|
As a network grows in size and complexity, vulnerabilities within local area and wide area network increase and become more problematic. In addition, popularity of intrusion tools and script also make it easier for anyone to launch an attack to any unguarded machines. Before an attacker is able to compromise a specific machine, valuable information |
In this research project we are concentrating on investigating the losses affecting a Free Space Optical communication system, which is considered as a very secure communication system. Losses are mainly atmospheric attenuation and geometric losses. The several types of atmospheric attenuation: absorption, scattering and scintillations are introduced. |
Increasing information security threads lead the Information Technology Systems to the strategic level. The organizationsص information systems need be protected from many possible attacks such as computer viruses, trojans, worms, and other debilitating networked-based attacks. Consequently, it is imperative that technologies be examined and adopted |
The purpose of this paper is to consider the information and its bearing and implications in matters concerning security rather than the technological angle of information but instead.The appreciation of the message, taken as the essence of information in any of its aspects, seeing it as a vehicle, means that it is always carrying something with an |
The development of information technology threats the security of the persons, the companies and the states. It increases the potential vulnerabilities. New technologies mean so new threats. These technologies can lead to hegemonic uses and facilitate illegal, secret or coercive activities led by governments to have access without authorization to |
Fraud can be described as a dishonest action to make a false statement in order to gain money or benefit from an individual or from an organization. It is also known as a scam or, more elegantly, as an economic offense. By any definition, it is a crime, which in the e-commerce network environment may cost businesses billions of dollars a year.Fraud |
In todays world people lives and country well-being are dependent on complex strategic infrastructure. Such infrastructure is called Critical infrastructure. Critical infrastructure includes systems, facilities, and assets so vital that if destroyed or incapacitated would disrupt the security, economy, health, safety, or welfare of the public. Critical |
Many countries IT infrastructure has undergone a dramatic transformation over the last decade. Explosive growth in the use of networks to connect various IT systems has made it relatively easy to obtain information, to communicate, and to control these systems across great distances. Because of the tremendous productivity gains and new capabilities |
Spam and spoofed emails have become a part of the daily reality delivered as messages to a persons inbox. Spam has become a profitable enterprise for many marketers and is a point of contention for those who receive it. However, spoofed email has become more than just a nuisance; it is a viable security threat to individual home users, organizations, |
Under the patronage of the Custodian of the Two Holy Mosques King Abdullah bin Abdul Aziz, the Information Technology and Security Conference started its works yesterday in Riyadh. Organized by the Saudi General Intelligence Presidency (GIP), the four day conference will take place at King Fahad Cultural Center. The topics to be discussed lie under
|
|
Security indicates something - an asset - is, or may be, protected from a danger. For a discussion of homeland security one needs to identify the class of potential assets that might be endangered and the potential dangers that might be relevant. This paper argues that IT has to play an indispensable role in homeland security, that, however, homeland |
The Custodian of the Two Holy Mosques King Abdullah bin Abdul Aziz is patronizing the Information technology and National Security Conference (ITNSC) which is organized by the General Intelligence Presidency (GIP) during the period from 21 to 24/11/1428, being 1 to 4/12/2007. The GIP president HRH Prince Muqrin bin Abdul Aziz said the conference aims
|
|
|
|
|