High Impact Factor : 4.396 icon | Submit Manuscript Online icon |

Spy Device Forensics

Author(s):

Aditya Chaubey , Fr. Conceicao Rodrigues Institute of Technology ; Aditya Chaubey, Fr. Conceicao Rodrigues Institute of Technology ; Mayur Dere, Fr. Conceicao Rodrigues Institute of Technology ; Roydon Quadros, Fr. Conceicao Rodrigues Institute of Technology ; Omkar Sonawane, Fr. Conceicao Rodrigues Institute of Technology

Keywords:

Android Application, Android Studio, Wireless communication system, Arduino, X-CTU system, zig bee 802.15.4, PAN ID, Mesh Network, Bluetooth

Abstract

The unprecedented growth of competition in the Information technology has raised the importance of maintaining security in digital field in order to secure all confidential company’s information and databases. Analyzing Company’s databases for any type of malicious attacks on company may lead to loss of company’s assets. This study presents a new stage frame-work of identifying the malicious signals that an attacker can perform within the company’s environment in order to get access of databases related to company’s assets, employee details, Tender projects, high level catalyst projects. This system will provide information about attacker’s scenario that can lead to loss of any data .in this system we will be focusing on all aspects of attacker and in order to intercept attackers function with respect to system’s functionality. We will try to intercept the attacks that an attacker will try to get access to assets of the company using signaling frequency.

Other Details

Paper ID: IJSRDV4I120193
Published in: Volume : 4, Issue : 12
Publication Date: 01/03/2017
Page(s): 211-213

Article Preview

Download Article