You are on page 1of 16

Cyber security challenges and its emerging trends on latest

technologies
The purpose of this study was to learn about the cyber security as it
plays an important role in the field of information technology.
Securing the information have become one of the biggest challenges
in the present day.
The article deals about the various challenges faced by cyber security
on the latest technologies .It also focuses on latest about the cyber
security techniques, ethics and the trends changing the face of cyber
security.
Cyber-crime is a term for any illegal activity that uses a computer as
its primary means of commission and theft where in contrast the
Cyber security refers to the body of technologies, processes, and
practices designed to protect networks, devices, programs, and data
from attack, damage, or unauthorized access.
TRENDS CHANGING CYBER SECURITY
Web servers : The threat of attacks on web applications to extract
data or to distribute malicious code persists.
Cloud computing and its services : These days all small, medium
and large companies are slowly adopting cloud services. In other
words the world is slowly moving towards the clouds. This latest
trend presents a big challenge for cyber security
Mobile networks : Mobile networks are highly prone to these cyber-
crimes a lot of care must be taken in case of their security issues.
Encryption of the code : Encryption is the process of encoding
messages (or information) in such a way that eavesdroppers or
hackers cannot read it.. In an encryption scheme, the message or
information is encrypted using an encryption algorithm, turning it into
an unreadable cipher text.
CYBER SECURITY TECHNIQUES

• Access control and password security


• Malware scanners
• Firewalls
• Anti-virus software
• Authentication of data
Through this study I learned about Cyber-crime continues to diverge
down different paths with each New Year that passes and so does the
security of the information. There is no perfect solution for cyber-
crimes but we should try our level best to minimize them in order to
have a safe and secure future in cyber space.
References
https://www.researchgate.net/publication/260126665_A_Study_Of_Cyber_Security_Challenges_An
d_Its_Emerging_Trends_On_Latest_Technologies

Submitted by –
Name – Ayush Srivastava
University roll no: 1900290120029
Year - 1
Branch - CO
Section - E
Research on HTML5 in Web Development
The purpose of this study was about HTML (Hypertext Markup
Language) is the code that is used to structure a web page and its
content. It is the building block of a website. HTML5 is the next major
revision of the HTML standard superseding HTML 4.01, XHTML 1.0,
and XHTML
1. HTML5 is a standard for structuring and presenting content on the
World Wide Web. HTML5 is a cooperation between the World
Wide Web Consortium (W3C) and the Web Hypertext Application
Technology Working Group (WHATWG).
The lesson was about new tags that are introduced in HTML5. With the
development of HTML5 it has wide range of applications in multimedia
direction. It can play audio and video and supports animations from the
browser without the need of the proprietary technologies. HTML5
introduces a number of new elements and attributes that can help you in
building modern websites. Here is a set of some of the most prominent
features introduced in HTML5.
• New Semantic Elements − These are like <header>, <footer>, and
<section>.
• Forms 2.0 − Improvements to HTML web forms where new
attributes have been introduced for <input> tag.
• Persistent Local Storage − To achieve without resorting to third-
party plugins.
• Canvas − This supports a two-dimensional drawing surface that
you can program with JavaScript.
• Audio & Video − You can embed audio or video on your
webpages without resorting to third-party plugins.
• Geolocation − Now visitors can choose to share their physical
location with your web application.
• Drag and drop − Drag and drop the items from one location to
another location on the same webpage.
The major conclusion was to create a multi-platform based responsive
website through a single code.
Through this study I was able to learn about the front end of web
development and creating a webpage through HTML with the help
of CSS and JavaScript. Moreover I learned about the principles of
Document Object Model and its application in creating real life
websites.
References
http://ijcsit.com/docs/Volume%205/vol5issue02/ijcsit20140502328.pdf

Submitted by –
Name – Ayush Srivastava
University roll no: 1900290120029
Year - 1
Branch - CO
Section - E
A review and analysis of technologies for developing web
Applications
The purpose of the study was to learn about the technologies that are
used at the client side and server side of web application. It was an
experimental study through which , we compared different web
application development frameworks. In addition, we got to know about
life cycle model and framework of web application development.
The article deals about various technologies and languages required for
web development. It deals about the real life approach of making a web
application. We start with a description of components of web
applications, followed by general trends in development methods. Next,
studied the components up close and report on popularity, usability and
efficiency of the technologies. Finally, we compare three popular web
application platforms and make recommendations for typical business
applications.
Web applications tend to be multi-tiered by nature, with the most
common structure being the three-tiered architecture. In its most
common form, the three tiers are
• Presentation layer: The presentation tier is the front end layer in
the 3-tier system and consists of the user interface. This user
interface is often a graphical one accessible through
a web browser or web-based application and which displays
content and information useful to an end user. The four big
technologies in this layer are HTML, CSS, JavaScript and JQuery.
• Application layer: This layer, also called Business Logic or
Domain Logic or Application Layer, accepts user requests from
the browser, processes them, and determines the routes through
which the data will be accessed. The workflows by which the data
and requests travel through the back end are encoded in a
business layer. Scripting languages that are uses are ColdFusion, ,
Ruby, WebObjects and Python.
• Data Layer: The data tier includes the data persistence
mechanisms (database servers, file shares, etc.) and the data
access layer that encapsulates the persistence mechanisms and
exposes the data.
Through this study I learned about Object oriented approach build
web applications very efficient when one can accomplish more in
less time. Because it uses modern processes, by this both
developers and clients can benefit. To develop these types of
applications there are so many scripting languages and new
technologies.
References
https://www.researchgate.net/publication/230668912_A_review_and_analysis_of_technologies_f
or_developing_web_applications

Submitted by –
Name – Ayush Srivastava
University roll no: 1900290120029
Year - 1
Branch - CO
Section - E
Peer to Peer File Sharing System
The purpose of the study was to learn about Peer-to-peer file sharing
is the distribution and sharing of digital media using peer-to-peer
(P2P) networking technology
The article deals about how a Peer to Peer file sharing system between
mobile devices is designed and implemented using Bluetooth as a
communication protocol.
Peer-to-peer file sharing systems have become more popular for sharing,
exchanging, and transferring files among many users over the internet.
In the peer to peer network, a central point is not necessary. Many peer-
to-peer file sharing systems are available between computers, such as
Napster, Gnutella, and Freenet over the internet. Some more are listed
below.

• BitTorrent : BitTorrent is a peer-to-peer file sharing protocol.


• Gnutella : Gnutella is one of the most popular peer-to-peer file
sharing systems to date used to exchange and share data between
the peers.
• SymTorrent : SymTorrent is the only BitTorrent client for mobile
Symbian OS. The target platform for SymTorrent is S60 3rd and
5th edition and it is freely available under the terms of GNU
General Public License.
BLUETOOTH NETWORK TOPOLOGY : A Personal Area Network
(PAN) is a group of devices that are connected with each other over
Bluetooth. A PAN network is known as a Piconet or a Scatternet.

SYSTEM DESIGN :
System Scenario -The proposed system is that a group of peers join the
network in order to share files and information. Peers must enable
Bluetooth in order to be able to join the network, because the system is
built on Bluetooth as a protocol to connect the peers.
System Implementation - In order to investigate the application the
implementation of the software is one of the most important tasks in this
project. The main idea of the application in a peer-to-peer network
means that one side acts a server and the other as a client and this is how
the idea of this system works.
To conclude, the system designed allowed users to share and search for
data using Bluetooth as a communication protocol. Peer-to-peer
applications were studied in order to understand the main concepts of the
network and help the developer to design a user-friendly application.
References
https://www.researchgate.net/publication/305542661_Peer_to_Peer_File_Sharing_System

https://en.wikipedia.org/wiki/Peer-to-peer_file_sharing

Submitted by –
Name – Ayush Srivastava
University roll no: 1900290120029
Year - 1
Branch - CO
Section - E
Challenges in Android Application Development
The purpose of the study was to learn about various challenges faced by
developers in Android App Development.
Based upon personal experience in developing apps and available
literature, the following are the challenges faced by the Android App
developers:
A. Multiple Devices: The most common challenge is to set the
properties of app for different devices with different screen sizes,
resolution etc. There are many versions of each android device and
while releasing the app, version specific details need to be checked this
makes the task very critical. As it need to be run in different devices,
therefore it also affects the cost and budget implications. For each
version of Android, developer has to write code again because there are
migration problem available to migrate the existing code to new
platform. Sometimes, behavior is also different across new platform.
B. Testing of Android Application: Currently, the Development
Environment does not have enough tools for testing. There is a need of
testing techniques for the Android Platform. Also debugging features
must be made available.
C. Limited Capabilities of Different Devices: Sometimes different
devices have different capabilities in terms of software support like
some browsers has poor support for HTML5.
D. Emulators/Simulators Problem: Emulators are the devices which
provides us hardware environment of Android Devices while Simulators
provide us the software environment. Apps are tested on the emulators
which are not enough for testing. Emulators are very slow and take a lot
of time to start and run.
E. Data Intensive Apps: Since Mobile Devices have very limited
memory, so it is very difficult to store huge amount of data in it. Offline
caching doesn’t work well and synchronizing with another data source is
a challenging task.
F. Lack of Software/Hardware Integration: One Button on Android
device works differently on another device. So it is difficult to build an
app that relies on a particular hardware to do a thing.
G. Security Issue: Since Android is an open Source operating system so
there can be malware Apps which users can install by mistake or by any
other reason that can lead to loss of data.
Conclusion and future scope

Smart Phones has changed the life of everyone. Along with other
features, an App in Smart Phones allows to do almost everything, from
playing games to do business. The development of app described in
present paper has given a strong understanding of various challenges
associated with design and development of apps.
References
https://www.ijcsmc.com/docs/papers/May2015/V4I5201557.pdf

Submitted by –
Name – Ayush Srivastava
University roll no: 1900290120029
Year - 1
Branch - CO
Section - E

You might also like