  <?xml version="1.0"?>
<journal>
 <journal_metadata>
  <full_title>Journal of Cybersecurity and Information Management</full_title>
  <abbrev_title>JCIM</abbrev_title>
  <issn media_type="print">2690-6775</issn>
  <issn media_type="electronic">2769-7851</issn>
  <doi_data>
   <doi>10.54216/JCIM</doi>
   <resource>https://www.americaspg.com/journals/show/3180</resource>
  </doi_data>
 </journal_metadata>
 <journal_issue>
  <publication_date media_type="print">
   <year>2019</year>
  </publication_date>
  <publication_date media_type="online">
   <year>2019</year>
  </publication_date>
 </journal_issue>
 <journal_article publication_type="full_text">
  <titles>
   <title>Comprehensive Analysis of Internet Security Protocols and Standards for Enhanced Network Safety</title>
  </titles>
  <contributors>
   <organization sequence="first" contributor_role="author">Professor, Department of Information Technology, Institute of Technology &amp; Science, Ghaziabad, Uttar Pradesh, India</organization>
   <person_name sequence="first" contributor_role="author">
    <given_name>Piyush</given_name>
    <surname>Piyush</surname>
   </person_name>
   <organization sequence="first" contributor_role="author">Associate Professor (Research) Department of Computer Science and Engineering, Koneru Lakshmaiah Education Foundation, K L Deamed to be University, Vaddeswaram, Guntur - 522302, Andhra Pradesh, India </organization>
   <person_name sequence="additional" contributor_role="author">
    <given_name>Prashant Kumar</given_name>
    <surname>Shukla</surname>
   </person_name>
   <organization sequence="first" contributor_role="author">Professor and Head Department of AIML and IPR Cell Nitte Meenakshi Institute of Technology Bengaluru, Karnataka, India</organization>
   <person_name sequence="additional" contributor_role="author">
    <given_name>Piyush Kumar</given_name>
    <surname>Pareek</surname>
   </person_name>
   <organization sequence="first" contributor_role="author">Assistant Professor, Department of IT, Vivekananada Institute of Professional Studies, Delhi, India</organization>
   <person_name sequence="additional" contributor_role="author">
    <given_name>Cosmena</given_name>
    <surname>Mahapatra</surname>
   </person_name>
   <organization sequence="first" contributor_role="author">Associate Professor, Department of Information Technology, ABES ENGINEERING COLLEGE, Ghaziabad, Uttar Pradesh, India</organization>
   <person_name sequence="additional" contributor_role="author">
    <given_name>Puneet Kumar</given_name>
    <surname>Aggarwal</surname>
   </person_name>
   <organization sequence="first" contributor_role="author">Associate Professor &amp; Associate Dean (Research), Faculty of Engineering and Technology, Poornima University, Jaipur, Rajasthan, India</organization>
   <person_name sequence="additional" contributor_role="author">
    <given_name>Udit</given_name>
    <surname>Mamodiya</surname>
   </person_name>
  </contributors>
  <jats:abstract xml:lang="en">
   <jats:p>This research examines all internet security protocols. To develop and test a novel network protection method. The research's comprehensive methodology includes a detailed review of existing security measures, a critical investigation of the recommended method's components, and a vital analysis of its effectiveness. AES is critical to the recommended code efficiency technique. The ablation investigation highlights AES's importance for fast encryption. Multi-factor authentication (MFA) protects and boosts authentication scores, making login simpler. The article defines &quot;fast intrusion reaction time&quot; and provides examples of how quickly the proposed technique may handle security incidents. The ablation research highlights the impact on this swift response, underscoring the importance of proactive intrusion detection and response. The study's findings will help firms secure their websites. The recommended solution is superior to others and protects against emerging internet dangers. The report recommends quick response systems, multi-layered identities, and security upgrades. This research teaches us online safety principles. It also provides a standard for network protection firms. Many studies have proved that the recommended strategy works, making it a significant aspect of current defensive efforts to address global concerns.</jats:p>
  </jats:abstract>
  <publication_date media_type="print">
   <year>2025</year>
  </publication_date>
  <publication_date media_type="online">
   <year>2025</year>
  </publication_date>
  <pages>
   <first_page>332</first_page>
   <last_page>341</last_page>
  </pages>
  <doi_data>
   <doi>10.54216/JCIM.150126</doi>
   <resource>https://www.americaspg.com/articleinfo/2/show/3180</resource>
  </doi_data>
 </journal_article>
</journal>
