The PDF file you selected should load here if your Web browser has a PDF reader plug-in installed (for example, a recent version of Adobe Acrobat Reader).

If you would like more information about how to print, save, and work with PDFs, Highwire Press provides a helpful Frequently Asked Questions about PDFs.

Alternatively, you can download the PDF file directly to your computer, from where it can be opened using a PDF reader. To download the PDF, click the Download link above.

Fullscreen Fullscreen Off


Security continues to be an issue for organizations. Good information security is a mix of physical security, computer security, network security, backups, anti-virus software, firewalls, authentication methods, intrusion detection, confidentiality, integrity, availability, etc., Risk is the combination of threat and vulnerability. This paper deals with Information security in particular and concentrates on corporate networks. Threats without vulnerabilities pose no risk. Likewise, vulnerabilities without threats pose no risk. A secure system should still permit authorized users to carry out legitimate and useful tasks. It might be possible to secure a computer system against misuse using extreme measures. Most computer systems cannot be made secure even after the application of extensive "computer security" measures. Further more, if they are secure then functionality and ease of use often decreases. The assurance of security depends not only on the soundness of the design strategy, but also on the assurance of correctness of the implementation. There is no universal standard notion of what secure behavior is. "Security" is a concept that is unique to each situation. One technique enforces the principle of least privilege to great extent is even if an attacker gains access to one part of the system, fine-grained security ensures that it is just as difficult for them to access the rest. Further more, by breaking the system up into smaller components; the complexity of individual components is reduced. Most of the time people concentrate on coming out with efficient algorithms to analyze, process data. But not much importance is given to ensure data integrity, security, privacy, etc.
User
Notifications
Font Size