2022 Volume 2
- Security and Privacy in Metaverse Issues, Challenges, and Future Opportunities
- By: Aarushi Sethi
- Cite as: Sethi A., (2022) Security and Privacy in Metaverse, Cyber Security Insights Magazine, Insights2Techinfo, Volume 2, pp. 1-4. 2022.
- Cyber Security, Laws & Policy: A Study
- By: Anupama Mishra and Avadhesh Kumar Gupta
- Cite as: Mishra A., Gupta A.K. (2022) Cyber Security, Laws & Policy: A Study, Cyber Security Insights Magazine, Insights2Techinfo, Volume 2, pp. 5-8. 2022.
- Cyber Security Model to Secure Data Transmission using Cloud Cryptography
- By : Harshit Dubey, Sudhakar Kumar, Anureet Chhabra
- Cite as: Dubey H., Kumar S., Chhabra A., Cyber Security Model to Secure Data Transmission using Cloud Cryptography,Cyber Security Insights Magazine, Insights2Techinfo, Volume 2, pp. 9-12. 2022.
- Analyzing of secure authorization technique of Webservice using Authorization tool : OAuth 2.0
- By: Sahil, Akash Sharma
- Cite as: Sahil, Sharma A., Analyzing of secure authorization technique of Webservice using Authorization tool : OAuth 2.0, Cyber Security Insights Magazine, Insights2Techinfo, Volume 2, pp. 12-17. 2022.
- Natural Language Processing Applications in Cyber Security
- By: Ravinder Saini, Sunil Kumar Singh
- Cite as: Saini R., Singh S.K., Natural Language Processing Applications in Cyber Security, Cyber Security Insights Magazine, Insights2Techinfo, Volume 2, pp. 18-20. 2022.
pp. 1-4
pp. 5-8
pp. 9-12
pp. 13-17
pp. 18-20