• ISSN: 2349-6002
  • UGC Approved Journal No 47859

A STUDY OF RED TEAM WITHIN INFORMATION SECURITY USING COVERT CHANNEL

  • Unique Paper ID: 149906
  • Volume: 7
  • Issue: 1
  • PageNo: 1038-1041
  • Abstract:
  • Information security isn't tied in with making sure about things from an online premise and unauthorized access. Information security teaches us how to prevent from unauthorized users. How to describe ourselves with strangers. We have to secure ourselves in both world physical world as well as cyber world.. So prevent our system physically as well as virtually from the attacker. We have to prevent our details, our profile on social media, our data on the mobile. Thus, Information security is valuable in numerous zones with its new methods like Cryptography, Digital Crime scene investigation, Online Web-based social networking, and so on.. Information security have 2 teams: primary and secondary teams, which working to approach CIA triad and maintain security of the organization. A study of red team functionality using covert channel attack analysis. So, the analysis of this attack are vital point to know.
email to a friend

Cite This Article

  • ISSN: 2349-6002
  • Volume: 7
  • Issue: 1
  • PageNo: 1038-1041

A STUDY OF RED TEAM WITHIN INFORMATION SECURITY USING COVERT CHANNEL

Related Articles

Impact Factor
8.01 (Year 2024)
UGC Approved
Journal no 47859

Join Our IPN

IJIRT Partner Network

Submit your research paper and those of your network (friends, colleagues, or peers) through your IPN account, and receive 800 INR for each paper that gets published.

Join Now

Recent Conferences

NCSEM 2024

National Conference on Sustainable Engineering and Management - 2024 Last Date: 15th March 2024

Submit inquiry