IDEAS home Printed from https://ideas.repec.org/h/pkk/meb011/365-378.html
   My bibliography  Save this book chapter

Data security in theory and practice Possibile security holes

Author

Listed:
  • Keszthelyi András

    (Óbuda University)

Abstract

There are no enterprises which would not use computers to fulfill their administrative tasks. Computers became part of everyday administration, or, better to say: they became part of everyday life. This is why our age is called 'information age'. Both the amount of digital data and our dependency from these data has been growing intensively so digital data is high-valued as resource. Data owners and/or managers must, or at least ought to, protect their data from stealing or tampering with. Luckily standard communication protocols and methods have been developed for this purpose, they only ought to be used. If not, that will result in a high level of risk. We, at Óbuda University, have been using a computer based system called Neptun for about ten years to manage the scholar records of the students. In this paper I show some possible motivations and technical solutions why and how one could gain unauthorized access to such a system.

Suggested Citation

  • Keszthelyi András, 2011. "Data security in theory and practice Possibile security holes," Proceedings- 9th International Conference on Mangement, Enterprise and Benchmarking (MEB 2011),, Óbuda University, Keleti Faculty of Business and Management.
  • Handle: RePEc:pkk:meb011:365-378
    as

    Download full text from publisher

    File URL: http://kgk.uni-obuda.hu/sites/default/files/28%20Keszthelyi%20Andras.pdf
    Download Restriction: no
    ---><---

    More about this item

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:pkk:meb011:365-378. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Alexandra Vécsey (email available below). General contact details of provider: https://edirc.repec.org/data/gkbmfhu.html .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.