Volume 20, Issue 3 And 4 (4-2005)                   ... 2005, 20(3 And 4): 1-16 | Back to browse issues page

XML Persian Abstract Print


Download citation:
BibTeX | RIS | EndNote | Medlars | ProCite | Reference Manager | RefWorks
Send citation to:

Maryam Assadi. Information security technologies: A classification approach. .... 2005; 20 (3 and 4) :1-16
URL: http://jipm.irandoc.ac.ir/article-1-130-en.html
Abstract:   (7279 Views)
The most important advantage and mission for any computer network is to share the hardware and software resources as well as providing a quick and easy access to information. Controlling the extent of access to the shared resources, is one of the most important goals of a network security system. With expansion of computer networks (internet in particular), the attitude towards data security as well as security of other shared resources has entered a new level. It is therefore necessary for organizations to follow a specific strategy for implementation of a security system in order to protect valuable data. An appropriate security system, may lead to somewhat negative, unexpected consequences. Success in securing information is contingent upon protecting information and information systems against intrusions and attacks. To this end numerous security protocols are employed. The present paper attempts to classify these security protocols based on the level of interaction between technology and information as well as levels of security implementation of information systems.
Full-Text [PDF 210 kb]   (4574 Downloads)    
Type of Study: Research |
Received: 2009/09/25

Add your comments about this article : Your username or Email:
CAPTCHA code

© 2019 All Rights Reserved | Iranian Journal of Information processing and Management

Designed & Developed by : Yektaweb