A STUDY OF RED TEAM WITHIN INFORMATION SECURITY USING COVERT CHANNEL
Author(s):
Miss. Nishita H. Dave , Dr.Ravi K Sheth
Keywords:
Information security, CIA triad, Red Team, Attacker ,Covert channel
Abstract
Information security isn't tied in with making sure about things from an online premise and unauthorized access. Information security teaches us how to prevent from unauthorized users. How to describe ourselves with strangers. We have to secure ourselves in both world physical world as well as cyber world.. So prevent our system physically as well as virtually from the attacker. We have to prevent our details, our profile on social media, our data on the mobile. Thus, Information security is valuable in numerous zones with its new methods like Cryptography, Digital Crime scene investigation, Online Web-based social networking, and so on.. Information security have 2 teams: primary and secondary teams, which working to approach CIA triad and maintain security of the organization. A study of red team functionality using covert channel attack analysis. So, the analysis of this attack are vital point to know.
Article Details
Unique Paper ID: 149906

Publication Volume & Issue: Volume 7, Issue 1

Page(s): 1038 - 1041
Article Preview & Download


Share This Article

Go To Issue



Call For Paper

Volume 7 Issue 1

Last Date 25 June 2020


About Us

IJIRT.org enables door in research by providing high quality research articles in open access market.

Send us any query related to your research on editor@ijirt.org

Social Media

Google Verified Reviews

Contact Details

Telephone:+91 820 061 5067
Email: editor@ijirt.org
Website: ijirt.org

Policies