Detection of Guilty Agent using Encryption Algorithm and MAC Address

There are many websites that publish information and provide access of information on the internet. All that websites has many different web application programs that contains potential information or data that have to be protected. In many organizations, business scenarios and company outsource its data to the other company or organization or agents, all these agents are known as trusted third party agents. The data owner give the confidential data to the trusted third party agents and their possibility that any of that trusted agent can leak the potential data.

Subscribe to the Cybersecurity Insider Newsletter

Strengthen your organization's IT security defenses by keeping abreast of the latest cybersecurity news, solutions, and best practices. Delivered Tuesdays and Thursdays

Subscribe to the Cybersecurity Insider Newsletter

Strengthen your organization's IT security defenses by keeping abreast of the latest cybersecurity news, solutions, and best practices. Delivered Tuesdays and Thursdays

Resource Details

Provided by:
International Journal of Computer Science and Mobile Computing (IJCSMC)
Topic:
Security
Format:
PDF