IJSRET » December 20, 2025

Daily Archives: December 20, 2025

Uncategorized

Beyond Infrastructure Integrating IT Fundamentals And Risk Management In Wireless Cloud And IoT Systems

Authors: Sasikanth Reddy Mandati

Abstract: The rapid growth of Internet of Things (IoT) technologies has introduced significant challenges related to system scalability, interoperability, performance, and security. Traditional architectures often address IT infrastructure and risk management separately, leading to fragmented controls and increased vulnerability exposure. This paper proposes an integrated framework that unifies IT fundamentals with structured risk management processes to support secure, scalable, and resilient IoT environments. The framework is designed around key principles including modularity, interoperability, security-by-design, and fault tolerance, enabling seamless integration of heterogeneous devices and platforms. It incorporates edge and cloud computing for efficient data processing, along with continuous monitoring and proactive risk mitigation mechanisms. The framework is evaluated through use case analyses in smart city deployments, wireless cloud-based healthcare systems, and industrial IoT scenarios. The results indicate improved system performance, reduced latency, enhanced security, and effective risk reduction across all use cases. The study demonstrates that integrating risk management directly into IT architecture significantly improves operational reliability and adaptability. The proposed framework provides a practical foundation for developing robust IoT systems capable of supporting complex, large-scale digital ecosystems.

DOI: https://doi.org/10.5281/zenodo.18000025

Published by:
Uncategorized

Invisible Risks In Connected Worlds An IT Risk Management Framework For Cloud Enabled IoT Systems

Authors: Sasikanth Reddy Mandati

Abstract: The rapid proliferation of cloud-enabled Internet of Things (IoT) systems has transformed modern infrastructure, enabling real-time data collection, intelligent automation, and interconnected services across domains such as smart cities, healthcare, and industrial IoT. However, the increasing complexity and interdependence of these systems also expose them to invisible risks latent, cascading, and systemic vulnerabilities that are often overlooked by conventional risk management approaches. This paper presents a comprehensive IT risk management framework designed to detect, assess, and mitigate such hidden risks in cloud-enabled IoT environments. The framework integrates real-time data analytics, anomaly detection, and proactive mitigation strategies to improve system resilience and operational reliability. A case study in a smart city scenario demonstrates the framework’s effectiveness, showing significant improvements in risk coverage, mitigation efficiency, and stakeholder confidence compared to baseline methods. The results highlight the critical importance of addressing invisible risks to ensure secure, reliable, and resilient IoT-enabled systems.

DOI: https://doi.org/10.5281/zenodo.17999954

Published by:
Uncategorized

Determinants Of Cyber Incident Severity: Exploratory Evidence And Benchmark Prediction Of Financial Loss

Authors: Prajwal Chinchmalatpure, Suyash Chinchmalatpure, Sudeep Konde

Abstract: Cyber incidents vary significantly in the mechanisms, targets, and economic impacts they have, so it is significant to determine the factors which are connected to the severity and the economic effects of the incident. This paper is a data-driven analysis of world cybersecurity incidents, 2015-2024 (N=3000), focusing on contextual factors, e.g. country, type of attack, industry, source of attack, type of vulnerability, defensive mechanism, and operational outcomes, e.g. time to resolve the incident, victims, and financial loss (million USD). To surface patterns of incident occurrence and severity-linked outcomes, we describe the threat landscape in the first instance by exploratory distributional analysis, and in the second instance by relational analysis. We subsequently create a financial loss predictive pipeline by estimating a mixed data (categorical encoding and train/test analysis) predictor using common preprocessing of mixed data and a comprehensible baseline regression model. The combination of the empirical and benchmark results allows a clear point of departure to quantitative cyber risk profiling, showing which incident characteristics are too correlated with severity and defining a repeatable baseline to proceed with more detailed features and non-linear modelling methods in future studies.

Published by:
Uncategorized

Online Conferencing Application

Authors: Karthiban .R, Sabaripriya .S, Suganthi .R

Abstract: Online Conferencing Application is designed to be a communication platform in real time, which allows users to connect via video, audio, and chat from anywhere. The primary objective of this project is to build a system that is fast, secure, and user-friendly for online meetings, virtual classrooms, and remote collaboration.React.js is used to create the frontend, which gives a responsive and interactive user interface for smooth communication. Node.js is used for the backend, which handles server-side operations, user authentication, and data exchange in an efficient manner. In order to have an instant communication in real-time, Socket.io is brought in which makes it possible to have a live chat, notifications, and user synchronization without any waiting time. This set of modern technologies is what makes the system stable, with low latency, and scalable. To sum up, the Online Conferencing Application is an efficient, dependable, and userfriendly tool for virtual communication, which is in line with the increasing demand of online communication in this digital era. The Online Conferencing Application is a comprehensive web- based platform developed to enable users to conduct virtual meetings, conferences, and collaborative discussions in real time. With the increasing need for remote communication and online collaboration, this application provides an effective solution that integrates multiple technologies to deliver high-quality video, audio, and data transmission over the internet. The frontend of the application is built using React.js, which provides a responsive and interactive user interface for smooth navigation and dynamic updates. The backend is implemented with Node.js and Express.js, which handle API requests, authentication, and socket connections. The system uses Socket.IO to maintain low-latency bidirectional communication between the client and server, ensuring real-time synchronization of audio, video, and messages among all participants.

Published by:
Uncategorized

Deepfake And AI-Scam Protection

Authors: Siddhi Ekawade, Apurva Jate, Arya Kamble, Sharvari Kate, Tejal Panmand

Abstract: We have seen an rapid increase in the Artificial Intelligence (AI) and Deepfake, due to that it has become very easy for online scams and frauds. It is good but when its in correct hands but they are misused in voice cloning, fake video impression, fraud message it has became a serious cybersecurity concern. This paper reviews different deepfake and AI-driven scams and examines the detection and protection methods. While the precautions are taken to keep the user safe from all scams they still face challenges. The paper focuses on the need of improved solutions along with the awareness measures. There are existing methods show results but struggles with advance deepfakes. Through all the complaints and reviews its seen there should be double verification or multi-layer security to secure the user. The study is mainly focused on analyzing how deepfakes are created using Generative Adversarial Networks (GANs) and previously published papers and reports. The current finding has shown that there is face limitation in identifying the advanced deepfakes. And to tackle this issue this paper highlights the need for combined approach to improve AI-based detection, system review, user awareness to reduce scams an increase the security of the device and realism.

Published by:
Uncategorized

Loan Utilization Tracking Via Mobile

Authors: Vedant Pawar, Hasnain Pathan, Sujal Thombare, Yash Kondake, Aarti Gohade

Abstract: Loan utilization tracking is an important element of responsible lending to ensure that borrowers utilize loan funds strictly for their intended purposes. Traditional monitoring techniques such as physical inspections, manual reporting, and post-disbursement audits are often slow, expensive, and prone to inaccuracies. With the rapid growth of mobile technology, digital finance platforms have transformed loan monitoring through mobile applications, GPS tagging, cloud-based dashboards, digital receipts, photo/video verification, USSD/SMS reporting, and AI-based analysis. This survey paper provides an in-depth review of existing mobile-based loan utilization tracking approaches, studies their benefits in reducing fraud, examines their effectiveness in improving transparency and repayment rates, and analyzes challenges such as privacy issues, digital literacy, and connectivity limitations. The paper also proposes a robust mobile-based framework for lenders to track loan utilization efficiently and discusses future innovations including blockchain, biometric authentication, and advanced analytics to strengthen monitoring systems.

Published by:
Uncategorized

Survey Paper On Xaanaax: A Digital Emergency Backup And Information Access System

Authors: Hemant Khatpe,, Ayush Pilane, Sahil Choudhari, Chaitanya Jam, Tejal Panmand

Abstract: The rapid dependence on smartphones for storing personal and professional information has introduced new risks during emergencies such as device loss, battery failure, or network unavailability. Xaanaax is a digital emergency backup and information access system designed to ensure uninterrupted availability of essential files, contacts, and notes anytime and anywhere. The platform offers secure, centralized cloud-based storage with 24/7 accessibility across devices. This survey paper reviews existing digital storage and backup solutions, identifies their limitations in emergency scenarios, and analyzes how Xaanaax addresses these gaps through its architecture, security mechanisms, and user-centric design.

Published by:
Uncategorized

Multilingual Chat Application

Authors: Durvesh Mohan Kavire, Swaraj Pradeep Khade, Saurav Deepak Patankar, Abhijeet Shivraj Waghmar, Ms. Tejal Panmand

Abstract: A Multilingual Chat Application is a communication platform designed to allow users from different linguistic backgrounds to interact seamlessly by integrating real-time messaging with automatic language translation capabilities. The application enables users to send and receive messages in their native language while the system transparently translates the content into the recipient’s preferred language, thereby eliminating language barriers and promoting effective communication. It leverages advanced natural language processing and machine translation technologies to ensure accurate, fast, and context-aware translations, while maintaining message privacy and data security. The system typically supports multiple languages, user authentication, message synchronization, and an intuitive user interface to enhance usability across diverse user groups. Such an application is particularly valuable in global business collaboration, online education, customer support services, healthcare communication, and social networking, where participants may not share a common language. By fostering inclusivity and improving accessibility, the multilingual chat application plays a significant role in connecting people worldwide, enhancing cross-cultural interaction, and supporting efficient information exchange in today’s globally interconnected digital environment.

Published by:
× How can I help you?