Secure E-mail Communications Through Cryptographic Techniques—A Study

Author(s):  
Shafiya Afzal Sheikh ◽  
M. Tariq Banday
Author(s):  
Mahadi Winafil ◽  
Sinar Sinurat ◽  
Taronisokhi Zebua

Digital images that are personal and confidential are very vulnerable to wiretapping by irresponsible parties. Especially if distributed via the internet network such as on Facebook, WhatsApp and e-mail chat based applications. Images that are sent sometimes are often confidential images and must be maintained. In order to maintain the security of digital images can be done by utilizing cryptographic techniques. Cryptographic techniques can secure digital images by changing pixel values from digital images so as to produce different pixel values from the original image to be secured. This research will use AES 128 bit and Triple DES methods for encryption and decryption of digital images on client-server based applications. The results of the encryption AES algorithm will be re-encrypted with the Triple DES Algorithm so as to produce pixel values that are far different from the original pixel values. Keywords: cryptography, image, AES, Triple DES


Author(s):  
Bogdan Hoanca

The field of information security has realized many advances in the past few decades. Some of these innovations include new cryptographic techniques, network protocols, and hardware tokens. However, the weakest link in information security systems, human gullibility, remains extremely vulnerable. Even the strongest cryptographic algorithms are useless if a user is fooled into disclosing their authentication information. This chapter describes the threat of phishing in which attackers generally sent a fraudulent e-mail to their victims in an attempt to trick them into revealing private information. We start by defining the phishing threat and its impact on the financial industry. Next, we review different types of hardware and software attacks and their countermeasures. Finally, we discuss policies that can protect an organization against phishing attacks. An understanding of how phishers elicit confidential information along with technology and policy-based countermeasures will empower managers and end users to better protect their information systems.


Author(s):  
Nestor J. Zaluzec

The Information SuperHighway, Email, The Internet, FTP, BBS, Modems, : all buzz words which are becoming more and more routine in our daily life. Confusing terminology? Hopefully it won't be in a few minutes, all you need is to have a handle on a few basic concepts and terms and you will be on-line with the rest of the "telecommunication experts". These terms all refer to some type or aspect of tools associated with a range of computer-based communication software and hardware. They are in fact far less complex than the instruments we use on a day to day basis as microscopist's and microanalyst's. The key is for each of us to know what each is and how to make use of the wealth of information which they can make available to us for the asking. Basically all of these items relate to mechanisms and protocols by which we as scientists can easily exchange information rapidly and efficiently to colleagues in the office down the hall, or half-way around the world using computers and various communications media. The purpose of this tutorial/paper is to outline and demonstrate the basic ideas of some of the major information systems available to all of us today. For the sake of simplicity we will break this presentation down into two distinct (but as we shall see later connected) areas: telecommunications over conventional phone lines, and telecommunications by computer networks. Live tutorial/demonstrations of both procedures will be presented in the Computer Workshop/Software Exchange during the course of the meeting.


2005 ◽  
Vol 36 (1) ◽  
pp. 34
Author(s):  
SHARON WORCESTER
Keyword(s):  

2006 ◽  
Vol 37 (8) ◽  
pp. 56-57
Author(s):  
JOSEPH S. EASTERN
Keyword(s):  

2005 ◽  
Vol 38 (3) ◽  
pp. 94
Author(s):  
Sherry Boschert
Keyword(s):  

Author(s):  
Bernd Werse ◽  
Luise Klaus
Keyword(s):  

Zusammenfassung. Zielsetzung: Erfassung der Auswirkungen der Corona-Pandemie auf Menschen, die kompulsiv ‚harte‘ Drogen konsumieren sowie auf Mitarbeitende der Drogenhilfe. Methodik: Es wurde eine Form der qualitativen Online-Erhebung angewandt, in deren Rahmen Mitarbeitende der Drogenhilfe Leitfragen mittels E-Mail, Sprach- oder Textnachrichten beantworteten. Bisher konnten 50 Antworten aus 26 deutschen Städten einbezogen werden. Zwischenergebnisse: Die Stimmung der Konsumierenden von „harten“ Drogen hat sich nach Einschätzung der befragten Mitarbeitenden von Suchthilfeeinrichtungen überwiegend verschlechtert, u. a. durch ungünstigere Bedingungen für Hilfsangebote. Die generellen Lebensbedingungen für Konsumierende sind in erster Linie durch verschärften Geldmangel erschwert. Der Drogenmarkt wurde nur teilweise durch die Corona-Einschränkungen beeinflusst, wobei sich illegal gehandelte Medikamente stärker verteuert haben als illegale Substanzen. Die Drogenhilfe hat ihre Angebote aufgrund der Ausgangsbeschränkungen, Abstands- und Hygieneregeln stark eingeschränkt und musste zu Beginn der Krise teils mit einem Mangel an Schutzmaterialien umgehen. Oft, aber nicht immer, wurden Take-Home-Regelungen für Substitution ausgeweitet. Es wurde berichtet, dass Konsumierende teilweise Probleme hatten, Abstands- und Hygieneregeln einzuhalten. Fazit: Die aktuelle Pandemie hat sowohl für Konsumierende als auch Drogenhilfepersonal deutliche Herausforderungen und Belastungen mit sich gebracht. Es wird deutlich, dass hier weiterer Forschungsbedarf besteht, u. a. was Praxis und Auswirkungen der Substitution betrifft.


Sign in / Sign up

Export Citation Format

Share Document