Scroll to Top

Volume : II, Issue : X, November - 2012

A STUDY ON PROBLEMS AND PROSPECTS OF INSTALLING COMPUTER SECURITY MEASURES IN SELECTED SUGAR FACTORIES

BABASAHEB JOTIRAM MOHITE

Published By : Laxmi Book Publication

Abstract :

In today's rapidly changing scenario, individuals and organizations are relying heavily on automated computer systems to store, retrieve, process and exchange information. Organizations use's the information stored on these systems to conduct vital business operations. Therefore, organizations need to protect the information from unauthorized access and potential destruction. Earlier, an organization, computer system was developed, used and maintained in isolation from other areas of business. The rapid growth and widespread use of electronic data processing and electronic business conducted through the Internet, along with numerous occurrences of international terrorism, fueled the need for better methods of protecting the computers and the information they store, process and transmit. IT managers, Network Administrators and Database Administrators face increasing challenges of managing and protecting information and network resources from unauthorized access. So to preserve data securely every IT user must know the benefits and losses about the computer security. Which are the different threats to computer data and which are the different security controls and policies required to maintain data security? In view of the above, the present research work “A Study on problems and prospects of installing computer security measures in selected Sugar factories” has come up for further in-depth study.

Keywords :


Article :


Cite This Article :

BABASAHEB JOTIRAM MOHITE, (2012). A STUDY ON PROBLEMS AND PROSPECTS OF INSTALLING COMPUTER SECURITY MEASURES IN SELECTED SUGAR FACTORIES. Indian Streams Research Journal, Vol. II, Issue. X, http://oldisrj.lbp.world/UploadedData/1670.pdf

References :

  1. Peltier T. R. (2002), “Information Security Policies, Procedures and Standards, Guidelines for Effective Information Security Management”, New York: Auerbach Publications.
  2. Basta A., Halton W. (2009), “Computer Security- Concepts, Issues and Implementation”, New Delhi: Course technology/cengage Learning.
  3. Whitman M. E. & Mattord H. J. (2007), “Principles of Information Security” (2nd ed.), New Delhi: Thomson Learning/Course Technology.
  4. Kothari C. R. (2004), “Research Methodology, Methods and techniques” (2nd ed.), New Delhi: New age International (p) Ltd.
  5. Weber R. (2007), “Information Systems Control and Audit” (5th ed.), New Delhi: Pearson Education
  6. Sugar Statistics- Maharashtra”, Retrieved December 17, 2009 from http://www. vsisugar.com/india/statistics/ maharashtra_statistics.htm
  7. History of Sugar”, Retrieved February 27, 2009 from http://en.wikipedia. org/wiki/History_of_sugar
  8. Wood C. C. (2005), 'Information Security Roles and Responsibilities Made Easy' (Ver. 2). Information Shield, Inc. Reviewed November 15, 2009 from http://www.informationshield.com.
  9. The Information Security Policies / Computer Security Policies Directory', Retrieved November 7, 2009 from http://www.information-security-policies-and standards.com

Article Post Production

Article Indexed In

Comments :

Enter Name :
Email ID :
Comments :

Previous Comments :

Creative Commons License
Indian Streams Research Journal by Laxmi Book Publication is licensed under a Creative Commons Attribution 4.0 International License.
Based on a work at http://oldisrj.lbp.world/Default.aspx.
Permissions beyond the scope of this license may be available at http://oldisrj.lbp.world/Default.aspx
Copyright � 2014 Indian Streams Research Journal. All rights reserved
Looking for information? Browse our FAQs, tour our sitemap, or contact ISRJ
Read our Privacy Policy Statement and Plagairism Policy. Use of this site signifies your agreement to the Terms of Use