Study of Cyber Threats and Data Encryption Techniques to Protect National Information Infrastructure

Abstract

In today’s era of globalization almost all kind of organizations critically dependent on information technology , at the same time evolution of technology is also creating an opportunities for cyber criminal to exploit the technology. However, till now many organizations uses different prevention mechanisms to secure the information from the active and passive types of attacks done by hackers. The national communication or information infrastructure in general is having the vital role for the country having important data from the various sectors like Government, Private and Service sectors. This paper highlighting the different areas like electricity, telecom, transport, petroleum etc. of the countries. As data and information shared among the different sectors time to time the secrecy of the data plays very important role and it is a difficult task. The hackers, cyber thief or criminals keep the eyes on the information and always looking for the opportunities to get the important and secrete data of this information infrastructure and miss-use the data for their own benefits. This paper mainly speaks about the new defense mechanisms those can be implemented to regulate cybercrime.

Authors and Affiliations

Prof. Prashant Laxminarayan Chintal

Keywords

Related Articles

A Survey on Peer to Peer sharing using Cloud Based Mobile Social TV (Cloud MoV)

The fast increasing power of personal mobile devices (Smartphone, tablets, etc.) provides more advanced features like news, game app, health tips etc and social interactions to users in day to day life. This developm...

Integrity And Confidentiality for Network Security

We compute the liability metric as a function of the steering and the cryptographic protocols used to secure the complex passage. We formulate the minimum cost node capture attack problem as a nonlinear integer progra...

WSN Based Industrial Environmental Monitoring System Using µC/OS-II

The paper describes the performance and functional characteristics of arm7 embedded microprocessor and Micro C/OS-II based wireless sensor node (WSN) in monitoring the parameters such as temperature, humidity, gas an...

Design of Modulo 2n-1 based on Radix-8 Algorithm for RNS & MAC Applications

A new architecture, namely, Multiplier-and Accumulator (MAC) based Radix-8 Booth Encoded modulo 2n-1 Multiplication Algorithm for high-speed arithmetic logics have been proposed and implemented on Xilinx FPGA device....

Safety Defending Delegated Admittance Mechanism in Public Clouds

Cloud computing, as a rising registering standard. Cloud computing empowers clients to remotely store their information in a cloud furthermore profit by administrations on-interest. With fast improvement of cloud com...

Download PDF file
  • EP ID EP27863
  • DOI -
  • Views 260
  • Downloads 0

How To Cite

Prof. Prashant Laxminarayan Chintal (2014). Study of Cyber Threats and Data Encryption Techniques to Protect National Information Infrastructure. International Journal of Research in Computer and Communication Technology, 3(3), -. https://europub.co.uk./articles/-A-27863