Keyloggers A Malicious Attack
Keylogging, one of the unsafe malware, is the movement of recording the keys struck on a console with the end goal that the individual utilizing the console is obscure about the way that their activities are being watched. It has legitimate use in examination of human PC collaboration and is considered as the primary danger […]
A Real Dynamic Cyber Trust Model ijtsrd
A Real Dynamic Cyber Trust Model is an application that is proposed in order to distinguish the trust belief among the trustees who have been marketing in today’s digital world by authenticated users. Though we are happy with the developing technology, still we are worrying about the security issues in every scenario. In the same […]
Software Piracy Protection IJTSRD
Software piracy by users is generally believed to harm both software firms through lower profits and buying customers through higher prices . Thus, it is thought that perfect and cost less technological protection would benefit both firms and consumers. The model developed here suggests that in some circumstances, even with significant piracy, not protecting can […]
Graphical Password Authentication Using Image Segmentation for Web Based Applications IJTSRD
One of the most important topics in information security today is user authentication. User authentication is a fundamental component in most computer security contexts. It provides the basis for access control and user accountability. While there are various types of user authentication systems, alphanumeric passwords are the most common type of user authentication. They are […]
Authentication through Claims-Based Authentication IJTSRD
Thinking as far as claims and issuers is an effective reflection that backs better approaches for securing your application. Claims have an understanding with the issuer and allow the claims of the user to be accepted only if the claims are issued by a trusted issuer. Authentication and authorization is explicit in CBAC as compared […]