In order to achieve the security for the e-business application, generally, the organizations follow the cryptographic methods. The two widely accepted and used cryptographic methods are symmetric and asymmetric. The DES ideally belongs to the category of symmetric key cryptosystem and RSA, NTRU[3] belongs to the category of asymmetric key cryptosystem. NTRU (Nth degree truncated polynomial ring units) is a collection of mathematical algorithms based on manipulating lists of very small...
Topics: Data Security, Encryption, Decryption, Polynomial, Matrix.
15
15
Mar 20, 2021
03/21
by
Archana R. A., Ravindra S. Hegadi, Manjunath T. N.
texts
eye 15
favorite 0
comment 0
Due to rapid growth of unstructured data in contemporary information world, there is an essence of big data infrastructure for many applications spread across domains, due to the different source information type and huge volume, data ingestion and data retrieval is important activity during this process data security is a vital to protect user data, in connection with this, authors proposed a big data security architecture using split and merge security method in big data environment using...
Topics: Big Data, Data Masking, Data Security
33
33
Jan 10, 2020
01/20
by
@impact
texts
eye 33
favorite 0
comment 0
The advancements in information technology have generated data which needsto be protected so that the business can survive. This is due to the fact that data has generated an innate need for protection, security and the estimations pertaining to the loss arising out of data breach. This paper is thus an attempt to design, develop and implement a practical approach for the data security and disaster recovery plan for the organization. The genesis of the paper goes to the industry experience of...
Topics: Business Continuity, Data Security, Disaster Recovery
204
204
Oct 23, 2015
10/15
by
Engineering
texts
eye 204
favorite 0
comment 0
The rapid development of cloud computing is giving way to more cloud services, due to which security of services of cloud especially data confidentiality protection, becomes more critical. Cloud computing is an emerging computing style which provides dynamic services, scalable and payper-use. Although cloud computing provides numerous advantages, a key challenge is how to ensure and build confidence that the cloud can handle user data securely. This paper highlights some major security issues...
Topics: Cloud Computing, data security, privacy protection.
22
22
Feb 1, 2020
02/20
by
@impact
texts
eye 22
favorite 0
comment 0
The advancements in information technology have generated data which needsto be protected so that the business can survive. This is due to the fact that data has generated an innate need for protection, security and the estimations pertaining to the loss arising out of data breach. This paper is thus an attempt to design, develop and implement a practical approach for the data security and disaster recovery plan for the organization. The genesis of the paper goes to the industry experience of...
Topics: Business Continuity, Data Security, Disaster Recovery
We thought to set up a system of interconnection which allows sharing the communication network of data without the intervention of a human being. The Internet of Things system allows many devices to be connected for a long time without human intervention, data storage is low and the level of data processing is reduced, which was not the case with older solutions proposed to secure the data for example: cyber-attack and other systems. But other theories like for example: artificial...
Topics: data security, Internet of Things, deep learning.
In today’s business world, the owner of the data are called as distributors and the trusted third parties are called as agents. Data leakage happens every day when confidential business information such as customer or patient data, company secrets, budget information etc are leaked out . This paper contains the results of implementation of Data Leakage Detection Model. Traditionally, leakage detection is handled by watermarking, e.g., a unique code is embedded in each distributed copy. If...
Topics: agents, distributor, data leakage, data security, fake records.
Cloud Storage is a branch of Cloud Computing, which plays an important role in IT world. Cloud providers are providing a huge volume of storage space as per the user needs. Due to wide usage of this, it also increases data security issues and threats. Hence efforts are being made to encrypt the data stored in the cloud. In this paper, we are going to look at different encryption and auditing techniques that are used to avoid data breaching in cloud storage. Nikhil Sreenivasan ""Data...
Topics: Computer Network, Cloud Storage, Data Security threats, Risk
11
11
movies
eye 11
favorite 0
comment 0
Data Security.
Topics: technology, category5, data security, dban, boot and nuke
In this new era of technology securing information in internet has become a crucial task. To secure such information, encryption plays an important role in information security. In this paper Vigenere cipher is considered which is to be most efficient and simplest one. Due to its repeating nature, it is vulnerable to attacks like Kasiski, known plain text etc., to find the length of encryption key. To overcome this, this research present a modified algorithm encryption technique is done by...
Topics: Encryption, Vigenere cipher, Cipher ceaser, Decryption, data security
114
114
Jul 19, 2017
07/17
by
Sachin Kumar Singh, Devendra Kumar Singh
texts
eye 114
favorite 0
comment 0
Cloud storage is defined as "the storage of data online in the cloud," wherein a company's data is stored in and accessible from multiple distributed and connected resources that comprise a cloud. Although cloud service providers implement the best security standards and industry certifications, storing data and important files on external service providers always opens up risks. Using cloud-powered technologies means you need to provide your service provider with access to important...
Topics: Cloud computing, Cloud platforms, Data Security, Security Challenges
19
19
Mar 31, 2021
03/21
by
Abbas M. Al-Ghaili, Hairoladenan Kasim, Marini Othman, Wahidah Hashim
texts
eye 19
favorite 0
comment 0
A quick response code-based authentication method (QRAM) is proposed. QRAM is applicable for lots of internet of things (IoT) applications. QRAM aims to verify requests of such an access to IoT applications. Requests are made using a quick response code (QRC). To authenticate contents of QRC, users will scan QRC to access IoT applications. To authenticate contents of QRC, three procedures are applied. QRAM contributes to IoT automatic access systems or smart applications in terms of...
Topics: Data authentication, Data security, Internet of Things, QR code
129
129
May 17, 2020
05/20
by
The Forum of Incident Response and Security Teams (FIRST)
software
eye 129
favorite 0
comment 0
ISO 9660 image of 1994 information security CD-ROM compilation by the Forum of Incident Response and Security Teams (FIRST) - sponsored by the National Institute of Standards & Technology (NIST) and the U.S. Air Force Information Warfare Center (AFIWC). On this disc are over 200 megabytes of information related to computer and data security, including papers, UNIX software packages, virus scanners and tools for Macs and PCs, advisories, dictionaries, computer-related laws, and electronic...
Topics: hacking, cracking, phreaking, data security, computer viruses, information warfare
In higher education, Governance of data security is the data management mechanism that has to be practiced. This is an appropriate management model for the employees in the higher education institution that will understand the role to be played to secure more highly confidential data. This paper aims at issues on management and governance of data security in Higher education institutions HEIs . This will conclude on identifying the factors affecting governance of data security in private higher...
Topics: Computer Engineering, issues, governance, data security, higher education institutions
Cloud storage is known for its huge infrastructure, this property of the cloud inevitably invites attackers. However, to overcome this data stored in encrypted form, this security measure is not enough to handle the issue of data privacy. The other threat to the data arises during the process of accessing these data through various forms like by auditors, other users, data owners and some time by cloud owner itself. To handle these issues quite effectively strict access control mechanism is...
Topics: Computer Engineering, Cloud Computing, Data Security, BiLinear Pairing, BlockChains
Being in the 21st century, technology changes within a particular period of time. As we know the data is obtaining larger day by day so its protection is also coming under the concern. data is growing at a faster rate so securing of data is also an important concern. Technology has covered the way for electronic devices such as smartwatches and smartphones and computers which make our lives convenient, easier and simpler. On the click of a button, we can get small to big information and we can...
Topics: Computer Security, Mobile security, fake app, data security, mobile attacks
This essay presents the results of a study which surveyed the various aspects of system security hardware, software, and procedural techniques in use in current and proposed automated systems. Its impetus is from the concern for security control that has been generated by the increasing number of time-sharing and resource-sharing systems. The intention is to present the designers, managers, programmers, system implementers, and operational personnel with a consolidated source of data concerning...
Topics: Computer science, Data security, Computer security, Access security, Privacy/security
17
17
Mar 22, 2021
03/21
by
Ali Al Farawn, Hasanein D. Rjeib, Nabeel Salih Ali, Basheer Al-Sadawi
texts
eye 17
favorite 0
comment 0
Electronic payment has been considered as one of the most significant and convenient applications of modern electronic services e-University compared to traditional methods that impose time-consuming, human resources, and inefficiency. Different automatic identification technologies have been widely used, such as radio frequency identification (RFID). Extensive research and several applications are focusing on taking the maximum advantage of RFID technology. Data and information security had...
Topics: Data security, Encryption, Encryption password, Hash, Information security, RFID, SHA
The purpose of “Image to Image Encoder†is to hide an image inside another image. Using the LSB method, which facilitates data hiding in an image. It works with JPEG and PNG formats for the cover image and always creates tiff encoded image due to its compression. Least Significant Bit Embeddings LSB are the general steganographic procedure that might be utilized to install information into a variety of digital media, the most studied applications are utilizing LSB embedding to hide...
Topics: Digital Image, Secret Image, Cover, Steganography, Encoding, Decoding, Data Security
Cryptography is one of the most important tools that provide hiding data and information security usually done through mathematical manipulation of the data with an incomprehensible format for unauthorized users. It has long been used by government, public and private companies and militaries too to facilitate secret communication. Mainly, it is commonly used within many kinds of civilian systems in protecting information. Building and creating a key that would prevent an unauthorized...
Topics: Cryptographic Algorithms, Cryptology, Cryptanalyst, Decryption, Encryption, Cipher, Protocol, Data...
0
0.0
movies
eye 0
favorite 0
comment 0
"Politico" hosts a discussion with health care professionals and government officials on health care data security and cybersecurity threats facing medical facilities in the U.S
Topics: Politico Hosts Discussion on Health Care Data Security, Television Program
Source: Comcast Cable
This thesis presents a wide spectrum of computer data security, including both practical and theoretical aspects of the subject. It was motivated by the concern for the general lack of adequate knowledge, techniques, implementation, and application of computer data security. The objective was to (1) review the pertinent features of data security and the relationship of these features to the computer and its users; (2) generate an awareness of the techniques and problems in data security by...
Topics: Computer science, data security, computer security, access security, security verification system
In Forthcoming times of information technology companies, cloud computing updated as the structural model. There are so many benefits of cloud computing in technical as well as in organization. But still there are many new objections will carried in cloud computing for example in data security in cloud storage. There are many approaches available for data security in cloud storage like encryption with obfuscation technique, watermark security, data partitioning technique. In above all the...
Topics: Computer Engineering, Cloud Computing, Data Security, Homomorphic Encryption, Availability of Data
This paper presents the survey on data storage and retrieval in cloud computing. In this paper the study on scope and security issues related to data storage and information retrieval in cloud computing is done. Data storage and retrieval with data security is typical issue in today's scenario. The main objective of cloud computing is to enables users with limited computational resources to outsource their large computation workloads to the cloud. The integrity and confidentiality of the data...
Topics: Cloud computing, Data security, cloud security, Information Retrieval, security issues, Computer...
Military C41 facilities form an enormous network of distributed, heterogeneous computers. Operating these computers such that commanders can exploit their computing power effectively requires a resource management system. Management System for Heterogeneous Networks (MSHN) is a program under development specifically designed to address this need. Security for distributed computing systems is of particular importance to the Department of Defense. Previously developed resource management systems...
Topics: MSHN, Distributed computing, Security mechanisms, Common data security architecture, Virtual...
67
67
Mar 17, 2021
03/21
by
IRJASH Journal
texts
eye 67
favorite 0
comment 0
Cloud computing transforms the way information technology (IT) is consumed and managed, promising improved cost efficiencies, accelerated innovation, faster time-to-market, and the ability to scale applications on demand. However, as the shape of the cloud computing is emerging and developing rapidly both conceptually and in reality, the legal/contractual, economic, service quality, interoperability, security and privacy issues still pose significant challenges. In this project, we describe...
Topics: Cloud Computing, Cloud Platform, Data Privacy, Data Security, Models of Cloud Computing.
29
29
Feb 26, 2019
02/19
by
Computerphile
movies
eye 29
favorite 0
comment 0
Deleting files may not mean they're gone. Even overwriting them isn't safe. Professor Derek McAuley explains. EXTRA BITS - more on Flash/SSD: http://youtu.be/HQWFCDN9VZI Punch Card Programming: http://youtu.be/KG2M4ttzBnY http://www.facebook.com/computerphile https://twitter.com/computer_phile This video was filmed and edited by Sean Riley. Computer Science at the University of Nottingham: http://bit.ly/nottscomputer Thanks to Richard Faulkner for the photo of the hard disk being destroyed....
Topics: Youtube, video, Education, computers, computerphile, data security, disk drive, semiconductor...
With employees all over the world working from home, hackers are at an advantage when users don't have an IT department working in their defense. Kody Kinzie and Timothy Schellin demonstrate just how easy it is for hackers to lure victims into disclosing their Wi-Fi password using a tool called Airgeddon to execute an evil twin attack. After breaking in, hackers can take control of the router, redirect Wi-Fi traffic, steal information and attack other devices on the network. Source:...
Topics: Youtube, video, Science & Technology, Hacking, Hacking WiFi, Airgeddon, Data Security, Varonis,...
Millions of people are working remotely – and attackers are taking advantage. As more workers log into residential WiFi networks, cybercriminals have plenty of opportunities to launch attacks. Varonis security researcher Kody Kinzie created this video to show how easy it is for an attacker to launch an attack using an off-the-shelf hacking tool and trick an unsuspecting user into giving up their WiFi password. Source: https://www.youtube.com/watch?v=nHaJUjhfjjI Uploader: SecurityFWD
Topics: Youtube, video, Science & Technology, Hacking, Hacking WiFi, Airgeddon, Data Security, Varonis,...
The Wi-Fi deauther is a cheap and easy tool designed by Stefan Kremser to scan and attack Wi-Fi devices. Watch Stefan and I troubleshoot the advanced new features of the latest deauther release! Source: https://www.youtube.com/watch?v=I0N2KpwGETI Uploader: SecurityFWD
Topics: Youtube, video, Science & Technology, deauther, securityFWD, spacehuhn, wifi hacking, Stefan...
Metapolicies, or policies about policies may become a powerful concept for developing the large, complex, and interrelated trusted systems that military, commercial and non-profit organizations need today. Metapolicies provide a framework for clarifying policies and for successfully coordinating security policies and subpolicies. When there is only one security policy, metapolicies tend to be implicit, embedded, and fixed. When more than ons security policy is involved, an in a multipolicy...
Topics: DTIC Archive, Hosmer, Hilary H, DATA SECURITY INC BEDFORD MA, *POLICIES, *SECURITY, PAPER,...
Emily Wilson, Director of Analysis, Terbium Labs The reality of the dark web goes against industry reports. Most of the dark web is legal, even ridiculous activity amidst drugs, fraud and other crimes. This session will look at the funny and absurd. https://www.rsaconference.com/events/us17 Source: https://www.youtube.com/watch?v=sCaiWFyKVBY Uploader: RSA Conference Upload date: 2017-02-22
Topics: Youtube, video, Science & Technology, rsa, rsaconference, rsac, data security, identity theft,...
This thesis is a detailed design of a security kernel for an archival file storage system. Microprocessor technology is used to address a major part of the problem of information security in a distributed computer system. Utilizing multiprogramming techniques for processor efficiency, segmentation for controlled sharing, and a loop-free structure for avoiding intermodule dependencies, the Archival Storage System is designed for implementation on the filing Z8001 microprocessor with a memory...
Topics: Computer science, Data security, Security kernel, Operating system security file system, Secure,...
331
331
Jun 23, 2009
06/09
by
Picture Radio
audio
eye 331
favorite 1
comment 0
For our 'Techno Special' we talked to active people looking at the past, present and future of open-source, free, and DIY technologies. We looked at how such things affect music, activism, parties, and protest, as well as stuff like data-retention, and security in the face of state repression. The show featured words from datacide on the Teknival phenomenon, Yossarian on open source, free, and accessable software, and GDM talking to us about data retention and personal security. The show was...
Topics: Dissident Island, DIY Radio, LARC, Anarchism, Activism, datacide, technology, techival, indymedia...
This paper proposes icons and visual conventions for rapid comprehension and presentation of information security (INFOSEC) attack scenario information: Malicious Intruder, Buffer Overflow, Data Scavenging, QuickTime and a Photo - JPEG decompressor are needed to see this picture. Theft Poorly Installed Software Attack scenarios describe diverse ways to compromise the security of computer systems and networks. Visual attack scenarios help defenders see system ambiguities, imprecision,...
Topics: DTIC Archive, Hosmer, Hilary H, DATA SECURITY INC BEDFORD MA, *ELECTRONIC SECURITY, *VISUAL AIDS,...
25
25
Aug 20, 2012
08/12
by
Microsoft Official Academic Course Staff, Created by. oth
texts
eye 25
favorite 0
comment 0
Trade
Topics: Data security & data encryption, Microsoft Windows, Computers, Computers - Computer Security,...
46
46
Feb 22, 2012
02/12
by
Banks, Michael A
texts
eye 46
favorite 4
comment 0
No system requirements provided
Topics: Internet, Security - General, Computers - General Information, Computer Data Security, Computers,...
126
126
Sep 8, 2014
09/14
by
Nozaki, Micki Krause; Tipton, Harold F
texts
eye 126
favorite 2
comment 0
Revised edition of: Handbook of information security management 1999
Topics: Data security & data encryption, Reference works, Management Information Systems, Computer Data...
10
10.0
May 21, 2014
05/14
by
Microsoft Official Academic Course Staff; Dobson, Rick; Microsoft Corporation Staff
texts
eye 10
favorite 1
comment 0
Annotation
Topics: Computer Software Packages, Data security & data encryption, Network security, General,...
16
16
Aug 15, 2013
08/13
by
Microsoft Corporation
texts
eye 16
favorite 0
comment 0
Includes index
Topics: Computer Software Packages, Data security & data encryption, Internet, Programming languages,...
147
147
Mar 15, 2013
03/13
by
Gregg, Michael (Michael C.); Tittel, Ed
texts
eye 147
favorite 1
comment 0
Cover -- A Note from Series Editor Ed Tittel -- About the Author -- Table of Contents -- Introduction -- We Want to Hear from You! -- CHAPTER 1 Access Control -- Overview -- Practice Questions -- Quick Check Answer Key -- Answers and Explanations -- CHAPTER 2 Telecommunications and Network Security -- Overview -- Practice Questions -- Quick Check Answer Key -- Answers and Explanataions -- CHAPTER 3 Physical Security -- Overview -- Practice Questions -- Quick Check Answer Key -- Answers and...
Topics: Data security & data encryption, Network security, Networking - Network Protocols, Computers -...
27
27
Sep 16, 2013
09/13
by
Joseph Davies; Elliot Lewis; Linda Wells; Andrea Weiss
texts
eye 27
favorite 0
comment 0
Topics: Operating Systems - Windows, Extranets (Computer networks), Computers - Communications /...
Computer Professionals Book Club (PAPER DAMAGED.)
Topics: club, book, books, computer, systems, membership, data, ftft, alternate, enclosed, book club,...
Konstantinos Karagiannis, Chief Technology Officer, Security Consulting, BT Proponents of blockchain want to apply it to more than Bitcoin. Suggested applications include identity management, verifiable records and digital assets such as stocks. Is it really future-proof? https://www.rsaconference.com/events/us17 Source: https://www.youtube.com/watch?v=0gL6DsR6vGg Uploader: RSA Conference Upload date: 2017-02-15
Topics: Youtube, video, Science & Technology, Cryptography, Identity Management & Governance,...
Ted Claypoole, Partner, Womble Carlyle A thousand reasons to become someone else. How far can a person go in creating alternative identities or borrowing identities of others? We will explore law, regulation and policy of changing personas. https://www.rsaconference.com/events/us17 Source: https://www.youtube.com/watch?v=8UdHR0d53sU Uploader: RSA Conference Upload date: 2017-02-22
Topics: Youtube, video, Science & Technology, RSA Conference 2017, Access Control, Identity Theft,...
Vehicular ad hoc networks (VANETs) use many types of cryptographic approaches for the security of messages during communication. Elliptical Curve Cryptography (ECC) is one of them and best among all other techniques, because the keys produced using elliptical curves are smaller in size. All keys are stored in Temper Proof Devices (TPDs) for security reasons. But, these devices are the first target for attackers to get the keys. Hence, researchers are trying their best for improving the...
Topics: Vehicular ad hoc Networks (VANETs), Wireless Ad Hoc Networks (WANETs), Elliptical Curve...
Wi-Fi hacking continues to get cheaper and easier on the ESP8266, as Stefan Kremser and Kody Kinzie explore the advanced new features of the Wi-Fi Deauther. We'll try out tracking Wi-Fi devices, scanning for devices like Ring doorbells or security cameras, and even spying on what networks a device has connected to before, all from a $2 microcontroller! Source: https://www.youtube.com/watch?v=gs5lCJuvFMc Uploader: SecurityFWD
Topics: Youtube, video, Science & Technology, Varonis, VRNS, spacehuhn, Stefan Kremser, Kody Kinzie,...
70
70
Oct 17, 2014
10/14
by
Caldwell, Wilma
texts
eye 70
favorite 5
comment 0
Includes bibliographical references and index
Topics: Data security & data encryption, Security, Computers - General Information, Computers -...
118
118
Apr 4, 2016
04/16
by
International Education and Research Journal
texts
eye 118
favorite 0
comment 0
New concept in Information Technology is Cloud Computing, as it provides various scalable and elastic Information Technology services in pay-as-you-use basis, where the customers of cloud can reduce huge capital investments involved in IT infrastructure. Big data is an evolving term that describes any voluminous amount of structured, semi-structured andunstructured data, Cloud storage service is the cloud serviceswhich can provide a huge storage space to solve the bottleneck of the storage...
Topics: cloud computing, big data, data security, provable data possession, authorized auditing,...
51
51
May 20, 2014
05/14
by
Roberta Bragg
texts
eye 51
favorite 0
comment 0
Topics: Operating Systems - Windows, Computers, Security measures, Computers - Certification, Networking -...