Now a days with the rapid development of multimedia technologies, research on safety and security are becoming more important. Multimedia data are generated and transmitted through the communication channels and the wireless media. The efficiencies of encryption based on different existing algorithms are not up to the satisfactory limit. Hence researchers are...
Showing posts with label Computer Security. Show all posts
Showing posts with label Computer Security. Show all posts
Saturday, 28 August 2021
Wednesday, 25 August 2021
Security Issues Related to Biometrics
Team IJTSRD
August 25, 2021
0
With the growth of technology their grows threat to our data which is just secured by passwords so to make it more secure biometrics came into existence. As biometric systems are adopted and accepted for security purpose for various information and security systems. Hence it is immune to attacks. This paper deals with the security of biometric details of individuals....
Saturday, 7 August 2021
Privacy and Security on Social Media
Team IJTSRD
August 07, 2021
0
Social Media have become a integral part of human life. With over 1 billion users connected through online network. Social media is an online platform where we can share our information like text, photos, thoughts, videos, messages and many people have started to share seminar, workshop in Education domain and online survey, marketing, and targeting customers...
Tuesday, 29 June 2021
Image Cryptography using RSA Algorithm
Team IJTSRD
June 29, 2021
0
Cryptography is a process used for sending information in secret way. Goal of this process is to provide protection for information but in different way. In this paper our motive to represent a new method for protection that is generated by combination of RSA and 2 bit rotation mechanism of cryptography. There are many algorithms exist for this process. For...
Friday, 25 June 2021
Personal Health Record over Encrypted Data Using Cloud Service
Team IJTSRD
June 25, 2021
0
CBPHR Cloud Based Personal Health Record systems are used for storage and management of patient records. Cloud computing provides real time health care data in a convenient and cost effective manner. Due to the lack of visibility in cloud platform, the users are always concerned with data privacy and security. This is the main obstacle in widely adopting CBPHR...
Sunday, 20 June 2021
Organised Crime in the Digital Age
Team IJTSRD
June 20, 2021
0
Digital technology has transformed organizational life. Developments in communications, and in information storage and retrieval, to name just two areas, have greatly enhanced the efficiency with which legitimate organizations operate. Unfortunately, the benefits of digital technology are not lost on criminal organizations, which exploit digital technology to...
Impact of Message Size on Least Significant Bit and Chaotic Logistic Mapping Steganographic Technique
Team IJTSRD
June 20, 2021
0
Steganography is the technique of hiding information in other objects. Although many carrier objects can be used, digital images are the most popular because of their usage over the internet. For this purpose, many types of images steganographic techniques have been invented. Each of them has both pros and cons. It depends on the complexity, hiding capacity,...
Saturday, 19 June 2021
Systematic Review Automation in Cyber Security
Team IJTSRD
June 19, 2021
0
Many aspects of cyber security are carried by automation systems and service applications. The initial steps of cyber chain mainly focus on different automation tools with almost same task objective. Automation operations are carried only after detail study on particular task pre engagement phase , the tool is going to perform, measurement of dataset handling...
College Managmenet System
Team IJTSRD
June 19, 2021
0
College Management System will work on college area network. Under this system it will include all the departments which comes a particular college. This system will also help the college Admin. Admin will able to get all the information regarding any faculty members on particular day and time. Admin panel will also able to edit the login display panel of teachers,...
Thursday, 17 June 2021
A Survey on Data Encryption and Decryption Models
Team IJTSRD
June 17, 2021
0
Data storage paradigm in cloud computing brings many hard problems on the security. The critical nature of the cloud computing is to incorporate big number of statistics through networks, the need is even more critical. Security should be imposed on information by using encryption techniques to achieve secured statistics storage and access. In this approach...
Saturday, 10 April 2021
Keystroke with Data Leakage Detection for Secure Email Authentication
Team IJTSRD
April 10, 2021
0
The user authentication is the important factor which allows the user to use a particular software. The user authentication is also performed in various kinds of social media such as Gmail, Facebook, etc. The traditional password system is used for user authentication. But this technique has a lot of demerits in it. Some hackers also cracks the password and...
Thursday, 18 February 2021
An Assessment of Intrusion Detection System IDS and Data Set Overview A Comprehensive Review of Recent Works
Team IJTSRD
February 18, 2021
0
Millions of people worldwide have Internet access today. Intrusion detection technology is a modern wave of information technology monitoring devices to deter malicious activities. Malware development malicious software is a vital problem when it comes to designing intrusion detection systems IDS . The key challenge is to recognize unknown and hidden malware,...
Sunday, 14 February 2021
A Comparative Research on SSL VPN and IPSec VPN
Team IJTSRD
February 14, 2021
0
With information technology growth, VPN In a variety of areas, technology has been commonly used. Here we are. Two forms of VPN are studied in paper IPSec and SSL VPN Detailed implementation, protection, scalability and breadth Other dimensions, benefits and contrasts are analyzed and compared. Inappropriate collection comparison is summarized, finally, Standard...
Monday, 1 February 2021
Vulnerability Assessment and Penetration Testing using Webkill
Team IJTSRD
February 01, 2021
0
Data is more defenseless than any time in recent memory and each mechanical development raises new security danger that requires new security arrangements. web kill tool is directed to assess the security of an IT framework by securely uncovering its weaknesses. The performance of an application is measured based on the number of false negatives and false positives....
Thursday, 17 December 2020
XSS Finder for Web Application Security
Team IJTSRD
December 17, 2020
0
With progress in processing and innovative headways, online applications are currently omnipresent on the Internet. Nonetheless, these web applications are getting inclined to weaknesses which have prompted robbery of classified data, information misfortune, and disavowal of information access over the span of data transmission. Cross site scripting XSS is a...
Thursday, 10 December 2020
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving Trends on Modern Technologies
Team IJTSRD
December 10, 2020
0
In today’s dynamic and technologically advanced world, the Internet has become one of the most innovative and rapidly growing technologies. With its rise, it has also become vulnerable to a significant increase in occurrences of cyber attacks, with detrimental effects. Typically, these cyber attacks are targeted at accessing, manipulating, or damaging confidential...
Saturday, 21 November 2020
Risk Management
Team IJTSRD
November 21, 2020
0
Risk management is one of the main concepts that have been used by most of the organisations to protect their assets and data. One such example would be INSURANCE. Most of the insurance like Life, Health, and Auto etc have been formulated to help people protect their assets against losses. Risk management has also extended its roots to physical devices, such...
Monday, 16 November 2020
Comparative Analysis of Digital Forensic Extraction Tools
Team IJTSRD
November 16, 2020
0
Computer forensics Process collecting and examining information present in digital format in civil, criminal, or administrative proceedings for use as evidence. It is also a from data recovery, which involves the recovery of data from a system that has been erased by error or lost during a server crash. Tools are designed to extract evidence from the computer...
Saturday, 14 November 2020
Empowering Distributed Storage Inspecting with Undeniable Re Appropriating of Key Updates
Team IJTSRD
November 14, 2020
0
Key exposure in distributed computing has consistently been a noteworthy issue for cautiously digital obstruction in numerous security applications. As recently, how to rock bottom with the key exposure distress in the distributed storage revising has been anticipated and thought of. To tackle the contest, introduced clarification all necessitate the patron...
Thursday, 12 November 2020
Imagically Image Forensic Tool
Team IJTSRD
November 12, 2020
0
With the increasing popularity of social media such as Instagram, Facebook and twitter, fake news with fake pictures which look real has become a huge problem. Digital Photos are more integral to communication than ever before, but the wide availability of easy image editing and manipulation tools at the disposable of anyone with a computer, or a smartphone,...