CFP last date
20 January 2025
Reseach Article

Prevention Mechanism of Information Deceit

by Rana Majumdar, Abhishek Singhal, Abhay Bansal
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 49 - Number 3
Year of Publication: 2012
Authors: Rana Majumdar, Abhishek Singhal, Abhay Bansal
10.5120/7608-0651

Rana Majumdar, Abhishek Singhal, Abhay Bansal . Prevention Mechanism of Information Deceit. International Journal of Computer Applications. 49, 3 ( July 2012), 23-27. DOI=10.5120/7608-0651

@article{ 10.5120/7608-0651,
author = { Rana Majumdar, Abhishek Singhal, Abhay Bansal },
title = { Prevention Mechanism of Information Deceit },
journal = { International Journal of Computer Applications },
issue_date = { July 2012 },
volume = { 49 },
number = { 3 },
month = { July },
year = { 2012 },
issn = { 0975-8887 },
pages = { 23-27 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume49/number3/7608-0651/ },
doi = { 10.5120/7608-0651 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:45:20.940531+05:30
%A Rana Majumdar
%A Abhishek Singhal
%A Abhay Bansal
%T Prevention Mechanism of Information Deceit
%J International Journal of Computer Applications
%@ 0975-8887
%V 49
%N 3
%P 23-27
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Data security and extracting intelligence from data in the form of information is the area where every organization is concerned about it. Network security is concerned with who connects to and what goes across a network. Net users have to provide personal credentials like passwords or wireless keys, and the network must protect with firewalls and intrusion detection system. Information security on the other hand, is a somewhat more general concept of being sure information systems have confidentiality, integrity, and availability. This can include network security as well as cryptography, access control, physical security, and more. It covers everything from the earliest security mechanism to latest DMZ zones. Social engineering is the act of manipulating people into performing actions or divulging confidential information, rather than by breaking in or using technical cracking techniques . This paper described various techniques related to social engineering attack; the countermeasures for a social engineering attack.

References
  1. Bowman, M. , Debray, S. K. , and Peterson, L. L. 1993. Reasoning about naming systems. .
  2. ing, W. and Marchionini, G. 1997 A Study on Video Browsing Strategies. Technical Report. University of Maryland at College Park.
  3. Fröhlich, B. and Plate, J. 2000. The cubic mouse: a new device for three-dimensional input. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
  4. Tavel, P. 2007 Modeling and Simulation Design. AK Peters Ltd.
  5. Sannella, M. J. 1994 Constraint Satisfaction and Debugging for Interactive User Interfaces. Doctoral Thesis. UMI Order Number: UMI Order No. GAX95-09398. , University of Washington.
  6. Forman, G. 2003. An extensive empirical study of feature selection metrics for text classification. J. Mach. Learn. Res. 3 (Mar. 2003), 1289-1305.
  7. Brown, L. D. , Hua, H. , and Gao, C. 2003. A widget framework for augmented interaction in SCAPE.
  8. Y. T. Yu, M. F. Lau, "A comparison of MC/DC, MUMCUT and several other coverage criteria for logical decisions", Journal of Systems and Software, 2005, in press.
  9. Spector, A. Z. 1989. Achieving application requirements. In Distributed Systems, S. Mullender
  10. University of Pennsylvania Medical Center. "Human Brain Operates Differently In Deception And Honesty, University Of Pennsylvania Researchers Report. " Science Daily, 13 Nov. 2001. Web. 9 Jun. 2011.
  11. Harvard University (2009, July 14). Dishonesty Involves Activity In Control-related Brain Networks, Neuroimaging Study Suggests. Science Daily. Retrieved June 9, 2011
  12. technet. microsoft. com/en-us/library/cc875841. aspx
Index Terms

Computer Science
Information Sciences

Keywords

VPN IA DMZ