Life Cycle Assessment of Vulnerability and Penetration Testing on Systems and Proactive Action Taken to Resolve Possible Attacks on Networks

V Kannika Sherly - International Journal of Management …, 2023 - papers.ssrn.com
After getting the vulnerability list of the victim, the attacker make a plan for the possible
attack. With that list attacker exploit the victim's network or system and compromise his …

Examination of Some Foremost Security Concerns of Contemporary Cloud Computing Environments

RA Chauhan - International Journal of Management, Technology …, 2023 - papers.ssrn.com
Cloud computing diminishes cost and complexity of service providers by means of assets
and operational costs. It allows users to access applications tenuously. On behalf of user …

Utilization of Possible Security and Privacy Issues Considering the Component Interaction in High Speed Communication Networks

RA Chauhan - International Journal of Management, Technology …, 2023 - papers.ssrn.com
Abstract The Internet of Things (IoT), an evolutionary technology that raised and gained
huge scope in the science and engineering applications solving problems without the …

[PDF][PDF] Design and Development of an Online Bakery Website for Enhanced Customer Experience

T Shynu - Central Asian Journal of Mathematical Theory and …, 2024 - researchgate.net
Swiss Bakery is a digital paradise where the delightful aroma of freshly baked goods meets
the convenience of online shopping. Our virtual bakery is a sanctuary for pastry lovers …

Mitigating the Vulnerabilities for the Larger Infrastructures and Smaller Attention to the Cyber Security Threats in Large Scale Networks

RA Chauhan - International Journal of Management, Technology …, 2023 - papers.ssrn.com
We have seen the development and demand for seamless interconnectivity of smart devices
to provide various functionality and abilities to users. Nevertheless, we also know the …

Highly Reliable Intrusion Detection Model as a Predictive Framework for Network Data Traffic Analysis in Wireless Networks

RA Chauhan - International Journal of Management, Technology …, 2023 - papers.ssrn.com
It has become an important model in various applications such as education, business and
others. So security of the data that is communicated through internet is necessary. Secure …

An Enhanced Context Graph Based Framework to Provide a Reliable Strategy for Enhancing Network Security

RA Chauhan - International Journal of Management, Technology …, 2023 - papers.ssrn.com
A common firmware makes it easier to control and manage various IoT devices without
many overheads. Common software platforms allow easy configurations as well as easy …

Formulating a Complex Solution to Secure Data in Information Systems for Supply Chain Management

V Kannika Sherly - International Journal of Management …, 2023 - papers.ssrn.com
To successfully integrate business processes between suppliers and customers,
manufacturers must solve the complex problem of information security. IoT is defined as a …

[PDF][PDF] Building a Scalable Serverless Weather Application Using AWS Lambda, API Gateway, and DynamoDB

S Manimaran, SR Saranya… - Central Asian Journal …, 2024 - researchgate.net
This paper demonstrates how to build a scalable and cost-effective serverless weather
application using Amazon Web Services (AWS). By leveraging the power of AWS Lambda …

An Efficient Scheme for Securing Data Warehouses in the Cloud by Reducing Overhead While Enforcing Data Privacy

V Kannika Sherly - International Journal of Management …, 2022 - papers.ssrn.com
In cloud computing schemes, Infrastructure as a Service represents a cloud computing
technology that delivers computing resources, networking, and storage to consumers on …