Indian Streams Research Journal

Size: px
Start display at page:

Download "Indian Streams Research Journal"

Transcription

1 Vol 5 Issue 9 Oct 2015 ISSN No : ORIGINAL ARTICLE International Multidisciplinary Research Journal Indian Streams Research Journal Executive Editor Ashok Yakkaldevi Editor-in-Chief H.N.Jagtap

2 Welcome to ISRJ RNI MAHMUL/2011/38595 ISSN No Indian Streams Research Journal is a multidisciplinary research journal, published monthly in English, Hindi & Marathi Language. All research papers submitted to the journal will be double - blind peer reviewed referred by members of the editorial board.readers will include investigator in universities, research institutes government and industry with research interest in the general subjects. International Advisory Board Flávio de São Pedro Filho Federal University of Rondonia, Brazil Kamani Perera Regional Center For Strategic Studies, Sri Lanka Janaki Sinnasamy Librarian, University of Malaya Romona Mihaila Spiru Haret University, Romania Delia Serbescu Spiru Haret University, Bucharest, Romania Anurag Misra DBS College, Kanpur Titus PopPhD, Partium Christian University, Oradea,Romania Mohammad Hailat Dept. of Mathematical Sciences, University of South Carolina Aiken Abdullah Sabbagh Engineering Studies, Sydney Ecaterina Patrascu Spiru Haret University, Bucharest Loredana Bosca Spiru Haret University, Romania Fabricio Moraes de Almeida Federal University of Rondonia, Brazil George - Calin SERITAN Faculty of Philosophy and Socio-Political Sciences Al. I. Cuza University, Iasi Editorial Board Hasan Baktir English Language and Literature Department, Kayseri Ghayoor Abbas Chotana Dept of Chemistry, Lahore University of Management Sciences[PK] Anna Maria Constantinovici AL. I. Cuza University, Romania Ilie Pintea, Spiru Haret University, Romania Xiaohua Yang PhD, USA...More Pratap Vyamktrao Naikwade Iresh Swami ASP College Devrukh,Ratnagiri,MS India Ex - VC. Solapur University, Solapur R. R. Patil Head Geology Department Solapur University,Solapur Rama Bhosale Prin. and Jt. Director Higher Education, Panvel Salve R. N. Department of Sociology, Shivaji University,Kolhapur N.S. Dhaygude Ex. Prin. Dayanand College, Solapur Narendra Kadu Jt. Director Higher Education, Pune K. M. Bhandarkar Praful Patel College of Education, Gondia Sonal Singh Vikram University, Ujjain Rajendra Shendge Director, B.C.U.D. Solapur University, Solapur R. R. Yalikar Director Managment Institute, Solapur Umesh Rajderkar Head Humanities & Social Science YCMOU,Nashik S. R. Pandya Head Education Dept. Mumbai University, Mumbai Govind P. Shinde Bharati Vidyapeeth School of Distance Education Center, Navi Mumbai Chakane Sanjay Dnyaneshwar Arts, Science & Commerce College, Indapur, Pune Awadhesh Kumar Shirotriya Secretary,Play India Play,Meerut(U.P.) G. P. Patankar Alka Darshan Shrivastava S. D. M. Degree College, Honavar, Karnataka Shaskiya Snatkottar Mahavidyalaya, Dhar Maj. S. Bakhtiar Choudhary Director,Hyderabad AP India. S.Parvathi Devi Ph.D.-University of Allahabad Sonal Singh, Vikram University, Ujjain Rahul Shriram Sudke Devi Ahilya Vishwavidyalaya, Indore S.KANNAN Annamalai University,TN Satish Kumar Kalhotra Maulana Azad National Urdu University Address:-Ashok Yakkaldevi 258/34, Raviwar Peth, Solapur Maharashtra, India Cell : , Ph No: ayisrj@yahoo.in Website:

3 Indian Streams Research Journal Impact Factor : (UIF) ISSN Volume - 5 Issue - 9 Oct SECURITY TECHNIQUES USED IN COMPUTER NETWORKING Aarti Ramesh Sonone Assistant Professor, Department of Management Science, VSS College, Jalna. ABSTRACT Security is one of the important in several areas as personal computer user, organizational computer network etc. because most of the time data will be share from one network to other network via the internet. The rapid growth in the use of internet there is need of computer network security to prevent and protect data or information from the internal and external attacks. Online security includes protection of information from theft, corruption or unauthorized access etc. In this paper we discuss the security techniques used in computer network to protect information and information system from unauthorized user and their advantages. KEYWORDS Threats. :Computer Network Security, Treats in computer, Security Techniques used to avoid INTRODUCTION In the personal or business organization generally every day data being shared over a network from one computer to other and for that security is one of the most essential aspects of networking to protect data or information from unauthorized access. The computer network is a telecommunication network which allow computer to exchange data through some networking devices which are link with each other by establishing either cable media or wireless media but the best and most preferable way is to use internet. The use of internet for communication needs some security for protecting the data from unwanted access and the security is refer as Network Security. Network security is the policies or technique adopted to prevent and monitor authorized access, modification or denial of a computer network and network accessible resources. Network security covers variety of computer networks like conduction transactions and communications among business, government agencies, personal etc. SURVEY OF LITERATURE: To devise the way to evaluate the objectives of study, it is necessary to have an idea of the methodology followed by the earlier related studies along with their findings. A review of literature connected with the computer network their security and advantages. 1

4 SECURITY TECHNIQUES USED IN COMPUTER NETWORKING Type of Security Threats and It s Prevention (Ateeq Ahmad ): Security is a branch of computer technology known as information security as applied to computers and networks. The objective of online security includes protection of information and property from theft, corruption, or threats attack, while allowing the information and property to remain accessible and productive to its intended users. The term online system security means the collective processes and mechanisms by which sensitive and valuable information and services are protected from publication, tampering or collapse by unauthorized activities or untrustworthy individuals and unplanned events respectively. The basic aim of this article is to Prevention against unauthorized security Attack and Threats. Information Security: Components and Techniques( Aniruddha Singh, Abhishek Vaish, Pankaj Kumar Keserwani): Institutions of all sizes collect and store huge volumes of confidential information. Most of this information is collected, processed and stored on computers and transmitted across networks to other computers. The rapid growth and widespread use of electronic data processing and electronic business conducted through the Internet, along with numerous occurrences of international terrorism, fueled the need for better methods of protecting the computers and the information they store, process and transmit. Information security means protecting information and information systems from unauthorized access, use, disruption, or destruction. It also includes a wide range of physical security measures such as protecting your information assets against natural disasters or theft, and social engineering attacks. The paper undertakes the concepts of information security and also review the current technologies related to information security. Network Security: History, Importance, and Future(Bhavya Daya): Network security has become more important topersonal computer users, organizations, and the military. With the advent of the internet, security became a major concern and the history of security allows a better understanding of the emergence of security technology. The internet structure itself allowed for many security threats to occur. The architecture of the internet, when modified can reduce the possible attacks that can be sent across the network. Knowing the attack methods, allows for the appropriate security to emerge. Many businesses secure themselves from the internet by means of firewalls and encryption mechanisms. The businesses create an intranet to remain connected to the internet but secured from possible threats. The entire field of network security is vast and in an evolutionary stage. The range of study encompasses a brief history dating back to internet s beginnings and the current development in network security. In order to understand the research being performed today, background knowledge of the internet, its vulnerabilities, attack methods through the internet, and security technology is important and therefore they are reviewed. The Future of Organization s Computer Network Security for the Next 5 Years ( ) by Using Delphi Technique(Cholatip Yawut and Phattarapong Keawpipop): Security is one of the important factors in an organization s computer network because the network connects to other networks through the internet. An attack on the organization s computer network can be possible from outside of the organization. Therefore, computer network security is very important to prevent and protect the organization from internal and external attacks. The purpose of this research is to predict the future of computer network security for the next 5 years ( ) by using Delphi technique which is a widely used and accepted method for achieving convergence of opinion concerning real-world knowledge solicited from experts within certain topic areas. The 2

5 SECURITY TECHNIQUES USED IN COMPUTER NETWORKING research result can be used to ameliorate and develop organization s computer network security including staff, hardware, software and privacy system. Research Methodology: The present research article is mostly depends on secondary sources of data, which is collected by the research from various books, research journals, research articles and various official websites. OBJECTIVES OF THE STUDY: Following are the objectives have been made for the current study: To know about the computer network. To know about Network Security. To know the need for providing security. To study the security Techniques used in Computer Network. ABOUT COMPUTER NETWORK: Computer network is allowing people to communicate people efficiently and easily via , massaging, telephones, video conferencing etc. Network allows sharing of files, data and other types of information giving authorized users the ability to access information stored on other computer on the network. Through computer network we can share the networking devices as like distributed computing. Some time when working over a network there is possibility to corrupt the system or break the system due to unwanted threats or viruses or the possibility to access data by unauthorized user to avoid this computer network need to protect data and prevent and detect the unauthorized use of computer. The prevention helps to stop the unauthorized user for accessing part of computer system and detection helps to determine whether or not someone attempt to break the system. COMPUTER NETWORK SECURITY: Network security is generally handled by network administrator or system administrator who implements some security polices, network software and hardware needed to protect network and resources through network form unwanted or unauthorized access and also ensure to access the network resources to work. The security system is based on layer of protection and consists of multiple components including networking monitoring and security software, hardware and appliances. All components work together to increase the overall security of computer network. The security is the quality of state being secure means it is free from danger. The business organization has the different of layers of security for the protection of its operations as 1.Physical security protect physical items, objects, areas of an organization from unauthorized access. 2.To protect the personal of group of personal. 3.To protect the series of activity as operations security. 4.To protect organizations communication media, technology and content. 5.To protect networking component, connections and content. 6.To protect the information including systems and hardware. GENERALLY CAUSED TREATS: Following are some treats that attack the system 1. Viruses: computer virus is a program written to alter the way a computer operates, without the 3

6 SECURITY TECHNIQUES USED IN COMPUTER NETWORKING permission or knowledge of the user. A virus replicates and executes itself, usually doing damage to your computer in the process 2.Hackers: Hackers are programmers who victimize others for their own gain by breaking into computer systems to steal, change or destroy information as a form of cyber-terrorism. 3.Spyware Threats: spyware is any program that monitors your online activities or installs programs without your consent for profit or to capture personal information. We ve amassed a wealth of knowledge that will help you combat spyware threats and stay safe online. 4.Viral Web Sites: Users can communicate by messages, to visit web sites that contain viruses or Trojans. These sites are known as viral web sites and are often made to look like well known web sites and can have similar web addresses to the sites they are imitating. Users who visit these sites often inadvertently download and run a virus or Trojan and can then become infected or the subject of hacker attacks. 5.Social Engineering: Tricking computer users into revealing computer security or private information, e.g. passwords, addresses, etc, by exploiting the natural tendency of a person to trust and/or by exploiting a person's emotional response. 6.Bluesnarfing: The act of stealing personal data, specifically calendar and contact information, from a Bluetooth enabled device. 7.Denial of Service: Denial of Service is an attack when the system receiving too many requests cannot return communication with the requestors. The system then consumes resources waiting for the handshake to complete. Eventually, the system cannot respond to any more requests rendering it without service. Security Techniques used to avoid Threats: Generally there are three methods to secure the system from online security attack as 1.Prevention: prevention is nothing but lock the window and installing chain link fence around yard. 2.Detection: Detection is put up the alarms and it will off when someone breaks the system. 3.Reaction: If someone breaks into your house and triggers the burglar alarm, one hopes that the local police force can quickly respond. The same holds true for information security. Once you have detected a failure, you must execute an effective response to the incident Instead of these methods there are number of techniques to defense and detection mechanism was developed to deal with attacks as. 1.Firewall: A firewall is border control mechanism it blocks the traffic from the outside as well as inside. Is the front line defense against intruders. Firewall is system designed to prevent unauthorized access over private network and is implemented both in combination of hardware and software. 2.Intrusion Detection Systems (IDS): It helps to ward off computer intrusions. IDS is used to monitor the connection in determining whether attacks are been launched. Some IDS only monitor and alert of an attack while others to block the attacks. 3.Keep patches and updates current: Cyber criminals exploit vulnerabilities in operating systems, software applications, web browsers and browser plug-ins when administrators are lax about applying patches and updates. 4.Use strong passwords: Definition of a strong password is one that s difficult to detect by humans and computers, is at least 6 characters, preferably more, and uses a combination of upper- and lower-case letters, numbers and symbols. 4

7 SECURITY TECHNIQUES USED IN COMPUTER NETWORKING 5.Clean up inactive accounts: Hackers use inactive accounts once assigned to contractors and former employees to gain access and disguise their activity. The HP/Ponemon Institute report did find that the companies in the survey were doing a good job deleting accounts once an employee quit or was laid off. Software is available for cleaning up inactive accounts on large networks with many users. 6.Anti-Malware Software and scanners: Anti Malware tools used to detect and cure infected system. Viruses, worms, Trojans are the examples of Malware. 7.Secure Socket Layer (SSL): Is a suit of protocol that achieves a good level of security between web browser and website. SSL designed to create secure channel or tunnel in between web browser and web server. So that information exchanged is protected within secured tunnel. It provide certificates to the client for authentication, user prove their identity using this certificate. CONCLUSIONS: In this paper we conclude that using some above general techniques we protect our personal computer or business organization from online attack like viruses, threats and unauthorized access. REFERENCES: 1. work-security.htm Information Security: Components and Techniques(January 201)( Aniruddha Singh, Abhishek Vaish, Pankaj Kumar Keserwani) 7.Type of Security Threats and It s Prevention (Ateeq Ahmad) 8.The Future of Organization s Computer Network Security for the Next 5 Years ( ) by Using Delphi Technique(Cholatip Yawut??and Phattarapong Keawpipop) 5

8 Publish Research Article International Level Multidisciplinary Research Journal For All Subjects Dear Sir/Mam, We invite unpublished Research Paper,Summary of Research Project,Theses,Books and Book Review for publication,you will be pleased to know that our journals are Associated and Indexed,India International Scientific Journal Consortium OPEN J-GATE Associated and Indexed,USA Google Scholar EBSCO DOAJ Index Copernicus Publication Index Academic Journal Database Contemporary Research Index Academic Paper Databse Digital Journals Database Current Index to Scholarly Journals Elite Scientific Journal Archive Directory Of Academic Resources Scholar Journal Index Recent Science Index Scientific Resources Database Directory Of Research Journal Indexing Indian Streams Research Journal 258/34 Raviwar Peth Solapur ,Maharashtra Contact Website :

Golden Research Thoughts

Golden Research Thoughts Vol 2 Issue 4 Oct 2012 ISSN No :2231-5063 ORIGINAL ARTICLE International Multidisciplinary Research Journal Golden Research Thoughts Chief Editor Dr.Tukaram Narayan Shinde Publisher Mrs.Laxmi Ashok Yakkaldevi

More information

Indian Streams Research Journal

Indian Streams Research Journal Vol 5 Issue 12 Jan 2016 ISSN No : 2230-7850 ORIGINAL ARTICLE International Multidisciplinary Research Journal Indian Streams Research Journal Executive Editor Ashok Yakkaldevi Editor-in-Chief H.N.Jagtap

More information

Indian Streams Research Journal

Indian Streams Research Journal Vol 5 Issue 7 Aug 2015 ISSN No : 2230-7850 ORIGINAL ARTICLE International Multidisciplinary Research Journal Indian Streams Research Journal Executive Editor Ashok Yakkaldevi Editor-in-Chief H.N.Jagtap

More information

Indian Streams Research Journal

Indian Streams Research Journal Vol 5 Issue 7 Aug 2015 ISSN No : 2230-7850 ORIGINAL ARTICLE International Multidisciplinary Research Journal Indian Streams Research Journal Executive Editor Ashok Yakkaldevi Editor-in-Chief H.N.Jagtap

More information

Indian Streams Research Journal

Indian Streams Research Journal Vol 5 Issue 7 Aug 2015 ISSN No : 2230-7850 ORIGINAL ARTICLE International Multidisciplinary Research Journal Indian Streams Research Journal Executive Editor Ashok Yakkaldevi Editor-in-Chief H.N.Jagtap

More information

Indian Streams Research Journal

Indian Streams Research Journal Vol 5 Issue 7 Aug 2015 ISSN No : 2230-7850 ORIGINAL ARTICLE International Multidisciplinary Research Journal Indian Streams Research Journal Executive Editor Ashok Yakkaldevi Editor-in-Chief H.N.Jagtap

More information

Indian Streams Research Journal

Indian Streams Research Journal Vol 5 Issue 7 Aug 2015 ISSN No : 2230-7850 ORIGINAL ARTICLE International Multidisciplinary Research Journal Indian Streams Research Journal Executive Editor Ashok Yakkaldevi Editor-in-Chief H.N.Jagtap

More information

GoldenResearch Thoughts

GoldenResearch Thoughts Vol 2 Issue 11 May 2013 Impact Factor : 1.2018 (GISI) ISSN No :2231-5063 ORIGINAL ARTICLE Monthly Multidisciplinary Research Journal GoldenResearch Thoughts Chief Editor Dr.Tukaram Narayan Shinde Publisher

More information

Indian Streams Research Journal

Indian Streams Research Journal Vol 5 Issue 9 Oct 2015 ISSN No : 2230-7850 ORIGINAL ARTICLE International Multidisciplinary Research Journal Indian Streams Research Journal Executive Editor Ashok Yakkaldevi Editor-in-Chief H.N.Jagtap

More information

Indian Streams Research Journal

Indian Streams Research Journal Vol 5 Issue 11Jan 2016 ISSN No : 2230-7850 ORIGINAL ARTICLE International Multidisciplinary Research Journal Indian Streams Research Journal Executive Editor Ashok Yakkaldevi Editor-in-Chief H.N.Jagtap

More information

Indian Streams Research Journal

Indian Streams Research Journal Vol 5 Issue 9 Oct 2015 ISSN No : 2230-7850 ORIGINAL ARTICLE International Multidisciplinary Research Journal Indian Streams Research Journal Executive Editor Ashok Yakkaldevi Editor-in-Chief H.N.Jagtap

More information

Indian Streams Research Journal

Indian Streams Research Journal Vol 5 Issue 7 Aug 2015 ISSN No : 2230-7850 ORIGINAL ARTICLE International Multidisciplinary Research Journal Indian Streams Research Journal Executive Editor Ashok Yakkaldevi Editor-in-Chief H.N.Jagtap

More information

Golden Research Thoughts

Golden Research Thoughts Vol 4 Issue 11 may 2015 ISSN No :2231-5063 ORIGINAL ARTICLE International Multidisciplinary Research Journal Golden Research Thoughts Chief Editor Dr.Tukaram Narayan Shinde Publisher Mrs.Laxmi Ashok Yakkaldevi

More information

Indian Streams Research Journal

Indian Streams Research Journal Vol 5 Issue 7 Aug 2015 ISSN No : 2230-7850 ORIGINAL ARTICLE International Multidisciplinary Research Journal Indian Streams Research Journal Executive Editor Ashok Yakkaldevi Editor-in-Chief H.N.Jagtap

More information

Indian Streams Research Journal

Indian Streams Research Journal Vol 5 Issue 7 Aug 2015 ISSN No : 2230-7850 ORIGINAL ARTICLE International Multidisciplinary Research Journal Indian Streams Research Journal Executive Editor Ashok Yakkaldevi Editor-in-Chief H.N.Jagtap

More information

Golden Research Thoughts

Golden Research Thoughts Vol 4 Issue 8 Feb 2015 ISSN No :2231-5063 ORIGINAL ARTICLE International Multidisciplinary Research Journal Golden Research Thoughts Chief Editor Dr.Tukaram Narayan Shinde Publisher Mrs.Laxmi Ashok Yakkaldevi

More information

Golden Research Thoughts

Golden Research Thoughts Vol 4 Issue 9 March 2015 ISSN No :2231-5063 ORIGINAL ARTICLE International Multidisciplinary Research Journal Golden Research Thoughts Chief Editor Dr.Tukaram Narayan Shinde Publisher Mrs.Laxmi Ashok Yakkaldevi

More information

Indian Streams Research Journal

Indian Streams Research Journal Vol 5 Issue 9 Oct 2015 ISSN No : 2230-7850 ORIGINAL ARTICLE International Multidisciplinary Research Journal Indian Streams Research Journal Executive Editor Ashok Yakkaldevi Editor-in-Chief H.N.Jagtap

More information

Golden Research Thoughts

Golden Research Thoughts Vol 4 Issue 11 May 2015 ISSN No :2231-5063 ORIGINAL ARTICLE International Multidisciplinary Research Journal Golden Research Thoughts Chief Editor Dr.Tukaram Narayan Shinde Publisher Mrs.Laxmi Ashok Yakkaldevi

More information

Indian Streams Research Journal

Indian Streams Research Journal Vol 5 Issue 9 Oct 015 ISSN No : 30-750 ORIGINAL ARTICLE International Multidisciplinary Research Journal Indian Streams Research Journal Executive Editor Ashok Yakkaldevi Editor-in-Chief H.N.Jagtap Welcome

More information

Indian Streams Research Journal

Indian Streams Research Journal Vol 4 Issue 6 July 2014 ISSN No : 2230-7850 ORIGINAL ARTICLE International Multidisciplinary Research Journal Indian Streams Research Journal Executive Editor Ashok Yakkaldevi Editor-in-Chief H.N.Jagtap

More information

Indian Streams Research Journal

Indian Streams Research Journal Vol 5 Issue 9 Oct 2015 ISSN No : 2230-7850 ORIGINAL ARTICLE International Multidisciplinary Research Journal Indian Streams Research Journal Executive Editor Ashok Yakkaldevi Editor-in-Chief H.N.Jagtap

More information

Golden Research Thoughts

Golden Research Thoughts Vol II Issue V Nov 2012 Impact Factor : 0.1870 ISSN No :2231-5063 ORIGINAL ARTICLE Monthly Multidiciplinary Research Journal Golden Research Thoughts Chief Editor Dr.Tukaram Narayan Shinde Publisher Mrs.Laxmi

More information

Indian Streams Research Journal

Indian Streams Research Journal Vol II Issue XII Jan 2013 Impact Factor : 0.2105 ISSN No : 2230-7850 ORIGINAL ARTICLE Monthly Multidisciplinary Research Journal Indian Streams Research Journal Executive Editor Ashok Yakkaldevi Editor-in-chief

More information

Indian Streams Research Journal

Indian Streams Research Journal Vol 5 Issue 7 Aug 2015 ISSN No : 2230-7850 ORIGINAL ARTICLE International Multidisciplinary Research Journal Indian Streams Research Journal Executive Editor Ashok Yakkaldevi Editor-in-Chief H.N.Jagtap

More information

Indian Streams Research Journal

Indian Streams Research Journal Vol 5 Issue 7 Aug 2015 ISSN No : 2230-7850 ORIGINAL ARTICLE International Multidisciplinary Research Journal Indian Streams Research Journal Executive Editor Ashok Yakkaldevi Editor-in-Chief H.N.Jagtap

More information

Indian Streams Research Journal

Indian Streams Research Journal Vol 5 Issue 7 Aug 2015 ISSN No : 2230-7850 ORIGINAL ARTICLE International Multidisciplinary Research Journal Indian Streams Research Journal Executive Editor Ashok Yakkaldevi Editor-in-Chief H.N.Jagtap

More information

Indian Streams Research Journal

Indian Streams Research Journal Vol 5 Issue 11 Dec 2015 ISSN No : 2230-7850 ORIGINAL ARTICLE International Multidisciplinary Research Journal Indian Streams Research Journal Executive Editor Ashok Yakkaldevi Editor-in-Chief H.N.Jagtap

More information

GoldenResearch Thoughts

GoldenResearch Thoughts Vol II Issue VI Dec 2012 Impact Factor : 0.1870 ISSN No :2231-5063 ORIGINAL ARTICLE Monthly Multidisciplinary Research Journal GoldenResearch Thoughts Chief Editor Dr.Tukaram Narayan Shinde Publisher Mrs.Laxmi

More information

Indian Streams Research Journal

Indian Streams Research Journal Vol 5 Issue 1 Feb 2015 ISSN No : 2230-7850 ORIGINAL ARTICLE International Multidisciplinary Research Journal Indian Streams Research Journal Executive Editor Ashok Yakkaldevi Editor-in-Chief H.N.Jagtap

More information

Indian Streams Research Journal

Indian Streams Research Journal Vol 5 Issue 5 June 2015 ISSN No : 2230-7850 ORIGINAL ARTICLE International Multidisciplinary Research Journal Indian Streams Research Journal Executive Editor Ashok Yakkaldevi Editor-in-Chief H.N.Jagtap

More information

Indian Streams Research Journal

Indian Streams Research Journal Vol 6 Issue 1 Feb 2016 ISSN No : 2230-7850 ORIGINAL ARTICLE International Multidisciplinary Research Journal Indian Streams Research Journal Executive Editor Ashok Yakkaldevi Editor-in-Chief H.N.Jagtap

More information

Golden Research Thoughts

Golden Research Thoughts Vol III Issue IX March 2014 Impact Factor : 2.2052(UIF) ISSN No :2231-5063 ORIGINAL ARTICLE International Multidisciplinary Research Journal Golden Research Thoughts Chief Editor Dr.Tukaram Narayan Shinde

More information

Indian Streams Research Journal

Indian Streams Research Journal Vol 5 Issue 7 Aug 2015 ISSN No : 2230-7850 ORIGINAL ARTICLE International Multidisciplinary Research Journal Indian Streams Research Journal Executive Editor Ashok Yakkaldevi Editor-in-Chief H.N.Jagtap

More information

Golden Research Thoughts

Golden Research Thoughts Vol 5 Issue 3 Sept 2015 ISSN No :2231-5063 ORIGINAL ARTICLE International Multidisciplinary Research Journal Golden Research Thoughts Chief Editor Dr.Tukaram Narayan Shinde Publisher Mrs.Laxmi Ashok Yakkaldevi

More information

Indian Streams Research Journal

Indian Streams Research Journal Vol 5 Issue 12 Jan 2016 ISSN No : 2230-7850 ORIGINAL ARTICLE International Multidisciplinary Research Journal Indian Streams Research Journal Executive Editor Ashok Yakkaldevi Editor-in-Chief H.N.Jagtap

More information

Indian Streams Research Journal

Indian Streams Research Journal Vol 5 Issue 7 Aug 2015 ISSN No : 2230-7850 ORIGINAL ARTICLE International Multidisciplinary Research Journal Indian Streams Research Journal Executive Editor Ashok Yakkaldevi Editor-in-Chief H.N.Jagtap

More information

Indian Streams Research Journal

Indian Streams Research Journal Vol 4 Issue 12 Jan 2015 ISSN No : 2230-7850 ORIGINAL ARTICLE International Multidisciplinary Research Journal Indian Streams Research Journal Executive Editor Ashok Yakkaldevi Editor-in-Chief H.N.Jagtap

More information

Indian Streams Research Journal

Indian Streams Research Journal Vol 5 Issue 9 Oct 2015 ISSN No : 2230-7850 ORIGINAL ARTICLE International Multidisciplinary Research Journal Indian Streams Research Journal Executive Editor Ashok Yakkaldevi Editor-in-Chief H.N.Jagtap

More information

GoldenResearch Thoughts

GoldenResearch Thoughts Vol II Issue VI Dec 2012 Impact Factor : 0.1870 ISSN No :2231-5063 ORIGINAL ARTICLE Monthly Multidisciplinary Research Journal GoldenResearch Thoughts Chief Editor Dr.Tukaram Narayan Shinde Publisher Mrs.Laxmi

More information

Indian Streams Research Journal

Indian Streams Research Journal Vol 5 Issue 12 Jan 2016 ISSN No : 2230-7850 ORIGINAL ARTICLE International Multidisciplinary Research Journal Indian Streams Research Journal Executive Editor Ashok Yakkaldevi Editor-in-Chief H.N.Jagtap

More information

Indian Streams Research Journal

Indian Streams Research Journal Vol 5 Issue 7 Aug 2015 ISSN No : 2230-7850 ORIGINAL ARTICLE International Multidisciplinary Research Journal Indian Streams Research Journal Executive Editor Ashok Yakkaldevi Editor-in-Chief H.N.Jagtap

More information

Indian Streams Research Journal

Indian Streams Research Journal Vol 6 Issue 1 Feb 2016 ISSN No : 2230-7850 ORIGINAL ARTICLE International Multidisciplinary Research Journal Indian Streams Research Journal Executive Editor Ashok Yakkaldevi Editor-in-Chief H.N.Jagtap

More information

Indian Streams Research Journal

Indian Streams Research Journal Vol 5 Issue 12 Jan 2016 ISSN No : 2230-7850 ORIGINAL ARTICLE International Multidisciplinary Research Journal Indian Streams Research Journal Executive Editor Ashok Yakkaldevi Editor-in-Chief H.N.Jagtap

More information

Golden Research Thoughts

Golden Research Thoughts Vol 5 Issue 6 Dec 2015 ISSN No :2231-5063 ORIGINAL ARTICLE International Multidisciplinary Research Journal Golden Research Thoughts Chief Editor Dr.Tukaram Narayan Shinde Publisher Mrs.Laxmi Ashok Yakkaldevi

More information

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft) 1- A (firewall) is a computer program that permits a user on the internal network to access the internet but severely restricts transmissions from the outside 2- A (system failure) is the prolonged malfunction

More information

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster Security Standards Symantec shall maintain administrative, technical, and physical safeguards for the Symantec Network designed to (i) protect the security and integrity of the Symantec Network, and (ii)

More information

Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006

Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,

More information

ITSC Training Courses Student IT Competence Programme SIIS1 Information Security

ITSC Training Courses Student IT Competence Programme SIIS1 Information Security ITSC Training Courses Student IT Competence Programme SI1 2012 2013 Prof. Chan Yuen Yan, Rosanna Department of Engineering The Chinese University of Hong Kong SI1-1 Course Outline What you should know

More information

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

2. From a control perspective, the PRIMARY objective of classifying information assets is to: MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected

More information

Research Directions. International Multidisciplinary Research Journal. Vol 3 Issue 4 Oct 2015 ISSN No: 2321-5488. Editor-in-Chief S.P.

Research Directions. International Multidisciplinary Research Journal. Vol 3 Issue 4 Oct 2015 ISSN No: 2321-5488. Editor-in-Chief S.P. Vol 3 Issue 4 Oct 2015 ISSN No: 2321-5488 ORIGINAL ARTICLE International Multidisciplinary Research Journal Research Directions Editor-in-Chief S.P. Rajguru Welcome to Research Direction ISSN No.2321-5488

More information

Achieving Truly Secure Cloud Communications. How to navigate evolving security threats

Achieving Truly Secure Cloud Communications. How to navigate evolving security threats Achieving Truly Secure Cloud Communications How to navigate evolving security threats Security is quickly becoming the primary concern of many businesses, and protecting VoIP vulnerabilities is critical.

More information

Data Management Policies. Sage ERP Online

Data Management Policies. Sage ERP Online Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...

More information

Chapter 11 Manage Computing Securely, Safely and Ethically. Discovering Computers 2012. Your Interactive Guide to the Digital World

Chapter 11 Manage Computing Securely, Safely and Ethically. Discovering Computers 2012. Your Interactive Guide to the Digital World Chapter 11 Manage Computing Securely, Safely and Ethically Discovering Computers 2012 Your Interactive Guide to the Digital World Objectives Overview Define the term, computer security risks, and briefly

More information

The Future of Organization s Computer Network Security for the Next 5 Years (2011-2015) by Using Delphi Technique

The Future of Organization s Computer Network Security for the Next 5 Years (2011-2015) by Using Delphi Technique 2011 International Conference on Information and Electronics Engineering IPCSIT vol.6 (2011) (2011) IACSIT Press, Singapore The Future of Organization s Computer Network Security for the Next 5 Years (2011-2015)

More information

PROTECT YOUR COMPUTER AND YOUR PRIVACY!

PROTECT YOUR COMPUTER AND YOUR PRIVACY! PROTECT YOUR COMPUTER AND YOUR PRIVACY! Fraud comes in many shapes simple: the loss of both money protecting your computer and Take action and get peace of and sizes, but the outcome is and time. That

More information

OCR LEVEL 3 CAMBRIDGE TECHNICAL

OCR LEVEL 3 CAMBRIDGE TECHNICAL Cambridge TECHNICALS OCR LEVEL 3 CAMBRIDGE TECHNICAL CERTIFICATE/DIPLOMA IN IT NETWORKED SYSTEMS SECURITY J/601/7332 LEVEL 3 UNIT 28 GUIDED LEARNING HOURS: 60 UNIT CREDIT VALUE: 10 NETWORKED SYSTEMS SECURITY

More information

Information Security By Bhupendra Ratha, Lecturer School of Library & Information Science D.A.V.V., Indore E-mail:bhu261@gmail.com Outline of Information Security Introduction Impact of information Need

More information

Cyber Security Awareness

Cyber Security Awareness Cyber Security Awareness User IDs and Passwords Home Computer Protection Protecting your Information Firewalls Malicious Code Protection Mobile Computing Security Wireless Security Patching Possible Symptoms

More information

BCS IT User Syllabus IT Security for Users Level 2. Version 1.0

BCS IT User Syllabus IT Security for Users Level 2. Version 1.0 BCS IT User Syllabus IT for Users Level 2 Version 1.0 June 2009 ITS2.1 System Performance ITS2.1.1 Unwanted messages ITS2.1.2 Malicious ITS2.1.1.1 ITS2.1.1.2 ITS2.1.2.1 ITS2.1.2.2 ITS2.1.2.3 ITS2.1.2.4

More information

Course: Information Security Management in e-governance. Day 1. Session 5: Securing Data and Operating systems

Course: Information Security Management in e-governance. Day 1. Session 5: Securing Data and Operating systems Course: Information Security Management in e-governance Day 1 Session 5: Securing Data and Operating systems Agenda Introduction to information, data and database systems Information security risks surrounding

More information

Network Security and the Small Business

Network Security and the Small Business Network Security and the Small Business Why network security is important for a small business Many small businesses think that they are less likely targets for security attacks as compared to large enterprises,

More information

OCT Training & Technology Solutions Training@qc.cuny.edu (718) 997-4875

OCT Training & Technology Solutions Training@qc.cuny.edu (718) 997-4875 OCT Training & Technology Solutions Training@qc.cuny.edu (718) 997-4875 Understanding Information Security Information Security Information security refers to safeguarding information from misuse and theft,

More information

IIABSC 2015 - Spring Conference

IIABSC 2015 - Spring Conference IIABSC 2015 - Spring Conference Cyber Security With enough time, anyone can be hacked. There is no solution that will completely protect you from hackers. March 11, 2015 Chris Joye, Security + 1 2 Cyber

More information

Common Cyber Threats. Common cyber threats include:

Common Cyber Threats. Common cyber threats include: Common Cyber Threats: and Common Cyber Threats... 2 Phishing and Spear Phishing... 3... 3... 4 Malicious Code... 5... 5... 5 Weak and Default Passwords... 6... 6... 6 Unpatched or Outdated Software Vulnerabilities...

More information

Online International Interdisciplinary Research Journal, {Bi-Monthly}, ISSN2249-9598, Volume-III, Issue-IV, July-Aug 2013

Online International Interdisciplinary Research Journal, {Bi-Monthly}, ISSN2249-9598, Volume-III, Issue-IV, July-Aug 2013 Need to understand Cyber Crime s Impact over national Security in India: A case study P.R. Patil and D.V. Bhosale Dept. of Defence & Strategic Studies, Tuljaram Chaturchand College, Baramati, Dist- Pune,

More information

The Key to Secure Online Financial Transactions

The Key to Secure Online Financial Transactions Transaction Security The Key to Secure Online Financial Transactions Transferring money, shopping, or paying debts online is no longer a novelty. These days, it s just one of many daily occurrences on

More information

Top tips for improved network security

Top tips for improved network security Top tips for improved network security Network security is beleaguered by malware, spam and security breaches. Some criminal, some malicious, some just annoying but all impeding the smooth running of a

More information

Online Security Awareness - UAE Exchange - Foreign Exchange Send Money UAE Exchange

Online Security Awareness - UAE Exchange - Foreign Exchange Send Money UAE Exchange The responsibility of safeguarding your personal information starts with you. Your information is critical and it must be protected from unauthorised disclosure, modification or destruction. Here we are

More information

Cyber Security Awareness

Cyber Security Awareness Cyber Security Awareness William F. Pelgrin Chair Page 1 Introduction Information is a critical asset. Therefore, it must be protected from unauthorized modification, destruction and disclosure. This brochure

More information

How To Use Pretty Good Privacy (Pgp) For A Secure Communication

How To Use Pretty Good Privacy (Pgp) For A Secure Communication Cryptographic process for Cyber Safeguard by using PGP Bharatratna P. Gaikwad 1 Department of Computer Science and IT, Dr. Babasaheb Ambedkar Marathwada University Aurangabad, India 1 ABSTRACT: Data security

More information

Cyber Self Assessment

Cyber Self Assessment Cyber Self Assessment According to Protecting Personal Information A Guide for Business 1 a sound data security plan is built on five key principles: 1. Take stock. Know what personal information you have

More information

Seamless ICT Infrastructure Security.

Seamless ICT Infrastructure Security. Seamless ICT Infrastructure Security. Integrated solutions from a single source. Effective protection requires comprehensive measures. Global networking has practically removed all borders in the exchange

More information

MODULES FOR TRAINING PROGRAMMES ON CYBER SECURITY

MODULES FOR TRAINING PROGRAMMES ON CYBER SECURITY MODULES FOR TRAINING PROGRAMMES ON CYBER SECURITY 1) Awareness Programme on Cyber Security for Users of Computer Awareness Programme on Cyber Security for Users of Computer 1 day To make the users of computers

More information

Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details:

Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details: Malicious software About ENISA The European Network and Information Security Agency (ENISA) is an EU agency created to advance the functioning of the internal market. ENISA is a centre of excellence for

More information

Five keys to a more secure data environment

Five keys to a more secure data environment Five keys to a more secure data environment A holistic approach to data infrastructure security Compliance professionals know better than anyone how compromised data can lead to financial and reputational

More information

INTERNET & COMPUTER SECURITY March 20, 2010. Scoville Library. ccayne@biblio.org

INTERNET & COMPUTER SECURITY March 20, 2010. Scoville Library. ccayne@biblio.org INTERNET & COMPUTER SECURITY March 20, 2010 Scoville Library ccayne@biblio.org Internet: Computer Password strength Phishing Malware Email scams Identity Theft Viruses Windows updates Browser updates Backup

More information

Information Security Awareness Training Gramm-Leach-Bliley Act (GLB Act)

Information Security Awareness Training Gramm-Leach-Bliley Act (GLB Act) Information Security Awareness Training Gramm-Leach-Bliley Act (GLB Act) The GLB Act training packet is part of the Information Security Awareness Training that must be completed by employees. Please visit

More information

How are we keeping Hackers away from our UCD networks and computer systems?

How are we keeping Hackers away from our UCD networks and computer systems? How are we keeping Hackers away from our UCD networks and computer systems? Cybercrime Sony's Hacking Scandal Could Cost The Company $100 Million - http://www.businessinsider.com/sonys-hacking-scandal-could-cost-the-company-100-million-2014-12

More information

SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)

SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA) UNIVERSITY OF PITTSBURGH POLICY SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA) DATE: March 18, 2005 I. SCOPE This

More information

GlobalSign Malware Monitoring

GlobalSign Malware Monitoring GLOBALSIGN WHITE PAPER GlobalSign Malware Monitoring Protecting your website from distributing hidden malware GLOBALSIGN WHITE PAPER www.globalsign.com CONTENTS Introduction... 2 Malware Monitoring...

More information

Protection for Mac and Linux computers: genuine need or nice to have?

Protection for Mac and Linux computers: genuine need or nice to have? Protection for Mac and Linux computers: genuine need or nice to have? The current risk to computers running non-windows platforms is small but growing. As Mac and Linux computers become more prevalent

More information

SHORT MESSAGE SERVICE SECURITY

SHORT MESSAGE SERVICE SECURITY SHORT MESSAGE SERVICE SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in

More information

Spyware. Michael Glenn Technology Management Michael.Glenn@Qwest.com. 2004 Qwest Communications International Inc.

Spyware. Michael Glenn Technology Management Michael.Glenn@Qwest.com. 2004 Qwest Communications International Inc. Spyware Michael Glenn Technology Management Michael.Glenn@Qwest.com Agenda Security Fundamentals Current Issues Spyware Definitions Overlaps of Threats Best Practices What Service Providers are Doing References

More information

Software Engineering 4C03 Class Project. Computer Networks and Computer Security COMBATING HACKERS

Software Engineering 4C03 Class Project. Computer Networks and Computer Security COMBATING HACKERS Software Engineering 4C03 Class Project Computer Networks and Computer Security COMBATING HACKERS Done By: Ratinder Ricky Gill Student Number: 0048973 E-Mail: gillrr@mcmaster.ca Due: Tuesday April 5, 2005

More information

Usages of Selected Antivirus Software in Different Categories of Users in selected Districts

Usages of Selected Antivirus Software in Different Categories of Users in selected Districts Usages of Selected Antivirus Software in Different Categories of Users in selected Districts Dr. Bhaskar V. Patil 1, Dr. Milind. J. Joshi 2 Bharati Vidyapeeth University Yashwantrao Mohite institute of

More information

Risk Assessment Guide

Risk Assessment Guide KirkpatrickPrice Assessment Guide Designed Exclusively for PRISM International Members KirkpatrickPrice. innovation. integrity. delivered. KirkpatrickPrice Assessment Guide 2 Document Purpose The Assessment

More information

Security Defense Strategy Basics

Security Defense Strategy Basics Security Defense Strategy Basics Joseph E. Cannon, PhD Professor of Computer and Information Sciences Harrisburg University of Science and Technology Only two things in the water after dark. Gators and

More information

Basic Computer Security Part 2

Basic Computer Security Part 2 Basic Computer Security Part 2 Presenter David Schaefer, MBA OCC Manager of Desktop Support Adjunct Security Instructor: Walsh College, Oakland Community College, Lawrence Technology University Welcome

More information

VOIP for Telerehabilitation: A Risk Analysis for Privacy, Security, and HIPAA Compliance

VOIP for Telerehabilitation: A Risk Analysis for Privacy, Security, and HIPAA Compliance VOIP for Telerehabilitation: A Risk Analysis for Privacy, Security, and HIPAA Compliance Valerie J.M. Watzlaf, PhD, RHIA, FAHIMA, Sohrab Moeini, MS, and Patti Firouzan, MS, RHIA Department of Health Information

More information

COB 302 Management Information System (Lesson 8)

COB 302 Management Information System (Lesson 8) COB 302 Management Information System (Lesson 8) Dr. Stanley Wong Macau University of Science and Technology Chapter 13 Security and Ethical Challenges 安 全 與 倫 理 挑 戰 Remarks: Some of the contents in this

More information

Cyber Security: Beginners Guide to Firewalls

Cyber Security: Beginners Guide to Firewalls Cyber Security: Beginners Guide to Firewalls A Non-Technical Guide Essential for Business Managers Office Managers Operations Managers This appendix is a supplement to the Cyber Security: Getting Started

More information

COSC 472 Network Security

COSC 472 Network Security COSC 472 Network Security Instructor: Dr. Enyue (Annie) Lu Office hours: http://faculty.salisbury.edu/~ealu/schedule.htm Office room: HS114 Email: ealu@salisbury.edu Course information: http://faculty.salisbury.edu/~ealu/cosc472/cosc472.html

More information

Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning

Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning Lee Zelyck Network Administrator Regina Public Library Malware, Spyware, Trojans

More information

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 2 Systems Threats and Risks

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 2 Systems Threats and Risks Security+ Guide to Network Security Fundamentals, Third Edition Chapter 2 Systems Threats and Risks Objectives Describe the different types of software-based attacks List types of hardware attacks Define

More information

An Introduction on How to Better Protect Your Computer and Sensitive Data

An Introduction on How to Better Protect Your Computer and Sensitive Data An Introduction on How to Better Protect Your Computer and Sensitive Data Common Security Problems Computer users who fail to use strong passwords Constant attacks by viruses, worms, key loggers and bots

More information

EXIN Information Security Foundation based on ISO/IEC 27002. Sample Exam

EXIN Information Security Foundation based on ISO/IEC 27002. Sample Exam EXIN Information Security Foundation based on ISO/IEC 27002 Sample Exam Edition June 2016 Copyright 2016 EXIN All rights reserved. No part of this publication may be published, reproduced, copied or stored

More information

E-BUSINESS THREATS AND SOLUTIONS

E-BUSINESS THREATS AND SOLUTIONS E-BUSINESS THREATS AND SOLUTIONS E-BUSINESS THREATS AND SOLUTIONS E-business has forever revolutionized the way business is done. Retail has now a long way from the days of physical transactions that were

More information

E-Business, E-Commerce

E-Business, E-Commerce E-Business, E-Commerce Lecture Outline 11 Instructor: Kevin Robertson Introduction to Information Systems Explain the differences between extranets and intranets as well as show how organizations utilize

More information

Malware & Botnets. Botnets

Malware & Botnets. Botnets - 2 - Malware & Botnets The Internet is a powerful and useful tool, but in the same way that you shouldn t drive without buckling your seat belt or ride a bike without a helmet, you shouldn t venture online

More information