Information Security
[Abbr: Acd. Jr. AJIS]Effect of Data Breaching on Socio-economic Condition of Countries from Social Networking Sites
by Nitin Sharma
It is an incident in which sensitive, protected or confidential data is imitated, transmitted, viewed, stolen or disclosed or used by an individual unauthorized to do so. Data breach can cause a massive impact on social and economic condition of any country. Drawing upon Cambridge Analytica as a case study, a countries election is the spine of democracy, once it gets jeopardize the very essence of justice and equality gets hampered. The forensic application is helpful in determining whether the incident has occurred or not as well the one who involve in the particular breach. This present review paper focuses on the steps and ideas to prevent data breach and how social networking sites are responsible for data breaching. Keywords: Data Breaching, unauthorized access, Cambridge Analytica
Cryptography: A Way to Secure Network Information
by Aman Sharma, Prakhar Saxena
In information and communication technology, a modern ear of networking and wireless networks has been come in which security is an important factor. Now, the exchange and transmitting of information through the internet and other communication medium is common due to which the vulnerability of the information is increased. To reduce the chance of threatening of data, information security plays a vital role. In information security, the process of cryptography technique provides the security to the network. It protects the data or information from the unauthorized user and give the guarantee that the contents of a message are transmitted with confidentiality and it would not be changed. Various techniques of cryptography has been emerged to obtain secure communication. In cryptography, there are two types of techniques; symmetric and asymmetric key encryption. The secret data which is transferred over electrical cable is very sensitive. It can be accessed as the purpose of malignant. This paper discuss about the cryptographic technique with its objective, principle and types. Keywords: Cryptography, Encryption, Keys, Confidentiality
Botnet and Botnet Detection Techniques
by Devendra Sharma, Aman Sharma
Botnet is currently the most emerging risk to the internet safety needs much attention as it have made already a big impact. In criminal activities such as DDoS, click fraud, phishing spamming, sniffing and spreading new malware, botnets are used by the attackers. It is worst when peer-to-peer technology underlying exchanges files and botnets become much tougher to identify and lock down due to which it becomes one of the biggest danger to internet constancy and safety. Hence, botnets are becoming more highlighted for the topic of research. Botnet attacks can be prevented, detected and mitigated by various types of proposed techniques hence, the current trend of botnet techniques and different criterias has beend discussed in this review study. Keywords: Bots, Botnet, Botmaster, Detection Techniques, Botnet Architecture, Botnet Attacks
Detection techniques for Intrusion Detection System (IDS)
by Rohit Gaharwal, Pavan Kumar, Umakant Dwivedi
A device or software that monitor or identify the network for malicious or unauthorized activities is called as Intrusion Detection System (IDS). An intrusion attempt may be stopped by some systems but this is neither expected nor required of monitoring system. The recognizing possible events, cataloging information about them and reporting attempts are contents that is focused by the Intrusion Detection and Prevention systems (IDPS). Intrusion Detection systems detects any of unauthorized or misuse access by monitoring the network and computer resources and it is essentially an attack on these resources. Consumers should be concern from malicious attack which is increase tremendous and known that how to safeguard and interconnect the digital data in a safer way. For getting valuable information, hackers use altered types of attacks which is detected by many intrusion detection techniques, algorithms and methods. In this paper, discussed about the intrusion detection system, its classification or types, its detection techniques that are frequently used. Keywords: Intrusion Detection System, malicious attack, hackers
Biometric devices and Security
by Dr. Ranjeet Kumar Singh, Mahesh Sharma
The major problem in our daily life is security. To deal with the information security major role is played by authentication. Biometric security is one of the widely used technology in identification and security. Biometrics is the automatic identification system of a person. The identification system of biometrics depends upon the physiological as well as behavioral characteristics of a person. In the recent system of security, biometric has depicted his work. In the prevention of unauthorized admittance of ATMs, smart cards, PCs, computer networks, etc. biometrics can be used. Many industries and companies uses biometric security for the recognition of employees. Because of liability and efficiency of biometrics, it is quite popular. This paper discusses about biometric techniques with some comparison of biometric system with other authentication method can also be discussed for the achievement of a security system with maximum advantages. Keywords: Biometrics, Security, Authentication, Information.