New Generation Internet Tools
English | Bulgarian

Criptography:

Cyber security:

Cyber attacks:







E-mails:

 • Information: office@g-92.com
 • Support: support@g-92.com
 • Careers: career@g-92.com


Black Screen Project (NGIT)

Cyber Warfire,
Section 6192A,

Eastern Europe

fax: +359(575) 34345

Official URL address

G-92 Developers Group

SECTION: MILITARY AND SECURITY (Public edition)

Cyber warfare ...

Generalized Discriminant Analysis algorithm for feature reduction in Cyber
Attack Detection System
...

Cyber Attack Classification using Game Theoretic Weighted Metrics Approach

A Comparison of Commercial and Military Computer Security Policies ...

Cyber Command Synchronizes Services’ Efforts ...

U.S. International Cyber Strategy ...


Recomended Web-Resources:

United States Cyber CommandUnited States Tenth FleetNaval Network Warfare Command

[ 9ec4c12949a4f31474f299058ce2b22a ]

NATO Communications and Information Agency

 










BS NGIT Developers

INFORMATION SECURITY:

Definition:

The protection of data against unauthorized access. Programs and data can be secured by issuing passwords and digital certificates to authorized users. However, passwords only validate that a correct number has been entered, not that it is the actual person. Digital certificates and biometric techniques (fingerprints, eyes, voice, etc.) provide a more secure method (see authentication). After a user has been authenticated, sensitive data can be encrypted to preventData Encryption Standard eavesdropping (see cryptography).


Authorized Users Can Be the Most Dangerous:

Although precautions can be taken to authenticate users, it is much more difficult to determine if an authorized employee is doing something malicious. Someone may have valid access to an account for updating, but determining whether phony numbers are being entered requires a great deal more processing. The bottom line is that effective security measures are always a balance between technology and personnel management. See Parkerian hexad, information assurance, security scan, security audit, audit trail, NCSC, ICSA, access control, share-level security, user-level security and social engineering.




New Generation Internet Tools
Copyright © 2010-2017 G-92 Developers Group. All rights reserved
NGIT Black Screen Project