Session
Mechatronics, Robotics, and System Engineering
Description
During the years, the people are more hungry for faster doing processes and works. There always is high possibility for loss business and markets by different attacks in different layers. In this paper is presented which are the challenges faced with information security on businesses during the rapid development IT and Telnet. This challenge requires stable technology, the standard platform and especially policies and rules for implementation security steps through those rapid changes in technology. In the paper are presented some of statistical review about the causes of information damage, which are advantages and weaknesses using new information technology. At the end is presented a model with seven attributes which has impact in information system security for every kind of the business.The paper has descriptive-narrative, statistical and inductive nature.
Keywords:
Developing technologies, telnet security, computer threats, policies, rules
Session Chair
Edmond Hajrizi
Session Co-Chair
Muzafer Shala
Proceedings Editor
Edmond Hajrizi
ISBN
978-9951-437-24-0
First Page
212
Last Page
223
Location
Durres, Albania
Start Date
2-11-2013 4:00 PM
End Date
2-11-2013 4:15 PM
DOI
10.33107/ubt-ic.2013.78
Recommended Citation
Tahiraj, Musa, "The development of IT and Telnet and its Impact in Business Security (non Security)" (2013). UBT International Conference. 78.
https://knowledgecenter.ubt-uni.net/conference/2013/all-events/78
Included in
The development of IT and Telnet and its Impact in Business Security (non Security)
Durres, Albania
During the years, the people are more hungry for faster doing processes and works. There always is high possibility for loss business and markets by different attacks in different layers. In this paper is presented which are the challenges faced with information security on businesses during the rapid development IT and Telnet. This challenge requires stable technology, the standard platform and especially policies and rules for implementation security steps through those rapid changes in technology. In the paper are presented some of statistical review about the causes of information damage, which are advantages and weaknesses using new information technology. At the end is presented a model with seven attributes which has impact in information system security for every kind of the business.The paper has descriptive-narrative, statistical and inductive nature.