earticle

논문검색

A Dependency analysis for Information Security and Risk Management

초록

영어

Today major issue in IT Sector is security, now a day in every field software products are using at the same time users are struggles for their information and data security. Normally software engineers developed good software and test the all aspects and deliver to the user but they cannot bother about minuet problems because they think that those problems cannot impact the product output. But in the run time environment those problems create major problems and display the wrong outputs. Software hackers also using these minuet problems hacked the system and spoil the data. There are so many methods are available for information security and risk management but those are not universally accepted methods. In this paper I proposed a novel method for information security and risk management. Using this method to develop application very well and if any hidden mistakes are there in development stage those risks are identified in run time environment and reduce risk and provide security to the data.

목차

Abstract
 1. Introduction
 2. Risk Management
  2.1. Risk Management Process
  2.2. Dependency Analysis
 3. Proposed Method
 4. Results and Comparison
 5. Conclusion
 References

저자정보

  • B. Chaitanya Krishna Department of Computer Science and Engineering, K L University, Andhra Pradesh
  • Kodukula Subrahmanyam Department of Computer Science and Engineering, K L University, Andhra Pradesh
  • Tai-hoon Kim Department of Convergence Security, Sungshin Women's University, 249-1, Dongseon-dong 3-ga, Seoul, 136-742, Korea

참고문헌

자료제공 : 네이버학술정보

    함께 이용한 논문

      ※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

      0개의 논문이 장바구니에 담겼습니다.