全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

Enable Excel-Based Basic Cybersecurity Features for End Users by Using Python-Excel Integration

DOI: 10.4236/jsea.2024.176029, PP. 522-529

Keywords: Python, End-User Approach, Excel, Excel Add-In, Cybersecurity, URL Check, API, Virustotal API, Encryption, Decryption, Vigenère Cipher, Python-Excel Integration

Full-Text   Cite this paper   Add to My Lib

Abstract:

In the digital age, the global character of the Internet has significantly improved our daily lives by providing access to large amounts of knowledge and allowing for seamless connections. However, this enormously interconnected world is not without its risks. Malicious URLs are a powerful menace, masquerading as legitimate links while holding the intent to hack computer systems or steal sensitive personal information. As the sophistication and frequency of cyberattacks increase, identifying bad URLs has emerged as a critical aspect of cybersecurity. This study presents a new approach that enables the average end-user to check URL safety using Microsoft Excel. Using the powerful VirusTotal API for URL inspections, this study creates an Excel add-in that integrates Python and Excel to deliver a seamless, user-friendly interface. Furthermore, the study improves Excel’s capabilities by allowing users to encrypt and decrypt text communications directly in the spreadsheet. Users may easily encrypt their conversations by simply typing a key and the required text into predefined cells, enhancing their personal cybersecurity with a layer of cryptographic secrecy. This strategy democratizes access to advanced cybersecurity solutions, making attentive digital integrity a feature rather than a daunting burden.

References

[1]  Manjusha, K.N.S.B.V. and Jaya Kumari, D. (2024) Detecting Phishing Links Analysis Using Machine Learning. International Journal for Multidisciplinary Research, 6.
https://doi.org/10.36948/ijfmr.2024.v06i03.18870
[2]  Koca, M., Avci, İ. and Al-Hayani, M.A.S. (2023) Classification of Malicious Urls Using Naive Bayes and Genetic Algorithm. Sakarya University Journal of Computer and Information Sciences, 6, 80-90.
https://doi.org/10.35377/saucis...1273536
[3]  Barricelli, B.R., Cassano, F., Fogli, D. and Piccinno, A. (2019) End-User Development, End-User Programming and End-User Software Engineering: A Systematic Mapping Study. Journal of Systems and Software, 149, 101-137.
https://doi.org/10.1016/j.jss.2018.11.041
[4]  Thompson, K. (1984) Reflections on Trusting Trust. Communications of the ACM, 27, 761-763.
https://doi.org/10.1145/358198.358210
[5]  Huang, Y., Tsai, C., Lin, T., Huang, S., Lee, D.T. and Kuo, S. (2005) A Testing Framework for Web Application Security Assessment. Computer Networks, 48, 739-761.
https://doi.org/10.1016/j.comnet.2005.01.003
[6]  Rubinstein-Salzedo, S. (2018). The Vigenère Cipher. In: Rubinstein-Salzedo, S., Ed., Cryptography, Springer Undergraduate Mathematics Series. Springer, Cham, 41-54.
https://doi.org/10.1007/978-3-319-94818-8_5
[7]  Choo, E., Nabeel, M., Kim, D., De Silva, R., Yu, T. and Khalil, I. (2023) A Large Scale Study and Classification of Virustotal Reports on Phishing and Malware Urls. Proceedings of the ACM on Measurement and Analysis of Computing Systems, 7, 1-26.
https://doi.org/10.1145/3626790
[8]  Shalaginov, A., Franke, K. and Huang, X. (2016) Malware Beaconing Detection by Mining Large-Scale DNS Logs for Targeted Attack Identification. International Journal of Computer and Information Engineering, 10, 743-755.
https://publications.waset.org/10004242/pdf
[9]  Lieberman, H., Paternò, F., Klann, M. and Wulf, V. (2006) End-User Development: An Emerging Paradigm. In: Lieberman, H., Paternò, F., Wulf, V., Eds., End User Development, Human-Computer Interaction Series, vol. 9, Springer, Dordrecht, 1-8.
https://doi.org/10.1007/1-4020-5386-x_1
[10]  Ko, A.J., Abraham, R., Beckwith, L., Blackwell, A., Burnett, M., Erwig, M., et al. (2011) The State of the Art in End-User Software Engineering. ACM Computing Surveys, 43, 1-44.
https://doi.org/10.1145/1922649.1922658
[11]  Fischer, G., Fogli, D. and Piccinno, A. (2017) Revisiting and Broadening the Meta-Design Framework for End-User Development. In: Paternò, F. and Wulf, V., Eds., New Perspectives in End-User Development, Springer, Cham, 61-97.
https://doi.org/10.1007/978-3-319-60291-2_4
[12]  Rak, M., Ficco, M., Battista, E., Casola, V. and Mazzocca, N. (2014) Developing Secure Cloud Applications. Scalable Computing: Practice and Experience, 15.
https://doi.org/10.12694/scpe.v15i1.965
[13]  Ghumatkar, R.S. and Date, A. (2023) Software Development Life Cycle (SDLC). International Journal for Research in Applied Science and Engineering Technology, 11, 1162-1165.
https://doi.org/10.22214/ijraset.2023.56554

Full-Text

comments powered by Disqus

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133

WeChat 1538708413