Earlier this year, in March, a man was caught on camera in New York. The police of New York has revealed the man through a CCTV camera robbing a clothing store. Before the man begins to rob the store, he removed his hat and crossed himself, then he took a large masonry and threw it […]

1.0 Introduction Years ago, consumer need to step out from home for buying groceries, settle bills, making transactions and others daily activities. But in nowadays, consumer can simply sit in front of computer with the available of internet connection to complete all of those daily activities with the help of online transaction. Online transaction becomes […]

Internet banking system has become widely popular and used among many consumers. There is much debate as to whether internet banking system is secure. This essay argues that client, data transport and bank’s server are important players in terms of internet banking security. This essay demonstrates some vulnerability of these sections and shows successful solutions. […]

Cryptography Latika Arora , IT/06/321 Shri Balwant Institute of Technology Pallri, Sonipat, Haryana it06321. sbit@gmail. com ABSTRACT The present century has been one of many scientific discoveries and technological advancements. With the advent of technology came the issue of security. As computing systems became more complicated, there was an increasing need for security. Network Security […]

A computer virus is a computer program that can copy itself[1] and infect a computer. The term “virus” is also commonly but erroneously used to refer to other types of malware, adware, and spyware programs that do not have the reproductive ability. A true virus can only spread from one computer to another (in some […]

Introduction The internet is used by thousands of people around the world to share ideas, conduct financial transactions, and keep in touch with relatives, friends, and colleagues. However if this biggest network is so helpful in our daily life, it is also low our privacy. No more day goes without someone being a victim of […]

Abstract The privacy of the Internet must be protected. Now a day all you do and all you buy is saved then stored for future references. Your bank account information or SSN anything that requires the user to provide highly delicate information is kept and can be accessed by someone who breaks into their server […]

According to Alvarez Technology Group, “a hacker attacks an internet-connected computer every 39 seconds in the United States.” (Admin.). Cybercrime is a dangerous game within the embodiment of the mysterious Internet. People who do cybercrime are anonymous and hard to track. There are many sources that help combat the rise of cybercrime. According to the […]

Abstract The purpose of this document is to research on drones and its effect on the society. Drone is one of the major benefits to the smart city such as providing wireless access to mobile hotspots, contributing to safe infrastructure maintenance, helping save lives, and surveying the damage of natural disasters. There are also negative […]

Cybercrime is a crime that involves a computer. It is defined as Offences that are committed against individual or groups of indiduals with criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm, loss to the victim directly or indirectly using internet. It affects person, financial health and nation’s […]

Cybercrime is known to be a worldwide crime due to its outrageous outcomes. Cybercrime doesn’t involve with just one crime, but indeed with multiple crimes. Some crimes that involve a cyber crime are Hacking, Scams, Computer vandalism, Cyber Terrorism, Phishing, and Internet Fraud. Cybercrime is considered to be one of the biggest threat to society […]

With increasing threat to your identity online it becomes important to place certain preventive measures to keep your identity traces safe. Here, advanced identity theft protection tools can help you monitor your identity traces online and protects you from all possible cyber threats & attacks. Let’s discuss some of these effective tools here. Advanced Identity […]

Project Aim: Passwords management is an important aspect of computer security, it’s the front line of protection for user terminals and it is by far the most common user authentication method within the largest multinational organizations. A poorly chosen password will increase the probability for an information system to be compromised. As such, all organization […]

Recently, there has been an alarming upward trend in cybersecurity breaches, with 2018 seeing over 600 breaches only halfway into the year. Cybercrime is now the fastest growing crime in the US, and according to the FBI every 3 seconds, an identity is stolen. That’s 35,000 every day and more than 15 million every year! […]

The CAC and the importance of PII The department of defense starting using the Common Access Card or CAC in the spring of 2001. The CAC is used to enable physical access to building, installations, and controlled spaces, and is used to securely access unclassified information systems and applications that link the Department’s computer networks. […]

The research of techniques to have ensured conversation although a 3rd occasion is eavesdropping is what we call Cryptography or Crypto for small. It is essentially, producing and researching processes that protect against other folks from examining the private concept that was despatched. As we can see, it has a large possible to be used […]

Have you at any time wondered, How a great deal of my world wide web activity is getting monitored, and by who? The reply is all of the time by numerous distinctive groups, weather it be retail providers accessing your search outcomes to greater publicize merchandise to you, or governing administration businesses tapping in to […]

Social criminal offense prevention methods concentrate additional on influencing the basic socio-economic brings about of criminal offense in its place of the actual physical environment (Grant, 2014, p. 3). The Kings Cross shootings that obtained a great deal of media protection from print media to on the net media would have been barred working with […]

The previous adage that history repeats alone is ever so existing in Fred Kaplan’s Dark Territory: The Magic formula Background of Cyber War. There is a recurring theme in the United States (US) govt of implementation lag, policy lag, and a absence of proper oversight in this fast altering technological know-how age. The trouble is […]