Vaishnavi Savant - Academia.edu (original) (raw)
Uploads
Papers by Vaishnavi Savant
International Journal of Advanced Research in Computer Science and Software Engineering, 2018
In these days communication technology is very advanced. Digital communication has become very i... more In these days communication technology is very advanced. Digital communication has become very important to secure transmission of information between the sender and the receiver. Security for exchange is a very important feature because it protects information from interloper. In this paper we present a hierarchy of network security technologies such as privacy, authentication, non-rejection and honesty control. There are two popular security mechanisms, namely cryptography and steganography. Both are well known and widely used techniques. Cryptography is used to send data in an encrypted form using the encryption key. Encrypted data is transmitted through unsafe public media. Decryption algorithms are also used to decrypt messages when using decryption keys. Steganography is used to hide data in other cover media.
International Journal of Technology
Computer use is becoming part of our lives every other day however there have been considerable t... more Computer use is becoming part of our lives every other day however there have been considerable threats of computer viruses in the recent past. Viruses have had adverse effects on data and programs ranging from formatting hard disks, damaging information infrastructure etc. The purpose of the review is to discover the impact of computer virus attack and provide procedures on how individuals can protect their personal computer (PC) against virus attacks. It is important to address the virus attacks and its protective mechanisms among the personal computer users in this electronic world. After identification of typical aspects which leads to computer virus attacks the possible solutions are put forwarded to personal computer users to overcome this virus attacks and their future improvement in computer usage. This paper defines a virus and explain its related terms like phases of viruses, types of viruses worms. It describes the general symptoms of virus attacks and the solutions apart...
International Journal of Advanced Research in Computer Science and Software Engineering, 2018
In these days communication technology is very advanced. Digital communication has become very i... more In these days communication technology is very advanced. Digital communication has become very important to secure transmission of information between the sender and the receiver. Security for exchange is a very important feature because it protects information from interloper. In this paper we present a hierarchy of network security technologies such as privacy, authentication, non-rejection and honesty control. There are two popular security mechanisms, namely cryptography and steganography. Both are well known and widely used techniques. Cryptography is used to send data in an encrypted form using the encryption key. Encrypted data is transmitted through unsafe public media. Decryption algorithms are also used to decrypt messages when using decryption keys. Steganography is used to hide data in other cover media.
International Journal of Technology
Computer use is becoming part of our lives every other day however there have been considerable t... more Computer use is becoming part of our lives every other day however there have been considerable threats of computer viruses in the recent past. Viruses have had adverse effects on data and programs ranging from formatting hard disks, damaging information infrastructure etc. The purpose of the review is to discover the impact of computer virus attack and provide procedures on how individuals can protect their personal computer (PC) against virus attacks. It is important to address the virus attacks and its protective mechanisms among the personal computer users in this electronic world. After identification of typical aspects which leads to computer virus attacks the possible solutions are put forwarded to personal computer users to overcome this virus attacks and their future improvement in computer usage. This paper defines a virus and explain its related terms like phases of viruses, types of viruses worms. It describes the general symptoms of virus attacks and the solutions apart...