International Journal of Trend in Scientific Research and Development: Computer Security

IJTSRD is a leading Open Access, Peer-Reviewed International Journal which provides rapid publication of your research articles and aims to promote the theory and practice along with knowledge sharing between researchers, developers, engineers, students, and practitioners working in and around the world in many areas. For any further information, feel free to write us on editor.ijtsrd@gmail.com

Showing posts with label Computer Security. Show all posts
Showing posts with label Computer Security. Show all posts

Saturday 28 August 2021

Data Security by AES Advanced Encryption Standard

August 28, 2021 0
Data Security by AES Advanced Encryption Standard

Now a days with the rapid development of multimedia technologies, research on safety and security are becoming more important. Multimedia data are generated and transmitted through the communication channels and the wireless media. The efficiencies of encryption based on different existing algorithms are not up to the satisfactory limit. Hence researchers are trying to modify the existing algorithm or even develop new algorithms that help to increase security with a little encryption time. Here in this paper, we have furnished a new technology to modify the AES algorithm which gives more security with a little encryption time and which can be used to encrypt using 128 bit key. Theoretical analysis on the proposed algorithm with the existing reveals the novelty of our work. Here we have proposed a technique to randomize the key and hidden the key data into an encrypted digital image using the basics concept of cryptography and also using the concept of digital watermarking, the concept of key hide has also been encrypted. We have also proposed a new technique to reposition the pixels to break the correlation between them. So, the proposed scheme offers a more secure and cost effective mechanism for encryption. Next on the AES criteria list good performance. Widespread market adoption will require reasonably good performance on a variety of platforms, ranging from easy tocrack smart cards to the largest servers. Good algorithm performance includes speed for the encryption and decryption process as well as the key schedule. 

by Prateek Goyal | Ms. Shalini Bhadola | Ms. Kirti Bhatia "Data Security by AES (Advanced Encryption Standard)" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-5 , August 2021, 

URL: https://www.ijtsrd.com/papers/ijtsrd45073.pdf 

Paper URL: https://www.ijtsrd.com/computer-science/computer-security/45073/data-security-by-aes-advanced-encryption-standard/prateek-goyal


callforpaperphysics, physicsjournal

Wednesday 25 August 2021

Security Issues Related to Biometrics

August 25, 2021 0
Security Issues Related to Biometrics

With the growth of technology their grows threat to our data which is just secured by passwords so to make it more secure biometrics came into existence. As biometric systems are adopted and accepted for security purpose for various information and security systems. Hence it is immune to attacks. This paper deals with the security of biometric details of individuals. In this paper we will be discussing about biometrics and its types and the threats and security issues which is not talked about usually. The different technologies evolved and had contributed to biometrics in long run and their effects. 

by Sushmita Raulo | Saurabh Gawade "Security Issues Related to Biometrics" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-5 , August 2021, 

URL: https://www.ijtsrd.com/papers/ijtsrd44951.pdf 

Paper URL: https://www.ijtsrd.com/computer-science/computer-security/44951/security-issues-related-to-biometrics/sushmita-raulo


openaccessjournalofengineering, engineeringjournal, paperpublicationforengineering

Saturday 7 August 2021

Privacy and Security on Social Media

August 07, 2021 0
Privacy and Security on Social Media

Social Media have become a integral part of human life. With over 1 billion users connected through online network. Social media is an online platform where we can share our information like text, photos, thoughts, videos, messages and many people have started to share seminar, workshop in Education domain and online survey, marketing, and targeting customers in Business domain. There are various social media platforms like Facebook, Twitter, WhatsApp, Instagram etc. The main purpose of these sites is to allow people to share activities, interests, real life connections. Using social media we can communicate with the people in a world in a powerful and fun way. While enjoying on the social media platform it requires a great knowledge of privacy and security. The Internet is the safe place for only those people who are aware about the risk and the security, and can protect themselves from any fraud. Social media is a sometimes good because it allows you to share what actually we want to share, but it can also be used for negative purpose and in both the cases we are responsible for our security. In this paper we will describe about the privacy and security issues associated with social media. 

Rachana Khandagale | Manali Gamre "Privacy and Security on Social Media" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-5 , August 2021, 

URL: https://www.ijtsrd.com/papers/ijtsrd43821.pdf

Paper URL: https://www.ijtsrd.com/computer-science/computer-security/43821/privacy-and-security-on-social-media/rachana-khandagale


callforpapersocialscience, ugcapprovedjournalsforsocialscience, socialsciencejournal

Tuesday 29 June 2021

Image Cryptography using RSA Algorithm

June 29, 2021 0
Image Cryptography using RSA Algorithm

Cryptography is a process used for sending information in secret way. Goal of this process is to provide protection for information but in different way. In this paper our motive to represent a new method for protection that is generated by combination of RSA and 2 bit rotation mechanism of cryptography. There are many algorithms exist for this process. For cryptography there are algorithms like RSA, IDEA, AES, and DES but here we are using only one algorithm from these that is RSA which is enough to implement combined process using 2 bit rotation. The encrypted image is used as input for network for further implementation.RSA encrypt image with 1 bit rotation. In 1 bit rotation only 1 bit is shifted and at decrypt side shifted bit are reversed. But to make it more secure we are going to perform 2 bit rotation due to which it is more secure as compared to existing algorithm. After applying the 2 bit rotation we perform the permutation of that image that will give us encrypted image. 


by Shivam Kumar | Dr. Ganesh D "Image Cryptography using RSA Algorithm" 

Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-4 , June 2021, 

URL: https://www.ijtsrd.compapers/ijtsrd42408.pdf 

Paper URL: https://www.ijtsrd.comcomputer-science/computer-security/42408/image-cryptography-using-rsa-algorithm/shivam-kumar

callforpapermathematics, mathematicsjournal, ugcapprovedjournalsinmathemetics

Friday 25 June 2021

Personal Health Record over Encrypted Data Using Cloud Service

June 25, 2021 0
Personal Health Record over Encrypted Data Using Cloud Service

CBPHR Cloud Based Personal Health Record systems are used for storage and management of patient records. Cloud computing provides real time health care data in a convenient and cost effective manner. Due to the lack of visibility in cloud platform, the users are always concerned with data privacy and security. This is the main obstacle in widely adopting CBPHR systems in health care sector. The paper is discussing a cloud based patient health record management scheme which is highly secured. In this approach, indexes are encrypted under different symmetric keys and also the encrypted data indexes from various data providers can be merge by cloud without knowing the index content. It also provides efficient and privacy preserving query processing using a single data query submitted by the data user. Encrypted data will be processed by cloud from all related data providers without knowing its query content. 


by Dinesh Soni | Dr. Lakshmi JVN "Personal Health Record over Encrypted Data Using Cloud Service" 

Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-4 , June 2021, 

URL: https://www.ijtsrd.compapers/ijtsrd41230.pdf 

Paper URL: https://www.ijtsrd.comcomputer-science/computer-security/41230/personal-health-record-over-encrypted-data-using-cloud-service/dinesh-soni

callforpaperpharmacy, pharmacyjournal, internationalpeerreviewedjournal

Sunday 20 June 2021

Organised Crime in the Digital Age

June 20, 2021 0
Organised Crime in the Digital Age

Digital technology has transformed organizational life. Developments in communications, and in information storage and retrieval, to name just two areas, have greatly enhanced the efficiency with which legitimate organizations operate. Unfortunately, the benefits of digital technology are not lost on criminal organizations, which exploit digital technology to enhance the efficiency and effectiveness of their own operations. This paper will discuss the organized criminal exploitation of digital technology, by looking at a number of illustrative cases from Asia and around the world. It will discuss the various types of “conventional” organized crime that can be facilitated by digital technology, as well as terrorism, which itself can be regarded as a special kind of organized criminal activity. One fundamental question that the paper will seek to address is whether the activities of Asian organized crime have become substantively different as a result of technology, or whether traditional organized criminal activities in Asia are merely being conducted on a more efficient and effective basis. The paper will note the transnational nature of much organized criminal activity, and will discuss mechanisms for the control of organized crime in the digital age. 


by Dr. S. Krishnan | Mr Harsh Pratap | Ms Sakshi Gupta "Organised Crime in the Digital Age" 

Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-4 , June 2021, 

URL: https://www.ijtsrd.compapers/ijtsrd41185.pdf 

Paper URL: https://www.ijtsrd.comcomputer-science/computer-security/41185/organised-crime-in-the-digital-age/dr-s-krishnan

callforpaperlifesciences, lifesciencesjournal, researchpapers

Impact of Message Size on Least Significant Bit and Chaotic Logistic Mapping Steganographic Technique

June 20, 2021 0
Impact of Message Size on Least Significant Bit and Chaotic Logistic Mapping Steganographic Technique

Steganography is the technique of hiding information in other objects. Although many carrier objects can be used, digital images are the most popular because of their usage over the internet. For this purpose, many types of images steganographic techniques have been invented. Each of them has both pros and cons. It depends on the complexity, hiding capacity, security, and so on. In our research, we studied the two most popular techniques of image steganography, least significant bit LSB and chaotic logistic mapping to find the similarities, dissimilarities, and many other factors. In this paper, we presented a detailed comparison of the LSB and chaotic logistic mapping based image steganography for various carrier images and messages. 

by Tokey Ahmmed | Ipshita Tasnim Raha | Faizah Safwat | Nakib Aman Turzo "Impact of Message Size on Least Significant Bit and Chaotic Logistic Mapping Steganographic Technique" 

Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-4 , June 2021, 

URL: https://www.ijtsrd.compapers/ijtsrd42494.pdf 

Paper URL: https://www.ijtsrd.comcomputer-science/computer-security/42494/impact-of-message-size-on-least-significant-bit-and-chaotic-logistic-mapping-steganographic-technique/tokey-ahmmed


internationaljournalofmanagement
, callforpapermanagement, managementjournal 

Saturday 19 June 2021

Systematic Review Automation in Cyber Security

June 19, 2021 0
Systematic Review Automation in Cyber Security

Many aspects of cyber security are carried by automation systems and service applications. The initial steps of cyber chain mainly focus on different automation tools with almost same task objective. Automation operations are carried only after detail study on particular task pre engagement phase , the tool is going to perform, measurement of dataset handling of tool produced output. The algorithm is going to make use of after comparing the existing tools efficiency, the throughput time, output format for reusable input and mainly the resource’s consumption. In this paper we are going to study the existing methodology in application and system pen testing, automation tool’s efficiency over growing technology and their behaviour study on unintended platform assignment. 


by Nitin | Dr. Lakshmi J. V. N "Systematic Review: Automation in Cyber Security" 

Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-4 , June 2021, 

URL: https://www.ijtsrd.compapers/ijtsrd41315.pdf 

Paper URL: https://www.ijtsrd.comcomputer-science/computer-security/41315/systematic-review-automation-in-cyber-security/nitin

callforpaperpapersconference, highimpactfactor, manuscriptpublication

College Managmenet System

June 19, 2021 0
College Managmenet System

College Management System will work on college area network. Under this system it will include all the departments which comes a particular college. This system will also help the college Admin. Admin will able to get all the information regarding any faculty members on particular day and time. Admin panel will also able to edit the login display panel of teachers, staff members, students etc. Admin can add person, delete person, can give special permission. Admin can schedule classes, their lectures time. Teachers can get information of any students under their particular class. Teachers can also make query by using grade, percentage, can see list of students who comes under the category of attendance shortage and many more under this one proof. Student section will also include learning section, so that students can prepare for their exam. 


by Alvi H. A | Barate P. R | Siddhanath K. R | Prof. Suryawanshi A. P "College Managmenet System" 

Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-4 , June 2021, 

URL: https://www.ijtsrd.compapers/ijtsrd42508.pdf 

Paper URL: https://www.ijtsrd.comcomputer-science/computer-security/42508/college-managmenet-system/alvi-h-a

callforpaperchemistry, chemistryjournal, openaccessjournalofchemistry 

Thursday 17 June 2021

A Survey on Data Encryption and Decryption Models

June 17, 2021 0
A Survey on Data Encryption and Decryption Models

 Data storage paradigm in cloud computing brings many hard problems on the security. The critical nature of the cloud computing is to incorporate big number of statistics through networks, the need is even more critical. Security should be imposed on information by using encryption techniques to achieve secured statistics storage and access. In this approach some essential protection services along with key technology, encryption and decryption in cloud.The reason of this paper work is to make a survey of currently current gadgets available inside the market to save encryption keys, how the hacker intrudes into the tool, what are the assaults in the back of robbery of the keys, how are we able to shop encryption keys securely. Under the category of storage devices, USBs Universal Serial Bus , PDAs Personal Digital Assistant and Smart Cards have been tested. Under the class of assaults on devices, attacks from hackers, attacks from malicious code Trojan Horses, viruses, worms , attacks from PDAs, attacks from Smart Cards, dictionary attacks and brute pressure assaults had been studied. Based on those necessities weve got mentioned and analyzed a proposed machine to store the encryption keys securely to avoid those assaults.With the speedy development of cloud storage, records safety in garage receives extremely good interest and turns into the top difficulty to unfold improvement of cloud carrier. In this the systematical take a look at of protection researches inside the storage structures. We first present the design criteria which can be used to assess a comfortable garage device and summarize the extensively adopted key technologies. Then, we in addition look at the safety research in cloud storage and finish the new demanding situations inside the cloud environment. Finally, we provide a detailed evaluation among the decided on relaxed storage structures and draw the connection among the important thing technology and the design criteria.Importance of cloud is due to its unlimited deliver of offerings which includes server, storage of data and what no longer something as a service Xaas is viable. As long as customers enjoy its benefits need to take care of the security troubles raisesbecause of its infrastructure that is distributive and as characteristic of the armed provider to the purchaser provider extend their hands to cozy theinformation.This paper specially concentrating in what number of methodprovider will provide protection and how the mechanism works and which is maximum suitable for every and every kind of provider and value involved for the security provision.Nowadays, the quotes of malicious statistics theft and records destruction are alarming. Governments, organizations and other businesses have lost loads of money and lots of others have closed down because of the sports of dubious hackers and attackers. As records is the existence twine of each organization, there is the need to remotely and securely save the statistics generated day by day through these corporations so as to permit them recover speedy within the event of attach and hack. Cloud storage is wanted here for the far off information storage. For many institutions, statistics security is certainly one of their essential difficulty whilst sending their documents into the cloud. They fear about their documents being visible or maybe compromised through malicious and dubious people because that’s what happened within the past. User debts had been hacked, cloud garage structures failed, files and private statistics have been uncovered. So how are you going to efficiently save you that from happening even if your account gets hacked or something occurs in your cloud garage issuer. Data encryption techniques are required to shield the integrity of the stored facts. In the beyond, many corporations felt comfy allowing the cloud providers to control all their facts, believing that protection risks may be managed thru contracts, controls and audits. Over time it has come to be apparent, but, that cloud companies cannot honor such commitments whilst responding to government requests for records. In this paper, I will attention on cloud storage vendors, cloud protection demanding situations, encryption methodologies. 


by Saif Ulla Shariff | M Ganeshan | Mariam Fatima "A Survey on Data Encryption and Decryption Models" 

Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-4 , June 2021, 

URL: https://www.ijtsrd.compapers/ijtsrd42364.pdf 

Paper URL: https://www.ijtsrd.comcomputer-science/computer-security/42364/a-survey-on-data-encryption-and-decryption-models/saif-ulla-shariff

internationaljournalsofcomputerscience, callforpapercomputerscience, ugcapprovedjournalsforcomputerscience 

Saturday 10 April 2021

Keystroke with Data Leakage Detection for Secure Email Authentication

April 10, 2021 0
Keystroke with Data Leakage Detection for Secure Email Authentication

The user authentication is the important factor which allows the user to use a particular software. The user authentication is also performed in various kinds of social media such as Gmail, Facebook, etc. The traditional password system is used for user authentication. But this technique has a lot of demerits in it. Some hackers also cracks the password and perform some unwanted actions in the user authentication. In order to remove the difficulties in this traditional password technique and to provide additional security in user authentication, the keystroke with data leakage detection for secure email authentication is designed. This system uses Keystroke Dynamics. This system consists of five different types of modules such as Email Framework Construction, User Enrolment, Keystroke Authentication, Data Sharing and Data Leakage Detection. This system gets the details of the user such as name and email. Then it allows to enter the password. This password is stored along with the keystroke dynamics data such as the typing speed of the password and the threshold value. Both the Keystroke dynamics data and the original password are stored in the database. When the user wants to log into the system, the user has to give the password according to the keystroke dynamics data. Then only, the user can log into the system. Hence this system can also be used in Cyber security and provide security and privacy for the user data. 


by Mrs. V. Hemalatha | V. Boominathan | K. Harithas | P. Raj Kumar | S. Vijaya Bharathi "Keystroke with Data Leakage Detection for Secure Email Authentication" 

Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-3 , April 2021, 

URL: https://www.ijtsrd.com/papers/ijtsrd39969.pdf 

Paper URL: https://www.ijtsrd.com/computer-science/computer-security/39969/keystroke-with-data-leakage-detection-for-secure-email-authentication/mrs-v-hemalatha

callforpapermathematics, mathematicsjournal, ugcapprovedjournalsinmathemetics

Thursday 18 February 2021

An Assessment of Intrusion Detection System IDS and Data Set Overview A Comprehensive Review of Recent Works

February 18, 2021 0
An Assessment of Intrusion Detection System IDS and Data Set Overview A Comprehensive Review of Recent Works

Millions of people worldwide have Internet access today. Intrusion detection technology is a modern wave of information technology monitoring devices to deter malicious activities. Malware development malicious software is a vital problem when it comes to designing intrusion detection systems IDS . The key challenge is to recognize unknown and hidden malware, because malware writers use various evasion techniques to mask information to avoid IDS detection. Malicious attacks have become more sophisticated and Furthermore, threats to security have increased, including a zero day attack on internet users. Through the use of IT in our daily lives, computer security has become critical. Cyber threats are becoming more complex and pose growing challenges when it comes to successful intrusion detection. Failure to prevent invading information, such as data privacy, integrity and availability can undermine the credibility of security services. Specific intrusion detection approaches were proposed in the literature to combat computer security threats. This paper consists of a literature survey of the IDS that uses program algorithms to use specific data collection and forensic techniques in real time. Data mining techniques for cyber research are introduced in support of intrusion detection. 


by Mohammed I. Alghamdi "An Assessment of Intrusion Detection System (IDS) and Data-Set Overview: A Comprehensive Review of Recent Works" 

Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-2 , February 2021, 

URL: https://www.ijtsrd.com/papers/ijtsrd35730.pdf 

Paper Url: https://www.ijtsrd.com/computer-science/computer-security/35730/an-assessment-of-intrusion-detection-system-ids-and-dataset-overview-a-comprehensive-review-of-recent-works/mohammed-i-alghamdi

callforpaperbiologicalscience, biologicalsciencejournal

Sunday 14 February 2021

A Comparative Research on SSL VPN and IPSec VPN

February 14, 2021 0
A Comparative Research on SSL VPN and IPSec VPN

With information technology growth, VPN In a variety of areas, technology has been commonly used. Here we are. Two forms of VPN are studied in paper IPSec and SSL VPN Detailed implementation, protection, scalability and breadth Other dimensions, benefits and contrasts are analyzed and compared. Inappropriate collection comparison is summarized, finally, Standard suggested. Standard proposed. 


by Vaibhav Gahlot "A Comparative Research on SSL VPN and IPSec VPN" 

Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-2 , February 2021, 

URL: https://www.ijtsrd.com/papers/ijtsrd38333.pdf

Paper Url: https://www.ijtsrd.com/computer-science/computer-security/38333/a-comparative-research-on-ssl-vpn-and-ipsec-vpn/vaibhav-gahlot

ugcjournallist, listofugcapprovedjournals, researchpublication

Monday 1 February 2021

Vulnerability Assessment and Penetration Testing using Webkill

February 01, 2021 0
Vulnerability Assessment and Penetration Testing using Webkill

Data is more defenseless than any time in recent memory and each mechanical development raises new security danger that requires new security arrangements. web kill tool is directed to assess the security of an IT framework by securely uncovering its weaknesses. The performance of an application is measured based on the number of false negatives and false positives. Testing technique that is highly automated, which covers several boundary cases by means of invalid data as the application input to make sure that exploitable vulnerabilities are absent. 


BY Deepesh Seth | Ms. N. Priya "Vulnerability Assessment and Penetration Testing using Webkill" 

Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-1 , December 2020, 

URL: https://www.ijtsrd.com/papers/ijtsrd37919.pdf

Paper URL : https://www.ijtsrd.com/computer-science/computer-security/37919/vulnerability-assessment-and-penetration-testing-using-webkill/deepesh-seth

internationaljournalofscience, openaccessjournalofscience, ugcapprovedjournalsforscience 

Thursday 17 December 2020

XSS Finder for Web Application Security

December 17, 2020 0
XSS Finder for Web Application Security

With progress in processing and innovative headways, online applications are currently omnipresent on the Internet. Nonetheless, these web applications are getting inclined to weaknesses which have prompted robbery of classified data, information misfortune, and disavowal of information access over the span of data transmission. Cross site scripting XSS is a type of web security assault which includes the infusion of malevolent codes into web applications from untrusted sources. Curiously, late examination concentrates on the web application security focus center around assault avoidance and components for secure coding ongoing strategies for those assaults dont just create high bogus positives yet additionally have little contemplations for the clients who frequently are the casualties of vindictive assaults. Persuaded by this issue, this paper portrays an shrewd apparatus for distinguishing cross site scripting blemishes in web applications. This paper depicts the technique executed dependent on fluffy rationale to distinguish exemplary XSS shortcomings and to give a few outcomes on experimentations. Our location structure recorded 15 improvement in precision and 0.01 decrease in the bogus positive rate which is significantly lower than that found in the current work by Koli et al. Our methodology likewise fills in as a dynamic device for the clients. 


by Kishore M "XSS Finder for Web Application Security" 

Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-1 , December 2020, 

URL: https://www.ijtsrd.com/papers/ijtsrd38084.pdf

Paper URL : https://www.ijtsrd.com/computer-science/computer-security/38084/xss-finder-for-web-application-security/kishore-m

peerreviewedinternationaljournal, paperpublicationforstudent

Thursday 10 December 2020

An Analytical Study on Attacks and Threats in Cyber Security and its Evolving Trends on Modern Technologies

December 10, 2020 0
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving Trends on Modern Technologies

In today’s dynamic and technologically advanced world, the Internet has become one of the most innovative and rapidly growing technologies. With its rise, it has also become vulnerable to a significant increase in occurrences of cyber attacks, with detrimental effects. Typically, these cyber attacks are targeted at accessing, manipulating, or damaging confidential data, extracting users money, or extorting an organization’s or user’s private information. Sensitive information, whether intellectual property, financial data, confidential information, or other forms of private data are exposed to unauthorized access or disclosure, which can have adverse consequences. Protecting data has become one of the greatest obstacles today as cyber attacks are constantly escalating. Along with the growth of internet services and the advancement of information technology, the importance of cybersecurity is crucial. Cybersecurity aims to ensure that the security interests of the company and users assets are protected and preserved against relevant cyber threats in the digital world. The data and confidentiality of computing assets pertaining to the network of an organization are protected by cybersecurity. This paper mainly focuses on threats and issues in cybersecurity facing modern technologies. It also focuses on the latest cybersecurity strategies and developments that are transforming the face of cybersecurity. 


by Omkar Veerendra Nikhal "An Analytical Study on Attacks and Threats in Cyber Security and its Evolving Trends on Modern Technologies" 

Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-1 , December 2020, 

URL: https://www.ijtsrd.com/papers/ijtsrd38195.pdf

Paper URL : https://www.ijtsrd.com/computer-science/computer-security/38195/an-analytical-study-on-attacks-and-threats-in-cyber-security-and-its-evolving-trends-on-modern-technologies/omkar-veerendra-nikhal

callforpaperlanguages, languagesjournal, bestjournal

Saturday 21 November 2020

Risk Management

November 21, 2020 0
Risk Management

Risk management is one of the main concepts that have been used by most of the organisations to protect their assets and data. One such example would be INSURANCE. Most of the insurance like Life, Health, and Auto etc have been formulated to help people protect their assets against losses. Risk management has also extended its roots to physical devices, such as locks and doors to protect homes and automobiles, password protected vaults to protect money and jewels, police, fire, security to protect against other physical risks. 


BY Dr. C. Umarani | Shriniketh D "Risk Management" 

Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-1 , December 2020, 

URL: https://www.ijtsrd.com/papers/ijtsrd37916.pdf

Paper URL : https://www.ijtsrd.com/computer-science/computer-security/37916/risk-management/dr-c-umarani

peerreviewedinternationaljournal, callforpaperinugcapprovedjournals, paperpublicationforstudent

Monday 16 November 2020

Comparative Analysis of Digital Forensic Extraction Tools

November 16, 2020 0
Comparative Analysis of Digital Forensic Extraction Tools

Computer forensics Process collecting and examining information present in digital format in civil, criminal, or administrative proceedings for use as evidence. It is also a from data recovery, which involves the recovery of data from a system that has been erased by error or lost during a server crash. Tools are designed to extract evidence from the computer and it is the role of the investigator to check whether the crime or policy violation has been committed by the suspect. Investigators use various kinds of tools based on the area or the kind of information which is lost such as digital data, network compromise, cyber breach, web data, email and many more. 


by Varun H M | Dr. Uma Rani Chellapandy | Srividya B G "Comparative Analysis of Digital Forensic Extraction Tools" 

Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-1 , December 2020, 

URL: https://www.ijtsrd.com/papers/ijtsrd37980.pdf

Paper URL : https://www.ijtsrd.com/computer-science/computer-security/37980/comparative-analysis-of-digital-forensic-extraction-tools/varun-h-m

internationaljournalsinengineering, callforpaperengineering, ugcapprovedengineeringjournal 

Saturday 14 November 2020

Empowering Distributed Storage Inspecting with Undeniable Re Appropriating of Key Updates

November 14, 2020 0
Empowering Distributed Storage Inspecting with Undeniable Re Appropriating of Key Updates

Key exposure in distributed computing has consistently been a noteworthy issue for cautiously digital obstruction in numerous security applications. As recently, how to rock bottom with the key exposure distress in the distributed storage revising has been anticipated and thought of. To tackle the contest, introduced clarification all necessitate the patron to reconsider his mystery keys in each time frame, which may typically get new nearby, burden to the client, especially those with constrained control assets, for instance, portable telephones. In this paper, we center around how to variety the key updates as clear as plausible for the customer whats more, propose another example called distributed storage examining with indisputable re appropriating of key updates. In this model, key updates can be securely re appropriated to some appropriate assembly, and hence the key update distress on the client will be kept insignificant. In specific, we inspiration the interloper examiner TPA in many existing public examining plans, allowed it to play the function of appropriate assembly for our circumstances, and make it accountable for both the dimension scrutinizing and the protected key updates for key exposure opposition. In our plan, TPA just desires to clutch an encoded adaptation of the clients mystery key though doing all these domineering errands for the customer. The client just wishes to download the programmed mystery key from the TPA whereas transferring new records to cloud. Moreover, our plan additionally outfits the client with capacity to further check the validity of the encoded mystery keys given by the TPA. 


BY Anjali G | Dr. M N Nachappa "Empowering Distributed Storage Inspecting with Undeniable Re-Appropriating of Key Updates" 

Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-1 , December 2020, 

URL: https://www.ijtsrd.com/papers/ijtsrd35878.pdf

Paper URL : https://www.ijtsrd.com/computer-science/computer-security/35878/empowering-distributed-storage-inspecting-with-undeniable-reappropriating-of-key-updates/anjali-g

callforpapercommerce, ugcapprovedjournalsincommerce, commercejournal

Thursday 12 November 2020

Imagically Image Forensic Tool

November 12, 2020 0
Imagically Image Forensic Tool

 With the increasing popularity of social media such as Instagram, Facebook and twitter, fake news with fake pictures which look real has become a huge problem. Digital Photos are more integral to communication than ever before, but the wide availability of easy image editing and manipulation tools at the disposable of anyone with a computer, or a smartphone, it makes them a risky proposition when trust is important. The point of this undertaking is to give a thorough idea of the best in class in the territory of Image forensics investigation. In this era to effectively change the data of a picture without leaving any undeniable which achieves viably and precisely the Image tampering discovery task. This strategy has been intended to recognize to decide if the Image is original or altered, without the knowledge on any data about the picture under examination. The tool work by identifying the certain pattern and metadata and other function giving a better result in forensically extraction. 


BY Raj Saundatikar | Dr. Lakshmi J. V. N "Imagically - Image Forensic Tool" 

Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-1 , December 2020, 

URL: https://www.ijtsrd.com/papers/ijtsrd35808.pdf

Paper URL : https://www.ijtsrd.com/computer-science/computer-security/35808/imagically--image-forensic-tool/raj-saundatikar

callforpaperpharmacy, pharmacyjournal, internationalpeerreviewedjournal

Ad