{"title":"对信息系统安全的贡献","authors":"A. B. Charke, M. Chabi, M. Fakir","doi":"10.11591/IJEECS.V16.I1.PP154-166","DOIUrl":null,"url":null,"abstract":"Security of information systems has become a critical problem of companies. In this paper, the principles of security and the description of some attacks that threatening the information system are given. After Techniques of cryptography, digital signature to ensure the confidentiality, integrity and authentication of data, are described. Some security protocol such as Secure Shell (SSH), Secure Socket Layer (SSL), Internet Protocol SECure (IPSEC), in order to ensure the security of connection resources, are described. Intrusion detection is implemented using free IDS \"SNORT\" software.","PeriodicalId":247642,"journal":{"name":"TELKOMNIKA Indonesian Journal of Electrical Engineering","volume":"59 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"Contribution to the Security of the Information System\",\"authors\":\"A. B. Charke, M. Chabi, M. Fakir\",\"doi\":\"10.11591/IJEECS.V16.I1.PP154-166\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Security of information systems has become a critical problem of companies. In this paper, the principles of security and the description of some attacks that threatening the information system are given. After Techniques of cryptography, digital signature to ensure the confidentiality, integrity and authentication of data, are described. Some security protocol such as Secure Shell (SSH), Secure Socket Layer (SSL), Internet Protocol SECure (IPSEC), in order to ensure the security of connection resources, are described. Intrusion detection is implemented using free IDS \\\"SNORT\\\" software.\",\"PeriodicalId\":247642,\"journal\":{\"name\":\"TELKOMNIKA Indonesian Journal of Electrical Engineering\",\"volume\":\"59 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2015-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"TELKOMNIKA Indonesian Journal of Electrical Engineering\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.11591/IJEECS.V16.I1.PP154-166\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"TELKOMNIKA Indonesian Journal of Electrical Engineering","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.11591/IJEECS.V16.I1.PP154-166","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Contribution to the Security of the Information System
Security of information systems has become a critical problem of companies. In this paper, the principles of security and the description of some attacks that threatening the information system are given. After Techniques of cryptography, digital signature to ensure the confidentiality, integrity and authentication of data, are described. Some security protocol such as Secure Shell (SSH), Secure Socket Layer (SSL), Internet Protocol SECure (IPSEC), in order to ensure the security of connection resources, are described. Intrusion detection is implemented using free IDS "SNORT" software.