Study of Cyber Threats and Data Encryption Techniques to Protect National Information Infrastructure
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 3
Abstract
In today’s era of globalization almost all kind of organizations critically dependent on information technology , at the same time evolution of technology is also creating an opportunities for cyber criminal to exploit the technology. However, till now many organizations uses different prevention mechanisms to secure the information from the active and passive types of attacks done by hackers. The national communication or information infrastructure in general is having the vital role for the country having important data from the various sectors like Government, Private and Service sectors. This paper highlighting the different areas like electricity, telecom, transport, petroleum etc. of the countries. As data and information shared among the different sectors time to time the secrecy of the data plays very important role and it is a difficult task. The hackers, cyber thief or criminals keep the eyes on the information and always looking for the opportunities to get the important and secrete data of this information infrastructure and miss-use the data for their own benefits. This paper mainly speaks about the new defense mechanisms those can be implemented to regulate cybercrime.
Authors and Affiliations
Prof. Prashant Laxminarayan Chintal
Design of Trust Model For Efficient Cyber Attack Detection on Fuzzified Large Data using Data Mining techniques
Recently Network Intrusion Detection System (IDS), is being used as the main security defending technique. It is second guard for a network after firewall. Various approaches from data mining to soft computing fields...
Load frequency control in Microgrid
The objective of this paper is to design a Load Frequency Control (LFC) mechanism using a Battery Storage System (BSS) and Diesel Generation (DG) units for an isolated microgrid system. Load frequency control is impo...
A Stochastic Model to Evaluate The Performance of An IAAS Cloud System
Cloud systems are different from usual distributed systems.First of all; they are branded by an extremely big numeral of resources that can distance different administrative domains. Presentation assessment of cloud...
Text Detection On Scene Images Using MSER
Text detection and recognition is one of the difficult tasks in the computer vision community and there is a lot of research going on in recent years. This paper focuses on the problem of text detection and recogniti...
Data Possession Using Shipment Equilibrium Model And Mechanism on Multi cloud Environment
Shipment equilibrium mechanism is the main building blocks for cloud computing applications which is based on the Map Reduce programming concept. Shipment equilibrium is essential for efficient operations in distribu...