USE OF CRYPTOGRAPHY IN SECURITY ENHANCEMENT FOR PREVENTING CYBER CRIME

Authors

  • Shivneet Singh

Keywords:

Steganography, Cryptography, Phishing, Cyber Terrorism, Spamming, Visual cryptography

Abstract

The effects of cybercrime have been outlined in this research. The Internet-facilitated criminal activity. Cybercrime is the term used to describe these forms of wrongdoings. Controls for network security have been implemented to prevent hackers from gaining access. The usage of VPNs and other forms of encryption technology are used here. To prevent hackers from gaining access to networks, this strategy relies heavily on VPNs. Using a virtual private network (VPN) enables users to have direct access to network resources. It's possible it exists on a public network like the internet. We can combat cybercrime by combining cryptography and steganography. Those who lack familiarity with cybercrime and its consequences might benefit from reading this material. The ability to spot patterns of cybercrime would be very useful. Understanding the efficacy of laws against cybercrime is also determined.

References

Abhishek Kumar Bharti, ”Detection of Session Hijacking and IP Spoofing Using Sensor Nodes and Cryptography”IOSR Journal of Computer Engineering (IOSR-JCE)e-ISSN: 2278-0661, p-ISSN: 2278-8727 volume 13, Issue 2 (Jul. -Aug. 2013), PP 66-73

.Hani Alshamrani, “Internet Protocol Security (IPSec) Mechanisms”, International Journal of Scientific & Engineering Research, Volume 5, Issue 5, May-2014, pp. 85-87.

.ChanderDiwakar, Sandeep Kumar, Amit Chaudhary, “SECURITY THREATS IN PEER TO PEER NETWORKS”, Journal of Global Research in Computer Science, Volume 2, No. 4, April 2011, pp. 81-84.

. HaroonShakiratOluwatosin, “Client-Server Model”, Journal of Computer Engineering (IOSR-JCE), Volume 16, Issue 1, Feb. 2014, pp. 67-71.

. Ms. Jasmin Bhambure, Ms. DhanashriChavan, Ms. Pallavi Band, Mrs.LakshmiMadhuri, “Secure Authentication Protocol in Client – Server Application using Visual Cryptography”, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 4, Issue 2, February 2014, pp. 556-560.

. Mohan V. Pawar, Anuradha J, “Security of network and Types of Attacks in Network”, International Conference on Intelligent Computing, Communication & Convergence, 2015, pp. 503 – 506.

. MANJIRI N. MULEY, “ANALYSIS FOR EXPLORING THE SCOPE OF NETWORK SECURITY TECHNIQUES IN DIFFERENT ERA: A STUDY”, International Journal of Advanced Computational Engineering and Networking, Volume-3, Issue-12, Dec.-2015, pp. 33-36.

Downloads

Published

30-06-2022

How to Cite

Shivneet Singh. (2022). USE OF CRYPTOGRAPHY IN SECURITY ENHANCEMENT FOR PREVENTING CYBER CRIME. International Journal for Research Publication and Seminar, 13(2), 268–272. Retrieved from https://jrps.shodhsagar.com/index.php/j/article/view/601

Issue

Section

Original Research Article