International Journal of Trend in Scientific Research and Development: Computer Security

IJTSRD is a leading Open Access, Peer-Reviewed International Journal which provides rapid publication of your research articles and aims to promote the theory and practice along with knowledge sharing between researchers, developers, engineers, students, and practitioners working in and around the world in many areas. For any further information, feel free to write us on editor.ijtsrd@gmail.com

Showing posts with label Computer Security. Show all posts
Showing posts with label Computer Security. Show all posts

Saturday, 28 August 2021

Data Security by AES Advanced Encryption Standard

August 28, 2021 0
Data Security by AES Advanced Encryption Standard
Now a days with the rapid development of multimedia technologies, research on safety and security are becoming more important. Multimedia data are generated and transmitted through the communication channels and the wireless media. The efficiencies of encryption based on different existing algorithms are not up to the satisfactory limit. Hence researchers are...

Wednesday, 25 August 2021

Security Issues Related to Biometrics

August 25, 2021 0
Security Issues Related to Biometrics
With the growth of technology their grows threat to our data which is just secured by passwords so to make it more secure biometrics came into existence. As biometric systems are adopted and accepted for security purpose for various information and security systems. Hence it is immune to attacks. This paper deals with the security of biometric details of individuals....

Saturday, 7 August 2021

Privacy and Security on Social Media

August 07, 2021 0
Privacy and Security on Social Media
Social Media have become a integral part of human life. With over 1 billion users connected through online network. Social media is an online platform where we can share our information like text, photos, thoughts, videos, messages and many people have started to share seminar, workshop in Education domain and online survey, marketing, and targeting customers...

Tuesday, 29 June 2021

Image Cryptography using RSA Algorithm

June 29, 2021 0
Image Cryptography using RSA Algorithm
Cryptography is a process used for sending information in secret way. Goal of this process is to provide protection for information but in different way. In this paper our motive to represent a new method for protection that is generated by combination of RSA and 2 bit rotation mechanism of cryptography. There are many algorithms exist for this process. For...

Friday, 25 June 2021

Personal Health Record over Encrypted Data Using Cloud Service

June 25, 2021 0
Personal Health Record over Encrypted Data Using Cloud Service
CBPHR Cloud Based Personal Health Record systems are used for storage and management of patient records. Cloud computing provides real time health care data in a convenient and cost effective manner. Due to the lack of visibility in cloud platform, the users are always concerned with data privacy and security. This is the main obstacle in widely adopting CBPHR...

Sunday, 20 June 2021

Organised Crime in the Digital Age

June 20, 2021 0
Organised Crime in the Digital Age
Digital technology has transformed organizational life. Developments in communications, and in information storage and retrieval, to name just two areas, have greatly enhanced the efficiency with which legitimate organizations operate. Unfortunately, the benefits of digital technology are not lost on criminal organizations, which exploit digital technology to...

Impact of Message Size on Least Significant Bit and Chaotic Logistic Mapping Steganographic Technique

June 20, 2021 0
Impact of Message Size on Least Significant Bit and Chaotic Logistic Mapping Steganographic Technique
Steganography is the technique of hiding information in other objects. Although many carrier objects can be used, digital images are the most popular because of their usage over the internet. For this purpose, many types of images steganographic techniques have been invented. Each of them has both pros and cons. It depends on the complexity, hiding capacity,...

Saturday, 19 June 2021

Systematic Review Automation in Cyber Security

June 19, 2021 0
Systematic Review Automation in Cyber Security
Many aspects of cyber security are carried by automation systems and service applications. The initial steps of cyber chain mainly focus on different automation tools with almost same task objective. Automation operations are carried only after detail study on particular task pre engagement phase , the tool is going to perform, measurement of dataset handling...

College Managmenet System

June 19, 2021 0
College Managmenet System
College Management System will work on college area network. Under this system it will include all the departments which comes a particular college. This system will also help the college Admin. Admin will able to get all the information regarding any faculty members on particular day and time. Admin panel will also able to edit the login display panel of teachers,...

Thursday, 17 June 2021

A Survey on Data Encryption and Decryption Models

June 17, 2021 0
A Survey on Data Encryption and Decryption Models
 Data storage paradigm in cloud computing brings many hard problems on the security. The critical nature of the cloud computing is to incorporate big number of statistics through networks, the need is even more critical. Security should be imposed on information by using encryption techniques to achieve secured statistics storage and access. In this approach...

Saturday, 10 April 2021

Keystroke with Data Leakage Detection for Secure Email Authentication

April 10, 2021 0
Keystroke with Data Leakage Detection for Secure Email Authentication
The user authentication is the important factor which allows the user to use a particular software. The user authentication is also performed in various kinds of social media such as Gmail, Facebook, etc. The traditional password system is used for user authentication. But this technique has a lot of demerits in it. Some hackers also cracks the password and...

Thursday, 18 February 2021

An Assessment of Intrusion Detection System IDS and Data Set Overview A Comprehensive Review of Recent Works

February 18, 2021 0
An Assessment of Intrusion Detection System IDS and Data Set Overview A Comprehensive Review of Recent Works
Millions of people worldwide have Internet access today. Intrusion detection technology is a modern wave of information technology monitoring devices to deter malicious activities. Malware development malicious software is a vital problem when it comes to designing intrusion detection systems IDS . The key challenge is to recognize unknown and hidden malware,...

Sunday, 14 February 2021

A Comparative Research on SSL VPN and IPSec VPN

February 14, 2021 0
A Comparative Research on SSL VPN and IPSec VPN
With information technology growth, VPN In a variety of areas, technology has been commonly used. Here we are. Two forms of VPN are studied in paper IPSec and SSL VPN Detailed implementation, protection, scalability and breadth Other dimensions, benefits and contrasts are analyzed and compared. Inappropriate collection comparison is summarized, finally, Standard...

Monday, 1 February 2021

Vulnerability Assessment and Penetration Testing using Webkill

February 01, 2021 0
Vulnerability Assessment and Penetration Testing using Webkill
Data is more defenseless than any time in recent memory and each mechanical development raises new security danger that requires new security arrangements. web kill tool is directed to assess the security of an IT framework by securely uncovering its weaknesses. The performance of an application is measured based on the number of false negatives and false positives....

Thursday, 17 December 2020

XSS Finder for Web Application Security

December 17, 2020 0
XSS Finder for Web Application Security
With progress in processing and innovative headways, online applications are currently omnipresent on the Internet. Nonetheless, these web applications are getting inclined to weaknesses which have prompted robbery of classified data, information misfortune, and disavowal of information access over the span of data transmission. Cross site scripting XSS is a...

Thursday, 10 December 2020

An Analytical Study on Attacks and Threats in Cyber Security and its Evolving Trends on Modern Technologies

December 10, 2020 0
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving Trends on Modern Technologies
In today’s dynamic and technologically advanced world, the Internet has become one of the most innovative and rapidly growing technologies. With its rise, it has also become vulnerable to a significant increase in occurrences of cyber attacks, with detrimental effects. Typically, these cyber attacks are targeted at accessing, manipulating, or damaging confidential...

Saturday, 21 November 2020

Risk Management

November 21, 2020 0
Risk Management
Risk management is one of the main concepts that have been used by most of the organisations to protect their assets and data. One such example would be INSURANCE. Most of the insurance like Life, Health, and Auto etc have been formulated to help people protect their assets against losses. Risk management has also extended its roots to physical devices, such...

Monday, 16 November 2020

Comparative Analysis of Digital Forensic Extraction Tools

November 16, 2020 0
Comparative Analysis of Digital Forensic Extraction Tools
Computer forensics Process collecting and examining information present in digital format in civil, criminal, or administrative proceedings for use as evidence. It is also a from data recovery, which involves the recovery of data from a system that has been erased by error or lost during a server crash. Tools are designed to extract evidence from the computer...

Saturday, 14 November 2020

Empowering Distributed Storage Inspecting with Undeniable Re Appropriating of Key Updates

November 14, 2020 0
Empowering Distributed Storage Inspecting with Undeniable Re Appropriating of Key Updates
Key exposure in distributed computing has consistently been a noteworthy issue for cautiously digital obstruction in numerous security applications. As recently, how to rock bottom with the key exposure distress in the distributed storage revising has been anticipated and thought of. To tackle the contest, introduced clarification all necessitate the patron...

Thursday, 12 November 2020

Imagically Image Forensic Tool

November 12, 2020 0
Imagically Image Forensic Tool
 With the increasing popularity of social media such as Instagram, Facebook and twitter, fake news with fake pictures which look real has become a huge problem. Digital Photos are more integral to communication than ever before, but the wide availability of easy image editing and manipulation tools at the disposable of anyone with a computer, or a smartphone,...

Ad