Asadi, Maryam Information security technologies: a classification approach. Iranian Journal of Information Science, 2005, vol. 20, n. 3&4, pp. 1-16. [Journal article (Paginated)]
Preview |
PDF
Information_Security.pdf Download (215kB) | Preview |
English abstract
The most important advantage and mission for any computer network is to share the hardware and software resources as well as providing a quick and easy access to information. Controlling the extent of access to the shared resources, is one of the most important goals of a network security system. With expansion of computer networks (internet in particular), the attitude towards data security as well as security of other shared resources has entered a new level. It is therefore necessary for organizations to follow a specific strategy for implementation of a security system in order to protect valuable data. An appropriate security system, may lead to somewhat negative, unexpected consequences. Success in securing information is contingent upon protecting information and information systems against intrusions and attacks. To this end numerous security protocols are employed. The present paper attempts to classify these security protocols based on the level of interaction between technology and information as well as levels of security implementation of information systems.
Item type: | Journal article (Paginated) |
---|---|
Keywords: | Information security, Computer network, Classification |
Subjects: | L. Information technology and library technology > LH. Computer and network security. |
Depositing user: | Maryam Asadi |
Date deposited: | 23 Oct 2006 |
Last modified: | 02 Oct 2014 12:04 |
URI: | http://hdl.handle.net/10760/8258 |
References
Downloads
Downloads per month over past year
Actions (login required)
View Item |