Future Research on Internal Hacking would be
interdisciplinary research. It starts from human
behavior and psychology, continues with
supercomputing and Intragalactic Networks, and
reaches programming and investment banking.
Research teams around the globe work on various
subjects in the area like:
1.
Frequency hopping analogy to Internet
security and telephony.
2.
Personalized unique non-de-posit security.
3.
Non-money trading security.
4.
Personal (even URL) recorder devices for
trusted programmers and traders.
5.
Counter and Counter-Counter Counter-
Counter actions for holistic security.
8 Conclusion
Cross-border Interbank Payment System (CIPS)
and one of its counterparts, the Quantum Financial
System (QFS), will dominate investment banking
in the following years, with security for all new
services being a significant threat. Our preliminary
research found that executable computer code
redefinition for security reasons is still possible
after all these years of complex computing. We
reject software domination on network security and
retract mixed-mode security, intermixing tangible
and software elements. We also propose that every
central installation adopt customized
noncommercial applications.
USA radio amateurs association with 1 million
members shows us the road to diversified personal
security, although the SDR (Software defined
Radio) is not a complete solution to avoid internal
fraud. The missing link is not Thales Defense
Systems Corporation’s ”SafeNet eToken.” Possibly
Thales from Miletus, the Greek philosopher, could
explain himself in the famous phrase: ”If there is a
change, there must be something that changes, yet
does not change.”
References:
[1]
Ashfaq Ahmed, Atta Muhammad, Muhammad
Owais, Kifayat Ullah, and Muhammad Usman.
Social, political, and psychological impacts of
covid-19 digitalization of the currency and
emerging world order. WSEAS Transactions on
Environment and Development, 2202.
[2]
Mona A Ahmed and Abdel-Badeeh M Salem.
Intelligent technique for human Authentication
using a fusion of finger and dorsal hand veins.
WSEAS Transactions on Information Science and
Applications, 18:91–101, 2021.
[3]
Mohammad Arfizurrahmanl, Mohammad
Shahadat Hossain Ahmad, Mohammad Shahadat
Hossain, Mohammad Ahsanul Haque, and Karl
Andersson. Real-time non-intrusive driver fatigue
detection system using belief rule-based expert
system. J. Internet Serv. Inf. Security., 11(4):44–60,
2021.
[4]
Joe Biden. Fact sheet: President Biden to sign an
executive order on ensuring responsible
development of the digital assets-the white house,
2022.
[5]
Georgia Broni, Anastasia Metsiou, and Athanasios
Zisopoulos. Economic life and its evolution: The
case of Aristotle. In XV. International Balkan and
Near Eastern Congress Series on Economics,
Business and Management, Plovdiv/Bulgaria May,
pages 29–30, 2021.
[6]
MN Cankara and ME Cek. Covert digital
communication using random frequency hopped
spread-spectrum. In 2021 13th International
Conference on Electrical and Electronics
Engineering (ELECO), pages 490–493. IEEE,
2021.
[7]
Sabrina Corpino, Lorenzo Gagliardini, and Galib
Alili. Software-defined Radio-based
communication subsystem for c3 ground control
station. 2021.
[8]
Dipankar Dasgupta, Abhijit Kumar Nag, Denise
Ferebee, Sanjib Kumar Saha, Kul Prasad Subedi,
Arunava Roy, Alvaro Madero, Abel Sanchez, and
John R Williams. Design and implementation of a
negative authentication system. International
Journal of Information Security, 18(1):23–48,
2019.
[9]
M Durairaj and A Manimaran. A study on securing
cloud environment from DDoS attack to preserve
data availability. the international journal of
science and technology, 3(2):63, 2015.
[10]
Saugata Dutta and Kavita Saini. Securing data: A
study on different transform domain techniques.
WSEAS Transactions on Systems and Control,
16:110–120, 2021.
[11]
N Ch SN Iyengar, Arindam Banerjee, and
Gopinath Ganapathy. A fuzzy logic-based defense
mechanism against distributed denial of service
attacks in the cloud computing environment.
International journal of communication networks
and Information security, 6(3):233, 2014.
[12]
Han Jipeng and Lichen Zhihang. A constraint and
object-oriented fifth generation programming
language and its compiler and runtime system, 2022.
[13]
S. Kovalyov. Order send-trade functions-mql4
reference, https://docs.mql4.com/trading/ordersend.
[14]
Apostle Luke. BIBLE 4:30. King James.
[15]
Satoshi Matsuoka. Fugaku and a64fx: the first
exascale supercomputer and its innovative arm
CPU. In 2021 Symposium on VLSI Circuits, pages
1–3. IEEE, 2021.
[16]
Jonathan C McDowell. The low earth orbit satellite
population and impacts of the SpaceX StarLink
constellation. The Astrophysical Journal Letters,
892(2): L36, 2020.
WSEAS TRANSACTIONS on BUSINESS and ECONOMICS
DOI: 10.37394/23207.2023.20.26
A. D. Zisopoulos, K. G. Panitsidis,
G. K. Broni, N. D. Kartalis