A Method of Warning About Unauthorized Access to a Room
Downloads
This paper is based on the study of cybercrime in the context of a world based on technology. Whether it is financial losses, data leaks or mental trauma resulting from harassment in the online environment, cybercrime is part of the reality of the modern world, where the multiple advantages of using the most advanced technologies bring with them disadvantages that cannot be ignored. We will treat the types of cyberattacks, but also the methods by which we can protect ourselves as much as possible. An example of increasing the degree of security in terms of physical access to a room containing sensitive information, achieved at low cost, is also provided. A "smart" entrance mat is used to provide access, a coconut fiber mat into which Linqstat (Velostat) tactile force sensors and the data processing electronics provided by them have been inserted.
Downloads
E. N. Kaur, "Introduction of Cyber Crime and its Types," International Research Journal of computer Science (IRJCS), 2018.
V. Kavitha, "Cyber Security issues and challenges - a review," International Journal of Computer Science and Mobile Computing, vol. 8, no. 11, 2019.
M.B. Owiso, Cyber Crime, https://www.academia.edu/12741661/Cyber_Crime.
M. Lakshmi Prasanthi, Tata A.S.K. Ishwarya, "Cyber Crime: Prevention & Detection," International Journal of Advanced Research in Computer and Communication Engineering, vol. 4, no. 3, March 2015.
E.S. Pilli, "Forensic analysis of e-mail address spoofing," in 2012 Third International Conference on Computer and Communication Technology, 2014.
Spam still first choice for cyber crime, according to study. https://www.information-age.com/spam-still-first-choice-cyber-crime-according-study-123473840/#.
A.L. Ishabakaki, "Defamation in social media (cyber defamation) legal perspective in Tanzania," Victory Attorneys & Consultants.
http://cs.sru.edu/~mullins/cpsc100book/module05_SoftwareAndAdmin/module05-04_softwareAndAdmin.html. [Online].
I.T.D. Sector, "Understanding cybercrime: phenomena, challenges and legal response," Sept. 2012.
Cybercrime. European Commission. https://ec.europa.eu/home-affairs/what-we-do/policies/cybercrime_en.
Check Point, Check Point Research: Cyber Attacks Increased 50% Year over Year, 2022. https://blog.checkpoint.com/security/check-point-research-cyber-attacks-increased-50-year-over-year/.
P. Institute, "Cost of Cyber Crime Study: United States," HP Enterprise Security, 2013.
C.O. Opris, I.B. Bacis, L. Milea, A. Vasile, “Implementation of a Resistive Pressure Sensor Made With "Linqstat" for Automotive”. ISSE 2023, Timișoara, Romania.
S. Mcleod, Maslow’s Hierarchy of Needs, Simply Psychology, http://www.simplypsychology.org/maslow.html. Accessed Apr. 20, 2023.
Z. Gul, R. Terkesli, "Crime of the Millennium: Cyber Crime," Humanity & Social Sciences Journal 7, 2012.