Multiple Criteria Decision Making Methodology for Network security

Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2014, Vol 8, Issue 1

Abstract

Technology and it’s requirement comes in various ways, considering one of the aspect as the building tool to next level journey of security as Information Security, i.e. how it plays the role in making and controlling the decision system. Making a prejudice statement on the support system is lead to nest level of insecurity. But In this paper we try to give a best perdition based on information where we consider as security to the information system. Time and Technology may play the complementary aspect in the decision support based on information security, at now we can give the best to mingle of various technology where security and its related decision are most important to these days software revolution, which we call it as most important and high risky to main component if IT market. The purpose of the security plan is to provide an overview of the security requirements of the system and describe the controls that are in place or those controls that are planned for meeting the security requirements. The system security plan also delineates responsibilities and expected behavior of all the individuals who access the system. The security plan should be viewed as documentation of the structured process of planning adequate, cost-effective security protection for the system. It should reflect input from the various managers who are responsible for the system. This includes the information owners, the system operators, the system security manager, and the system administrators.

Authors and Affiliations

Dr. S. Munisankaraiah , Mr. A. Arun Kumar , Mr. G. Ravikumar , Dr. D. K. Pandey

Keywords

Related Articles

Implementation of an Efficient RBAC Technique of Cloud Computing in .Net Environment

Cloud Computing is flourishing day by day and it will continue in developing phase until computers and internet era is in existence. While dealing with cloud computing, a number of security and traffic related issues are...

Risk Assessment in Online Banking System

With the development of information technology and the popular use of the information network system, the security of the information system becomes particularly important. To ensure the security of the information syste...

Facilitating Document Annotation Using Content & Querying Value

Collections of huge, large textual data contains significant amount of structured information, which remains hidden in unstructured text. Relevant information is always difficult to find in these documents. In this paper...

Improved Discretization Based Decision Tree for Continuous Attributes

The majority of the Machine Learning and Data Mining applications can easily be applicable only on discrete features. However, data in solid world are sometimes continuous by nature. Even for algorithms that will directl...

Proficient And Protected Content Dispensation In Distributed Environment To Client Proxy-Based Transcoding Approach

Currently internet client varies widely both in hardware and software properties. The ever increasing requirements of clients to support heterogeneous environment, demand techniques to adapt the same content to diverse d...

Download PDF file
  • EP ID EP121261
  • DOI -
  • Views 113
  • Downloads 0

How To Cite

Dr. S. Munisankaraiah, Mr. A. Arun Kumar, Mr. G. Ravikumar, Dr. D. K. Pandey (2014). Multiple Criteria Decision Making Methodology for Network security. INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY, 8(1), 17-24. https://europub.co.uk/articles/-A-121261