International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 105

Research Paper | Computer Science & Engineering | India | Volume 3 Issue 7, July 2014


Design and Analysis of Information Security for SIS in Prospective of Application Software

Sharanappa Patil | Ramesh.K


Abstract: Information security plays an important role in protecting the assets of an organization. As no single formula can guarantee 100 % security, there is a need for a set of benchmarks or standards to help ensure an adequate level of security is attained, resources are used efficiently, and the best security practices are adopted. In this paper is concerned with issues relating to the management of information security in organizations, motivated by the need for cost-efficient information security.


Keywords: Assets of organization, Security, Information Security, Management of Information Security


Edition: Volume 3 Issue 7, July 2014,


Pages: 2039 - 2042


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

Sharanappa Patil, Ramesh.K, "Design and Analysis of Information Security for SIS in Prospective of Application Software", International Journal of Science and Research (IJSR), Volume 3 Issue 7, July 2014, pp. 2039-2042, https://www.ijsr.net/get_abstract.php?paper_id=201531

Similar Articles with Keyword 'Security'

Downloads: 5 | Weekly Hits: ⮙4 | Monthly Hits: ⮙4

Analysis Study Research Paper, Computer Science & Engineering, India, Volume 13 Issue 1, January 2024

Pages: 516 - 519

I-Vote Android Application for Internet-Voting

Rahul Kumar [11] | Hima Saxena [2] | Dr. Suman Sharma [5]

Share this Article

Downloads: 124 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 991 - 995

A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats

M. Meena [3] | A. Komathi [2]

Share this Article
Top