Smart Card Technical Document

Smart Card Technical Document: A Smart Card is like a piece of plastic. It is of the same size like credit or debit card. It is embedded on a silicon chip. The chip consists of a microprocessor, which is a miniature computer. This can perform calculations and store data or information in its memory.

These chips hold a variety of data from stored information to secure information. It has applications which support operations like medical/health care records. New application or information can be updated added depending on the chip memory.

The card is called “smart” because it is “active”. This implied that card can receive information, execute it and then “get the result”.

Based on PC/SC standards, the basic components of the smart card subsystem include: application programming interface (API), user interface (UI), and several base service. The service providers make use of COM interface model to get smart card services.

The interaction between users and smart cards include different components. They are SMART CARD Readers, Smart Card Interfaces, Primary Service Provider, Introducing Smart Cards to the System, Accessing a Smart Card, and Relation to Other Services.

Smart cards are becoming most advanced way for the world works. Combining microchip technology with credit card size, smart cards has become computing power directly into the consumer’s pocket. This is nothing but a CardTouch that comprises libraries of standard components

Smart Cards are used in different areas as a credit card, phone card, SIM card, MTN air time card, Super Card, Clicks, Edgars, Woolworths, Petrol Cards etc.

There are other different kinds of cards used nowadays are contact, contactless and combination cards.

Conclusion:

The conclusion made is that smart cards are convenient and provide wide range of value-added services. They reduce the risk of fraud and threats. These cards can provide identification, authentication, data storage, and application processing. They also provide strong security authentication within large organizations.

Download Smart Card Technical Document.

Slammer Worm Seminar

Slammer Worm Seminar: The Virus is a computer program which moves from one computer to another while attaching any file. These programs are sometimes malicious rather than beneficial. Examples of virus are Worms and Trojan horses.

Worms are self replicating programs. They do not infect other programs like viruses. However they create copies of themselves, which in turn create copies again. Thus it is hogging the memory resources and clogging the network. These are usually found on networks and multiprocessing OS.

Trojan Horses are programs which act as delivery vehicles. These programs do something undocumented or something concealed at the time of delivery. These are desperate actions unwanted by the user.

Slammer Worm which is sometimes called Sapphire. This was the faster worm than any other computer worms in history. Within 10 minutes, this worm infected more than 90 percent of vulnerable hosts, which caused significant disruption to transportation, financial, government institutions, and precluding human-based response.

On Saturday, 25 January 2003, Slammer infected hosts by exploiting buffer-overflow vulnerability on the Internet running Microsoft’s SQL Server. This worm exploited its vulnerability and worm infected at least 75,000 hosts causing network outages and unforeseen like canceled airline flights, interference with elections, and ATM failures.

The spreading strategy of this worm uses random scanning. It randomly selects IP addresses then finds and infects every susceptible host. Random-scanning worms spread exponentially but their rapid new-host infection decreases because the worms retry infected addresses continually.

Conclusion:

The above mentioned information suggest that even if a giant leap is taken in the technological advancement and secure everything, it is possible for today’s technology to explore beyond the unobvious.  So it can be concluded that how much firewalls and other security measures are taken, even the most intricate encryption can be decrypted, so attention is only the way for warding them off.

Download Slammer Worm CSE Computer Science Engineering B Tech/ BE Final Project Paper Presentation and Seminar PPT.

All Parts of a Computer Technical White Paper

All Parts of a Computer Technical White Paper There are several components of computer which is listed as: The Mother Board, CPU, SMPS, RAM, Hard Disk Drive (HDD), Floppy Disk Drive (FDD), CD ROM Drive, CD Writer, AGP Card, and LAN Card. This PowerPoint presentation consists of the images of different parts of a computer. Let’s have a brief discussion on each part.

In PCs, a motherboard is the central printed circuit board (PCB). It holds various crucial components of the system. It provides connectors for other peripherals. The motherboard is sometimes called the mainboard, system board, or the logic board. It is a big communication highway.

From the image, the motherboard connections can be seen. It contains expansion slots like ISA, PCI, AGP and DIMM sockets. It also contains external connections for sound card, USB ports, Serial and Parallel ports, PS/2 ports for keyboard and mouse as well as network and Firewire connections. Hence the motherboard has a massive role to play in PC performance.

There are different ports which are on the front view, such as, Mouse port, Ethernet port, parallel port, Game port, keyboard port, serial port, USB port, VGA port, and sound port.

Random-access memory (RAM) is data storage in a computer. It is the form of integrated circuits which allow stored data to be accessed. A switched-mode power supply (SMPS) is an electronic power supply. It incorporates a switching regulator for conversion electrical power. It transfers power from electrical power grid to a load i.e., PC.

This PowerPoint describes about peripheral power connector, floppy power, speed of a CDD which is expressed as 52X = 52 x 150 kbps = 7800kbps, AGP card. The hard disk drive (HDD is a non-volatile, random access digital magnetic data storage device. Other parts of computer are LAN card, cables, floppy drive cable, IDE cables, 40 conductor cable, and 80 conductor cables.

Conclusion:

It is concluded that these main parts of computer help in the processing of computer. Each part has its own functionality. These components provide different functions in a computer like data storage, power connectors, drivers, CD, etc.

Download All Parts of a Computer Technical White Paper.

Semantic Web A New Trend in Data Warehousing PPT

Semantic Web A New Trend in Data Warehousing PPT: The Semantic Web is a huge engineering solution to make a secured transaction and publishing data on WWW. The Semantic Web is a mesh of data and information which are linked up for easy processing by machines on a global scale. The Semantic Web provides a common framework which allows data to be shared and reutilized over application. It is a collaborative effort by W3C. It is about common formats for integration and collection of data drawn from diverse sources in which the original Web deals with interchange of documents. This development is occurring in two areas, infrastructural and academically-focused organizations.

Problems with the WWW

Data hidden in HTML files is utilized in some contexts but not in others. The problem with the large amount of data on the web is not easy to use on large scale because of absence of global system. Technically, WWW is defined as a set of protocols and languages. It is driven by a standards approach namely URI, HTTP, HTML, and HML.

The Semantic Web is an extension of the current web where information has well-defined meaning and enables people and computers to work cooperatively. Web is Human Friendly whereas the SEMANTIC WEB is a Machine Friendly. Semantic Web is defined as adding semantic annotation to web resources.

The Web Machine is friendly in three ways: Creating an environment for Knowledge inference, Making Knowledge self-explainable for machines, and Establishing Trust

Conclusion:

It is concluded that Semantic Web is said to be a huge engineering solution to the problems of WWW. The best thing of this web is that it provides many different things to so many different people and the upcoming Semantic Web will give this versatility numerous folds. The Semantic Web will be an ease by which PDA, laptop, desktop, server, and car will communicate with each other.

Download Semantic Web A New Trend in Data Warehousing CSE Computer Science Engineering B Tech/ BE Final Project Paper Presentation and Seminar PPT.

Download Security in Mobile Ad Hoc Networks

Security in Mobile Ad Hoc Networks Seminar Abstract: In today’s hostile environment, security has become an important concern in order to have a protected communication between the nodes of mobiles.

Like the wireless networks, the only characteristics of Mobile Ad Hoc Networks consist of a number of nontrivial challenges such as open peer-to-peer network architecture, stringent resource constraints, shared wireless medium and highly dynamic network topology.

These challenges helped in building multi-fence security solutions. This set of the challenge has achieved both broad protection and desirable network performance.

This article has focused on the important security problem of protecting the data transmitting between two nodes in a MANET, that is from wormhole attacks and find the way to solve related to this problem. We also identify the security issues and various protocols (SRP) used in securing MANETs.

MANET is a type of self-configuring network of mobile nodes. It is connected by wireless links. The union of this network forms an arbitrary topology. 

Mobile Ad Hoc Networks (MANETs) have got a tremendous attention due to their capabilities of self-configuration and self-maintenance. It is assumed to have a friendly and cooperative environment. It has focused on problems like wireless channel access and multihop routing.

This security includes challenges like open network architecture, shared wireless medium, stringent resource constraints, and highly dynamic network topology.

The goal of MANETS is to provide security services to mobile users like confidentiality, authentication, integrity, anonymity, and availability. To have a secure Ad Hoc Network, the attributes considered are availability, confidentiality, integrity, authentication, and non-repudiation.

Also See: Mobile Ad-Hoc Network Project

Conclusion:

In the research community, Mobile Ad Hoc Networks security has recently gained momentum. Because of the open nature of Ad Hoc Networks and inherent lack of infrastructure, security exposures are a hindrance to basic network operation.

Security solution for MANET has to contend with a challenging environment which includes scarce energy, lack of persistent structure, and computational resources.

Security and Privacy in Wireless LAN Latest CSE Seminar Idea

Security and Privacy in Wireless LAN Latest CSE Seminar Idea:  Wireless local area networks (WLANs) are metamorphosing the landscape of computer networking. With the use of laptops and personal digital assistants, there is a big demand of adoption of WLANs. Network team is using WLANs to facilitate network add-ons, moves, and changes.

This document furnishes about fundamental Internet Privacy and Security, technical and complex security, and multiple number of methods how the security of WLANs can be breached. It also contributes prevention on potential assault on WLANs network.

The different kinds of attacks are eavesdropping, tampering, utilizing antennas, war driving, malicious association, interference and jamming. Brute-Force attack, Mac spoofing-Identity theft, man-in-the-middle attack, and Denial-of-Service attack

The high-speed WLANs offer the benefits of network connection without the prevention of being connected by wires. It extends or replaces a wired infrastructure in places where cables are costly or prohibited. Using laptop computers and wireless NICs, portable access to wireless networks are achieved.

With wireless connection, the user can travel to various locations and can have access to networked data. Wireless networks provide more mobility and flexibility to stay connected to the Internet and to the network in any business field. It is widely used in many areas like airports, restaurants, rail stations, and common areas etc.

 CONCLUSION:

It is preferred to have only one access point and enables to process under a secure operating system like Linux. It must be occasionally boot up and trap sections to know for any unauthorized signatures. The user should connect via a VPN, WEP is enabled, the access point is secured and hence cannot be reset, and access point must in a position for the radio frequency. The network traffic between the LAN and access point passes through a firewall. It helps to block any possible DoS attacks. It prevents the attacks from entering the enterprise LAN on the WLAN.

Download Security and Privacy in Wireless LAN Latest CSE Seminar Idea

Security and Cryptography Technical PPT

This document Security and Cryptography Technical PPT presents three ways for strengthening public key cryptosystems in a way that they become secure against ciphertext attacks. The first is strengthening method, based on one-way hash functions, the second on universal hash functions, and the third on digital signature schemes.

There are two kinds of cryptographic security, computational security and unconditional security. Cryptography occurs in a physical world of communication where nobody can have complete information about system state.

Using a public key system, this technique provides secure messages transmission to exchange secret keys. Ranging from secure commerce and payments to private communications and protecting passwords, many aspects to security and applications are described, one among is cryptography. Security is the protection against loss, danger, and criminals. It has to be compared and contrasted with continuity, safety, and reliability.

Cryptography is study of protecting information. Today, cryptography is meant to be a branch of both computer science and mathematics. It is affiliated with information theory, engineering, and computer security. This technology is applied in many fields like security of ATM cards, computer passwords, and electronic commerce.

Cryptography is closely referred to encryption. It is the process of converting plaintext into ciphertext or conversion of ordinary information into unintelligible gibberish. Conversion of unintelligible ciphertext to plaintext is termed as decryption. Cipher is a pair of algorithm that creates the encryption and reverses the decryption. It is the technology of writing in secret code.

Conclusion:

This document describes how cryptography operates. It is an interesting field where the work is done in secret. Time is the only genuine test of cryptography. The strength of cryptography depends on the choice of the keys. Cryptographic schemes have employed many trust models like Kerberos. Secrecy is not the key to best cryptography, but the best algorithms are those which are well-documented and well-known.

Download Security and Cryptography Technical PPT.

Secure Mobile Agent Final Year Btech Seminar Technical

Secure Mobile Agent Final Year Btech Seminar Technical allows intelligent operation with less human interaction in software system. A big challenge to deployment of mobile agents to prevent unauthorized access to resources between interacting systems can act maliciously both as host or agent. In a heterogeneous computing environment, a secure mobile agent system has the ability for transmission and secure management of mobile agents. It provides security managers for the users.

Mobile agent is the latest discussion in the domain of distributed system. This agent technology allows in designing innovative solution by complementing other method simply by including code mobility, improved network, machine based intelligence, and data management possibilities.

Motivation and Approach for Mobile Agents: Mobile software agents can realize interconnections between data sources as proactive components. With respect to security, flexibility and data compression, mobile agents offer the optimum solution with their benefits.

A mobile agent is defined as a program migration from host to host in a network of heterogeneous computer systems. It fulfills the task of its owner. It works autonomously and communicates with host systems and other agents. Migration of agents depends on an infrastructure that provides the necessary services in the computer network. This infrastructure is a set of agent servers that run on nodes.

Goals of mobile agent system: The agent has to identify, trust, and communicate in a secure fashion. The code should be transmitted. The execution host must restrict the actions of the mobile code. An agent system must be authenticated.

Conclusion:

From the above discussion, mobile agent plays an important role in designing mobile agent system security. It may be concluded that mobile agents are not yet secured enough. The complete mobile agent systems security is dominated by the policy certificates depending on the agents and hosts verification. The mobile agents will become the integral part of the today’s commercial market within a short period of time.

Download Secure Mobile Agent Final Year Technical Btech Seminar.

Small Computers System Interface (SCSI) Seminar

Small Computers System Interface (SCSI) Seminar: SCSI is a kind of interface which is used for computer components like hard drives, optical drives, scanners and tape drives. The Small Computers System Interface (SCSI) was originally developed by IBM.

There are three components mentioned in any SCSI system. They are Controller, Device, and Cable.

The heart of SCSI is the controller. It acts as an interface between all devices on SCSI bus and the computer. It is also called host adapter. It can be a card which is plugged into a slot. It can be built exactly into the motherboard. There is a SCSI BIOS on the controller. This is a small ROM or Flash memory chip that has the software needed to access and control the devices on the SCSI bus.

Every device on the SCSI bus has a built-in SCSI adapter which allows it to interface and communicate with SCSI bus. Embedded SCSI devices are those devices on which adapter are built. Each SCSI device must have a unique identifier (ID). Depending on specification, an SCSI bus has ability to support 8 or 16 devices. Using a resistor circuit, each end of the SCSI bus is closed which is called Termination. There are only two terminators which are used one for each end of the SCSI bus.

There are three jumpers which are used to describe the SCSI ID. This interface is not a happy participant in multiple host scenarios. It has been spindled, folded, and mutilated to the point and grudgingly allows two hosts to talk to a given device string.

Conclusion:

SCSI has a high speed communication bus. It allows connectivity both from inside and outside the computer. The SCSI is of three types. They are SCSI-1, SCSI-2, and SCSI-3. Termination of SCSI interface can be done either in active or passive mode. SCSI is smarter bus than IDE.

Download Small Computers System Interface (SCSI) Seminar.

RSA Algorithm Computer Science Seminar Topics 2011

RSA Algorithm Computer Science Seminar Topics 2011 was discovered by three scientists, Ron Rivest, Adi Shamir and Len Adleman. This scheme is a block cipher where plain text and cipher text are integers between 0 and n-1 for some value n. The typical size of n is 1024 bits or 309 decimal digits. It is a public key encryption RSA scheme.

The two pairs of integers {e, n} and {d, n} are used in this scheme. First of them {e.n} is called the RSA public key and the other one {d, n} is called the RSA secret key. The sender uses the public key to encrypt the message into cipher text.

It is expressed as C =  M^e mod n.

Here C is the cipher text and M is the message or the plane text. At the receiving end, the receiver receives the cipher text C and decrypts C into M using secret key {d, n}.

KEY GENERATION: The method of Key Generation consists of following steps:

1. Select two prime numbers say p and q randomly Where p ≠ q.

2. Calculate n = p *q.

3. Calculate Ø(n) = (p-1) (q-1).

Applications of RSA are: It is widely used for encryption and decryption in message process to get secure communication. It is used for digital signature. It is used for key distribution. It is used in e-commerce and remote banking.

Conclusion:

It is concluded that RSA is a powerful scheme most widely utilized for digital signature and encryption/decryption. It is more secure than DES and other schemes. It is known that that the key length RSA use has increased for security purpose. Using RSA, it has a heavier processing load on applications. This scheme has ramified especially for electronic commerce sites that have large numbers of transactions. RSA is fundamentally an easy method to explain than ECC.

Download RSA Algorithm Computer Science Seminar Topics 2011.