ENHANCEMENT OF CLOUD RESOURCES SECURITY USING VERIFICATION CODE IJTSRD
The advancement in robotics has led to Cloud computing security or simply cloud security refers to a broad set of policies, technologies and controls deployed to protect data application and the associated infrastructure of cloud computing. The aim of this work was to address and minimize the problem of unauthorized access to information and applications […]
Survey on Detection and Prevention of Intrusion IJTSRD
Intrusion Detection and Prevention System using GSM modem is proposed, which is designed to detect unwanted attempts of accessing, manipulating and/or disabling computer system. If intruder cracks or guess the password then proposed system will deny access of system resources with the help of security question known to owner of the system. Proposed system will […]
Medicine Traceability System using Blockchain IJTSRD
Prerequisites from purchasers and governments to create increasingly supportable items have expanded amid late years. Regardless of whether items are certied, one cant ensure organizations meet these necessities, since no chain of occasions can check this exists. The transportation business needs certfication and data on whether a item is transported economically. In any case, the […]
Improving Defense Mechanism Using Packet Tracer for Switches and Router IJTSRD
We live in that era of time where security is the prime concern everywhere. Nowadays several unauthorized groups are now available in the domain of computer networking. Designing a secure system against attacking is always a challenging task for network developers. Here you can see Layer 2 and 3 attacks on Packet Tracer and also […]
Security Technique and Congestion Avoidance in Mesh Network IJTSRD
Security in wireless network is one of the prime concern in today’s Information Age, where information is an asset not only to an organisation but also to an individual. Security to a great extent is able to protect the network from various unauthorized attacks. On the other side implementation of security mechanisms also causes an […]