International Research journal of Management Science and Technology

  ISSN 2250 - 1959 (online) ISSN 2348 - 9367 (Print) New DOI : 10.32804/IRJMST

Impact Factor* - 6.2311


**Need Help in Content editing, Data Analysis.

Research Gateway

Adv For Editing Content

   No of Download : 95    Submit Your Rating     Cite This   Download        Certificate

SECURITY THREATS IN DATA MINING TOOLS

    2 Author(s):  RISHABH SRIVASTAVA , SANTOSH KUMAR UPADHYAY

Vol -  6, Issue- 10 ,         Page(s) : 53 - 59  (2015 ) DOI : https://doi.org/10.32804/IRJMST

Abstract

Since the early days of writing, politicians, heads of state and military commanders understood that it was necessary to provide some mechanism to protect the confidentiality of written correspondence and to have some means of detecting tampering. Julius Caesar is credited with the invention of the Caesar cipher ca. 50 B.C., which was created in order to prevent his secret messages from being read should a message fall into the wrong hands. World War II brought about much advancement in information security and marked the beginning of the professional field of information security. The end of the 20th century and early years of the 21st century saw rapid advancements in telecommunications, computing hardware and software, and data encryption. The availability of smaller, more powerful and less expensive computing equipment made electronic data processing within the reach of small business and the home user. These computers quickly became interconnected through a network generically called the Internet. Julius Caesar is credited with the invention of the Caesar cipher ca. 50 B.C., which was created in order to prevent his secret messages from being read should a message fall into the wrong hands. World War II brought about much advancement in information security and marked the beginning of the professional field of information security. The end of the 20th century and early years of the 21st century saw rapid advancements in telecommunications, computing hardware and software, and data encryption. The availability of smaller, more powerful and less expensive computing equipment made electronic data processing within the reach of small business and the home user. These computers quickly became interconnected through a network generically called the Internet.

  1. http://www.information-management.com/issues/20031001/7398-1.html
  2. http://technet.microsoft.com/en-us/ library/ cc917548.aspx
  3. http://www.27000.org/iso-27002.htm
  4. “Data Warehouse Control and Security” by  Slemo Warigon, CISA, MBA 
  5. Association of College and University Auditors LEDGER, Vol. 41, No. 2, April 1997; pp. 3-7. Copyright © 1997. (http://www.all.net/books/audit/kits/dw.html)
  6. http://en.wikipedia.org/wiki/Information_security
  7. Perrin, Chad. "The CIA Triad". http://www.techrepublic.com/blog/security/the-cia-triad/488. Retrieved 31 May 2012.

*Contents are provided by Authors of articles. Please contact us if you having any query.






Bank Details