Refine your search
Collections
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Sharma, Ayush
- Safeguard Issues in Information Security
Abstract Views :153 |
PDF Views:0
Authors
Affiliations
1 Department of Electronics and Communication Engineering, Amity School of Engineering, Amity University Uttar Pradesh, Noida – 201313, Uttar Pradesh, IN
2 Department of Electronics and Communication Engineering, Amity School of Engineering, Amity University, Noida – 201313, Uttar Pradesh, IN
3 Amity Institute of Information Technology, Amity University, Noida – 201301, Uttar Pradesh, IN
1 Department of Electronics and Communication Engineering, Amity School of Engineering, Amity University Uttar Pradesh, Noida – 201313, Uttar Pradesh, IN
2 Department of Electronics and Communication Engineering, Amity School of Engineering, Amity University, Noida – 201313, Uttar Pradesh, IN
3 Amity Institute of Information Technology, Amity University, Noida – 201301, Uttar Pradesh, IN
Source
Indian Journal of Science and Technology, Vol 9, No 33 (2016), Pagination:Abstract
This paper presents a critique of the work done in field of network security with a focus on attacks which are further classified into active and passive and how to safeguard information. Active attacks are classified into masquerade, fabrication and modification of message which is further categorized into replay attacks and alterations. Passive attack includes release of message content and traffic analysis. For securing our network, analysis of various network security techniques which include Virtual Private Network (VPN) technology, antivirus, firewalls, intrusion prevention systems and spyware protection is discussed by taking up relevant case studies. Detailed analysis of biometric security is concluded on the basis of following factors such as: biometric accuracy, its verification capabilities and their interaction with users. Security of network as well as end point users can be increased manifolds by implementing biometrics to our present networks. Biometrics acts as an extra shield in safeguarding our confidential information by implementing 2-step verification. Biometrics are classified into active and passive biometric and these systems include fingerprint, iris scanning, face detection and voice analysis.Keywords
Biometric, Fingerprint, Firewall, Information Security, Iris Scanning, Virtual Private Network- Virtual Reality: Blessings and Risk Assessment
Abstract Views :265 |
PDF Views:0
Authors
Affiliations
1 Department of Computer Science and Technology, Manav Rachna University, Faridabad – 121004, Haryana
1 Department of Computer Science and Technology, Manav Rachna University, Faridabad – 121004, Haryana