Academic Journal of

Information Security

[Abbr: Acd. Jr. AJIS]
English
UA
2016

Effect of Data Breaching on Socio-economic Condition of Countries from Social Networking Sites

by Nitin Sharma

It is an incident in which sensitive, protected or confidential data is imitated, transmitted, viewed, stolen or disclosed or used by an individual unauthorized to do so. Data breach can cause a massive impact on social and economic condition of any country. Drawing upon Cambridge Analytica as a case study, a countries election is the spine of democracy, once it gets jeopardize the very essence of justice and equality gets hampered. The forensic application is helpful in determining whether the incident has occurred or not as well the one who involve in the particular breach. This present review paper focuses on the steps and ideas to prevent data breach and how social networking sites are responsible for data breaching. Keywords: Data Breaching, unauthorized access, Cambridge Analytica

Cryptography: A Way to Secure Network Information

by Aman Sharma, Prakhar Saxena

In information and communication technology, a modern ear of networking and wireless networks has been come in which security is an important factor. Now, the exchange and transmitting of information through the internet and other communication medium is common due to which the vulnerability of the information is increased. To reduce the chance of threatening of data, information security plays a vital role. In information security, the process of cryptography technique provides the security to the network. It protects the data or information from the unauthorized user and give the guarantee that the contents of a message are transmitted with confidentiality and it would not be changed. Various techniques of cryptography has been emerged to obtain secure communication. In cryptography, there are two types of techniques; symmetric and asymmetric key encryption. The secret data which is transferred over electrical cable is very sensitive. It can be accessed as the purpose of malignant. This paper discuss about the cryptographic technique with its objective, principle and types. Keywords: Cryptography, Encryption, Keys, Confidentiality

Botnet and Botnet Detection Techniques

by Devendra Sharma, Aman Sharma

Botnet is currently the most emerging risk to the internet safety needs much attention as it have made already a big impact. In criminal activities such as DDoS, click fraud, phishing spamming, sniffing and spreading new malware, botnets are used by the attackers. It is worst when peer-to-peer technology underlying exchanges files and botnets become much tougher to identify and lock down due to which it becomes one of the biggest danger to internet constancy and safety. Hence, botnets are becoming more highlighted for the topic of research. Botnet attacks can be prevented, detected and mitigated by various types of proposed techniques hence, the current trend of botnet techniques and different criterias has beend discussed in this review study. Keywords: Bots, Botnet, Botmaster, Detection Techniques, Botnet Architecture, Botnet Attacks

Detection techniques for Intrusion Detection System (IDS)

by Rohit Gaharwal, Pavan Kumar, Umakant Dwivedi

A device or software that monitor or identify the network for malicious or unauthorized activities is called as Intrusion Detection System (IDS). An intrusion attempt may be stopped by some systems but this is neither expected nor required of monitoring system. The recognizing possible events, cataloging information about them and reporting attempts are contents that is focused by the Intrusion Detection and Prevention systems (IDPS). Intrusion Detection systems detects any of unauthorized or misuse access by monitoring the network and computer resources and it is essentially an attack on these resources. Consumers should be concern from malicious attack which is increase tremendous and known that how to safeguard and interconnect the digital data in a safer way. For getting valuable information, hackers use altered types of attacks which is detected by many intrusion detection techniques, algorithms and methods. In this paper, discussed about the intrusion detection system, its classification or types, its detection techniques that are frequently used. Keywords: Intrusion Detection System, malicious attack, hackers

Biometric devices and Security

by Dr. Ranjeet Kumar Singh, Mahesh Sharma

The major problem in our daily life is security. To deal with the information security major role is played by authentication. Biometric security is one of the widely used technology in identification and security. Biometrics is the automatic identification system of a person. The identification system of biometrics depends upon the physiological as well as behavioral characteristics of a person. In the recent system of security, biometric has depicted his work. In the prevention of unauthorized admittance of ATMs, smart cards, PCs, computer networks, etc. biometrics can be used. Many industries and companies uses biometric security for the recognition of employees. Because of liability and efficiency of biometrics, it is quite popular. This paper discusses about biometric techniques with some comparison of biometric system with other authentication method can also be discussed for the achievement of a security system with maximum advantages. Keywords: Biometrics, Security, Authentication, Information.

Create Your Password

We've sent a link to create password on your registered email, Click the link in email to start using Xournal.

Sign In

Forgot Password?
Don't have an account? Create Account

Create Account

Already have an account? Sign In

Forgot Password

Do you want to try again? Sign In

Publication Tracking