Mr Farish Kurupkar’s scientific contributions

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (1)


Research Paper on Cyber Security
  • Article

June 2021

·

234,734 Reads

·

15 Citations

Mrs Ashwini Sheth

·

Mr Sachin Bhosale

·

Mr Farish Kurupkar

·

Asst Prof

In the current world that is run by technology and network connections, it is crucial to know what cyber security is and to be able to use it effectively. Systems, important files, data, and other important virtual things are at risk if there is no security to protect it. Whether it is an IT firm not, every company has to be protected equally. With the development of the fresh technology in cyber security, the attackers similarly do not collapse behind. They are consuming better and enhanced hacking techniques and aim the weak points of many businesses out there. Cyber security is essential because military, government, financial, medical and corporate organizations accumulate, practise, and stock unprecedented quantities of data on PCs and other devices. An important quota of that data can be sensitive information, whether that be financial data, intellectual property, personal information, or other various kinds of data for which illegal access or acquaintance could ensure negative concerns.

Citations (1)


... Shrestha and Adhikari (2019) pointed out that if proper security solution is not implemented, the intruder can take advantage and get into the system through faked MAC addresses, unknown stations and illegitimate access points. To address the aforementioned threats, there must be an information security infrastructure mechanism that will offer three essential security objectives which are confidentiality, integrity and availability (Sheth, 2021;Choi, 2008). The three objectives ensure that only authorized users can get into the system, see what is intended for that user and change data and information delegated to change (Parte, 2012). ...

Reference:

Comprehensive Analysis of the Wi-Fi Security: A Case of the National Institute of Transport
Research Paper on Cyber Security
  • Citing Article
  • June 2021