On development of science and technology, the network technique is more and more advance and important. A lot of malware has appeared on the Internet. Malware is described some unsafe software, such as computer viruses, Trojan horses and spywares. Recently, it uses in order to invade any computer. Malware is exploited by hackers and governments to steal personal, financial or state secrets.
You still believe that you are talking to the original party and may send private information to the hacker by accident. (d) Sniffer attacks A sniffer is an application that can read, monitor or capture network data exchanges and read network packets. If the packets are not encrypted, a sniffer provides a full view of the data inside the packet. Even encapsulated packets can be broken open and read unless they are encrypted and the attacker does not have access to the key. (e) Password attacks Password based attacks or password crackers are aimed at guessing the password for a system until the correct password is determined.
Interconnectivity, distributed computing, and immediate rate of transmission are among the most powerful features of the Internet. Ironically, these attributes are also jeopardizing its long-term security. Hackers are using these specific characteristics to abuse the networks of hosts that exhibit little to no security. Common internet attacks methods are broken down into categories. Some attacks gain system knowledge or personal information, such as phishing.
Government surveillance can have adverse effects on anyone’s life as it can be used to harm an individual’s reputation by exposing their personal information. In the digital age, terrorist’s use of the internet has increased to such an extent that all their communication and daily transactions occur on the internet. Keeping a close watch of the internet is almost necessary to prevent an unforeseen circumstance and to limit the approach of terrorist organizations around the world. The internet serves as the main source for recruits, funding and information, so limiting their access to the internet can prove effective in countering terrorists. The purpose of this paper is to investigate the question if government surveillance is necessary to counter terrorism.
Introduction : The history of information security begins with computer security . The need for computer Security — that is, the need to secure physical locations, hardware, and software from threats. Despite the fact that information security plays an vital role in shielding the information and wealth of an organization. we habitually hear news about the security incidents, such as mutilation of websites, as well as server hacking and data escapeing.The organizations require to be entirely thoughtful of the need to allot more resources to the safeguard of information assets , and information security must become a top anxiety in both government and business. To address the situation, a number of governments and organizations have set up
Based on the type of attack, the further action depends. As the rate of computer crimes increases there is a need for a well defined set of Computer Forensic Methodologies.These methods help in solving such computer crimes.The evidences that are seized from the computer devices are likely to change,can be altered easily,so they are to be handled properly using methodologies.These methodologies can vary based on the adopted procedures in companies. The examiner involves in recovering hidden, deleted and temporary files.They helps in the examination of servers,workstations, standalone computers and other storage medias and procedure involved in the process can be difficult or easier based on the media that is to be analyzed.During the process of evidence examination,the logs are to be maintained which play a crucial role in
Many forms of spyware, however, are more malicious and can have serious effects on users and businesses. Key logging spyware, for example, transmits to the author of the spyware a log of every keystroke entered on that computer. The author can then sift through this data to find valuable information, such as credit card numbers, security codes and confidential information, from that user or their business. Other types of spyware search through the data stored on the host computer for particular types of file, which are likely to contain confidential or personal information, such as Word documents or images, and transmit them to the spyware
Among the many security issues that now affect computer users, there is a growing threat within era of internet technology is known as "phishing". Online frauds in bank with phishing usually appear to come from a well-known organization and ask for your personal information such as credit card number, social security number, account number or password. In order for Internet criminals to successfully "phish" your personal information, they will almost always trick you to click a link that takes you to a web site where your personal information is requested. Legitimate organizations would never request this information of internet consumers via email. Internet frauds is the use of Internet services or software with Internet access to defraud victims or take advantage of them using email, web sites, chat rooms to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme.
Using both the method the computational complexity was high but security was more. It is difficult to understand the complexity of algorithm. They proposed the method for increase the impression of output carrier image by preserving the edge structure in . In this  proposed architecture researcher approached hybrid technique of visual cryptography and digital watermarking in which secret image is broken into parts and using digital watermarking parts are covered. In the proposed scheme , initially the secret data is encrypted using visual cryptography and then cipher