Information Security with Cryptography
Journal Title: INTERNATIONAL JOURNAL FOR ELECTRONIC CRIME INVESTIGATION - Year 2018, Vol 2, Issue 1
Abstract
The purpose of Information Security and Cryptography is to secure the data transmission and network over wireless network. The main feature of data Security is to protect transmission of data over unsecure network. The authorization of access over the data within the network is included in Information Security and which is managed by the administration of network. The users are authorized and have their own ID and password or may be some other validating information which permits them to access the programs and information under their limited authority. Diversity of computer networks is covered by information Security, private and public both, which are used in daily routine jobs directing communications and transactions among individuals, businesses and government agencies. Network might be open for the public to access or they can be private like within a company. Businesses, organizations and other kind of institutions are covered by Information Security. We will study about the cryptography and its principles in this paper. Cryptographic systems with ciphers are presented. The cryptographic algorithms and models are outlined.
Authors and Affiliations
TAYYABA SULTANA, ZAKA ULLAH, MUHAMMAD ZULKIFL HASAN, TAIMOOR HASSAN
Enterprise Security of Wi-Fi Networks using Simulation
Wireless network setting is developing into the market, and it is the major way of accessing the internet. Design and security of these networks for an organization need to be considered to ensure mobility and access to...
Use of Cyber Space by Terrorist Organizations
Prevention of Electronic Crime Act 2016 of Pakistan, defines and include cyber terrorism as a cyber-crime. Due to its anonymity cyber space is a popular tool used by terrorists. Terrorists use cyber space to launch their...
The Reality of Cyber Security
The purpose of this article is to provide information about cyber security. It gives an analysis that would be useful in taking measure to prevent attacks. The judgment of this analysis is made by expertise and knowledge...
In-Demand Skillsets in Cybersecurity
In recent years, a huge shift to digitization has been observed on a global level. Due to the advantage of having easy access and other benefits, digitization is being adopted fast. With digitization, the ever-growing th...
User Trust on Online Social Network on the basis of Security and privacy
Online social networks have become a popular medium of sharing information and also major source for connecting the people on a network. As we know that the threats related to online social network is affecting people to...