Multiple Criteria Decision Making Methodology for Network security

Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2014, Vol 8, Issue 1

Abstract

Technology and it’s requirement comes in various ways, considering one of the aspect as the building tool to next level journey of security as Information Security, i.e. how it plays the role in making and controlling the decision system. Making a prejudice statement on the support system is lead to nest level of insecurity. But In this paper we try to give a best perdition based on information where we consider as security to the information system. Time and Technology may play the complementary aspect in the decision support based on information security, at now we can give the best to mingle of various technology where security and its related decision are most important to these days software revolution, which we call it as most important and high risky to main component if IT market. The purpose of the security plan is to provide an overview of the security requirements of the system and describe the controls that are in place or those controls that are planned for meeting the security requirements. The system security plan also delineates responsibilities and expected behavior of all the individuals who access the system. The security plan should be viewed as documentation of the structured process of planning adequate, cost-effective security protection for the system. It should reflect input from the various managers who are responsible for the system. This includes the information owners, the system operators, the system security manager, and the system administrators.

Authors and Affiliations

Dr. S. Munisankaraiah , Mr. A. Arun Kumar , Mr. G. Ravikumar , Dr. D. K. Pandey

Keywords

Related Articles

Study of Routing Protocols in Mobile Ad Hoc Networks

Mobile ad hoc networks (MANETs) are rapidly evolving as an important area of mobility. MANETs are infrastructure less autonomous collection of mobile users that communicate over relatively bandwidth constrained wireless...

Survey of Spatial Approximate String Search

Several applications require finding objects closest to a specified location that contains a set of keywords. In view of example, online yellow pages allow users to specify an address and a set of keywords. In response,...

Maximizing Communication Quality with Bandwidth Guarantees in Wireless Mesh Networks

Wireless Mesh Network (WMN) helps remote areas to gain access to Internet. There might be number of paths to gain access to Internet. Finding a path with maximum bandwidth is the problem to be addressed. Many solutions t...

Data Concealing in Encrypted Images Using Reversible Data Hiding (RDH) Technique

In the new era of technology,more attention is needed to be given to hide some personal data or secret information, etc. This can be exactly brought out through Reversible Data [1] Hiding,since it maintains the splendid...

Facial Image Noise Removal Via a Trained Dictionary

In this project we address that, sparsity has shown to be useful in source separation. In most cases, the sources are not sparse currently and needs to sparsify them using a known dictionary. The problem here is that, if...

Download PDF file
  • EP ID EP121261
  • DOI -
  • Views 90
  • Downloads 0

How To Cite

Dr. S. Munisankaraiah, Mr. A. Arun Kumar, Mr. G. Ravikumar, Dr. D. K. Pandey (2014). Multiple Criteria Decision Making Methodology for Network security. INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY, 8(1), 17-24. https://europub.co.uk./articles/-A-121261