ENHANCED METHODOLOGY TO IMPROVE INFORMATION SECURITY SYSTEM USING THE COMBINATION OF ETHICAL HACKING AND CAPTCHA TECHNOLOGY
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 0, Vol 4, Issue 8
Abstract
Information Technology has become an integrated and fundamental part of the business, and with the increased automation of business processes in all the industries and sectors, the Information Technology users are not limited to only IT and Software Company. With the increased usage and penetration of Internet and application access on handheld mobile devices, the IT user community has increased many times. In fact, for every interaction or transaction what happens today, some way or the other IT system has got a place there. The usage is being tracked and captured by organizations to do analytics to find the opportunities for growth. The business process automation requires organizations process and data as the input to the IT systems. The data in the transaction has become very important, and it contains private data and should be kept secure understanding the criticality of data privacy. In fact, the entire process must meet the basic requirements of security i.e. Availability, Confidentiality, and Integrity.
Authors and Affiliations
Arshad Kamal*
CAUSE OF ATTRACTION AND REPULSION
This paper is designed to solve one of the fundamental problems that is the “cause of attraction and repulsion” in nature. The idea behind to solve this unsolved mystery from decades gives rise to several other id...
AN IMPLEMENTATION OF PEARSON CORRELATION METHOD FOR PREDICTING ITEMS TO USER IN E-COMMERCE
Collaborative filtering algorithms (CFAs) are recommender systems for the collaborating one another to filter documents they read from last decade. CFAs have various features that create them different from other a...
A FRAMEWORK FOR MINING OF TEXT DATA WITH THE APPLICATION OF SIDE INFORMATION
Now a days data is not purely available in text form.It also contains a lot of side information ,which may be of different kinds,such as web logs which tells about the user access behavior,links in the document and s...
Optimized Storage Approaches in Cloud Environment
The cloud computing is a technology using internet and remote servers the users can run and deploy their applications .Different services are provided by cloud service providers(CSP).They are software-as a service...
Stabilization of Lateritic Silty Clays with Common Stabilizing Agents
Local common stabilizing agents such as ordinary Portland cement, fly ash and lime were used to stabilize a lateritic silty clay for improved strength and plasticity behaviour of the clay. Various percentage cemen...