USE OF CRYPTOGRAPHY IN SECURITY ENHANCEMENT FOR PREVENTING CYBER CRIME
Keywords:
Steganography, Cryptography, Phishing, Cyber Terrorism, Spamming, Visual cryptographyAbstract
The effects of cybercrime have been outlined in this research. The Internet-facilitated criminal activity. Cybercrime is the term used to describe these forms of wrongdoings. Controls for network security have been implemented to prevent hackers from gaining access. The usage of VPNs and other forms of encryption technology are used here. To prevent hackers from gaining access to networks, this strategy relies heavily on VPNs. Using a virtual private network (VPN) enables users to have direct access to network resources. It's possible it exists on a public network like the internet. We can combat cybercrime by combining cryptography and steganography. Those who lack familiarity with cybercrime and its consequences might benefit from reading this material. The ability to spot patterns of cybercrime would be very useful. Understanding the efficacy of laws against cybercrime is also determined.
References
Abhishek Kumar Bharti, ”Detection of Session Hijacking and IP Spoofing Using Sensor Nodes and Cryptography”IOSR Journal of Computer Engineering (IOSR-JCE)e-ISSN: 2278-0661, p-ISSN: 2278-8727 volume 13, Issue 2 (Jul. -Aug. 2013), PP 66-73
.Hani Alshamrani, “Internet Protocol Security (IPSec) Mechanisms”, International Journal of Scientific & Engineering Research, Volume 5, Issue 5, May-2014, pp. 85-87.
.ChanderDiwakar, Sandeep Kumar, Amit Chaudhary, “SECURITY THREATS IN PEER TO PEER NETWORKS”, Journal of Global Research in Computer Science, Volume 2, No. 4, April 2011, pp. 81-84.
. HaroonShakiratOluwatosin, “Client-Server Model”, Journal of Computer Engineering (IOSR-JCE), Volume 16, Issue 1, Feb. 2014, pp. 67-71.
. Ms. Jasmin Bhambure, Ms. DhanashriChavan, Ms. Pallavi Band, Mrs.LakshmiMadhuri, “Secure Authentication Protocol in Client – Server Application using Visual Cryptography”, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 4, Issue 2, February 2014, pp. 556-560.
. Mohan V. Pawar, Anuradha J, “Security of network and Types of Attacks in Network”, International Conference on Intelligent Computing, Communication & Convergence, 2015, pp. 503 – 506.
. MANJIRI N. MULEY, “ANALYSIS FOR EXPLORING THE SCOPE OF NETWORK SECURITY TECHNIQUES IN DIFFERENT ERA: A STUDY”, International Journal of Advanced Computational Engineering and Networking, Volume-3, Issue-12, Dec.-2015, pp. 33-36.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2022 International Journal for Research Publication and Seminar
This work is licensed under a Creative Commons Attribution 4.0 International License.
Re-users must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use. This license allows for redistribution, commercial and non-commercial, as long as the original work is properly credited.