Cyber Security in the Era of Networking: A Review
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2016, Vol 18, Issue 1
Abstract
Abstract: Cyber security is an intricate issue, affecting many application domains and straddling many disciplines and fields. Securing the critical infrastructures entails protecting not only the physical systems but, just as important, the cyber portions of the systems on which they rely. Cyber attackers can disrupt critical infrastructures such as financial and air traffic control systems, creating effects that are similar to terrorist attacks in the physical space. They can also carry out individuality theft and financial fraud; steal commercial information such as intellectual property; recruit criminals and others to carry out carnal terrorist activities. What makes cyberspace even more attractive to criminals including non-state actors is that provenance in cyberspace is complex, especially given that cyberspace is borderless and cuts across authorities. Cyber Security Research is one context where the solution to deal with cyber criminals is germinating.
Authors and Affiliations
Ms. Manjiri N. Muley
Design and analysis of the redundancy allocation problem using a greedy technique
Abstract: We present a very computationally light and fast approximation algorithm and then verify it with genetic algorithm and simulated annealing. We show that our algorithm is on par with GA and SA in terms of output...
Digital Image Compression using Hybrid Transform with Kekre Transform and Other Orthogonal Transforms
This paper presents image compression technique using hybrid transform. Concept of hybrid wavelet transform can be extended to generate hybrid transform. In hybrid wavelet transform first few rows represent  ...
Twin Key Implementation in Aes
Abstract: In February 2001, NIST announced that a draft of the Federal Information Processing Standard (FIPS) was available for public review and comment. Finally, AES was published as FIPS 197 in the Federal Regis...
Water–Demand Management in the Kingdom of Saudi Arabia for Enhancement Environment
The purpose and the goal of the paper is growing substantially demand for water and waste-water infrastructure and that is being met through the available scarce and dwindling water resources. The kingdom of Sa...
Prevention of SQL Injection Attacks having XML Database
XML-based Web applications are broadly utilized in computer world, whose main applications are remote operation performance and bring arbitrary data. It is recently used in cloud interfaces, E-Government, ...