Skip to main content

Part of the book series: Advances in Intelligent Systems and Computing ((AINSC,volume 167))

  • 1238 Accesses

Abstract

Applications are generally designed and developed with little regards to security consideration. Fortunately, there is abundant of processes and technologies today that is available that can be used to easily secure an application while it is in the maintenance phase. In this paper, we have discussed how we can use symmetric and asymmetric cryptography methods and security architecture can be created to protect a system from various cipher attacks after deployment.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Raval, V., Fichadia, A.: Risks, Controls and Security Concepts and Applications. Wiley & Sons, Inc., Hoboken (2007)

    Google Scholar 

  2. Schumacher, R.: How to easily prevent SQL injection attacks [Web log message] (January 25, 2011), Retrieved from http://blogs.enterprisedb.com/2011/01/25/how-to-easily-prevent-sql-injection-attacks/

  3. Stallings, W., Brown, L.: Computer Security Principles and Practice. Pearson Prentice Hall, Upper Saddle River (2008)

    Google Scholar 

  4. Microsoft, MSDN Library (2011a), Retrieved from http://msdn.microsoft.com/en-us/library/

  5. Microsoft, IPSec (2011b), Retrieved from http://technet.microsoft.com/en-us/network/bb531150

  6. The University of Texas at Austin, Windows 2003 Server Hardening Checklist (2009), Retrieved, from http://security.utexas.edu/admin/win2003.html

  7. Acunetix, Audit your website security with Acunetix Web Vulnerability Scanner (2011), Retrieved from http://www.acunetix.com/vulnerability-scanner/

  8. Hewlett-Packard Development Company, L.P., HP WebInspect software (2011), http://www.hp.com/cda/hpms/display/main/hpms_content.jsp?zn=bto&cp=1-11-201-200 ^9570_4000_100__ (retrieved February 19, 2011)

  9. MoRUN.net, Some Types of Attacks on Cryptosystems (2011), Retrieved from http://www.encryptionanddecryption.com/encryption/types_of_attacks.html

  10. National Institute of Standards and Technology, Security Considerations in the System Development Life Cycle (2008), Retrieved from http://csrc.nist.gov/publications/nistpubs/800-64.../SP800-64-Revision2.pdf

  11. Halton, M., Rahman, S.: The Top 10 Best Cloud-Security Practices in Next-Generation Networking. International Journal of Communication Networks and Distributed Systems (IJCNDS); Special Issue on: Recent Advances in Next-Generation and Resource-Constrained Converged Networks 8(½), 70–84 (2012)

    Google Scholar 

  12. Mohr, S., Rahman, S.: IT Security Issues within the Video Game Industry. International Journal of Computer Science & Information Technology (IJCSIT) 3(5) (October 2011)

    Google Scholar 

  13. Dees, K., Rahman, S.: Enhancing Infrastructure Security in Real Estate. International Journal of Computer Networks & Communications (IJCNC) ISSN: 0974-9322 [Online]; 0975- 2293 [Print]

    Google Scholar 

  14. Hood, D., Rahman, S.: IT Security Plan for Flight Simulation Program. International Journal of Computer Science, Engineering and Applications (IJCSEA) 1(5) (October 2011) ISSN: 2230-9616 [Online]; 2231-0088 [Print]

    Google Scholar 

  15. Schuett, M., Rahman, S.: Information Security Synthesis in Online Universities. International Journal of Network Security & Its Applications (IJNSA) 3(5) (September 2011) ISSN: 0974-9330(online); 0975-2307 (Print)

    Google Scholar 

  16. Slaughter, J., Rahman, S.: Information Security Plan for Flight Simulator Applications. International Journal of Computer Science & Information Technology (IJCSIT) 3(3) (June 2011) ISSN: 0975-3826(online); 0975-4660 (Print)

    Google Scholar 

  17. Benson, K., Rahman, S.: Security Risks in Mechanical Engineering Industries. International Journal of Computer Science and Engineering Survey (IJCSES) ISSN: 0976-2760 (Online); 0976-3252 (Print)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to David (DJ) Neal .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag GmbH Berlin Heidelberg

About this paper

Cite this paper

Neal, D.(., Rahman, S.(. (2012). Securing Systems after Deployment. In: Wyld, D., Zizka, J., Nagamalai, D. (eds) Advances in Computer Science, Engineering & Applications. Advances in Intelligent Systems and Computing, vol 167. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-30111-7_65

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-30111-7_65

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-30110-0

  • Online ISBN: 978-3-642-30111-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics