A STUDY OF RED TEAM WITHIN INFORMATION SECURITY USING COVERT CHANNEL
Author(s):
Miss. Nishita H. Dave , Dr.Ravi K Sheth
Keywords:
Information security, CIA triad, Red Team, Attacker ,Covert channel
Abstract
Information security isn't tied in with making sure about things from an online premise and unauthorized access. Information security teaches us how to prevent from unauthorized users. How to describe ourselves with strangers. We have to secure ourselves in both world physical world as well as cyber world.. So prevent our system physically as well as virtually from the attacker. We have to prevent our details, our profile on social media, our data on the mobile. Thus, Information security is valuable in numerous zones with its new methods like Cryptography, Digital Crime scene investigation, Online Web-based social networking, and so on.. Information security have 2 teams: primary and secondary teams, which working to approach CIA triad and maintain security of the organization. A study of red team functionality using covert channel attack analysis. So, the analysis of this attack are vital point to know.
Article Details
Unique Paper ID: 149906

Publication Volume & Issue: Volume 7, Issue 1

Page(s): 1038 - 1041
Article Preview & Download


Share This Article

Join our RMS

Conference Alert

NCSEM 2024

National Conference on Sustainable Engineering and Management - 2024

Last Date: 15th March 2024

Call For Paper

Volume 10 Issue 10

Last Date for paper submitting for March Issue is 25 June 2024

About Us

IJIRT.org enables door in research by providing high quality research articles in open access market.

Send us any query related to your research on editor@ijirt.org

Social Media

Google Verified Reviews