A STUDY OF RED TEAM WITHIN INFORMATION SECURITY USING COVERT CHANNEL

  • Unique Paper ID: 149906
  • Volume: 7
  • Issue: 1
  • PageNo: 1038-1041
  • Abstract:
  • Information security isn't tied in with making sure about things from an online premise and unauthorized access. Information security teaches us how to prevent from unauthorized users. How to describe ourselves with strangers. We have to secure ourselves in both world physical world as well as cyber world.. So prevent our system physically as well as virtually from the attacker. We have to prevent our details, our profile on social media, our data on the mobile. Thus, Information security is valuable in numerous zones with its new methods like Cryptography, Digital Crime scene investigation, Online Web-based social networking, and so on.. Information security have 2 teams: primary and secondary teams, which working to approach CIA triad and maintain security of the organization. A study of red team functionality using covert channel attack analysis. So, the analysis of this attack are vital point to know.

Cite This Article

  • ISSN: 2349-6002
  • Volume: 7
  • Issue: 1
  • PageNo: 1038-1041

A STUDY OF RED TEAM WITHIN INFORMATION SECURITY USING COVERT CHANNEL

Related Articles