IITM Journal of Management and IT
Listed in:
Google Scholar, EBSCO Discovery, indianjournals.com & CNKI Scholar
(China National Knowledge Infrastructure Scholar)
ISSN(PRINT):0976-8629
ISSN(ONLINE):2349-9826
www.iitmipujournal.org
Published Issues
Submission
Please sent your full manuscript to [email protected]
Author Guidelines

Volume 6 issue 1 January- June 2015

Research Paper & Articles


FIRe: Firefox for Computer Security Incident Reporting and Coordination 1
Ashutosh Bahuguna
Nine Steps to Indian Security, Confidentiality Privacy & Technology in Cyber Space 10
Rajeev Kumar Singh
Security Vulnerabilities in ‘Future of the Web’-IPv6 Protocol Suite 17
Navneet Kaur Popli, Dr. Anup Girdhar
A Study to Examine Cyber Forensic: Trends and Patterns in India21
Ms. Shruti Verma, Dr. Saurabh Mehta
General View on the Aspects of Cryptography 28
Amit Kumar, Sonia Kumari
A Scalable Server Architecture for Mobile Presence Services in Social Network Applications 33
A. Radha Krishna, K. Chandra Sekharaiah
“Aadhar” Management System 40
Ameer Ulla Siddiqui, Mr. Hare Krishna Singh
A Survey on Honeypots Security 44
Amit Kumar, Sonia Kumari
Security Features of User's for Online Social Networks 51
A. Radha Krishna, K. Chandra Sekharaiah
Cyber Security in India: Problems and Prospects 59
Sushma Devi, Mohd. Aarif Rather
An Analysis on Improvement of Website Ranking Using Joomla 69
Kirti Nigam, Satyam Saxena, Nargish Gupta
Network Security-Authentication Methods and Firewall 73
Minal Dhankar
Cyber Security in Biometrics Using Fingerprints 80
Priyanka Rattan, Ritika Kapoor
The Online Murder: Death via Hacked Internet Connected Technologies86
Nishtha Girotra, Raghunatha Sethupathy
Future Towards Danger: The Terror of Cyber Attacks 90
Kanika Sharma, Tanvi Bhalla
Method for Storing User Password Securely 95
Gunjan Jha, Navneet Popli
Security Issues in Bluetooth Technology-A Review 100
Dr. Menal, Sumeet Gill
Detection of Terrorism Activities Using Face Recognition Technique 104
Garima Bhatia, Mansi
Cloud Security: A Concerning Issue 112
Apurva Aggarwal, Shalini Sharma
Hand Recognition System Design 116
Harleen Kaur, Simranjeet Kaur
Infrared Thermal Imaging 120
Amit Sharma, Nidhi Jindal
Cyber Forensic: Introducing A New Approach to Studying Cyber Forensic and Various Tools to Prevent Cybercrimes 123
B. Vanlalsiama, Nitesh Jha
Cyber Crime and Information Warfare-The New Arenas for WAR 129
Anwesha Pathak, Rohit Sharma
Legislation Vulnerabilities, Threats and Counter Measures in Wireless Network Security 135
Kushagra Dhingra, Ankit Verma
Cyber Ethics in Security Application in the Modern Era of Internet 140
Megha Sharma, Sanchit Mittal, Ankit Verma
Comparison of AES and DES Algorithm 144
Shruti Kumari, Gautam Kumar
Social Networking Security Loopholes 147
Shelly Taneja, Shalini Rawat
Cloud Computing: Vulnerabilities, Privacy and Legislation 152
Amit Kiran, Priyam Lizmary Cherian
The Exigency in Accretion of Cyber Warfare Legislation 158
Raman Solanki, Ankit Verma
Cyber Terrorism-An International Phenomena and An Eminent Threat 164
Biny Pal Singh, Ankit Verma


copyright @ www.iitmjanakpuri.com