-
Provide Security to MapReduce, Hbase, & PIG
Monika Patel ; Prof. Piyush Patel
Pages: 1 - 4
Hbase is a distributed, scalable, big data store, modelled after Google's BigTable. It stores data as key/value pairs. database it's biggest advantage is that it provides you random read/write capabilities. Hadoop is not very good for your real time needs, so you can use Hbase to serve that purpose. If you have some data which you want to access real time, you could store it in Hbase. MapReduce is just a computing framework. HBase has nothing to do with it. That said, you can efficiently put or fetch data to/from HBase by writing MapReduce jobs. While Pig is basically a dataflow language that allows us to process enormous amounts of data very easily and quickly. Pig basically has 2 parts: the Pig Interpreter and the language, PigLatin. You write Pig script in PigLatin and using Pig interpreter process them. Pig makes our life a lot easier, otherwise writing MapReduce is always not easy.
Read More...
-
Energy Efficiency for Mica Mode to Improve Network Life Time Using Greedy Scheduling Algorithm
S.Kannadhasan ; M.Rajesh Baba
Pages: 5 - 10
The goal of this work is to preserve full coverage-target area while minimizing the number of active nodes. The nodes which are available in the wireless sensor networks consume more energy even when the nodes are not sensing or covering the target area. The nodes which should enter the hibernation state will be determined using the energy greedy scheduling algorithm which has several principles and objectives. Radio energy models are being used to find the energy consumed during access of the nodes at various modes like transmit, receive, idle and sleep mode. When the nodes enters the hibernation state and doesn’t sense or cover any target area then there will be an occurrence of blind point and that particular spot where the blind point occurs can be said as an blind spot. The blind point can be removed using the back of mechanism and that’s the major part of the work. The issue of energy saving is significant since in a battery-operated wireless node, the battery energy is definite and a node can only transmit a definite number of bits. The maximum number of bits that can be sent is defined by the total battery energy divided by the required energy per bit.
Read More...
-
Growing Cybercrimes in India: A Survey
Vaishnav Mruga Bhadreshbhai ; Prajapati Nikita Dineshbhai; Mr. Piyush Patel
Pages: 11 - 14
Cybercrime is defined as a crime in which a computer is the object of the crime (hacking, phishing, spamming) or is used as a tool to commit an offense (hate crimes). Cybercriminals may use computer technology to access personal information, business trade secrets, or use the internet for exploitive or malicious purposes. Criminals can also use computers for communication and document or data storage. Criminals who perform these illegal activities are often referred to as hackers [1]. Our paper gives detailed information regarding Cybercrime, its types, modes of cybercrime, security measures including prevention to deal efficiently with cybercrime.
Read More...
-
Cyber-Crime Effects and Issues on Company and its Stock Market Prices
Parekh Kanchi Saurabh ; Vrunda Chaitanya Rana; Varsha Girish Tank
Pages: 15 - 18
Cybercrime is a ubiquitous and crucial threat to publicly traded companies. Even though people have a basic amount of knowledge about “cyber-crimeâ€, the effects of this kind of crime has a great amount of impact on the people’s lives and society. This type of crime many times result in a loss of billion dollars annually to publically traded companies in the form of stolen assets and lost business. Further, when a company becomes a victim of cyber criminals, it may cause its customers to worry about the security of their business transactions with the company. If the company remains vulnerable to this kind of attacks than it may result in losing its future business. This thesis examines the effects and issues of cyber-crime on the stock market as well as on the company and the customers of the company.
Read More...
-
Survey of Privacy and Security Issues in Spice World E-Commerce Website
Palak Patel ; Rucha Patel; Vishwa Patel; Trupti Pathrabe
Pages: 19 - 23
The term used for world-wide communication of computers over a single network is referred as Internet. It is a public network and consisting of thousands of private computers network which are connected together. Privacy is needed while doing online business with customers over the internet and it has become an ongoing and increasing relevant for the users, developers, administrators, policy makers as well as technologist. This paper lays the groundwork with brief introduction of recent trend in E-commerce with people; particularly it managing spice from the different area which are famous for providing online selling for growers and have better choice to end users. E-commerce Security is a part of the Information Security framework and is specifically applied to the components that affect e-commerce that include Computer Security, Data security and other wider realms of the Information Security framework.
Read More...
-
Cyber Crime categories, Prevention Techniques and Cyber Crime Scenario in India
Hemangi Khimani
Pages: 24 - 27
In current era cyber crime is emerging very faster than the technology and the cyber security. Now-a-days attackers are more skillful than the cyber security professionals. It creates very harmful threats in the virtual world. In the world of cyber mobile phone is the most used source for transaction and information sharing which is most vulnerable treat. There are huge number of threats and vulnerabilities are available and their behavior is difficult to understand on early phase, so its difficult to prevent cyber crime at early phases of the attack. some of the cyber-attacks have motivation behind them whereas some of them are unknowingly. these attacks which are done knowingly comes under the category of the cyber crime and it creates a very serious impact on society it may be in the form of national defense threat, economical disrupt, financial fraud, etc. the main aim of this paper is to give a review about the scenario of cyber crime in India and spread awareness in the society about the cyber crime.
Read More...
-
Security and Privacy - A Big Concern in Big Data A Case Study on Tracking and Monitoring System
Tilwani Mashook ; Patel Malay; Pooja Mehta
Pages: 28 - 31
With the ever-increasing usage of Employee Tracking and Monitoring System data for fleet management is increasing enormously there is a need for proactive Tracking and Monitoring. In addition, the new wave of digitizing Fleet records has seen a paradigm shift in the corporate industry. As a result, the corporate industry is witnessing an increase in sheer volume of data in terms of complexity, diversity and timeliness. As corporate experts look for every possible way to properly manage and track Employee while improving Monitoring process, Tracking and management, big data emerges as a plausible solution with the promise to transform the corporate industry. This paradigm shift from reactive to proactive employee data can result in an overall decrease in risk costs and mismanagement of tasks by employee which would eventually lead to Company's growth. While the Corporate industry harnesses the power of big data, security and privacy issues are at the focal point as emerging threats and vulnerabilities continue to grow. In this paper, we present the state-of-the-art security and privacy issues in big data as applied to Employee Tracking and Corporate Fleet Management.
Read More...
-
Tautology based Advanced SQL Injection Technique A Peril to Web Application
Kritarth Jhala ; Shukla Umang Dipakkumar
Pages: 32 - 36
In online era,SQL Injection is the top most security breaches in web application applications' software they let the attackers to gain the unrestricted access to the heart of any web application called backend databases which underlying the applications and potentially sensitive information these databases contain. Although researchers and pentsters have proposed a variety of methods to address the SQL injection problem current approaches either fail to handle the full scope of the problem or have limitations that prohibit their use and adoption. Many researchers and practitioners are familiar with only a subset of the wide range of techniques available to attackers who are trying to take advantage of SQL injection vulnerabilities SQL Injection is a code injection technique which used to attack data-driven applications in which the malicious SQL statements are inserted into an entry field for execution code injection technique. The first public discussions of SQL injection started appearing around 1998.It is very common and dangerous vulnerability in web applications. Lot of techniques are there to exploit this vulnerability. This paper will focus on Advanced Authentication bypass using Tautology based injection (ex : ' OR '1' = '1) etc., with some other manipulations to gain different user accounts access.
Read More...
-
To Minimize Total Execution Time of Application in Computational Grid with Fault Tolerance Mechanism
Mr. Ramesh T. Prajapati ; Dr. Samrat Khanna; Prof.VijayKumar Gadhavi
Pages: 37 - 43
Framework figuring gives administration of sharing information stockpiling limit and PC control over the Internet and Intranet. It is an accumulation of vast gathering of circulated assets for tackling extensive information and issues. The heterogeneous way of network figuring asset makes the asset administration an essentially difficult employment. Out of these situations, Fault resilience and Load Balancing are principle idea in this research. The more number of assets required in network. So, the likelihood of blame event increments. To start with issue is on the advancement of adaptation to internal failure for computational matrices and applies the Load Balancing. For this I had setup a computational lattice in light of the Alchemi middleware. In the wake of setting up lattice, I have concentrated existing adaptation to internal failure in Alchemi. In instance of disappointment of the focal administrator, reinforcement supervisor will take its control and stays away from the framework to fizzle.
Read More...
-
Survey of Payment Integration and Data maintenance Issues
Riddhi Vaghela ; Upadhyay Monika; Mrs. Neha Minocha
Pages: 44 - 46
This payment integration and data maintenance issue survey deliberated over the security of electronic payment systems and management of huge amount of data. In our research, we focused on either dominant systems or new attempts and innovations to improve the level of security of the electronic payment systems. This survey consists of the Card-present (CP) transactions and a review of its dominant system. A data warehouse stores materialized views of data from one or more sources, with the purpose of efficiently implementing decision-support or OLAP queries. One of the most important decisions in designing a data warehouse is the selection of materialized views to be maintained at the warehouse. The goal is to select an appropriate set of views that minimizes total query response time and the cost of maintaining the selected views, given a limited amount of resource, e.g., materialization time, storage space, etc. In this article, we have developed a theoretical framework for the general problem of selection of views in a data warehouse. We present polynomial-time heuristics for a selection of views to optimize total query response time under a disk-space constraint, for some important special cases of the general data warehouse scenario:
1) an AND view graph, where each query/view has a unique evaluation, e.g., when a multiple-query optimizer can be used to general a global evaluation plan for the queries, and
2) an OR view graph, in which any view can be computed from any one of its related views, e.g., data cubes. We present proofs showing that the algorithms are guaranteed to provide a solution that is fairly close to (within a constant factor ratio of) the optimal solution. We extend our heuristic to the general AND-OR view graphs. Finally, we address in detail the view-selection problem under the maintenance cost constraint and present provably competitive heuristics.
Read More...
-
Cyber Security - Security Problems and Encounters in Physical System
Tosal M. Bhalodia ; Keyur N. Zala; Debalina Nandy
Pages: 47 - 51
In this paper, we look into the security challenge and issue of cyber-physical systems which is placed physically somewhere as mentioned. 1. We summary the general workflow of cyber physical systems, 2. Identify the attack issues, possible vulnerabilities, adversary characteristics and a set of challenges that need to be address; 3. Then we also propose a physical-context-awareness of security framework for all-purpose cyber-physical systems in real time application and suggest some probable research areas and problems for security.
Read More...
-
A Survey: Security and Payment Issues in Stay’N Play
Patel Avik M. ; Prof. Nidhi Barot
Pages: 61 - 65
The purpose of this paper is to analyze the effect of privacy and perceived security on the level of trust shown by the consumer in the internet. It also aims to reveal and test the close relationship between the trust in a web site and the degree of loyalty to it. First, there is an explanation of the main attributes of the concepts examined, with special attention being paid to the multiâ€dimensional nature of the variables and the relationships between them.
Read More...
-
Survey Paper on security Issues in E-Commerce Pathology
Wadhwani Meenakshi A ; Prof. Nidhi Barot
Pages: 66 - 68
"Ecommerce Pathology" is a portal which provides patients easier access to their healthcare information and pathology services, thereby providing pathology lab a platform to increase their profit by selling diagnostic tests and health packages online. But a major challenge in designing such a system is to meet the critical security requirements such as confidentiality of patient data, pathology lab data and integrity of diagnosis results and availability of healthcare services. This paper addresses informatics security issues in the system related to passwords, biometric devices, and data encryption. It also addresses the issue from access control perspective.
Read More...
-
A Survey Paper on Security Aspects of “Art Treasureâ€: An Android Application
Preyansi Shaileshkumar Darji ; Prof. Nidhi Barot; Vijaysinh Chandrasinh Sodha
Pages: 69 - 71
Here this survey paper is made for all Security Aspects for the application “Art Treasureâ€. This document includes all the necessary security facilities for payments. All the credential information of the institutes will also going to be secured here. Security for online payment of the particular course is the most basic requirements for this application. As most of the participant will going to do an online payment for their learning course, security for their payment is highly recommendation. As we all know that online payment has its own advantages and some of the drawbacks also. By providing online payment participants will easily pay their fees while it also has a drawback of risk of security and many more.
Read More...
-
Adequate Analyzing of Social Network Based on Big Data
Heena Rawal ; Dr. Priyanka Sharma
Pages: 72 - 76
As a late there has been an immense increase of social network of data in modern world. This is evident within the field of social media. The amount of social data is growing fast. For a social media networking platform, this provides means of getting more information to the world. This platform gives us many useful information, thus the analysis and information extraction is of great value. The average global internet user spends two and a half hours daily on social media. This way social media users produce huge amount of data which cannot be handled with conventional data management techniques. The social media are making compelling investments in putting this data to work because it gives the analysis of media content has been central in social sciences, due to the key role that media plays in shaping public opinion etc. The main aims of this paper are impact of big data on social media and some technical issues and impact on society. As these networks can be very large the methods used to study them must scale linearly when the network size increases. Thus, an integral part of the study is to determine which social network analysis algorithms that have this scalability. Another important part of using social network analysis is to be able to interpret the results. It will include discussion on appearing and circumstantial in education, economy, advanced technology, environment and safety and role of these two contemporary technologies of Big Data and Social Media on them.
Read More...
-
A Survey on Supply Chain Cyber Security
Shreya Sharma ; Janki Thakkar; Jalpa Patel
Pages: 77 - 79
Supply chain cyber security refers to efforts to enhance cyber security within the supply chain. It is a subset of supply chain security and is focused on the management of cyber security requirements for information technology systems, software and networks, which are driven by threats such as cyber-terrorism, malware, data theft and the advanced persistent threat (APT). Typical supply chain cyber security activities for minimizing risks include buying only from trusted vendors, disconnecting critical machines from outside networks, and educating users on the threats and protective measures they can take.
Read More...
-
Survey Paper on Security and Payment Issue in Tripedia an iOS Application
Thakore Abhirajsinh ; Krunal Ubhadiya; Vijay Tahelramani; Prof. Neha Minocha
Pages: 80 - 83
The purpose of this article is to analyses the effect of privacy and perceived security on the level of trust shown by the consumer in the Internet. This survey deliberated over the security of electronic payment systems. This article also shows the security issues and privacy level in the mobile applications for IOS. It also aims to reveal and test the close relationship between the trust in an application and degree of loyalty. In this research in progress we investigate what characteristics of mobile payment solutions increase or decrease consumers' willingness to adopt these solutions. We also evaluate the solution of that security problems and privacy issues and how can we tackle from the problems using technology. The paper is divided into five sections which includes introduction of IOS application in first section, then security in second section and then third section is all about malicious things like virus, worms, etc. Then fourth section is about data security and fifth section is all about unauthorized access and vulnerability. And Finally we end up our paper with conclusion.
Read More...
-
Variants of Scheduling in Distributed Networking using Vehicular Ad-hoc Networks
Prof. Manish Singh ; Prof. Dushyantsinh Rathod; Prof. Jayshree Upadhyay
Pages: 84 - 89
Vehicular connectivity can be fairly considered a future killer application, adding extra value to the car industry and operator’s services. Its main feature is to provide car safety and passenger comfort. Thus the issue of content distribution for these emerging vehicular applications needs to be handled carefully. In this paper we have done comparative study of different systems that can be used for distributing data in vehicular network applications and shown that Vehicular Ad hoc Network (VANET) is the most suitable solution for this purpose. Vehicular Ad-hoc Networks are self-arranging networks created among vehicles equipped with communication facilities. Because of late headways in vehicular advancements vehicular communication has risen. For a rich arrangement of uses executing intelligent highways, similar to application identified with street security, activity observing and administration, street debacle relief and so out and about side framework assumes a fundamental part for any VANET. This is the reason that effective communication between the vehicles and the street side framework is needed. Meeting this prerequisite gets to be exceptionally upsetting as hubs in a VANET are profoundly portable and along these lines the system topology is very dynamic. Primary objective of scheduling scheme is to serve whatever number demands as could be allowed by considering information type. We reviewed different scheduling schemes. Scheduling increases the quality of service.
Read More...
-
Security Challenges in Big Data
Miss. Debalina Nandy ; Mr. Renish J Padariya; Miss Tosal Bhalodia
Pages: 90 - 93
The biggest challenge for big data from a security point of view is the protection of user’s privacy. Big data frequently contains huge amounts of personal identifiable information and therefore privacy of users is a huge concern. Because of the big amount of data stored, breaches affecting big data can have more devastating consequences than the data breaches we normally see in the press. This is because a big data security breach will potentially affect a much larger number of people, with consequences not only from a reputational point of view, but with enormous legal repercussions. While using big data a significant challenge is how to establish ownership of information. If the data is stored in the cloud a trust boundary should be establish between the data owners and the data storage owners.
Read More...
-
Big data concern with Web Applications :“The Growth Enhancement For Free Venture Proposal
Shreya P Shah ; Mansi H Shah; Prof. Nidhi Barot
Pages: 94 - 95
Big data is more than just some trending business phrase that’s big on style and low on substance; it brings with it tangible benefits for any company willing to use it so Here this document is made for all Security issue with big data for the application “The Growth Enhancement For Free Venture Proposalâ€. This document includes all the necessary security facilities for details of business. All the credential information of the business will also going to be secured here. The advantages of leveraging big data are real and oftentimes far-reaching, which is why so many organizations have adopted big data for their own operations But that doesn’t mean big data has prepared a paved road to the future. Security for online payment of the particular business is the most basic requirements for this application. As most of the client will going to do an online payment for their service charges, security for their payment is highly recommendation. As we all know that online payment has its own advantages and some of the drawbacks also. By providing online payment clients will easily pay their charges while it also has a drawback of risk of security and many more.
Read More...
-
A Survey on Cloud Computing
Tilwani Mashook ; Harshvardhan Shani; Prof. Nidhi Barot
Pages: 96 - 100
Cloud computing is a computing paradigm, where a large pool of systems are connected in private or public networks, to provide dynamically scalable infrastructure for application, data and file storage. The idea of cloud computing is based on a very fundamental principal of reusability of IT capabilities'. The difference that cloud computing brings compared to traditional concepts of “grid computingâ€, “distributed computingâ€, “utility computingâ€, or “autonomic computing†is to broaden horizons across organizational boundaries. Advocates claim that cloud computing allows companies to avoid upfront infrastructure costs. As well, it enables organizations to focus on their core businesses instead of spending time and money on computer infrastructure. Proponents also claim that cloud computing allows enterprises to get their applications up and running faster, with improved manageability and less maintenance, and enables Information technology (IT) teams to more rapidly adjust resources to meet fluctuating and unpredictable business demand. This paper brings an introduction review on the Cloud computing and provides the state-of-the-art of Cloud computing technologies. Readers will also capture the status of cloud computing as well as its future trends.
Read More...
-
A Survey: Security Technique for on Demand Multicast Routing (SAODV)
Ms. Namita Patel ; Ms. Nirmal Patel
Pages: 101 - 104
Wireless routing is an area of research which is being focused mainly for congestion avoidance and security. Various routing protocols and techniques are being included in wireless network and making it an area for further research. The need is increasing more due to invention and adaption of wireless communication devices for wireless communication. This work is focusing on security over multicast routing and simulations are being proposed to show the improved packet delivery ration, end to end delay and reduced packet drop rate for Ad hoc On Demand Distance Vector (AODV) routing protocol. Attacks are being avoided proactively by including changes in the basic implementation of AODV routing protocol. This work proposed to provide access control technique and unique key based authentication for AODV.
Read More...
-
Security Issues with Social Networking Sites
Viraj Kothari ; Biren patel
Pages: 105 - 107
Social networking sites have become very popular avenues for people to communicate with family, friends and colleagues from around the corner or across the globe. Social networking sites offer a straightforward way for people to have a simple social presence through web. They provide a virtual environment for people to share each and every activity, their interests, and their circle of acquaintance with their family, friends, or even the unknown. Social networking has transformed the way the connected masses communicate. Social network information is now being used in ways for which it may have not been originally intended. With so much sharing, hackers and thieves have found very easy ways to steal personal information through these networking sites. In this paper we present several of these privacy and security issues of Social Networks. In this paper we propose an architecture for secure request response exchange of data between users. Our research suggests that only a proper knowledge of the hacking strategies will prove the best defence in the war against cyber-attacks.
Read More...
-
A Survey Paper on Security Issue with Big Data on Association Rule Mining
Asha Patel
Pages: 108 - 109
Big data implies performing computation and database operations for massive amounts of data, remotely from the data owner’s enterprise. Since a key value proposition of big data is access to data from multiple and diverse domains, security and privacy will play a very important role in big data research and technology [1] Data mining is defined as the process of extracting useful knowledge or information from large data repository. To provide privacy to the data is the major issue so that the third party is not able to access the sensitive information. In this paper I clearly define the privacy prevention for Association rule mining in Big data.
Read More...
-
A Survey on Security Issues of In-Secure APIs of Cloud
Nidhi Barot
Pages: 110 - 111
Cloud is one of the next generation networks. It is used to provide various on demand resources to the user as per their availability. Clouds are basically collections of APIs and Various Services. Cloud computing providers expose a set of software interfaces or APIs that customers use to manage and interact with cloud services [1]. One of the major challenges for the cloud is its Security. The major reason for this is out sourcing of services to the third party.
Read More...
-
Simplified Approach to Analyse System Log Files
Dave Foram Pradipbhai ; Parth Pandya Nitinbhai
Pages: 112 - 116
Today’s computer based applications are networked based. Applications and computer systems are shared by many users of the organizations like academic institution, governmental offices and research institutions. When same system recourses are used by many users, it is very important to keep track of activities performed by them. All activities performed by such users are stored in to system log files. In case of any dispute/problem/attack in the system, such log files are very important for administrators of that network. We have designed a prototype model which will help administrators to analyse system log files.
Read More...
-
Survey on Prevention of Web injection using WAF and input Whitelisting
Kajalben Vishnubhai Patel ; Ravi Sheth
Pages: 117 - 120
Injections flaws which include SQL injection are the most prevalent security threats affecting Web applications. In this attack, Attacker is able to take benefit of poorly coded Web application software to put malicious or unwanted code into the organization's systems and network. The vulnerability exists within web application when a Web application does not provide proper validation or filtering for the input data entered by the user in the Input fields. To mitigate these attacks, Web Application Firewalls (WAFs) apply security rules in order to both inspect HTTP data streams and detect malicious HTTP transactions. Attackers can bypass WAF’s rules by using sophisticated SQL injection techniques. To address this problem we proposed a model which can generally patch the SQL injection vulnerability. This model not only sanitize the user input, but also guarantee the prevention of sql injection by applying the whitelisting rule.
Read More...
-
Exploration of Cognitive Skills in Kids through Cyber Crime Ethics Education: A Prevention Method
Prof. Bhavika Ganatra ; Dr. Roshni Rawal
Pages: 121 - 124
The growing use of e-learning system from the beginning age of education has been adopted rapidly, converting classroom teaching into Smart Classes and giving exposure of the world to the kids, leads to some positive as well as negative aspects named as ‘Cyber Crime’. Cybercrime is seen in more in the teenagers and youth but its root starts developing since childhood. Due to rapid digitalization of the world the level of intelligence is going high but ethical values are receding. Imparting cyber education with ethical values at right age can lead to decrease its crime rate in the world. The paper emphasis on the exploration of cognitive skills in the kids through moral internet education and a model prepared as one of the major preventing method of cybercrime. Objective of the paper is to provide a strong, moral foundation to build a smarter, intelligent and ethical generation to welcome future with various e- innovations with less e-crime rate and high moral values.
Read More...
-
Survey on Security Issues of Growing Technology : Big Data
Trupti V. Pathrabe
Pages: 125 - 129
Data is currently most important assets of any organization in every field with which many operations can be performed. The continuous growth in the importance and volume of data has created a new problem: it cannot be handled by traditional analysis techniques. This problem was, therefore, solved through the creation of a new paradigm: Big Data. Big Data originated new issues related to data security and privacy. This survey paper includes some security issues as well as privacy issues in Big data.
Read More...
-
Privacy and Security Issues in Social Online Networks
Rajvi Modi ; Radhika Bhagat; Mr. Harshil Joshi; Palaumi Patel
Pages: 130 - 134
Trend of social networking is burgeoning at tremendous rate. This constant use of internet poses potential dangers to all those people using it. Internet security includes taking measures against malicious attacks over internet and internet privacy includes exposure of private information to third party. Naïve users, especially teenagers reveal their private information comprehending of their location, current status, reputationally damaging photos, etc to the whole world. By keeping security and privacy settings open to public, they create insecure channel through which private information is exchanged which leads to a high risk of intrusion. Often users fall victim of a hyperlink or advertisement, which have catchy or provocative headline that entices a user to click to continue reading an article, which leads to infection of malware to their devices. Our study of survey paper includes all these unfavourable circumstances that befall to the community of social online network users and how they can manage to save themselves from this kind of cyber-crime. Some suggestions or remedies will also be given to the users in this survey paper to prevent themselves from malicious software.
Read More...
-
Distributed Computing Networks-Network of Workstations
Drashti Bhavsar ; Hiral Chhaniyara; Neha Minocha
Pages: 135 - 139
Distributed network of workstations are ready to do things at particular moment to become the primary computing infrastructure for science and technology. NOWs may dramatically improve virtual memory and file system performance, highly available, and scalable file storage and provide multiple CPUs for parallel computing. A distributed system is composed of a number of autonomous, processors, storage devices and database which interactively co-operate in order to achieve a common goal. Distributed system is a programming which facilitates and allows the use of a collection of workstations as a single integrated system. Distributed Computing offers advantages for improving availability and reliability through performance through parallelism and in addition flexibility, expansion and scalability of resources.
Read More...
-
Threats That Deep Web Possess to Modern World
Ishan Pandya ; Hitanshu Joshi; Mr. Biren Patel; Mr. Harshil Joshi
Pages: 140 - 148
The[6] Deep Web is the part of World Wide Web which cannot be accessed by normal search engines, these pages are not indexed in our normal search engines. There is no exact knowledge about how large is the Deep Web but it is believed that its size is about 400 to 550 times the size of the Surface Web (Opposite of Deep Web i.e. the World Wide Web which can be accessed by normal search engines). The[3] sizeof the Deep Web was 7500 TB as researched by Michael K Bergman in 2001, 95% of which can be publically accessed with a little extra effort. Deep Web receives half as much as traffic on Surface Web. Deep web and Dark Web are different things, the dark web is the World Wide Web content that exists on darknets, overlay networks which use the public Internet but require specific software, configurations or authorization to access.The dark web forms a small part of the deep web, although sometimes the term "deep web" is mistakenly used to refer specifically to the dark web, these sites are huge host to various cyber-crime and other all sorts of crime.
Read More...
-
Survey Paper on Vulnerability in Relation to Phishing-Based Social Engineering Attacks
Kanisha Agarwal ; Mansi Agrawal; Namrata Bandhaniya; Riddhi Jani; Harshil Joshi
Pages: 149 - 153
Phishing, or web spoofing, is a growing problem: the Anti-Phishing Working Group (APWG) received almost 14,000 unique phishing reports in August 2005, a 56% jump over the number of reports in December 2004 [3]. For financial institutions, phishing is a particularly insidious problem, since trust forms the foundation for customer relationships, and phishing attacks undermine confidence in an institution. Phishing attacks succeed by exploiting a user’s inability to distinguish legitimate sites from spoofed sites [2].In this paper, we examine the case of users authenticating web sites in the context of phishing attacks. In a phishing attack, the attacker spoofs a website (e.g., a financial services website). The attacker draws a victim to the rogue website, sometimes by embedding a link in email and encouraging the user to click on the link. Data suggest that some phishing attacks have convinced up to 5% of their recipients to provide sensitive information to spoofed websites [1].Here, phishing is performed on the admin panel when the attacker tries to capture and steal the data from the website, thereby extracting all the data of the customers and products from the admin’s account. The solution to this problem of phishing could be to maintain a security code for the admin’s account, which will give an automated new password in the form of OTP on admin’s mobile daily. This anti-phishing will consists of computer programs that attempt to identify phishing content contained in websites and e-mail or block users from being tricked [4].
Read More...
-
Organized Cybercrime and the State of User Privacy
Devansh Parikh ; Harshvardhan Shani; Suraj Dave ; Mr. Piyush Patel
Pages: 154 - 162
When you open your browser, surf web, connect with your friends, do you suspect you are being watched? Organized cyber crime is a crime which happens right in front of you but you are oblivious to it. The privacy of every user who accesses the internet, is compromised every second. Which sites you surf, what you buy online, what are your preferences, where are you going and what are you going to do next, imagine all these information used either by online Ad agencies that could lure you into buying their products or by government agencies to create a complete psychological profile and to spy on you. In this paper, initially we discuss the philosophical notion of privacy and debate the underlying ethics. We also present the current scenario, how the users are being targeted and affected. Furthermore we criticize the advent of worldwide surveillance, state its ramifications and brief on how it is undertaken and who are behind it. We also analyze the laws and policies that fail and in some cases even permit malpractices that take advantage of users. We provide a timeline of how cyberattacks started and state the most devastating ones, the methods used and the damage they caused. Ultimately we draw conclusions and propose solutions to some problems and outline some already researched techniques found to be superior and bring forth a new perspective on how the system can be improved and new laws enacted or enhanced.
Read More...