Human life is in todays world is surrounded with technology. Technology has left hardly any space for non-technical things. When society is influenced, the security system or the way that society is governed changes for sure. It is a social phenomenon. With the enormous speed of development of technology governance "by the states is also not only governance" but it is turning out to be an "E-governance". Even though, private sector is behind the creation of world class Information Technology still the government is focusing the public sector for implementation of E-governance. If we use...
Human life is in todays world is surrounded with technology. Technology has left hardly any space for non-technical things. When society is influenced...
With the exponential growth of computers inhabiting the earth with many millions of miles of optical fiber, wire and air waves, link people, their computers and the vast array of information handling devices together, we can say that we are living in cyber era. This globalization and digital convergence in the emerging knowledge society has raised complex ethical, legal and societal issues with some complex questions on the freedom of expression, access to information, the right to privacy, intellectual property rights, digital divide, cyber crimes, digital security and privacy which has led...
With the exponential growth of computers inhabiting the earth with many millions of miles of optical fiber, wire and air waves, link people, their com...
In the present age, software is exploited and the understanding of increasing extent of risk exposure as a result is rarely developed. Security should be incorporate right from the requirements phase so that the security is inbuilt and properly incorporated into the software in development. To establish the fact that a process is improving or not is a matter that seems impossible without obtaining the measurements. Security requirements are qualitative hence they needs to be converted into quantitative measure using some metrics. Certain Object Oriented modeling techniques like Misuse case,...
In the present age, software is exploited and the understanding of increasing extent of risk exposure as a result is rarely developed. Security should...