ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

THE BEHAVIOR OF DATABASES IN MAINTAINING THE SECURITY OF DATA TRANSFERRED BETWEEN TWO COMMUNICATION POINTS

Journal: International Journal of Civil Engineering and Technology (IJCIET) (Vol.9, No. 1)

Publication Date:

Authors : ;

Page : 126-139

Keywords : Information systems; data exchange; data classification; data encryption; ports.;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Keeping and controlling the security and confidentiality of database information is very important in the modern era as long as there are a lot of means of penetration, espionage, and access to data on the Internet. The importance of database security is more important than the importance of data to be protected. There are many ways and means of security that help maintain the security of information and encryption to the level that meets the requirements of database security. It is well known that each facility or department has its own policy to protect its data from theft or damage in proportion to the size and type of data in addition to the hand that operates on such data and that the information security situation is in line with the establishment of the database. In this paper, an encryption algorithm for network-transferred data is designed between two communication points, This algorithm was designed to be very complex. It is impossible to break its code, using a mixture of symmetric and asymmetric cryptographic algorithms to develop an algorithm to generate a complex and randomly generated cryptographic key this makes data transmitted over two network points secure to a high degree

Last modified: 2018-05-22 17:39:19