الأحد 22 ,ذو القعدة 1428

Sunday  02/12/2007

مجلة الاتصالات والعالم الرقمي العدد 234

Telecom & Digital World Magazine Issue 234

 
موقع الجزيرة بريدنا الإلكتروني الإعلانات أرشيف الصفحة الرئيسية

conferences

New Framework for Advanced Network Intrusion Detection
Shahrin Sahib / Mohd Faizal Abdollah / Asrul Hadi Yaacob

As a network grows in size and complexity, vulnerabilities within local area and wide area network increase and become more problematic. In addition, popularity of intrusion tools and script also make it easier for anyone to launch an attack to any unguarded machines. Before an attacker is able to compromise a specific machine, valuable information

 

Losses Affecting Free space Optical Communication System
Prof. Yas M. Al-Hadithi *

In this research project we are concentrating on investigating the losses affecting a Free Space Optical communication system, which is considered as a very secure communication system. Losses are mainly atmospheric attenuation and geometric losses. The several types of atmospheric attenuation: absorption, scattering and scintillations are introduced.

 

Enabling Security Systems for Organizations
Saleh Al-Zahrani / Pit. Pichappan

Increasing information security threads lead the Information Technology Systems to the strategic level. The organizationsص information systems need be protected from many possible attacks such as computer viruses, trojans, worms, and other debilitating networked-based attacks. Consequently, it is imperative that technologies be examined and adopted

 

The Message as Vehicle, Sign, and Content
Juan Jose Santander

The purpose of this paper is to consider the information and its bearing and implications in matters concerning security rather than the technological angle of information but instead.The appreciation of the message, taken as the essence of information in any of its aspects, seeing it as a vehicle, means that it is always carrying something with an

 

Challenges of Security in Modern Economics
Dr. Charles Saint-Prot.*

The development of information technology threats the security of the persons, the companies and the states. It increases the potential vulnerabilities. New technologies mean so new threats. These technologies can lead to hegemonic uses and facilitate illegal, secret or coercive activities led by governments to have access without authorization to

 

Fraudulent Transactions in e-Payment Systems
Ezz Hattab* Adnan Al-Khatib*

Fraud can be described as a dishonest action to make a false statement in order to gain money or benefit from an individual or from an organization. It is also known as a scam or, more elegantly, as an economic offense. By any definition, it is a crime, which in the e-commerce network environment may cost businesses billions of dollars a year.Fraud

 

Towards A Working Model
Lahouari Ghouti and Jarallah S. Al-Ghamdi

In todays world people lives and country well-being are dependent on complex strategic infrastructure. Such infrastructure is called Critical infrastructure. Critical infrastructure includes systems, facilities, and assets so vital that if destroyed or incapacitated would disrupt the security, economy, health, safety, or welfare of the public. Critical

 

New Forms of War, New Forms of Intelligence
Alessandro Zanasi

Many countries IT infrastructure has undergone a dramatic transformation over the last decade. Explosive growth in the use of networks to connect various IT systems has made it relatively easy to obtain information, to communicate, and to control these systems across great distances. Because of the tremendous productivity gains and new capabilities

 

Tools to Trace Spoofed Email
*Hadeel Ismail *Hana Al-Nuaim

Spam and spoofed emails have become a part of the daily reality delivered as messages to a persons inbox. Spam has become a profitable enterprise for many marketers and is a point of contention for those who receive it. However, spoofed email has become more than just a nuisance; it is a viable security threat to individual home users, organizations,

 

Custodian of the Two Holy Mosques Inaugurates ITNS Conference

Under the patronage of the Custodian of the Two Holy Mosques King Abdullah bin Abdul Aziz, the Information Technology and Security Conference started its works yesterday in Riyadh. Organized by the Saudi General Intelligence Presidency (GIP), the four day conference will take place at King Fahad Cultural Center. The topics to be discussed lie under

 

IT Plays an Indispensable Role in Security
Roland Kaschek*

Security indicates something - an asset - is, or may be, protected from a danger. For a discussion of homeland security one needs to identify the class of potential assets that might be endangered and the potential dangers that might be relevant. This paper argues that IT has to play an indispensable role in homeland security, that, however, homeland

 

HRH Prince Muqrin at a Press Conference:
We ought to be Participants in the Digital Knowledge

The Custodian of the Two Holy Mosques King Abdullah bin Abdul Aziz is patronizing the Information technology and National Security Conference (ITNSC) which is organized by the General Intelligence Presidency (GIP) during the period from 21 to 24/11/1428, being 1 to 4/12/2007. The GIP president HRH Prince Muqrin bin Abdul Aziz said the conference aims

 
 

صفحات العدد

متابعة

أخبارهم

ألعاب

بانوراما

الافتتاحية

هاكرز

رؤى

Panorama

مؤتمرات

إعلان

conferences

 

خدمات الجزيرة

الإعلانات

الإشتراكات

الأرشيف

البحث

جوال الجزيرة

كتاب وأقلام

الطقس

للاتصال بنا

 

اصدارات الجزيرة