International Journal of Computer
Trends and Technology

Research Article | Open Access | Download PDF

Volume 68 | Issue 10 | Year 2020 | Article Id. IJCTT-V68I10P112 | DOI : https://doi.org/10.14445/22312803/IJCTT-V68I10P112

Information Technology and Security Analysis


Nehal Chatterjee, Ratul Goswami

Received Revised Accepted
23 Sep 2020 27 Oct 2020 30 Oct 2020

Citation :

Nehal Chatterjee, Ratul Goswami, "Information Technology and Security Analysis," International Journal of Computer Trends and Technology (IJCTT), vol. 68, no. 10, pp. 66-68, 2020. Crossref, https://doi.org/10.14445/22312803/ IJCTT-V68I10P112

Abstract

This article referenced essential data on security examination. Execute fundamental innovation administrations. Administrations, for example, hostile to infection, firewall assurance, network checking, and remote security are, for the most part, additional layers of the guard that help give you cutting edge insurance.

Keywords

Information Technology, Security Analysis.

References

[1] Sharif, MHU.(2012). “Ordinary video events detection”. Retrieved from URL: https://books.google.com.bd/books?hl=en&lr=&id=r0PLBQAAQBAJ&oi=fnd&pg=PA19&ots=7o3ma97CD8&sig=_bheQrOiROO-g-LWlzz_Wqd0hfs&redir_esc=y#v=onepage&q&f=false
[2] Sharif MHU, Datta R(2019). “SOFTWARE AS A SERVICE HAS STRONG CLOUD SECURITY”. Retrieved from URL: https://www.researchgate.net/profile/Haris_Sharif/publication/335232 826_Software_as_a_Service_has_Strong_Cloud_Security/links/5d646 6fc299bf1f70b0eb0f2/Software-as-a-Service-has-Strong-Cloud-Securi ty.pdf
[3] Sharif, MHU.(2011). “Event Detection from Video Streams”. Retrieved from URL: https://www.researchgate.net/profile/Md_Haidar_Sharif/publication/265290040_Event_Detection_from_Video_Streams/links/5646d1cd08aef646e6cde39f.pdf
[4] Sharif MHU, Datta R.(2019). Biometrics Authentication Analysis. Retrieved from URL: https://www.researchgate.net/profile/Md_Haris_Sharif/publication/338540860_Biometrics_Authentication_Analysis/links/5e1ac051299bf10bc3a66b9b/Biometrics-Authentication-Analysis.pdf
[5] Sharif MHU, Datta R.(2019). BRING YOUR DEVICE (BYOD) PROGRAM. Retrieved from URL: https://www.semanticscholar.org/paper/BRING-YOUR-OWN-DEVICE-%28BYOD%29-PROGRAM-Sharif-Datta/622000fa59fa239238ac30b46402c43b826f6ad8?p2df
[6] Sharif MHU, Datta R.(2019). Information Governance: A Necessity in Today`s Business Environment. IJCSMC, Vol. 8, Issue. 8, August 2019, pg.67 – 76
[7] Sharif. (, 2019). Classification of Geographical Features from Satellite Imagery. Retrieved from URL: https://link.springer.com/chapter/10.1007/978-981-13-1501-5_27
[8] Dr. I.Lakshmi, "Security Analysis In Internet Of Things Using Ddos Mechanisms" SSRG International Journal of Mobile Computing and Application 6.1 (2019): 19-24.
[9] Sharif. (, 2017). International Journal of Mathematics Trends and Technology (IJMTT). Retrieved from URL: http://www.ijmttjournal.org/archive/ijmtt-v41p516
[10] Sharif MHU, Datta R.(2020). Cloud Data Transfer and Secure Data Storage. Retrieved from URL: https://www.researchgate.net/profile/Md_Haris_Sharif/publication/342402625_Cloud_Data_Transfer_and_Secure_Data_Storage/links/5ef29ff1a6fdcc158d25de32/Cloud-Data-Transfer-and-Secure-Data-Storage.pdf
[11] Sharif MHU, Datta R.(2020). Risk Management for a Retail Business. Retrieved from URL: https://www.researchgate.net/profile/Md_Haris_Sharif/publication/342212234_Risk_Management_for_a_Retail_Business/links/5ee8ebaa458515814a62e3fa/Risk-Management-for-a-Retail-Business.pdf
[12] Sharif MHU, Syed R.(2019). PHYSICAL SECURITY PRACTICES ON INTERNATIONAL BORDER MANAGEMENT. Retrieved from URL: https://www.researchgate.net/profile/Md_Haris_Sharif/publication/335737458_PHYSICAL_SECURITY_PRACTICES_ON_INTERNATIONAL_BORDER_MANAGEMENT/links/5d785f0b92851cacdb30d694/PHYSICAL-SECURITY-PRACTICES-ON-INTERNATIONAL-BORDER-MANAGEMENT.pdf
[13] Sharif MHU, Datta R.(2019). Performance Tuning for Anomaly Detection in IoT with the help of PCA. Retrieved from URL: https://www.researchgate.net/profile/Mounicasri_Valavala/publication/336262163_E-ISSN_2278-179X_Available_online_at_wwwjecetorg_Section_B_Computer_Science_Performance_Tuning_for_Anomaly_Detection_in_IoT_with_the_help_of_PCA/links/5d974bf192851c2f70ea00cc/E-ISSN-2278-179X-Available-online-at-wwwjecetorg-Section-B-Computer-Science-Performance-Tuning-for-Anomaly-Detection-in-IoT-with-the-help-of-PCA.pdf
[14] Sharif MHU, Datta R.(2019). “IDENTIFYING RISKS AND SECURITY MEASURES FOR E-COMMERCE ORGANIZATIONS”. Retrieved from URL: https://www.semanticscholar.org/paper/IDENTIFYING-RISKS-AND-SECURITY-MEASURES-FOR-Sharif-Datta/376a7774360a8fecb210d3a3cee39c38763eef05?p2df
[15] Apriliana, A. F., Sarno, R., & Effendi, Y. A. (2018, March). Risk analysis of IT applications using FMEA and AHP SAW method with COBIT 5. In 2018 International Conference on Information and Communications Technology (ICOIACT) (pp. 373-378). IEEE. Shandy Dafitra Hasibuan. / IJCTT, 68(10), 66-68, 2020 68
[16] Berry, C. T., & Berry, R. L. (2018). “An initial assessment of small business risk management approaches for cybersecurity threats”. International Journal of Business Continuity and Risk Management, 8(1), 1-10.
[17] Callahan, C., & Soileau, J. (2017). “Does enterprise risk management enhance operating performance?”. Advances in accounting, 37, 122-139.