Implementing Security in a University Network
نویسندگان
چکیده
منابع مشابه
Measurement of Security Dangers in University Network
Today’s universities are on the forefront of technological advancement which makes University’s computing environment particularly vulnerable because in contrast to hacking targets like banks and others, college and university computing environments are often large open networks. This paper assessed the security threats evolve specifically in University’s information technology environment; and...
متن کاملInformation Security Requirements for Implementing Electronic Health Records in Iran
Background and Goal: ICT development in recent years has created excellent developments in human social and economic life. One of the most important opportunities to use information technology is in the medical field, that the result would be electronic health record (EHR).The purpose of this research is to investigate the effects information securi...
متن کاملInformation Security Requirements for Implementing Electronic Health Records in Iran
Background and Goal: ICT development in recent years has created excellent developments in human social and economic life. One of the most important opportunities to use information technology is in the medical field, that the result would be electronic health record (EHR).The purpose of this research is to investigate the effects information securi...
متن کاملImplementing Network Security Protocols based on Elliptic Curve Cryptography
Elliptic curve cryptography provides a methodology for obtaining high-speed, efficient, and scalable implementations of network security protocols. In this paper, we describe in detail three protocols based on elliptic curve cryptographic techniques, and the results of our implementation of the elliptic curve cryptography over the Galois field GF (2k), where k is a composite number. 1 Elliptic ...
متن کاملSecurity implications of implementing active network infrastructures using agent technology
Active networks (AN) are a rapid evolving area of research and in parallel an area of great industry interest. However, for this technology to make the step out of the labs and penetrate the market, the security problems have to be tackled eectively. This paper demonstrates why and how agent technology research, can and should be applied to active networks, in order to ful®ll the new security ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: MATEC Web of Conferences
سال: 2016
ISSN: 2261-236X
DOI: 10.1051/matecconf/20164105004