Setting file permissions is a form of DAC because it is the owner’s discretion. Configuring as many security layers as the user can will ensure the server will stay secure. Not all OS are 100% secure, but they can be configured to make it very hard for a hacker to
They know what they are searching for and somehow know how to retrieves and circumvent intrusion detection systems. Different for external attackers, they can be hackers/crackers, saboteurs and thieves. If the network is compromised, intruders can attack or misuse the system. One common technique used by intruders to gain unauthorized access to the system is password theft. That is why, the users should be aware of information security which by not simply sharing their password with others and not leave their computer unprotected.
It is the technique to hide secret message inside a carrier file and is later extracted by its intended receiver. Steganography takes cryptography a step further by hiding an encrypted message so that no one suspects it exists. So any intruder scanning the files in ideal condition can never know about existence of the message. As nobody except the sender and the receiver knows the existence of the message, it does not attract unwanted attention. Information security has two techniques: cryptography and steganography.
INTRODUCTION Data mining extracts hidden and useful information from the data. Valid, previously unknown, useful and high quality knowledge is discovered by data mining. Outlier detection is an important task in data mining. Outlier detection has many important applications and deserves more attention from data mining community. Outlier detection is an important branch in data pre-processing and data mining, as this stage is required in elaboration and mining of data coming from many application fields such as industrial processes, transportation, ecology, public safety, climatology.
On development of science and technology, the network technique is more and more advance and important. A lot of malware has appeared on the Internet. Malware is described some unsafe software, such as computer viruses, Trojan horses and spywares. Recently, it uses in order to invade any computer. Malware is exploited by hackers and governments to steal personal, financial or state secrets.
INTRODUCTION STEGANOGRAPHY Steganography is an art of hiding data inside data.Steganography is a form of security technique which is used to hide secret messages in various types of files, including digital images, audio and video. It is very old way of hiding secret data, but it changes a lot with the introduction of new technologies. There are many techniques available today for hiding secret data. For hiding in different cover media, there are different techniques. The main aim of steganography is to hide secret data in an innocently looking cover media.
Abstract “Cybercrimes and cyber criminals seem to be everywhere now and Taking cyber security seriously could mean the difference between Business success and failure”. The purpose of this paper is to find out the reasons for increase and ways of detecting and preventing cybercrime in businesses. Cybercrime is a fast-growing area of crime. More and more criminals are exploiting the speed, convenience and anonymity of the Internet to commit a diverse range of criminal activities that knows no borders, either physical or virtual. There are many ways and means of preventing cybercrime which includes education and training of staff and securing company digital assets.
Abstract : Steganography is the methodology in science that involves communicating secret data in an appropriate multimedia carrier for e.g. video, audio and image files. Audio steganography hides data in a audio signal which is a cover signal without any modification in that cover signal. Generally, Steganography concept is confused with other technique such as cryptography and watermarking, but objectives such as imperceptibility, capacity of hidden data and robustness draws thin line between them. The prime goal of steganography is to reliably send hidden information secretly, and not to reveal its presence.
What is cryptography? Cryptography is the study of utilizing science to encode and unscramble information. Cryptography empowers you to store delicate data or transmit it crosswise over frail systems (like the Web) so it can't be perused by anybody aside from the expected beneficiary. While cryptography is the study of securing information, cryptanalysis is the study of examining and breaking secure correspondence. Established cryptanalysis includes a fascinating mix of systematic thinking, use of numerical instruments, example discovering, tolerance, determination, and good fortune.
CHALLENGES OF PROLIFERATION BIOMETRIC TECHNOLOGY Despite the numerous benefits of deployment of biometric technology to identification systems, it major disadvantage is that it is prone to vulnerabilities attacks either at the user interface or between modules or on the database template. Some of these attacks (Anthony & Mary, 2011)are highlighted as follow: Replay attacks Spoofing Tampering Substitution attacks Trojan Horse attacks Overriding yes/no Masquerade attack Over time biometric encryption is used as a solution to biometric security threat(Cavoukian & Stoianov, 2007),(Jain, Nandakumar, & Nagar, 2008). Biometric encryption is either symmetric or asymmetric. The process in which a single key is used for the purpose of encryption and decryption is known symmetric encryption. Whereas, asymmetric encryption involves the use of two different but related keys-the encryption key, and decryption key However, some Information Communication Technology experts have criticised the fact that several agencies are deploying biometric technology in their operations.