INTERNATIONAL RESEARCH JOURNAL OF SCIENCE ENGINEERING AND TECHNOLOGY

( Online- ISSN 2454 -3195 ) New DOI : 10.32804/RJSET

Impact Factor* - 6.2311


**Need Help in Content editing, Data Analysis.

Research Gateway

Adv For Editing Content

   No of Download : 184    Submit Your Rating     Cite This   Download        Certificate

ANALYSIS THE DATA PROTECTION AND INFORMATION SECURITY SYSTEM AND NETWORKS

    2 Author(s):  SURENDER KUMAR , DR. VAIBHAV BANSAL

Vol -  5, Issue- 1 ,         Page(s) : 92 - 102  (2015 ) DOI : https://doi.org/10.32804/RJSET

Abstract

Data protection and information security have become more important these days due to hacking and leak of the information costs more for the organizations. The computers run a variety of software applications, including older versions of that may sometimes contain vulnerabilities that can be exploited by malicious actors. Keeping up with the software updates and upgrades, in addition to applying the manufacturer-recommended patches, minimizes many of the vulnerabilities. The malicious individuals or criminals (e.g., hackers) target individuals and organizations to gain access to personal information are through emails containing malicious code-this is referred to as phishing. Once the infected emails are opened, the user’s machine can be compromised.

1. Article 8: The right to respect for private and family life, home and correspondence, Available at: http://www.equalityhumanrights.com/sites/default/files/documents/humanrights/hrr_article_8.pdf
2. David Chaum. Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM, 24(2):84–88, 1981.
3. Andreas Pfitzmann. Multilateral security: Enabling technologies and their evaluation. In Reinhard Wilhelm, editor, Informatics – 10 Years Back, 10 Years Ahead, volume 2000 of LNCS, pages 50–62. Springer, 2001.
4. Martin Rost and Andreas Pfitzmann. Datenschutz-Schutzziele – revisited. Datenschutz und Datensicherheit (DuD), 33(6):353–358, June 2009.
5. Gabrielle Demange, Myrna Wooders ‘Group formation in economics: networks, clubs and coalitions’ Cambridge University Press, 2005
6. Biskup, J. Security in Computing Systems: Challenges, Approaches and Solutions, Ed. Spring-Verlag Berlin Heidelberg, 2009, pp. 6
7. Dean, T. Network+ Guide to Networks, 5th Edition, Ed. Course Technology, 2010, pp. 2-10
8. PricewaterhouseCoopers, A Practical Guide to Risk Assessment (2008), 3.

*Contents are provided by Authors of articles. Please contact us if you having any query.






Bank Details