Recapitulating the development initiatives of a robust information security safeguard: RITSB-the proposed solution
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2013, Vol 15, Issue 2
Abstract
Most current information security systems performance vary with the nature of the filed its being operating. With an increased emphasizes on the adoption of security tools and technologies, the anomalies and intrusion are mostly said defined to be detected on system's algorithm, when most systems have well defined mechanism for rapid reaction and identification of intrusions. However, despite this support for anomaly detection, this is usually limited and often require a full recompilation of the system to deploy a comprehensive framework of security governance, strategies and practices employing the policies in implementation. As a result, the absence of a robust security framework securing both the education and corporate resources has heightened the tension for a strategic information security solutions which might ends with cost, complexities and cumbersome to develop. This paper thereby presents an alternative comprehensive system namely RITS-B which accommodates both the nature of education and organizations without a need to for a further modification. Implication of the proposed approach at real time depicts its suitability in the arena of concern.
Authors and Affiliations
Jahidul Arafat
Enhanced Data Sharing over Mobile Ad Hoc Network Based on non-Selfish Exposure
A Mobile ad hoc network is a peer-to-peer multihop wireless network. MANETs are key to nomadic computing. Mobile units can set up spontaneous local networks and can remove the need for fixed network infrastructure, eithe...
Effective utilisation of ICT is the key to Business success: Case Study of SMEs in Zimbabwe
The focus of this paper is to analyse the utilisation of information communication technology (ICT) among small and medium enterprises (SMEs) in Zimbabwe, as one of the major factors contributing to their limited g...
A study on Clustering Algorithms for XML Data Clustering
Abstract: Nowadays mining meaningful information from large scale web documents is more important to satisfy the user demand. XML and RDF documents are supporting the semantic information retrieval to interpret and extra...
An Efficient Approach for Prevention of Cooperative Black Hole Attack on DSR Protocol
In the mobile ad hoc networks, the major role is played by the routing protocols in order to route the data from one mobile node to another mobile node with security. But in such mobile networks, routing protocol...
IPv4 to IPv6 Transition Complaint Mediastreaming UsingARM 11
Abstract: Internet Protocol version 6 (IPv6) is the next version of Internet Protocol (IP) which is currently inthe transition phase from its predecessor, Internet Protocol version 4 (IPv4). With the number of IPv4...