Please use this identifier to cite or link to this item:
http://ir.inflibnet.ac.in/handle/1944/1011
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Bhatnagar, Anjana | |
dc.date.accessioned | 2010-05-12T05:29:51Z | |
dc.date.available | 2010-05-12T05:29:51Z | |
dc.date.issued | 2007-12-07 | |
dc.identifier.isbn | 978-81-902079-5-9 | |
dc.identifier.uri | http://hdl.handle.net/1944/1011 | |
dc.description.abstract | We are living in a society dominated by information technology and in an era of information where huge amount of Information can be speedily processed and saved on easily accessible media. Information plays a really important part in decision making in an organization. For an organization a wrong decision can lead to drastic result. This is on reason why information is steadily acquiring a more central role in business. In the world of today information is becoming increasing important. Generally speaking the standard of information security has not kept pace with this development. For example, information that before was saved on a large amount of paper and physically difficult to steal can today be saved on a disk that can easily remove. In this article author has discussed, what information security is. Why it is needed in an organization of 21 century. The CIA Relationship of information security is discussed with diagram. The information security chain has twelve modules and eighty sub modules. The overview of information security cannot be complete in such small paper; therefore author delimits herself to the most prominent module computer security. In the last future and conclusion of information security are highlighted. Information Security of IIT Kanpur system is also consulted in some of the modules. The paper is of particular value for newcomers in this area. | en_US |
dc.language.iso | en | en_US |
dc.publisher | INFLIBNET CENTER | en_US |
dc.subject | Information Security | en_US |
dc.subject | Computer Security | en_US |
dc.subject | Computer Viruses | en_US |
dc.subject | Data Encryption | en_US |
dc.subject | Biometric Methods | en_US |
dc.title | Need of Information Security In The 21st Centuary: With Special Emphasis to Computer Security | en_US |
dc.type | Article | en_US |
Appears in Collections: | PLANNER 2007 |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.