A study of some vulnerabilities in information security
Information security has always played a significant role in ensuring the privacy of our data is securely protected. It is built around 3 primary objectives, commonly known as CIA – Confidentiality, Integrity and Availability using various processes and tools. However, its application does not mean...
Saved in:
Main Author: | Tan, Kevin Wei Loong |
---|---|
Other Authors: | Tay Kian Boon |
Format: | Final Year Project |
Language: | English |
Published: |
Nanyang Technological University
2021
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/147959 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
Similar Items
-
Security study of data storage and communication in internet-PC environment
by: Tan, Benson Wei Jin.
Published: (2010) -
Cloud security
by: Hein Htet, Zaw
Published: (2014) -
Security as a service in social network
by: Pham Quang, Vu.
Published: (2013) -
Application of elliptic curve cryptography in web security
by: Pham, Tan Phat.
Published: (2009) -
Detection of Intrusions and Malware, and Vulnerability Assessment
Published: (2017)