Study of Cyber Threats and Data Encryption Techniques to Protect National Information Infrastructure

Abstract

In today’s era of globalization almost all kind of organizations critically dependent on information technology , at the same time evolution of technology is also creating an opportunities for cyber criminal to exploit the technology. However, till now many organizations uses different prevention mechanisms to secure the information from the active and passive types of attacks done by hackers. The national communication or information infrastructure in general is having the vital role for the country having important data from the various sectors like Government, Private and Service sectors. This paper highlighting the different areas like electricity, telecom, transport, petroleum etc. of the countries. As data and information shared among the different sectors time to time the secrecy of the data plays very important role and it is a difficult task. The hackers, cyber thief or criminals keep the eyes on the information and always looking for the opportunities to get the important and secrete data of this information infrastructure and miss-use the data for their own benefits. This paper mainly speaks about the new defense mechanisms those can be implemented to regulate cybercrime.

Authors and Affiliations

Prof. Prashant Laxminarayan Chintal

Keywords

Related Articles

Video Frame Retrieval Using Effective Query Processing

Video frame retrieval from a long video sequence is atypical known problem to many of us. In this work we have discussed a graph transformation and matching approach to the problem. We introduce a query algorithm to...

Novel Approach To Cell-Counting-Based Attack Against Tor

Different low-latency unidentified communication systems such as Tor and Anonymizer have been deliberate to make available anonymity service for users. In order to hide from view the communication of users, most of t...

A New Filtering Technique for Reducing Speckle Noise From Ultrasound Images

Noise is the annoying problem in the field of image processing. In Medical image such as Ultrasound image, MRI data and Radar Images are affected by different types of noise. So it is the major task to eliminate such...

Data Mining Approach To Analyze Virtual Museums Web Log Data

Virtual museums are part of digital libraries with large collections of multi dimensional data. Knowledge engineering tools facilitate extraction of meaningful information to support data mining features such as clas...

Application of IDS in WSN: A Survey

Wireless Sensor Networks (WSN) are one of the hottest areas over the past few years. Security is a major concern in WSN now a day. Intrusion detection represents one of such security aspects. Preventive mechanisms can...

Download PDF file
  • EP ID EP27863
  • DOI -
  • Views 241
  • Downloads 0

How To Cite

Prof. Prashant Laxminarayan Chintal (2014). Study of Cyber Threats and Data Encryption Techniques to Protect National Information Infrastructure. International Journal of Research in Computer and Communication Technology, 3(3), -. https://europub.co.uk/articles/-A-27863