Professional Documents
Culture Documents
In addition to these benefits, RSA encryption is also relatively easy to implement and
manage. There are a number of software libraries and tools available that make it
easy to integrate RSA encryption into existing systems.
The specific objectives of the study will vary depending on the specific needs of the
company. However, the overall goal of the study is to improve the security of the
company's information management system by implementing RSA encryption.
The company itself. The company will benefit from the improved security of
its information management system. This will help to protect the company
from data breaches, ransomware attacks, and other cyber threats.
The company's customers. The company's customers will benefit from the
fact that their personal information is protected by RSA encryption. This will
help to build trust between the company and its customers.
The company's employees. The company's employees will benefit from the
fact that the company is taking steps to protect its information management
system. This will help to create a more secure work environment for
employees.
The significance of the study is that it will provide a guideline for how companies can
implement RSA encryption to protect their information management systems. The
study will also identify and mitigate any potential risks associated with implementing
RSA encryption. The study will also contribute to the body of knowledge on
encryption for security. This knowledge can be used by other companies to improve
the security of their own information management systems. Overall, the study on the
implementation of RSA encryption to a company information management system is
a significant and valuable contribution to the field of cybersecurity.
Literature
Yu and others said that the data operation, generally speaking, includes three
aspects: first, processing, second, transmission, and storage. Weathersby and
others said that the link of network transmission is the most prone to problems in
these three aspects, so the security of data in network communication becomes
particularly important. Wu and others said that common means of data theft and
attack include: illegally stealing data information through system vulnerabilities;
malicious tampering with data distorting the data during transmission, and the data
receiver cannot recognize the data information. An unauthorized user logs in as an
authorized user to access the system. Li and others said that the problem of safe
data transmission in the network usually includes the following aspects: first, to
ensure that the user is safe, that is, to verify that the user is legitimate. Chen and
others said that the second is to ensure that the data has not been damaged or
stolen, that is, the application of encryption technology, digital signature, and other
technologies, as well as the management and traceability of access and operation
logs. Zhao and others said that at present, the most effective response to the
problem of how to ensure communication security on the Internet is to encrypt the
data.
Studies
In 2012 Suyash Verma et al proposed “An Efficient Developed New Symmetric Key
Cryptography Algorithm for Information Security”. They proposed new encryption
algorithm and used block cipher generating mechanism. They proposed evaluation,
results by calculation with different plaintexts in the same key (DPSK) mode. By the
results they show that, under the same key size and for the same size of the data,
proposed algorithm work faster than existing algorithm
The rationale of the study on enhanced security for company file sharing using
steganography application is to protect the confidentiality and integrity of sensitive
data that is shared between employees and other stakeholders. Steganography is a
technique of hiding data within another medium, such as an image, personal
information file or video file. This makes it difficult for unauthorized individuals to
detect the presence of the hidden data.
The objective of the study is to protect sensitive data from unauthorized access,
tampering, and disclosure.
The company itself. The company will benefit from the improved security of
its network security monitoring system. This will help to protect the company
from unauthorized access to its network and data.
The company's customers. The company's customers will benefit from the
fact that their data is protected by MFA. This will help to build trust between
the company and its customers.
The company's employees. The company's employees will benefit from the
fact that the company is taking steps to protect its network security monitoring
system. This will help to create a more secure work environment for employee
Literature
In the year of 2013 Akhtar, N.; Johri, P.; Khan, S., [2] implemented a variation of
plain LSB (Least Significant Bit) algorithm. The stego-image quality has been
improved by using bit-inversion technique. LSB method improving the PSNR of
stego-image. Through storing the bit patterns for which LSBs are inverted, image
may be obtained correctly. For the improving the robustness of steganography, RC4
algorithm had been implemented to achieve the randomization in hiding message
image bits into cover image pixels instead of storing them sequentially. This method
randomly disperses the bits of the message in the cover image and thus, harder for
unauthorized people to extract the original message. The presented method shows
good enhancement to Least Significant Bit technique in consideration to security as
well as image quality.
In the year of 2013 Prabakaran, G.; Bhavani, R. and Rajeswari P.S. [3] Investigated
on Medical records are extremely sensitive patient information a multi secure and
robustness of medical image-based steganography scheme is proposed. This
methodology provides an efficient and storage security mechanism for the protection
of digital medical images. Authors proposed a viable steganography method using
Integer Wavelet Transform to protect the MRI medical image into a single container
image. The patient's medical diagnosis image has been taken as secret image and
Arnold transform was applied and scrambled secret image was obtained. In this
case, the scrambled secret image was embedded into the dummy container image
and Inverse IWT was taken to get a dummy secret image. It has been observed that
the quality parameters are improved with acceptable PSNR compared to the existing
algorithms
Studies
In 2008, Alwan and his colleagues (2008) performed some applications on how to
select pixels in image steganography. In this study, edge finding and edge pixel
correlation are used. The selection of the pixel to hide the information using this
correlation is described in detail. Fridrich and his colleague discussed and detailed
the detection of steganography performed with the LSB (Least Significant Bits) in
gray level and color images in their articles. In this study, RS (Rescaled Range
Analysis) tried to obtain information that was hidden from the data hidden by
programs such as Cover image, Steganos and Hide4PGP.
This thesis aims to achieve the higher level of security in user authentication. This
will be done by developing a multi-factor authentication (MFA) system that uses a
combination of biometric and non-biometric factors.
The company itself. The company will benefit from the improved security of its
network security monitoring system.
The company's customers. The company's customers will benefit from the fact that
their data is protected by MFA.
The company's employees. The company's employees will benefit from the fact that
the company is taking steps to protect its network security monitoring system.
The cybersecurity community. The study will contribute to the body of knowledge
on MFA for cybersecurity.
Related Literature
•To preserve details on the net as protected as servers and possible, many clients
implement different kinds of cryptographic methods to encrypt sensitive details and
authenticate individuals at the opposite end of the connection. Today that much
more confidential information is stored virtual, it is supreme that community security
oak updated with modern threats.
•The most used method of boosting the protection of an account is asking for
additional info out of the computer user. Rather than asking only one piece of info
out of the person, the server can ask for additional info, making it a lot harder for an
assailant to bogus the identity of the person. With the hand of the fantasy, they have
approached the OTP primarily based authentication [27-28], do the related work
approach by [29]. A onetime password (OTP) method depends on the capability for
just a unit to make a onetime code that will be delivered towards the server for
verification
•According to the recode reports, which revealed Yahoo’s 2013 security Breach
affected three billion users hacked to steal the sensitive data of more than 145
Americans. The Senate committee requested Yahoo and Verizon to testify on Capitol
19 Hill with official executives (“Recode Daily: Hackers got into three billion Yahoo
accounts - Recode,” n.d.).
•Additional cyber security threats occurred in Bell Canada organizations, there were
over 560 million login credentials leaked online via database breaches at Yahoo,
LinkedIn, MySpace, Tumblr, and Dropbox. Also, there were 17 million Zomato
customer accounts compromised, encrypted passwords, email addresses. Thousands
of health records compromised in the breach at a Coney Island hospital, 1.9 million
customers hacked, 3,500 patient accounts were compromised, and 120,000 hashed
passwords decrypted, and United Airline confidential codes leaked (Nicholas, 2017).
•According to the article, (“143 Million Equifax customers affected by data breach.
Here’s what you should know.,” n.d.), threats cyber security for Equifax web
application compromised via customer names, SSN, birthday, address and driver’s
license numbers. Hijacking attackers gained unauthorized access to the Equifax data
files where 143 million of US customers hacked, 209,000 customers' credit card
numbers, 182,000 customers were exposed. Cyber criminals used stolen data to
access online banking accounts, insurance accounts and emails.
Related Studies