AN OVERVIEW OF INFORMATION SECURITY TECHNIQUES

dc.contributor.authorJegede, Abayomi Joshau
dc.contributor.authorAimufua, Gilbert Imuetinyan Osaze
dc.date.accessioned2023-12-14T07:04:48Z
dc.date.available2023-12-14T07:04:48Z
dc.date.issued2009-03-07
dc.description.abstractThis study explores the concept of information security and some common threats to the security of electronic information. The research also examines the various techniques used for securing enterprise environments as well as the strengths and weaknesses of the techniques. The study concludes by recommending that a balance be struck between security and availability so that what is gained is security is not lost in performance.en_US
dc.identifier.citationAimufua, G.I.O. & Jegede A.J. (2009) AN OVERVIEW OF INFORMATION SECURITY TECHNIQUESen_US
dc.identifier.urihttps://keffi.nsuk.edu.ng/handle/20.500.14448/5563
dc.language.isoenen_US
dc.publisherDepartment of Computer Science, Nasarawa State University Keffien_US
dc.subjectcryptography, firewalls, information security, intrusion detection system security techniques, scanners, logging and auditing toolsen_US
dc.titleAN OVERVIEW OF INFORMATION SECURITY TECHNIQUESen_US
dc.typeArticleen_US

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
10. (2009).pdf
Size:
1.04 MB
Format:
Adobe Portable Document Format
Description:
Article
License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.71 KB
Format:
Plain Text
Description:

Collections