[PDF][PDF] Information system security threats and vulnerabilities: Evaluating the human factor in data protection

O Safianu, F Twum… - International Journal of …, 2016 - academia.edu
Researches in information security have all these while been concerned only with technical
problems and efforts to improve information security have been software-centered or …

Information system security threats and vulnerabilities: evaluating the human factor in data protection

S Omar - 2016 - ir.knust.edu.gh
Researches in information security have all these while been concerned only with technical
problems. Attempts to curb security problems are either software-centered or hardware …

[PDF][PDF] Approach for Secure Authorized Deduplication using Hybrid Cloud

MBA Malar, ML Shri, M Deepa… - International Journal of …, 2016 - researchgate.net
Now a days Data deduplication is one of important data compression techniques for
eliminating duplicate copies of repeating data, and has been widely used in cloud storage to …

[PDF][PDF] Information Security Mechanisms and ICT Policy in Practice: A Case of the University of Namibia

P Kautwima, V Hashiyana… - International Journal of …, 2021 - researchgate.net
As new technologies emerge in the next generation of wireless communication systems so
the continued rise of cyber threats and attacks in higher education institutions. In the wake of …

[PDF][PDF] Comparative Analysis of Open-Source Encryption Tools: GnuPG vs. VeraCrypt

RK Singh, DS Vikalp, A Pandey - researchgate.net
This paper presents a comparative analysis of open-source encryption tools, specifically
GnuPG and VeraCrypt, focusing on their performance, usability, and security features. Our …

[HTML][HTML] IJNSA 06

P Kautwima, T Haiduwa, K Sai, V Hashiyana, N Suresh - ijcnc.com
As universities migrate online due to the advent of Covid-19, there is a need for enhanced
security in information systems in the institution of higher learning. Many opted to invest in …

[PDF][PDF] SYSTEM END-USER ACTIONS AS A THREAT TO INFORMATION SYSTEM SECURITY

P Kautwima, T Haiduwa, K Sai, V Hashiyana, N Suresh - disclosure, 2021 - academia.edu
As universities migrate online due to the advent of Covid-19, there is a need for enhanced
security in information systems in the institution of higher learning. Many opted to invest in …

[PDF][PDF] Data Security by Using Convergent Keys

KR Gawande, RR Bhure - ijiird.com
Secure deduplication is a technique to remove duplicate copies of storage data, and
provides security to them. To reduce storage space and upload bandwidth in cloud storage …

[PDF][PDF] Secure Deduplication using Dekey

KR Gawande, VB Bhagat - 2020 - academia.edu
Data deduplication is a technique for reducing duplicate copies of information in cloud
storage. By using Deduplication, process moment and storage space capability in cloud are …

[PDF][PDF] Smart Security Protocol for Body Area Networks

J Iqbal, N Noor-ul-Amin, AI Umar - “All papers published in the, 2015 - researchgate.net
Secure and authentic patient information communication is pivotal. We proposed an efficient
and secure protocol. It is suitable for securing small amount of in terms of efficiency and …