Multiple Criteria Decision Making Methodology for Network security
Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2014, Vol 8, Issue 1
Abstract
Technology and it’s requirement comes in various ways, considering one of the aspect as the building tool to next level journey of security as Information Security, i.e. how it plays the role in making and controlling the decision system. Making a prejudice statement on the support system is lead to nest level of insecurity. But In this paper we try to give a best perdition based on information where we consider as security to the information system. Time and Technology may play the complementary aspect in the decision support based on information security, at now we can give the best to mingle of various technology where security and its related decision are most important to these days software revolution, which we call it as most important and high risky to main component if IT market. The purpose of the security plan is to provide an overview of the security requirements of the system and describe the controls that are in place or those controls that are planned for meeting the security requirements. The system security plan also delineates responsibilities and expected behavior of all the individuals who access the system. The security plan should be viewed as documentation of the structured process of planning adequate, cost-effective security protection for the system. It should reflect input from the various managers who are responsible for the system. This includes the information owners, the system operators, the system security manager, and the system administrators.
Authors and Affiliations
Dr. S. Munisankaraiah , Mr. A. Arun Kumar , Mr. G. Ravikumar , Dr. D. K. Pandey
FPGA Implementation of Lifting DWT based LSB Steganography using Micro Blaze Processor
We present an information hiding technique that utilizes lifting schemes to effectively hide information in images. A successful information hiding should result in the extraction of the hidden data from the image with h...
BPR: Evaluation of Existing Methodologies and Limitations
Many of known organizations had their business processes changed and reengineered in order to achieve their objectives, meet their customer’s expectations and attain competitive advantage. Thus, they were willing to adop...
An Evaluation Agent System for Enhancing Wikipedia Management
Wikipedia has recently become a popular platform for knowledge sharing and creation. However, the enormously increasing amount of editing has caused management problems with efficiency, accuracy, and convenience for Wiki...
Classification of Diabetes Mellitus using Modified Particle Swarm Optimization and Least Squares Support Vector Machine
Diabetes Mellitus is a major health problem all over the world. Many classification algorithms have been applied for its diagnoses and treatment. In this paper, a hybrid algorithm of Modified-Particle Swarm Optimization...
A Literature Survey on Face Recognition Techniques
With data and information accumulating in abundance, there is a crucial need for high security. Biometrics has now received more attention. Face biometrics, useful for a person’s authentication is a simple and non-intrus...