Multiple Criteria Decision Making Methodology for Network security

Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2014, Vol 8, Issue 1

Abstract

Technology and it’s requirement comes in various ways, considering one of the aspect as the building tool to next level journey of security as Information Security, i.e. how it plays the role in making and controlling the decision system. Making a prejudice statement on the support system is lead to nest level of insecurity. But In this paper we try to give a best perdition based on information where we consider as security to the information system. Time and Technology may play the complementary aspect in the decision support based on information security, at now we can give the best to mingle of various technology where security and its related decision are most important to these days software revolution, which we call it as most important and high risky to main component if IT market. The purpose of the security plan is to provide an overview of the security requirements of the system and describe the controls that are in place or those controls that are planned for meeting the security requirements. The system security plan also delineates responsibilities and expected behavior of all the individuals who access the system. The security plan should be viewed as documentation of the structured process of planning adequate, cost-effective security protection for the system. It should reflect input from the various managers who are responsible for the system. This includes the information owners, the system operators, the system security manager, and the system administrators.

Authors and Affiliations

Dr. S. Munisankaraiah , Mr. A. Arun Kumar , Mr. G. Ravikumar , Dr. D. K. Pandey

Keywords

Related Articles

An Efficient Network Traffic Classification Based on Unknown and Anomaly Flow Detection Mechanism

Traffic classification technique is an important tool for network and system security in the environments such as cloud computing based environment. Modern traffic classification methods plans to take the gain of flow st...

Optimizing Resource Allocation in IAAS Clouds

Cloud computing is a phenomenon which bestows new model of computing. It has various service modes. The service model which provides on-demand access to computing resources is known as infrastructure-as-a-service (IaaS)....

Object Deployment Using Data Trans-Reception in Military Applications

An mobile ad-hoc network (MANETs) is a set of limited range wireless nodes that function in a cooperative manner so as to increase the overall range of the network. In general, routing protocols for MANETs are designed b...

Load-Balancing Multipath Switching System with Flow Slice

Load balancing plays a pivotal role in core routers as they need to handle multiple requests at a time. To achieve load balancing Multipath Switching Systems (MPS) are widely used. One of the challenging issues in buildi...

SVM Based Ranking Model for Dynamic Adaption to Business Domains

Huge information can be obtained from vertical search domains. Often the information is very large in such a way that users need to browse further to get the required piece of information. In this context ranking plays a...

Download PDF file
  • EP ID EP121261
  • DOI -
  • Views 82
  • Downloads 0

How To Cite

Dr. S. Munisankaraiah, Mr. A. Arun Kumar, Mr. G. Ravikumar, Dr. D. K. Pandey (2014). Multiple Criteria Decision Making Methodology for Network security. INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY, 8(1), 17-24. https://europub.co.uk/articles/-A-121261