Study of Cyber Threats and Data Encryption Techniques to Protect National Information Infrastructure
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 3
Abstract
In today’s era of globalization almost all kind of organizations critically dependent on information technology , at the same time evolution of technology is also creating an opportunities for cyber criminal to exploit the technology. However, till now many organizations uses different prevention mechanisms to secure the information from the active and passive types of attacks done by hackers. The national communication or information infrastructure in general is having the vital role for the country having important data from the various sectors like Government, Private and Service sectors. This paper highlighting the different areas like electricity, telecom, transport, petroleum etc. of the countries. As data and information shared among the different sectors time to time the secrecy of the data plays very important role and it is a difficult task. The hackers, cyber thief or criminals keep the eyes on the information and always looking for the opportunities to get the important and secrete data of this information infrastructure and miss-use the data for their own benefits. This paper mainly speaks about the new defense mechanisms those can be implemented to regulate cybercrime.
Authors and Affiliations
Prof. Prashant Laxminarayan Chintal
QOS ORIENTED VERTICAL HANDOFF FOR WIMAX/WLAN IN ADHOC WIRELESS NETWORK
Vertical Handoff (VHO) scheme is designed based on the interworking architecture of WLAN/WIMAX which aims to provide always the best Quality of Service (Qos) for users. The performance of applications and network co...
Stategy And Necessity Trades For Smile Networks
The mobile social networks are likely to a large extent enhance interaction with mobile users and shared the information in encounter-based social network. In this encounter traditional social network as opposed user...
Estimating the qos parameters and enhancing performance by implementing cluster head in MANET
In the MANET each node communicates with the other node temporarily and stops all the communication when all the data transfers done. Clustering (used in MANET) provides an effective way to allocate wireless channels...
A New Key Management Protocol for WMN’s And Ad Hoc Networks
A foremost challenge in developing systems is to overcome the difficulties of the theoretically incomplete communication from the group to the sender, the unattainability of a completely trusted key generation center...
Efficient Data Coordination Technique for Data Verification and Integration in Multi-Cloud Systems
Cloud computing is a new and fast growing technology that offers an innovative, efficient and scalable business model for organizations to adopt various information technology (IT) resources i.e. software, hardware,...