Refine your search
Collections
Co-Authors
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Kakde, Kirti
- A Technique for Exploiting Database Vulnerabilities of Web Application Using Detection Tools
Abstract Views :485 |
PDF Views:228
Authors
Affiliations
1 MCA Department, Y.M.T College of Management, Kharghar, IN
1 MCA Department, Y.M.T College of Management, Kharghar, IN
Source
AADYA -National Journal of Management and Technology, Vol 6 (2016), Pagination: 101-107Abstract
SQL injection attack is a form of attack that takes advantage of applications that generate SQL queries using user-supplied data without first checking or pre-processing it to verify that it is valid. The objective is to deceive the database system into running malicious code that will reveal sensitive information or otherwise compromise the server. By modifying the expected Web application parameters, an attacker can submit SQL queries and pass commands directly to the database. Although deployment of defensive coding or OS hardening energies security but they are not enough to stop SQLIAs. So this paper focuses on some tools and methodologies which can detect or prevent these attacks.Keywords
SQL Injection Attacks, Prevention, Web Application Parameters, OS Hardening.References
- Atefeh Tajpour , Suhaimi Ibrahim, Mohammad Sharifi IJCSI International Journal of Computer Science www.IJCSI.org
- Prasant Singh Yadav, 2 Dr pankajYadav, 3Dr. K.P.Yadav “A Modern Mechanism to Avoid SQL Injection Attacks in Web Applications”.
- Cyber Security by Nina Godbole
- SQL Injection analysis, Detection and Prevention by Jagdish Halde, San Jose State University
- An Impact of Cloud Computing on Cyber Security in Controlling the Proliferation of Cyber Crime
Abstract Views :402 |
PDF Views:188
Authors
Affiliations
1 MCA Department, Y.M.T. College of Management, IN
1 MCA Department, Y.M.T. College of Management, IN
Source
AADYA -National Journal of Management and Technology, Vol 3, No 2 (2015), Pagination: 178-183Abstract
Opportunities for the exploitation due to weakness in information security are multiplying because of the exponential growth of internet connections. It is important to know that how the data and the systems on which the data resides or transmitted are kept secured. The best way to predict future computing trends is to look at the recent developments and their motivations. Organizations are moving towards outsourcing their data storage, computations, and even user desktop environments. This trend towards Cloud Computing has a direct impact on Cyber security: rather than securing user machines, preventing malware access and managing removable media, a cloud based security scheme must focus on enabling secure communication with remote systems. Cloud computing has formed the conceptual and infrastructural basis for tomorrow's computing. Cloud computing advocates promise on-demand delivery of these massive, warehouse-scale computing resources simply and easily through a network browser. This paper presents a review on the Cloud Computing concepts as well as security issues inherent within the context of cloud computing and cloud infrastructure.Keywords
Proliferation of Cyber Crime, Information Security, Network Connections, Computing Trends, Data Storage, Remote Systems and Cloud Computing.- Hiding Data Communication Using Stegnography Technique
Abstract Views :357 |
PDF Views:240
Authors
Affiliations
1 YMT College of Management, Kharghar, IN
1 YMT College of Management, Kharghar, IN
Source
AADYA -National Journal of Management and Technology, Vol 7, No 1 (2017), Pagination: 97-103Abstract
Steganography is the technique of hiding any secret information like password, data and image behind any cover file. The word steganography comes from the Greek Steganos, which means covered or secret and -graphy means writing or drawing. The purpose of steganography is covert communication-to hide the existence of a message from a third party. In this paper, a penetration testing tool Kali Linux is used for Image Steganography to hide secret message i.e. Text, Image, Audio and Video in an Image which makes it harder for unauthorized people to extract the original message.Keywords
Stegnography, Steghide, Kali Linux.References
- Ramanpreet Kaur, Prof. Baljit Singh, “Survey and Analysis of various Steganographic Techniques” , ISSN:2250-3676, Volume-2, Isuue-3, 561-566
- T. Morkel, J.H.P. Eloff, M.S. Olivier, “An Overview Of Image Stegnography”, Information and Computer Security Architecture (ICSA) Research Group Department of Computer Science University of Pretoria, 0002, Pretoria, South Africa.
- Mehdi Hussain and Mureed Hussain, “A Survey of Image Steganography Techniques” , International Journal of Advanced Science and Technology Vol. 54, May, 2013
- https://www.blackmoreops.com/2017/01/11/steganography-in-kali-linux-hiding-datain-image