INTERNATIONAL SCIENTIFIC AND TECHNICAL CONFERENCE
“DIGITAL TECHNOLOGIES: PROBLEMS AND SOLUTIONS OF PRACTICAL
IMPLEMENTATION IN THE SPHERES”
APRIL 27-28, 2023
539
•
Avoid sending personal information through e-Mails.
•
Avoid filling forms that come via e-Mail asking for your personal information and
do not click on links that come via e-Mail.
•
Do not click on the e-Mails that you receive from un trusted
users as clicking itself
may execute some malicious code and spread into your system.
REFERENCES
1. CDAC Noida, “SPECIALISED PROGRAMME
ON REDUCING CYBER CRIME
THROUGH KNOWLEDGE EXCHANGE AND CAPACITY BUILDING” course materials
13.02-24.03, 2023.
2. O. Insu, Y. Lee, H. Lee, K. Lee, and K. Yim, “Study on secure
USB mechanism without
exposure of the authentication information,” in Proceedings of the International Symposium
on Mobile Internet Security (MobiSec),
Jeju Island,
South Korea, October 2017.
3. A.N. Magdum and Y. M. Patil, “A secure data transfer algorithm
for USB mass storage
devices to protect documents,” International Journal of Emerging Engineering Research and
Technology, vol. 2, no. 4, pp. 113–119, 2014.
4. https://blog.pulsarsecurity.com/