best project center in chennai
ieee 2013 final year projects
2013 ieee final year projects ieee 2013 final year projects in java IEEE final year projects in dotnet
final year projects for cse,it students best ieee projects ieee 2013 projects ieee final year projects for engineering students ieee 2013 final year projects for be btech students best project center in chennai
  DOMAIN  
 
Information Security:
DEFINITION
»
Information security is the practice of defending information from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction. It is a general term that can be used regardless of the form the data may take.
 
INTRODUCTION
»
The basic principles or key concepts that make up the information security are
  • Confidentiality
  • Integrity
  • Availability
  • Authenticity
  • Non – repudiation
 
»
Confidentiality

               Confidentiality refers to preventing the disclosure of information to unauthorized individuals or systems. Confidentiality is necessary for maintaining the privacy of the people whose personal information a system holds.

 
»
Integrity

                In information security, data integrity means maintaining and assuring the accuracy and consistency of data over its entire life-cycle. This means that data cannot be modified in an unauthorized or undetected manner.  Information security systems typically provide message integrity in addition to data confidentiality.

 
» Availability

                For any information system to serve its purpose, the information must be available when it is needed. This means that the computing systems used to store and process the information.  High availability systems aim to remain available at all times, preventing service disruptions due to power outages, hardware failures, and system upgrades. Ensuring availability also involves preventing denial-of-service attacks.

 
» Authenticity

                In computing, e-Business, and information security, it is necessary to ensure that the data, transactions, communications or documents (electronic or physical) are genuine. It is also important for authenticity to validate that both parties involved are who they claim to be. Some information security systems incorporate authentication features such as "digital signatures", which give evidence that the message data is genuine and was sent by someone possessing the proper signing key.

 
» Non - Repudiation

                Non-repudiation implies one's intention to fulfil their obligations to a contract. It also implies that one party of a transaction cannot deny having received a transaction nor can the other party deny having sent a transaction.

 
» Cryptography
  • Information security uses cryptography to transform usable information into a form that renders it unusable by anyone other than an authorized user; this process is called encryption.
  • Information that has been encrypted (rendered unusable) can be transformed back into its original usable form by an authorized user, who possesses the cryptographic key, through the process of decryption.
  • Cryptography is used in information security to protect information from unauthorized or accidental disclosure while the information is in transit (either electronically or physically) and while information is in storage.
» Steganography
  • Steganography (Listen) is the art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message, a form of security through obscurity.
  • The advantage of steganography over cryptography alone is that messages do not attract attention to themselves.
  • Cryptography protects the contents of a message, steganography can be said to protect both messages and communicating parties.
 
   
 
Block Diagram
ieee final year projects
ieee 2013 final year projects
Advantages
 
  • Information security is extremely easy to utilize. For protection of less sensitive material users can simply password protect files? For the more sensitive material users can install biometric scanners, firewalls, or detection systems.
  • As technology increases so will the crimes associated with it. Making the use of information security very worthwhile.
  • It keeps vital private information out of the wrong hands.
  • For the government it keeps top secret information and capabilities out of terrorist and enemy nation's hands.
  • Information security protects users valuable information both while in use and while it is being stored.
DisAdvantages
 
  • A technology is always changing so users must always purchase upgraded information security.
  • Since technology is always changing nothing will ever be completely secure.
  • If a user miss’s one single area that should be protected the whole system could be compromised.
  • It can be extremely complicated and users might not totally understand what they are dealing with.
  • It can slow down productivity if a user constantly has to enter passwords.
Real Time Examples
 
  • Governments
  • Military
  • Corporations
  • Financial institutions
  • Hospitals
  • Businesses
 
 
 
 
 
 
   
2013 ieee final year projects  
       
IEEE
Appln Projects
Domin
Products
Solution
dotnet
Dot net
Android
Oracle
Php
Home
Contact Us
Testimonials
Site Map
ieee final year projects in chennai
 
copyright © 2012 | Privacy Policy
 
best project center in chennai final year ieee 2013 projects ieee final year projects
 
website designed & hosted Uniq Technologies