IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Information Security: Application in Business to Maximize the Security and Protect Confidential and Private Data

Information Security: Application in Business to Maximize the Security and Protect Confidential and Private Data
View Sample PDF
Author(s): Sofienne Srihi (University of Tunis, Tunisia), Farhat Fnaiech (University of Tunis, Tunisia), Ala Balti (University of Tunis, Tunisia)and Habib Hamam (University of Moncton, Canada)
Copyright: 2016
Pages: 23
Source title: Automated Enterprise Systems for Maximizing Business Performance
Source Author(s)/Editor(s): Petraq Papajorgji (Universiteti Europian i Tiranes, Albania), François Pinet (National Research Institute of Science and Technology for Environment and Agriculture, France), Alaine Margarete Guimarães (State University of Ponta Grossa, Brazil)and Jason Papathanasiou (University of Macedonia, Greece)
DOI: 10.4018/978-1-4666-8841-4.ch013

Purchase


Abstract

In this chapter, we define Information Security (IS) and elaborate on the different methods and technology used. We proceed to explain some of the IS tools and risks found in private and confidential data. We detail the latest algorithms and systems of security and discuss how to implement those systems in business to upgrade performances and increase profits.

Related Content

Vincent Lennard Kraus. © 2023. 32 pages.
Tlou Maggie Masenya. © 2023. 16 pages.
Arzu Tufan, Gurkan Tuna. © 2023. 30 pages.
Wasswa Shafik. © 2023. 19 pages.
Calvin Nobles, Sharon L. Burton, Darrell Norman Burrell. © 2023. 23 pages.
Darrell Norman Burrell, Calvin Nobles, Austin Cusak, Laura Ann Jones, Jorja B. Wright, Horace C. Mingo, Jennifer Ferreras-Perez, Katrina Khanta, Philip Shen, Kevin Richardson. © 2023. 16 pages.
Jorja B. Wright, Darrell Norman Burrell. © 2023. 12 pages.
Body Bottom