Strengthening Data Security: An Holistic Approach

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Developing Secure Software: An Holistic Approach to Security Testing

Security vulnerabilities are a serious threat to software vendors and their customers: they can result in both monetary loss as well as loss of reputation. Thus, implementing a rigid secure software development lifecycle is a competitive advantage for a software vendor. A holistic security testing approach must cover the whole software development lifecycle across all software products and all ...

متن کامل

Strengthening of Data Security against its Attack

This paper specifies cryptographic algorithm Hybridizing Traditional Technology (H.T.T) which may be used to protect sensitive data. Protection of data during transmission or while in storage may be necessary to maintain the confidentiality and integrity of the information represented by the data. The algorithms uniquely define the mathematical steps required to transform data into a cryptograp...

متن کامل

An Approach for Intranet Data Security

In this paper, combined the encrypting and compressing processes to consider the choices of which types of bits are most effective in the selective encryption sense when they are changed. So, instead of encrypting the whole file bit by bit, changed only these highly sensitive bits. Moreover, by combining the compression and encryption tasks and reducing the total encryption work required, it wi...

متن کامل

Security Assessment of IP-based Networks: A Holistic Approach

This paper deals with network security assessment. We discuss currently available network security assessment tools and provide a categorization of their limitations. We revisit the methodology that the tools are based on, the flaw-hypothesis testing methodology. We then discuss the application of the methodology to network security assessment and discuss what is necessary to augment current ne...

متن کامل

A holistic approach to RFID security and privacy

RFID technology constitutes an important part of what has become known as the IoT; i.e accessible and interconnected machines and everyday objects that form a dynamic and complex environment. In order to be able to secure the IoT in a cost-efficient manner we need to build security and privacy into the design of its components. Thus, in this paper, we first introduce the use of security and pri...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IASSIST Quarterly

سال: 2010

ISSN: 0739-1137,0739-1137

DOI: 10.29173/iq653