Multiple Criteria Decision Making Methodology for Network security
Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2014, Vol 8, Issue 1
Abstract
Technology and it’s requirement comes in various ways, considering one of the aspect as the building tool to next level journey of security as Information Security, i.e. how it plays the role in making and controlling the decision system. Making a prejudice statement on the support system is lead to nest level of insecurity. But In this paper we try to give a best perdition based on information where we consider as security to the information system. Time and Technology may play the complementary aspect in the decision support based on information security, at now we can give the best to mingle of various technology where security and its related decision are most important to these days software revolution, which we call it as most important and high risky to main component if IT market. The purpose of the security plan is to provide an overview of the security requirements of the system and describe the controls that are in place or those controls that are planned for meeting the security requirements. The system security plan also delineates responsibilities and expected behavior of all the individuals who access the system. The security plan should be viewed as documentation of the structured process of planning adequate, cost-effective security protection for the system. It should reflect input from the various managers who are responsible for the system. This includes the information owners, the system operators, the system security manager, and the system administrators.
Authors and Affiliations
Dr. S. Munisankaraiah , Mr. A. Arun Kumar , Mr. G. Ravikumar , Dr. D. K. Pandey
Analysis on Credit Card Fraud Detection Methods
Due to the theatrical increase of fraud which results in loss of dollars worldwide each year, several modern techniques in detecting fraud are persistently evolved and applied to many business fields. Fraud detection inv...
Mas Based Framework for Recruitment of Fresher’s By CMM Level Company
Every company has to hire freshers for its business process the hiring process involves time and cost of company this costing increase when in a particular drive company does not get appropriate candidates for hiring. Th...
An Effective Cloud Service Reservation Through Negotiation
When making reservations for Cloud services, the consumer should provide with price and time slot for the service. The provider gives the price and time slot which are available, then the particular service will be provi...
A Proposed Methodology for Virus Detection Using Data Mining and Reverse Engineering Tools with Client-Server Model
Viruses are a class of malicious programs that cause unfavourable effects on the computer system and thereby becomes an obstacle to the standard operation of the system. Their existence and execution within the system sh...
Improved Discretization Based Decision Tree for Continuous Attributes
The majority of the Machine Learning and Data Mining applications can easily be applicable only on discrete features. However, data in solid world are sometimes continuous by nature. Even for algorithms that will directl...