Study of Cyber Threats and Data Encryption Techniques to Protect National Information Infrastructure
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 3
Abstract
In today’s era of globalization almost all kind of organizations critically dependent on information technology , at the same time evolution of technology is also creating an opportunities for cyber criminal to exploit the technology. However, till now many organizations uses different prevention mechanisms to secure the information from the active and passive types of attacks done by hackers. The national communication or information infrastructure in general is having the vital role for the country having important data from the various sectors like Government, Private and Service sectors. This paper highlighting the different areas like electricity, telecom, transport, petroleum etc. of the countries. As data and information shared among the different sectors time to time the secrecy of the data plays very important role and it is a difficult task. The hackers, cyber thief or criminals keep the eyes on the information and always looking for the opportunities to get the important and secrete data of this information infrastructure and miss-use the data for their own benefits. This paper mainly speaks about the new defense mechanisms those can be implemented to regulate cybercrime.
Authors and Affiliations
Prof. Prashant Laxminarayan Chintal
Video Frame Retrieval Using Effective Query Processing
Video frame retrieval from a long video sequence is atypical known problem to many of us. In this work we have discussed a graph transformation and matching approach to the problem. We introduce a query algorithm to...
Novel Approach To Cell-Counting-Based Attack Against Tor
Different low-latency unidentified communication systems such as Tor and Anonymizer have been deliberate to make available anonymity service for users. In order to hide from view the communication of users, most of t...
A New Filtering Technique for Reducing Speckle Noise From Ultrasound Images
Noise is the annoying problem in the field of image processing. In Medical image such as Ultrasound image, MRI data and Radar Images are affected by different types of noise. So it is the major task to eliminate such...
Data Mining Approach To Analyze Virtual Museums Web Log Data
Virtual museums are part of digital libraries with large collections of multi dimensional data. Knowledge engineering tools facilitate extraction of meaningful information to support data mining features such as clas...
Application of IDS in WSN: A Survey
Wireless Sensor Networks (WSN) are one of the hottest areas over the past few years. Security is a major concern in WSN now a day. Intrusion detection represents one of such security aspects. Preventive mechanisms can...