Saloni Halwai - Academia.edu (original) (raw)
Uploads
Papers by Saloni Halwai
International Journal for Research in Applied Science and Engineering Technology, Dec 31, 2022
This pandemic has not only affected the world physically but has also caused a major rise in the ... more This pandemic has not only affected the world physically but has also caused a major rise in the number of cyberattacks and cybersecurity breaches. In these trying times, the entire paradigm has shifted, forcing every individual to adapt to remote working. Since everything has shifted from its traditional offline methods to online portals, the online traffic has increased tremendously. This paper outlines how and why the number of cyberattacks have increased. Moreover, this paper provides real world cases where cybersecurity attacks have been used in order to extort personal information with numerous statistics and also sheds light upon various preventative methods one can adopt in order to prevent falling victim to any cybercrime. This paper is assembled into two parts. The first part highlights few of the most common cyberattacks which were observed to have upsurged manifold times during the COVID-19 pandemic and used excessively by cybercriminals to unethically derive the personal information of unsuspecting users for malicious reasons. These three main methods being phishing, malware and data breaches. The second part talks about ways and methods to prevent them.
International Journal for Research in Applied Science and Engineering Technology, 2019
Fog Computing (introduced in 2012) is now considered to be the most prioritized choice for applic... more Fog Computing (introduced in 2012) is now considered to be the most prioritized choice for applications of Internet of Things. Fog Computing allows to move a part of the processing in the cloud to the network devices present along the node to the cloud. It makes communications and storage services in proximity to the end user. It is used to well support time dependent, location dependent, massive scale, and latency sensitive applications. Fog computing makes the task laid-back for cloud by filtering the needless data before forwarding the data to the cloud. This paper is assembled into two parts. The first part covers the basic outline and architecture of fog. The second part talks about the working of Fog Computing and its benefits and limitations.
International Journal for Research in Applied Science and Engineering Technology, Dec 31, 2022
This pandemic has not only affected the world physically but has also caused a major rise in the ... more This pandemic has not only affected the world physically but has also caused a major rise in the number of cyberattacks and cybersecurity breaches. In these trying times, the entire paradigm has shifted, forcing every individual to adapt to remote working. Since everything has shifted from its traditional offline methods to online portals, the online traffic has increased tremendously. This paper outlines how and why the number of cyberattacks have increased. Moreover, this paper provides real world cases where cybersecurity attacks have been used in order to extort personal information with numerous statistics and also sheds light upon various preventative methods one can adopt in order to prevent falling victim to any cybercrime. This paper is assembled into two parts. The first part highlights few of the most common cyberattacks which were observed to have upsurged manifold times during the COVID-19 pandemic and used excessively by cybercriminals to unethically derive the personal information of unsuspecting users for malicious reasons. These three main methods being phishing, malware and data breaches. The second part talks about ways and methods to prevent them.
International Journal for Research in Applied Science and Engineering Technology, 2019
Fog Computing (introduced in 2012) is now considered to be the most prioritized choice for applic... more Fog Computing (introduced in 2012) is now considered to be the most prioritized choice for applications of Internet of Things. Fog Computing allows to move a part of the processing in the cloud to the network devices present along the node to the cloud. It makes communications and storage services in proximity to the end user. It is used to well support time dependent, location dependent, massive scale, and latency sensitive applications. Fog computing makes the task laid-back for cloud by filtering the needless data before forwarding the data to the cloud. This paper is assembled into two parts. The first part covers the basic outline and architecture of fog. The second part talks about the working of Fog Computing and its benefits and limitations.