AN OVERVIEW OF INFORMATION SECURITY TECHNIQUES
dc.contributor.author | Jegede, Abayomi Joshau | |
dc.contributor.author | Aimufua, Gilbert Imuetinyan Osaze | |
dc.date.accessioned | 2023-12-14T07:04:48Z | |
dc.date.available | 2023-12-14T07:04:48Z | |
dc.date.issued | 2009-03-07 | |
dc.description.abstract | This study explores the concept of information security and some common threats to the security of electronic information. The research also examines the various techniques used for securing enterprise environments as well as the strengths and weaknesses of the techniques. The study concludes by recommending that a balance be struck between security and availability so that what is gained is security is not lost in performance. | en_US |
dc.identifier.citation | Aimufua, G.I.O. & Jegede A.J. (2009) AN OVERVIEW OF INFORMATION SECURITY TECHNIQUES | en_US |
dc.identifier.uri | https://keffi.nsuk.edu.ng/handle/20.500.14448/5563 | |
dc.language.iso | en | en_US |
dc.publisher | Department of Computer Science, Nasarawa State University Keffi | en_US |
dc.subject | cryptography, firewalls, information security, intrusion detection system security techniques, scanners, logging and auditing tools | en_US |
dc.title | AN OVERVIEW OF INFORMATION SECURITY TECHNIQUES | en_US |
dc.type | Article | en_US |