Абстрактный

Information Security System and Its Different Techniques

Devendra Singh Kushwaha, Dr. Vikash Kumar Singh,Sonal Sharma

The use of computerized information systems has become an integral part of our day to day life. Managing computer and network security programs has become an increasingly difficult and challenging job. One way of enlightening the risks to their computerized information systems is through a risk management programme. Therefore, the objective of this paper is to educate users on how to perform a risk management exercise for their computerized information systems in order to reduce or mitigate information security risks within their information systems and protect vital information assets. This study uses the Operationally Critical Threat, Asset, and Vulnerability Evaluation for small organizations (OCTAVE) , Open Source Security Information Management (OSSIM) system and commercially available software Event Horizon risk management methodology to address these information security risks in small scale industries and users

Отказ от ответственности: Этот реферат был переведен с помощью инструментов искусственного интеллекта и еще не прошел проверку или верификацию

Индексировано в

Индекс Коперника
Академические ключи
CiteFactor
Космос ЕСЛИ
РефСик
Университет Хамдарда
Всемирный каталог научных журналов
Импакт-фактор Международного инновационного журнала (IIJIF)
Международный институт организованных исследований (I2OR)
Cosmos

Посмотреть больше