Cybersecurity Issue and Online Information Source

  • Lalit Mohan JoshiEmail author
  • Rajendra Bharti
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 624)


With the occurrence of the advent of social network, this paper illustrates the security issues related to online activity, information source. Here, I discourse on the network information forensic using Python language. As large users connect to the Internet, it magnetizes lots of cybercriminals. Information of gathering footprints and its countermeasures is also explained. Today as the Internet has become more and more widespread, here I discuss the process of discovering e-mail spam and anticipation with protocol analysis and also security issues such as multicast, broadcast, unicast, for communication between receiver and sender. This paper explained how a user can analyze the wireless traffic in an online source and security issues in information theory [1]. The main aim of the system audit by the third-party tools is to secure the online property [2]. This paper ventilates the state of the art for a broad range of cryptographic activity used in networking. This paper also helps to distinguish between hacker, hacking, and penetration techniques.


Penetration Impairments Posterior security Python 


  1. 1.
    K. Summers, W.C. and A. DeJoie. Wireless security techniques: an overview. 2004: ACM.Google Scholar
  2. 2.
    Russell, S. F. Wireless network security for users, 2001. IEEE, p. 172–177.Google Scholar
  3. 3.
    Manley, M., Mcentee, C., Molet, A. & Park, J. Wireless security policy development for sensitive organizations, 2005. IEEE, p. 150–157.Google Scholar
  4. 4.
    Durbin, S. (2011).Tackling converged threats: building a security-positive environment. Network Security (6): 5–8.Google Scholar
  5. 5.
    Herath, T. and H. Rao, Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness Decision Support Systems, 2009. 47(2): p. 154–165.Google Scholar
  6. 6.
    Miller, S.K., Facing the challenge of wireless security. Computer, 2001.34(7): p. 16–18.Google Scholar
  7. 7.
    Arbaugh, W.A., Wireless security is different. Computer, 2007.36(8): p. 99–101.Google Scholar
  8. 8.
    Dourish, al. Security in the wild: user strategies for managing security as an everyday, practical problem. Personal and Ubiquitous Computing, 2004.8(6): p. 391–401.Google Scholar
  9. 9.
    Chenoweth, T., R. Minch, and S. Tabor. User security behavior on wireless networks: An empirical study. 2007: IEEE.Google Scholar
  10. 10.
    Park, J.S. and D. Dicoi, WLAN security: current and future. IEEE Internet Computing, 2003. 7(5): p. 60–65.Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2018

Authors and Affiliations

  1. 1.BTKITDwarahatIndia

Personalised recommendations