A Comparison Study of Open Source Penetration Testing Tools IJTSRD
Penetration testing also known as Pen Test is a series of activities which is performed by authorized simulated attack on computer system, network or web application to find vulnerabilities that an attacker could exploit. It helps confirm the efficiency and effectiveness of the various security measures that have been implemented. In the world of Open […]
Security Threats in Indian Cyberspace by Social Media and Cyberhoaxes IJTSRD
This study examines the proliferation of hoaxes and hate speech through websites and social media in India. Such provocative content utilizes sectarian issues to attack its creators’ political opponents. This study finds that hate has been politicized and hoaxes have been commodified, both for economic and political interests, in Indian cyberspace. There has been a […]
Anomaly Threat Detection System using User and Role-Based Profile Assessment IJTSRD
In network security the organizations are ever-growing to identify insider threats. Those who have authorized access to sensitive organizational data are placed in a position of power that could well be abused and could cause significant damage to an organization. Traditional intrusion detection systems are neither designed nor capable of identifying those who act maliciously […]