A novel approach of information security and management in distributed environment

dc.contributor.guideNeelendra Badal
dc.coverage.spatial
dc.creator.researcherReena Bansal
dc.date.accessioned2023-03-02T06:59:21Z
dc.date.available2023-03-02T06:59:21Z
dc.date.awarded2023
dc.date.completed2023
dc.date.registered2013
dc.description.abstractnewline In current scenario internet is very important medium to transfer the valuable newlineinformation from one place to another place. But sometime hackers or crackers can access newlinepersonal information or data of anyone, hackers can alter or can misuse the personal or newlineconfidential information. To transmit the information safely and securely over the internet newlinethere must be some defined procedure for internet users. To establish a safe and secure newlinecommunication between any two parties is a very complex problem due to the possibility of newlineattacks and other unpremeditated changes during a lively communication over the internet. newlineCryptography and Steganography are two famous methods that preserve Data newlineConfidentiality, Data Integrity and Data Availability. In 1948, Cryptology was used for newlinemaintaining confidentiality in military and government messages, so in the beginning of newlinemodern cryptology era communicating parties had become essential to ensure message newlineconfidentiality. Today, cryptology lies at the heart of many processes and applications that newlineinclude E-commerce, Internet banking, Internet shopping and even in Aircrafts etc. The newlinepervasiveness of cryptology and the continual rise in the number of its application areas is the newlineprime motivation behind this thesis. newlineThe concept of Cryptography is to protect valuable information from unauthorized newlineaccess but after changing their meaning. While the aim of the Steganography is to cover the newlinevaluable data or information in any digital media in such a way that no one can sense the newlinepresence of such data or information. Steganography does not change the basic structure of newlinethe information or data; it only conceals the information inside the digital media or file. newlineCryptography is an act of secret writing through encryption and decryption process. newlineCommunication has always been a basic need for all human beings and online mode of newlinecommunication has become a necessity too. Internet communication is the fastest way of data newlinetransfer but during data transmission over the internet, security
dc.description.note
dc.format.accompanyingmaterialDVD
dc.format.dimensions
dc.format.extent
dc.identifier.urihttp://hdl.handle.net/10603/465349
dc.languageEnglish
dc.publisher.institutionDean P.G.S.R
dc.publisher.placeLucknow
dc.publisher.universityDr. A.P.J. Abdul Kalam Technical University
dc.relation
dc.rightsuniversity
dc.source.universityUniversity
dc.subject.keywordComputer Science
dc.subject.keywordComputer Science Software Engineering
dc.subject.keywordEngineering and Technology
dc.titleA novel approach of information security and management in distributed environment
dc.title.alternative
dc.type.degreePh.D.

Files

Original bundle

Now showing 1 - 5 of 13
Loading...
Thumbnail Image
Name:
01_title.pdf
Size:
118.7 KB
Format:
Adobe Portable Document Format
Description:
Attached File
Loading...
Thumbnail Image
Name:
02_prelim pages.pdf
Size:
132.96 KB
Format:
Adobe Portable Document Format
Loading...
Thumbnail Image
Name:
03_table of contents.pdf
Size:
91.95 KB
Format:
Adobe Portable Document Format
Loading...
Thumbnail Image
Name:
04_abstract.pdf
Size:
105.08 KB
Format:
Adobe Portable Document Format
Loading...
Thumbnail Image
Name:
05_chapter 1.pdf
Size:
130.52 KB
Format:
Adobe Portable Document Format

License bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
license.txt
Size:
1.79 KB
Format:
Plain Text
Description:

Collections