Secured and opportune transmission of data alwaysis a significant feature for any organization. Robust encryption techniques and algorithms always facilitate in augmenting secrecy, authentication and reliability of data. At present, Advanced Encryption Standard (AES) patronized by NIST is the most secure algorithm for escalating the confidentiality of data. This paper mainly focuses on an inclusive analysis related to the security of existing AES algorithm and aim to enhance the level security of this algorithm. Through some modification of existing AES algorithm by XORing an additional byte with s-box value
A high-resolution video surveillance management system incurs huge amounts of
storage and network bandwidth. The current infrastructure required to support a
high resolution video surveillance management system (VMS) is expensive and
time consuming to plan, implement and maintain. With the recent advances in
cloud technologies, opportunity for the utilization of virtualization and the
opportunity for distributed computing techniques of cloud storage have been
pursued on the basis to find out if the various cloud computing services that
are available can support the current requirements to a high resolution video
surveillance management system. The research concludes, after investigating and
comparing various Software as a Service (SaaS), Platform as a Service (PaaS),
and Infrastructure as a Service (IaaS) cloud computing provides what is
possible to architect a VMS using cloud technologies; however, it is more
expensive and it will require additional reviews for legal implications, as
well as emerging threats and countermeasures associated with using cloud
technologies for a video surveillance management syste
Cybersecurity has become a very hot topic due to high profile breaches that occurred in the past years. Despite the implementation of current known pre-emptive methods such as intrusion detection systems, anti-viruses, and the use of firewalls, hackers still find sophisticated means to steal data or impair an organization by targeting their assets. It is important that security professionals need to "think outside the box" and use new tools and techniques to mitigate threats beyond current known detections and prevention technologies. It is imperative that our infrastructure and assets are impermeable from domestic and foreign attackers. Our best line of defense is the detection of any threats or vulnerability to prevent or minimize damages of our assets from domestic and foreign attackers.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.