Data and Information Security Technology in Network Communication

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Modern Communication Technology and National Security In the Middle East

One of the characteristics of the modern international systems is the undeniable role the new communication technologies play in different sections of human societies. Modern communication technologies such as satellites and computers have challenged the national authority and sovereignty of Vestfallian states.  Although national states, specially, in the third world countries, extremely resist...

متن کامل

Information and Communication Technology security issues

Information and communication technologies (ICT) have noticeably shaped several aspects of our lives and contributed to major discoveries in science. While the benefits are immense, several factors are influencing negatively on ICT, therefore limiting its benefits and slowing down its proliferation. Lack of security awareness and training, operating system design and security, open source issue...

متن کامل

Determining the appropriate methodology for the security evaluation of equipment related to information and communication technology in the power industry

Providing security in the vital infrastructures of the country, is one of the essential operations that must be taken in order to improve the security of the country. Resistant security strategies need to be regularly implemented as a dynamic process to improve security, and security evaluation is one of the most important steps in this process. Methodology in the field of evaluation in both te...

متن کامل

PERSEUS Technology: New Trends in Information and Communication Security

Using cryptography to protect information and communication has bacically two major drawbacks. First, the specific entropy profile of encrypted data makes their detection very easy. Second, the use of cryptography can be more or less regulated, not to say forbidden, according to the countries. If the right to freely protect our personal and private data is a fundamental right, it must not hinde...

متن کامل

Role and Application of RFID Technology in Internet of Things: Communication, Authentication, Risk, and Security Concerns

The Internet of Things (IoT) is a very encouraging and fast-growing area that brings together the benefits of wireless systems, sensor networks, actuators, etc.A wide range of IoT applications have been targeted and several aspects of this field have been identified to address specific issues, as well as technologies and standards developed in various domains such as in radio frequency id...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Networking and Telecommunications

سال: 2020

ISSN: 2661-4065

DOI: 10.18282/jnt.v2i2.1102