A Comprehensive Review on Encryption based Open Source Cyber Security Tools | IEEE Conference Publication | IEEE Xplore

A Comprehensive Review on Encryption based Open Source Cyber Security Tools


Abstract:

With the worldwide migration of workloads on internet and doud based platforms, maintaining security has become a major bottleneck in business workflows. Open source secu...Show More

Abstract:

With the worldwide migration of workloads on internet and doud based platforms, maintaining security has become a major bottleneck in business workflows. Open source security tools are widely available for maintaining network security, endpoint security, system security etc. However, there exists a gap in adoption of these tools amidst end users. In This work, we have reviewed encryption based open source cybersecurity tools for a detailed study and comparison under different categories. Numerous open source tools are investigated which can be used by cyber security industries, academia, hackers and business institutions across the world. A comprehensive review of the tools is provided so as to guide anyone who wants to explore encryption based tools in today’s rapidly evolving digital world.
Date of Conference: 07-09 October 2021
Date Added to IEEE Xplore: 18 November 2021
ISBN Information:

ISSN Information:

Conference Location: Solan, India
References is not available for this document.

I. Introduction

In the last decade, the focus of IT businesses has shifted towards cybersecurity - thereby making it one of the foundations for computational service delivery and providing security. Despite having a good cybersecurity infrastructure and personnel training; cyberattacks and threat vectors have evolved at an unprecedented rate [1]. In 2019, 21 million passwords and 770 million email addresses were exposed from the MEGA cloud service which was later named “Collectionl” as nearly 1 TB of critical data was leaked. Half a billion Facebook user records, 100 million user records of JustDial in India, personal medical data of 1 million users in New Zealand, 3 million customer details from a banking firm UniCredit in Italy were exposed by various online cyberattacks [2].

Select All
1.
Verodin reveals top trends that, pp. 10, 2020.
2.
M. Müller, "Cyber Security Report 2019", Die Aktiengesellschaft, vol. 64, no. 19, pp. r283-r284, 2019.
3.
ENISA Threat Landscape 2014, no. January 2019, 2015.
4.
E. T. Landscape, Main incidents in the EU and worldwide, no. January 2019, 2020.
5.
A. Konakalla and B. Veeranki, "Evolution of Security Attacks and Security Technology", Ijcsmc, vol. 2, no. 11, pp. 270-276, 2013.
6.
G. Knight, Encrypt data using VeraCrypt, 2017.
7.
M. Bursać, R. Vulović and M. Milosavljević, Comparative Analysis of the Open Source Tools Intended for Data Encryption.
8.
D. Anton and E. Simion, "Linux Unified Key Setup (LUKS)- The Good the Bad the Ugly", In 2018 10th International Conference on Electronics Computers and Artificial Intelligence (ECAI), pp. 1-6, 2018, June.
9.
C. Tan, L. Zhang and L. Bao, "A Deep Exploration of BitLocker Encryption and Security Analysis", In 2020 IEEE 20th International Conference on Communication Technology (ICCT), pp. 1070-1074, 2020, October.
10.
A. Skendzic and B. Kovacic, "Open source system OpenVPN in a function of Virtual Private Network", In IOP Conf Ser: Mater Sci Eng, vol. 200, no. 1, pp. 012065, 2017, May.
11.
M. Rodriguez, "HTTPS everywhere: Industry trends and the need for encryption", Serials Review, vol. 44, no. 2, pp. 131-137, 2018.
12.
W. Puech and J. M. Rodrigues, An Autonomous Encrypto-Data Hiding Method for Images Safe Transfer.
13.
D. Budiyanto and P. A. W. Putro, Comparison of Implementation Tiny Encryption Algorithm (TEA) and Advanced Encryption Standard (AES), November 2018.
14.
M. Z. Sabir and M. Yousaf, "Design and Implementation of an End-to-End Web based Trusted Email System", Procedia Computer Science, vol. 141, pp. 231-238, 2018.
15.
N. Kobeissi, "An Analysis of the ProtonMail Cryptographic Architecture", IACR Cryptol. ePrint Arch, 2018.
16.
J. Lee, R. Choi, S. Kim and K. Kim, "Security analysis of end-to-end encryption in Telegram", In Simposio en Criptografia Seguridad Informatica, 2017, January, [online] Available: https://bit.ly/36aX3TK.
17.
H. Zhang, J. Hong and J. Hu, "Analysis of encryption mechanism in KeePass Password Safe 2.30", In 2016 10th IEEE International Conference on Anti-counterfeiting Security and Identification (ASID), pp. 43-46, 2016, September.

Contact IEEE to Subscribe

References

References is not available for this document.