Call for Papers
Quick Links


January, 2025 | Volume 04 | Issue 01
Paper 1: Building Back Stronger: A Strategic Model for Post-Supply Chain Attack Management
Shatakshi Singh, Shruti Trivedi, and Rinku Raheja
Abstract:
In today's fast-paced, interconnected world, supply chains are essential to the smooth operation of any business. Yet, with this increased connectivity comes a hidden risk: vulnerabilities that cybercriminals are all too eager to exploit. Supply chain attacks, where attackers target the very systems and networks that companies rely on, have become more common, leading to disruptions, loss of sensitive data, and significant financial strain. These attacks are not only growing in frequency, but they are also becoming increasingly sophisticated, making it clear that prevention alone is no longer enough. Companies need a plan for what comes next – a way to recover quickly and learn from the experience. This paper delves into the growing threat of supply chain attacks and introduces a post-recovery model designed to help businesses manage the aftermath. By focusing on rapid recovery, strengthening security, and fostering long-term resilience, this model enables businesses to recover effectively and emerge more prepared for future challenges. In a world where things can change in an instant, it’s not just about preventing an attack – it’s about knowing how to recover and emerge even stronger when the unexpected happens.
Download Full Paper
Paper 2: A review of Strategies for Enhancing Security Against Cyber Threats in Social Media Platform
Prabhat Singh and Sushil Sharma
Abstract:
Social media platforms have revolutionized communication, information sharing, and marketing strategies worldwide. However, they are increasingly vulnerable to cyber threats such as identity theft, malicious insider attacks, password breaches, and fraudulent marketing schemes. These threats compromise user privacy, system integrity, and the overall trustworthiness of online social networks (OSNs). Addressing these challenges necessitates robust security mechanisms to mitigate cyber risks effectively. This research presents a multi-layered approach to enhance security against cyber threats in social media platforms. Firstly, a novel Honeyword as a Trap (HAaT) mechanism is introduced to strengthen password security. HAaT employs an advanced honeyword generation model integrated with a salt-chlorine hashing algorithm, making password databases more resilient against brute force and dictionary attacks. By incorporating a rule-based honeyword generator (RHG) and a salt generation strategy, HAaT significantly enhances password security and minimizes the risk of unauthorized access.
Download Full Paper
Content Links
Contact Us
Dr. Satya Bhushan Verma
VB 607 Hariprem Nivas Near Back gate of Regal Palace Shantipuram, Barabanki, India
Postal Code-225001
+91 8840170302
tejasjournal@gmail.com