Data Security : An Analysis
Journal Title: International Journal on Computer Science and Engineering - Year 2010, Vol 2, Issue 4
Abstract
There is intense of cyber attach through electronic media, so it calls for data security practice. Internet technology becomes very pervasive to exchange data through online. Various Government and private sectors mostly depends on Information Technology and facing problem of security breach. The recious thing on internet is the data. This data need to be protected from any damage and errors. The first step in protecting yourself is to recognize the risks and become amiliar with some of the terminology associated with them. There are many way to protect from the cyber space. The data can be protected using various techniques such as nti-viruses, antimalware, spyware, encryption, access control, physical security, keep backup of data regularly, and good security habit
Authors and Affiliations
Dr. S. B. Thorat , S. K. Nayak , M. M. Bokhare
A Study on Enhancement of Loadability of Large-Scale Emerging Power Systems by Using FACTS Controllers
This study presents comprehensive review of various ethods/techniques for incorporation of differential algebraic equations (DAE) model of FACTS controllers and different type of loads such as a static, dynamic, and com...
Synergy between Object Recognition and Image Segmentation
Image segmentation is to partition an image into meaningful regions with respect to a particular application. Object recognition is the task of finding a given object in an image or video sequence. This paper discusses t...
Control overhead reduction: A Hierarchical Routing Protocol In Mobile Ad hoc Networks
A novel self-organizing hierarchical architecture is proposed for improving the scalability properties of ad-hoc wireless networks. This paper focuses on the design and evaluation of routing protocols applicable to this...
Weblog Search Engine Based on Quality Criteria
Nowadays, increasing amount of human knowledge is placed in computerized repositories such as the World Wide Web. This gives rise to the problem of how to locate specific pieces of information in these often quite unstru...
DMSA TECHNIQUE FOR FINDING SIGNIFICANT PATTERNS IN LARGE DATABASE
Frequent pattern mining in databases plays a vital role in many data mining tasks like classification, sequential patters, clustering, association rules analysis etc. There are numerous mining algorithms for finding asso...