Recapitulating the development initiatives of a robust information security safeguard: RITSB-the proposed solution
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2013, Vol 15, Issue 2
Abstract
Most current information security systems performance vary with the nature of the filed its being operating. With an increased emphasizes on the adoption of security tools and technologies, the anomalies and intrusion are mostly said defined to be detected on system's algorithm, when most systems have well defined mechanism for rapid reaction and identification of intrusions. However, despite this support for anomaly detection, this is usually limited and often require a full recompilation of the system to deploy a comprehensive framework of security governance, strategies and practices employing the policies in implementation. As a result, the absence of a robust security framework securing both the education and corporate resources has heightened the tension for a strategic information security solutions which might ends with cost, complexities and cumbersome to develop. This paper thereby presents an alternative comprehensive system namely RITS-B which accommodates both the nature of education and organizations without a need to for a further modification. Implication of the proposed approach at real time depicts its suitability in the arena of concern.
Authors and Affiliations
Jahidul Arafat
DDOS Anomaly Detection And Mitigation In Software Defined Networking (SDN)
The introduction of Software Defined Networking as a panacea to the global demand for a more secure and highly dependable internet infrastructure has also brought along security issues. The adoption of OpenFlow Protocol...
Web Usability Recommendation Model: An Approach to Enhance Web Usability
Abstract: The success of any business mainly e- business is mostly depends on its website. To attract and sustain web users is one of the biggest challenges for any e-business. Web Usability plays key role to retain web...
Applying Back Propagation Algorithm for classification of fragile genome sequence
Abstract : Most frequently occurring recurrent chromosomal translocation allied with all subtype of leukemia are available in Mitel Mann Data base. We have retrieved about 55 such genome sequence from TIC dB database wit...
Extracting Repitative Patterns from Fuzzy Temporal Data
Abstract: Association rules mining from temporal dataset is to find associations between items that hold within certain time frame but not throughout the dataset. This problem involves first discovering frequent itemsets...
Improve Performance by Using Load Balancing Algorithm to Reduce Response Time and Processing Time on Cloud Computing
Cloud computing is one of the incredible technology which enable the new vision for IT industry. Nowadays, it has become a strong alternative for startup large as well as small scale organizations that only use the resou...