Volume : II, Issue : X, November - 2012 A STUDY ON PROBLEMS AND PROSPECTS OF INSTALLING COMPUTER SECURITY MEASURES IN SELECTED SUGAR FACTORIESBABASAHEB JOTIRAM MOHITE Published By : Laxmi Book Publication Abstract : In today's rapidly changing scenario, individuals and organizations are relying
heavily on automated computer systems to store, retrieve, process and exchange
information. Organizations use's the information stored on these systems to conduct vital
business operations. Therefore, organizations need to protect the information from
unauthorized access and potential destruction. Earlier, an organization, computer
system was developed, used and maintained in isolation from other areas of business.
The rapid growth and widespread use of electronic data processing and electronic
business conducted through the Internet, along with numerous occurrences of
international terrorism, fueled the need for better methods of protecting the computers
and the information they store, process and transmit. IT managers, Network
Administrators and Database Administrators face increasing challenges of managing
and protecting information and network resources from unauthorized access. So to
preserve data securely every IT user must know the benefits and losses about the
computer security. Which are the different threats to computer data and which are the
different security controls and policies required to maintain data security?
In view of the above, the present research work “A Study on problems and
prospects of installing computer security measures in selected Sugar factories” has
come up for further in-depth study. Keywords : Article : Cite This Article : BABASAHEB JOTIRAM MOHITE, (2012). A STUDY ON PROBLEMS AND PROSPECTS OF INSTALLING COMPUTER SECURITY MEASURES IN SELECTED SUGAR FACTORIES. Indian Streams Research Journal, Vol. II, Issue. X, http://oldisrj.lbp.world/UploadedData/1670.pdf References : - Peltier T. R. (2002), “Information Security Policies, Procedures and Standards, Guidelines for Effective Information Security Management”, New York: Auerbach Publications.
- Basta A., Halton W. (2009), “Computer Security- Concepts, Issues and Implementation”, New Delhi: Course technology/cengage Learning.
- Whitman M. E. & Mattord H. J. (2007), “Principles of Information Security” (2nd ed.), New Delhi: Thomson Learning/Course Technology.
- Kothari C. R. (2004), “Research Methodology, Methods and techniques” (2nd ed.), New Delhi: New age International (p) Ltd.
- Weber R. (2007), “Information Systems Control and Audit” (5th ed.), New Delhi: Pearson Education
- Sugar Statistics- Maharashtra”, Retrieved December 17, 2009 from http://www. vsisugar.com/india/statistics/ maharashtra_statistics.htm
- History of Sugar”, Retrieved February 27, 2009 from http://en.wikipedia. org/wiki/History_of_sugar
- Wood C. C. (2005), 'Information Security Roles and Responsibilities Made Easy' (Ver. 2). Information Shield, Inc. Reviewed November 15, 2009 from http://www.informationshield.com.
- The Information Security Policies / Computer Security Policies Directory', Retrieved November 7, 2009 from http://www.information-security-policies-and standards.com
|
Article Post Production
Article Indexed In
|