{"title":"信息通信技术与信号处理中的安全问题、漏洞与对策","authors":"Akshay Goel, Jayesh Gaur, Ajay Rose","doi":"10.1109/ICSPC46172.2019.8976734","DOIUrl":null,"url":null,"abstract":"This paper discusses the heavy usage of source software which is free and open was because of the fact that it had many advantages associated with it like it was a cost saving and fast method but we know that everything has some disadvantages associated with it, this was also the case with the heavy usage of above discussed source software, it brought many vulnerabilities with it and researchers are still struggling to find a method of dealing with these vulnerabilities. Vulnerabilities are not only present in such open source software's, it is also present in outsourcing of Information Communication Technology (ICT). The algorithm of signal processing is also discussed in the paper. Various applications of signal processing are also discussed in the paper. The last section of the paper throws light on the challenges and goals of sensor network security. Finally, the paper concludes discussing the security vulnerabilities in ICT and signal processing.","PeriodicalId":321652,"journal":{"name":"2019 2nd International Conference on Signal Processing and Communication (ICSPC)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Security Issues, Vulnerabilities and Countermeasures in Information Communication Technology and Signal Processing\",\"authors\":\"Akshay Goel, Jayesh Gaur, Ajay Rose\",\"doi\":\"10.1109/ICSPC46172.2019.8976734\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper discusses the heavy usage of source software which is free and open was because of the fact that it had many advantages associated with it like it was a cost saving and fast method but we know that everything has some disadvantages associated with it, this was also the case with the heavy usage of above discussed source software, it brought many vulnerabilities with it and researchers are still struggling to find a method of dealing with these vulnerabilities. Vulnerabilities are not only present in such open source software's, it is also present in outsourcing of Information Communication Technology (ICT). The algorithm of signal processing is also discussed in the paper. Various applications of signal processing are also discussed in the paper. The last section of the paper throws light on the challenges and goals of sensor network security. Finally, the paper concludes discussing the security vulnerabilities in ICT and signal processing.\",\"PeriodicalId\":321652,\"journal\":{\"name\":\"2019 2nd International Conference on Signal Processing and Communication (ICSPC)\",\"volume\":\"26 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-03-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 2nd International Conference on Signal Processing and Communication (ICSPC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICSPC46172.2019.8976734\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 2nd International Conference on Signal Processing and Communication (ICSPC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICSPC46172.2019.8976734","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Security Issues, Vulnerabilities and Countermeasures in Information Communication Technology and Signal Processing
This paper discusses the heavy usage of source software which is free and open was because of the fact that it had many advantages associated with it like it was a cost saving and fast method but we know that everything has some disadvantages associated with it, this was also the case with the heavy usage of above discussed source software, it brought many vulnerabilities with it and researchers are still struggling to find a method of dealing with these vulnerabilities. Vulnerabilities are not only present in such open source software's, it is also present in outsourcing of Information Communication Technology (ICT). The algorithm of signal processing is also discussed in the paper. Various applications of signal processing are also discussed in the paper. The last section of the paper throws light on the challenges and goals of sensor network security. Finally, the paper concludes discussing the security vulnerabilities in ICT and signal processing.