Academia.eduAcademia.edu

Outline

Maintaining Data Integrity in Internet Security

2013, Ahlam Towfeeq Al-Sarraf

Abstract

The emergence of internet security started to enforce its importance with the advance technology of the internet computing processes. It is quite clear that the morphological structure of the internet itself allows for different types of threats to happen. Recently, security for the internet usage becomes a fundamental con-cern. Thus, It is quite feasible to study the architecture of the internet to develop and modify the computing processes to face the serious problem of computing processes attacked by different liberal or definable organizations of various types of internet data encryption. Some scholars believe in the cryptographic algorithms and protocols as central components to protect network transmission and data storage. Others, believe in the self content approach to characterize different computing defense protection which thought to be an active parameter to implement noticeable protection. It can be automated by building an automatic blocking device within the morphological structure of the computing set to create a parametric internet security. In this paper the highly sophisticated techniques and verified methods used by many attackers are considered as a serious problem which has to be solved to develop and achieve better internet security measure.

References (11)

  1. Atynderson ,R.J. ,AND KUKN,M.G.:1998,Soft tempest:' hidden data transmission
  2. Bragg,R,2005:'the complete reference network security,'
  3. Brainos,A.C.:2007,'common security in space'.
  4. Conklin,2009;'principle of computer security', Singapors.
  5. Kun,l.2008,'homeland security', IEEE Eng. Med.
  6. National Institute Standards and Technology-1995: An Introduction to computer security (NIST-1995).
  7. Perrig, A.2004: security in wireless sensor network, commun.ACM 47, (2004).
  8. Pfleeger,C.P.,2006:'Security in computing, person education, newdelhi.
  9. Reed,d.',2003;'applying seven layer network model to information security,(sans institute 2003)'
  10. Stavroulakis,p.2007,'communication and information security'.
  11. Karygiannis, t.2002, wireless network security, special publication, national institute of standards and technology (1995).