Articles

Evaluating Encryption Algorithm Method Based on Software Encryption Tools for Information Security

Information security is the combination of policies, rules and practices to prevent any unauthorized access or attacks that causes corruption to data, information, and computing services. Information security techniques and programs are built around the core objective to secure data and information by adapting encryption algorithms methods. Encryption algorithm methods impeded in the information security programs or encryption software tools enforce more security by encrypting and decrypting data and information. Encryption algorithm methods are based on algorithms that scramble data and information by converting them into unreadable text. There are various encryption methods used in various encryption software tools. The more encryption algorithm methods used within the encryption software tool, the more security provided on data and information effective data and information security.  In this paper, the most used encryption algorithm methods are analyzed and evaluated based on their usage in encryption software tools to determine the most encryption algorithm method that is used ensure more security on data and information.

A Review on the Different Types of Honeypots in Information Security

Honeypotting has evolved into a crucial tool in information security analysis, despite the fact that the concept of enticing enemies in order to watch their activities is not new. Honeynets, honeytokens, and adaptive honeypots are examples of recent advancements in network intrusion detection. This article will look at modern applications, as well as the technical issues that go into developing honeypot solutions for dynamically blocking emerging attack vectors and exploitation of sophisticated persistent threats.