercriminals are highly technically skilled, well organized, and use advanced techniques. Information technology security specialists have reported a significant increase in cybercrime since early 2001. Cybercrime is expanding because the information technology has become a fundamental part of people's lives. Expansion of cybercrime raised the need t o Cybersecurity and information security. Cybersecurity is defined as the practice of protecting information and data from outside sources on the Internet. Information security is defined as the protection of information and information systems from unauthorized use, assess, modification or removal. In this paper, statistics of Cybercrime has been analyzed from 2016 to the First Half of 2020, beside a summarization of cybersecurity and information security, projecting the difference between cybersecurity and knowledge of security.
academic science , 2017
Simulating biological systems is a huge assignment in the PC framework exceptionally in a data se... more Simulating biological systems is a huge assignment in the PC framework exceptionally in a data security. It expects to build the secure system and utilize proficient algorithms, data structures, perception and specific devices with the objective of biological modeling of computer systems. It includes the utilization of biological simulations of computer systems, including cell subsystems, to analyze the complex connections of these cellular processes. They are incorporated into the purported called artificial intelligence. [14]. Biomimicry (vital virtualization) is the term given to Observers and dissect the critical systems of animal or plant to find solutions to the complex problems facing us as human beings across the tradition of the ways in which these systems to overcome similar problems faced in natural resources. This paper presents the model for biological systems on the computer system and how they can solve the problems with the optimization results.
Throughout thousand ages the need for secure communication and private conversation has led to th... more Throughout thousand ages the need for secure communication and private conversation has led to the invention of Cryptography. The word Cryptography is combination of the Greek words (kryptó), which means "hidden"; and (graphein), which means "writing", it is the act of having secure communication in the presence of third party called adversary. On the other hand Steganography is to conceal a secret message or image within another message and to extract this secret message only at its destination, the word steganography combines the Greek words (steganos), which means "concealed", and (graphein) which means "writing". While cryptography is the protection of a message contents alone, steganography is concerned with concealing the contents of a secret message, so steganography improves cryptography by hiding an encrypted message so that no one will suspect its existence. The main goal of steganography is to communicate securely in a completely undetectable manner and to avoid drawing suspicion to the transmission of a hidden data. It is not to keep others from knowing the hidden information, but it is to keep others from thinking that the information even exists. Thousands of years ago cryptography began by the application of codes and ciphers to protect secret messages, by the beginning of 20th century the invention of complex machines, such as the Enigma rotor machine, have provided more sophisticated ways of encryption; and subsequently introduction of computer systems has increased the efficiency and complexity of encryption. Nowadays modern digital Steganography became more sophisticated than the cryptography, allowing a user to hide large amounts of information within image or audio files. These forms of steganography are often used in conjunction with cryptography so that the information is doubly protected; first it is encrypted and then hidden so an adversary has to find the information first and then decrypt it. Researches are still underway to develop this technology and use it to protect the information in all fields. This paper is a trial to know and understand the Steganography as a technology and to make a comparison between cryptography and steganography.
With the rapid technological developments, the world needed to be more accurate and speedy decisi... more With the rapid technological developments, the world needed to be more accurate and speedy decision making and in reducing errors as much as possible. This paper discusses a transudate genetic algorithm as one of the technical tools that feature natural technique and efficiency in completing and putting many solutions for issues concerning technological development,it is a technique based on mimicking natural evolution similar to the chains of chromosomes. The important feature of the genetic algorithm is its adaptive nature, which makes it less demanding to figure out the equation for genetics.The idea of genetic algorithms lies in the generation of some solutions for the problem randomly, then scan these solutions and compare them with some of the standard solutions set by the designer algorithm, and only the best solutions will remain. This paper is a trial to know and understand the algorithm technology and genetic studies and its implemented applications.
With the rapid technological developments, the world needed to be more accurate and speedy decisi... more With the rapid technological developments, the world needed to be more accurate and speedy decision making and in reducing errors as much as possible. This paper discusses a transudate genetic algorithm as one of the technical tools that feature natural technique and efficiency in completing and putting many solutions for issues concerning technological development,it is a technique based on mimicking natural evolution similar to the chains of chromosomes. The important feature of the genetic algorithm is its adaptive nature, which makes it less demanding to figure out the equation for genetics.The idea of genetic algorithms lies in the generation of some solutions for the problem randomly, then scan these solutions and compare them with some of the standard solutions set by the designer algorithm, and only the best solutions will remain. This paper is a trial to know and understand the algorithm technology and genetic studies and its implemented applications.
Expansion of electronic transaction raised the need for more confidentiality and data protection ... more Expansion of electronic transaction raised the need for more confidentiality and data protection against cybercrime. Cybercrime is defined as a criminal activity that targets internet users. Cybercriminals who commit cybercrime usually aim to make money through this action, but they could also tend to damage computers for reasons other than profit. Cybercriminals could be individuals or organizations. Some cybercriminals are highly technically skilled, well organized, and use advanced techniques. Information technology security specialists have reported a significant increase in cybercrime since early 2001. Cybercrime is expanding because the information technology has become a fundamental part of people's lives. Expansion of cybercrime raised the need t o Cybersecurity and information security. Cybersecurity is defined as the practice of protecting information and data from outside sources on the Internet. Information security is defined as the protection of information and information systems from unauthorized use, assess, modification or removal. In this paper, statistics of Cybercrime has been analyzed from 2016 to the First Half of 2020, beside a summarization of cybersecurity and information security, projecting the difference between cybersecurity and knowledge of security.
Throughout thousand ages the need for secure communication and private conversation has led to th... more Throughout thousand ages the need for secure communication and private conversation has led to the invention of Cryptography. The word Cryptography is combination of the Greek words (kryptó), which means "hidden"; and (graphein), which means "writing", it is the act of having secure communication in the presence of third party called adversary. On the other hand Steganography is to conceal a secret message or image within another message and to extract this secret message only at its destination, the word steganography combines the Greek words (steganos), which means "concealed", and (graphein) which means "writing". While cryptography is the protection of a message contents alone, steganography is concerned with concealing the contents of a secret message, so steganography improves cryptography by hiding an encrypted message so that no one will suspect its existence. The main goal of steganography is to communicate securely in a completely undetectable manner and to avoid drawing suspicion to the transmission of a hidden data. It is not to keep others from knowing the hidden information, but it is to keep others from thinking that the information even exists. Thousands of years ago cryptography began by the application of codes and ciphers to protect secret messages, by the beginning of 20th century the invention of complex machines, such as the Enigma rotor machine, have provided more sophisticated ways of encryption; and subsequently introduction of computer systems has increased the efficiency and complexity of encryption. Nowadays modern digital Steganography became more sophisticated than the cryptography, allowing a user to hide large amounts of information within image or audio files. These forms of steganography are often used in conjunction with cryptography so that the information is doubly protected; first it is encrypted and then hidden so an adversary has to find the information first and then decrypt it. Researches are still underway to develop this technology and use it to protect the information in all fields. This paper is a trial to know and understand the Steganography as a technology and to make a comparison between cryptography and steganography.
Throughout thousand ages the need for secure communication and private conversation has led to th... more Throughout thousand ages the need for secure communication and private conversation has led to the invention of Cryptography. The word Cryptography is combination of the Greek words (kryptó), which means "hidden"; and (graphein), which means "writing", it is the act of having secure communication in the presence of third party called adversary. On the other hand Steganography is to conceal a secret message or image within another message and to extract this secret message only at its destination, the word steganography combines the Greek words (steganos), which means "concealed", and (graphein) which means "writing". While cryptography is the protection of a message contents alone, steganography is concerned with concealing the contents of a secret message, so steganography improves cryptography by hiding an encrypted message so that no one will suspect its existence. The main goal of steganography is to communicate securely in a completely undetectable manner and to avoid drawing suspicion to the transmission of a hidden data. It is not to keep others from knowing the hidden information, but it is to keep others from thinking that the information even exists. Thousands of years ago cryptography began by the application of codes and ciphers to protect secret messages, by the beginning of 20th century the invention of complex machines, such as the Enigma rotor machine, have provided more sophisticated ways of encryption; and subsequently introduction of computer systems has increased the efficiency and complexity of encryption. Nowadays modern digital Steganography became more sophisticated than the cryptography, allowing a user to hide large amounts of information within image or audio files. These forms of steganography are often used in conjunction with cryptography so that the information is doubly protected; first it is encrypted and then hidden so an adversary has to find the information first and then decrypt it. Researches are still underway to develop this technology and use it to protect the information in all fields. This paper is a trial to know and understand the Steganography as a technology and to make a comparison between cryptography and steganography.
Simulating biological systems is a huge assignment in the PC framework exceptionally in a data se... more Simulating biological systems is a huge assignment in the PC framework exceptionally in a data security. It expects to build the secure system and utilize proficient algorithms, data structures, perception and specific devices with the objective of biological modeling of computer systems. It includes the utilization of biological simulations of computer systems, including cell subsystems, to analyze the complex connections of these cellular processes. They are incorporated into the purported called artificial intelligence. [14]. Biomimicry (vital virtualization) is the term given to Observers and dissect the critical systems of animal or plant to find solutions to the complex problems facing us as human beings across the tradition of the ways in which these systems to overcome similar problems faced in natural resources. This paper presents the model for biological systems on the computer system and how they can solve the problems with the optimization results.
Expansion of electronic transaction raised the need for more confidentiality and data protection ... more Expansion of electronic transaction raised the need for more confidentiality and data protection against cybercrime.
IJCSN - International Journal of Computer Science and Network, 2020
Expansion of electronic transaction raised the need for more confidentiality and data protection ... more Expansion of electronic transaction raised the need for more confidentiality and data protection against cybercrime. Cybercrime is defined as a criminal activity that targets internet users. Cybercriminals who commit cybercrime usually aim to make money through this action, but they could also tend to damage computers for reasons other than profit. Cybercriminals could be individuals or organizations. Some cybercriminals are highly technically skilled, well organized, and use advanced techniques. Information technology security specialists have reported a significant increase in cybercrime since early 2001. Cybercrime is expanding because the information technology has become a fundamental part of people's lives. Expansion of cybercrime raised the need t o Cybersecurity and information security. Cybersecurity is defined as the practice of protecting information and data from outside sources on the Internet. Information security is defined as the protection of information and information systems from unauthorized use, assess, modification or removal. In this paper, statistics of Cybercrime has been analyzed from 2016 to the First Half of 2020, beside a summarization of cybersecurity and information security, projecting the difference between cybersecurity and knowledge of security.
academic science , 2017
Simulating biological systems is a huge assignment in the PC framework exceptionally in a data se... more Simulating biological systems is a huge assignment in the PC framework exceptionally in a data security. It expects to build the secure system and utilize proficient algorithms, data structures, perception and specific devices with the objective of biological modeling of computer systems. It includes the utilization of biological simulations of computer systems, including cell subsystems, to analyze the complex connections of these cellular processes. They are incorporated into the purported called artificial intelligence. [14]. Biomimicry (vital virtualization) is the term given to Observers and dissect the critical systems of animal or plant to find solutions to the complex problems facing us as human beings across the tradition of the ways in which these systems to overcome similar problems faced in natural resources. This paper presents the model for biological systems on the computer system and how they can solve the problems with the optimization results.
Throughout thousand ages the need for secure communication and private conversation has led to th... more Throughout thousand ages the need for secure communication and private conversation has led to the invention of Cryptography. The word Cryptography is combination of the Greek words (kryptó), which means "hidden"; and (graphein), which means "writing", it is the act of having secure communication in the presence of third party called adversary. On the other hand Steganography is to conceal a secret message or image within another message and to extract this secret message only at its destination, the word steganography combines the Greek words (steganos), which means "concealed", and (graphein) which means "writing". While cryptography is the protection of a message contents alone, steganography is concerned with concealing the contents of a secret message, so steganography improves cryptography by hiding an encrypted message so that no one will suspect its existence. The main goal of steganography is to communicate securely in a completely undetectable manner and to avoid drawing suspicion to the transmission of a hidden data. It is not to keep others from knowing the hidden information, but it is to keep others from thinking that the information even exists. Thousands of years ago cryptography began by the application of codes and ciphers to protect secret messages, by the beginning of 20th century the invention of complex machines, such as the Enigma rotor machine, have provided more sophisticated ways of encryption; and subsequently introduction of computer systems has increased the efficiency and complexity of encryption. Nowadays modern digital Steganography became more sophisticated than the cryptography, allowing a user to hide large amounts of information within image or audio files. These forms of steganography are often used in conjunction with cryptography so that the information is doubly protected; first it is encrypted and then hidden so an adversary has to find the information first and then decrypt it. Researches are still underway to develop this technology and use it to protect the information in all fields. This paper is a trial to know and understand the Steganography as a technology and to make a comparison between cryptography and steganography.
With the rapid technological developments, the world needed to be more accurate and speedy decisi... more With the rapid technological developments, the world needed to be more accurate and speedy decision making and in reducing errors as much as possible. This paper discusses a transudate genetic algorithm as one of the technical tools that feature natural technique and efficiency in completing and putting many solutions for issues concerning technological development,it is a technique based on mimicking natural evolution similar to the chains of chromosomes. The important feature of the genetic algorithm is its adaptive nature, which makes it less demanding to figure out the equation for genetics.The idea of genetic algorithms lies in the generation of some solutions for the problem randomly, then scan these solutions and compare them with some of the standard solutions set by the designer algorithm, and only the best solutions will remain. This paper is a trial to know and understand the algorithm technology and genetic studies and its implemented applications.
With the rapid technological developments, the world needed to be more accurate and speedy decisi... more With the rapid technological developments, the world needed to be more accurate and speedy decision making and in reducing errors as much as possible. This paper discusses a transudate genetic algorithm as one of the technical tools that feature natural technique and efficiency in completing and putting many solutions for issues concerning technological development,it is a technique based on mimicking natural evolution similar to the chains of chromosomes. The important feature of the genetic algorithm is its adaptive nature, which makes it less demanding to figure out the equation for genetics.The idea of genetic algorithms lies in the generation of some solutions for the problem randomly, then scan these solutions and compare them with some of the standard solutions set by the designer algorithm, and only the best solutions will remain. This paper is a trial to know and understand the algorithm technology and genetic studies and its implemented applications.