Session

Mechatronics, Robotics, and System Engineering

Description

During the years, the people are more hungry for faster doing processes and works. There always is high possibility for loss business and markets by different attacks in different layers. In this paper is presented which are the challenges faced with information security on businesses during the rapid development IT and Telnet. This challenge requires stable technology, the standard platform and especially policies and rules for implementation security steps through those rapid changes in technology. In the paper are presented some of statistical review about the causes of information damage, which are advantages and weaknesses using new information technology. At the end is presented a model with seven attributes which has impact in information system security for every kind of the business.The paper has descriptive-narrative, statistical and inductive nature.

Keywords:

Developing technologies, telnet security, computer threats, policies, rules

Session Chair

Edmond Hajrizi

Session Co-Chair

Muzafer Shala

Proceedings Editor

Edmond Hajrizi

ISBN

978-9951-437-24-0

First Page

212

Last Page

223

Location

Durres, Albania

Start Date

2-11-2013 4:00 PM

End Date

2-11-2013 4:15 PM

DOI

10.33107/ubt-ic.2013.78

Share

COinS
 
Nov 2nd, 4:00 PM Nov 2nd, 4:15 PM

The development of IT and Telnet and its Impact in Business Security (non Security)

Durres, Albania

During the years, the people are more hungry for faster doing processes and works. There always is high possibility for loss business and markets by different attacks in different layers. In this paper is presented which are the challenges faced with information security on businesses during the rapid development IT and Telnet. This challenge requires stable technology, the standard platform and especially policies and rules for implementation security steps through those rapid changes in technology. In the paper are presented some of statistical review about the causes of information damage, which are advantages and weaknesses using new information technology. At the end is presented a model with seven attributes which has impact in information system security for every kind of the business.The paper has descriptive-narrative, statistical and inductive nature.