Information Technology and Security Analysis

  IJCTT-book-cover
 
         
 
© 2020 by IJCTT Journal
Volume-68 Issue-10
Year of Publication : 2020
Authors : Nehal Chatterjee, Ratul Goswami
DOI :  10.14445/22312803/IJCTT-V68I10P112

How to Cite?

Nehal Chatterjee, Ratul Goswami, "Information Technology and Security Analysis," International Journal of Computer Trends and Technology, vol. 68, no. 10, pp. 66-68, 2020. Crossref, 10.14445/22312803/IJCTT-V68I10P112

Abstract
This article referenced essential data on security examination. Execute fundamental innovation administrations. Administrations, for example, hostile to infection, firewall assurance, network checking, and remote security are, for the most part, additional layers of the guard that help give you cutting edge insurance.

Reference
[1] Sharif, MHU.(2012). “Ordinary video events detection”. Retrieved from URL: https://books.google.com.bd/books?hl=en&lr=&id=r0PLBQAAQBAJ&oi=fnd&pg=PA19&ots=7o3ma97CD8&sig=_bheQrOiROO-g-LWlzz_Wqd0hfs&redir_esc=y#v=onepage&q&f=false
[2] Sharif MHU, Datta R(2019). “SOFTWARE AS A SERVICE HAS STRONG CLOUD SECURITY”. Retrieved from URL: https://www.researchgate.net/profile/Haris_Sharif/publication/335232 826_Software_as_a_Service_has_Strong_Cloud_Security/links/5d646 6fc299bf1f70b0eb0f2/Software-as-a-Service-has-Strong-Cloud-Securi ty.pdf
[3] Sharif, MHU.(2011). “Event Detection from Video Streams”. Retrieved from URL: https://www.researchgate.net/profile/Md_Haidar_Sharif/publication/265290040_Event_Detection_from_Video_Streams/links/5646d1cd08aef646e6cde39f.pdf
[4] Sharif MHU, Datta R.(2019). Biometrics Authentication Analysis. Retrieved from URL: https://www.researchgate.net/profile/Md_Haris_Sharif/publication/338540860_Biometrics_Authentication_Analysis/links/5e1ac051299bf10bc3a66b9b/Biometrics-Authentication-Analysis.pdf
[5] Sharif MHU, Datta R.(2019). BRING YOUR DEVICE (BYOD) PROGRAM. Retrieved from URL: https://www.semanticscholar.org/paper/BRING-YOUR-OWN-DEVICE-%28BYOD%29-PROGRAM-Sharif-Datta/622000fa59fa239238ac30b46402c43b826f6ad8?p2df
[6] Sharif MHU, Datta R.(2019). Information Governance: A Necessity in Today`s Business Environment. IJCSMC, Vol. 8, Issue. 8, August 2019, pg.67 – 76
[7] Sharif. (, 2019). Classification of Geographical Features from Satellite Imagery. Retrieved from URL: https://link.springer.com/chapter/10.1007/978-981-13-1501-5_27
[8] Dr. I.Lakshmi, "Security Analysis In Internet Of Things Using Ddos Mechanisms" SSRG International Journal of Mobile Computing and Application 6.1 (2019): 19-24.
[9] Sharif. (, 2017). International Journal of Mathematics Trends and Technology (IJMTT). Retrieved from URL: http://www.ijmttjournal.org/archive/ijmtt-v41p516
[10] Sharif MHU, Datta R.(2020). Cloud Data Transfer and Secure Data Storage. Retrieved from URL: https://www.researchgate.net/profile/Md_Haris_Sharif/publication/342402625_Cloud_Data_Transfer_and_Secure_Data_Storage/links/5ef29ff1a6fdcc158d25de32/Cloud-Data-Transfer-and-Secure-Data-Storage.pdf
[11] Sharif MHU, Datta R.(2020). Risk Management for a Retail Business. Retrieved from URL: https://www.researchgate.net/profile/Md_Haris_Sharif/publication/342212234_Risk_Management_for_a_Retail_Business/links/5ee8ebaa458515814a62e3fa/Risk-Management-for-a-Retail-Business.pdf
[12] Sharif MHU, Syed R.(2019). PHYSICAL SECURITY PRACTICES ON INTERNATIONAL BORDER MANAGEMENT. Retrieved from URL: https://www.researchgate.net/profile/Md_Haris_Sharif/publication/335737458_PHYSICAL_SECURITY_PRACTICES_ON_INTERNATIONAL_BORDER_MANAGEMENT/links/5d785f0b92851cacdb30d694/PHYSICAL-SECURITY-PRACTICES-ON-INTERNATIONAL-BORDER-MANAGEMENT.pdf
[13] Sharif MHU, Datta R.(2019). Performance Tuning for Anomaly Detection in IoT with the help of PCA. Retrieved from URL: https://www.researchgate.net/profile/Mounicasri_Valavala/publication/336262163_E-ISSN_2278-179X_Available_online_at_wwwjecetorg_Section_B_Computer_Science_Performance_Tuning_for_Anomaly_Detection_in_IoT_with_the_help_of_PCA/links/5d974bf192851c2f70ea00cc/E-ISSN-2278-179X-Available-online-at-wwwjecetorg-Section-B-Computer-Science-Performance-Tuning-for-Anomaly-Detection-in-IoT-with-the-help-of-PCA.pdf
[14] Sharif MHU, Datta R.(2019). “IDENTIFYING RISKS AND SECURITY MEASURES FOR E-COMMERCE ORGANIZATIONS”. Retrieved from URL: https://www.semanticscholar.org/paper/IDENTIFYING-RISKS-AND-SECURITY-MEASURES-FOR-Sharif-Datta/376a7774360a8fecb210d3a3cee39c38763eef05?p2df
[15] Apriliana, A. F., Sarno, R., & Effendi, Y. A. (2018, March). Risk analysis of IT applications using FMEA and AHP SAW method with COBIT 5. In 2018 International Conference on Information and Communications Technology (ICOIACT) (pp. 373-378). IEEE. Shandy Dafitra Hasibuan. / IJCTT, 68(10), 66-68, 2020 68
[16] Berry, C. T., & Berry, R. L. (2018). “An initial assessment of small business risk management approaches for cybersecurity threats”. International Journal of Business Continuity and Risk Management, 8(1), 1-10.
[17] Callahan, C., & Soileau, J. (2017). “Does enterprise risk management enhance operating performance?”. Advances in accounting, 37, 122-139.

Keywords
Information Technology, Security Analysis.