Open Access Open Access  Restricted Access Subscription or Fee Access

Study & Analysis of Security Attributes in Windows Operating Systems

Dr. Harsh Vikram Singh

Abstract


Information and Communication Technology (ICT) revolution over the past two decades has been facilitated multimedia data transfer over commonly available public domain open channel networks. Such public domain network environment is open to all across the world and thus demands security measures to ensure multimedia data confidentiality, authenticity, and integrity to the intended recipient. Organizations of all sizes want secure network connectivity to their business data and applications. The need to connect and collaborate with partners, customers, and remote/mobile employees anytime and anywhere has expanded network connectivity requirements beyond traditional wired LANs to include dial-up remote access, virtual private networks (VPNs), as well as Wi-fi, WiMAX and other wireless networks. This paper discuss the commonly used Windows operating systems for enabling superior access to the open networks and other related issues like security, management complexity, and cost.

Keywords


Information Security, Security Threats, Microsoft Windows Operating Systems, Right Management.

Full Text:

PDF

References


Harsh Vikram Singh, A. K. Singh, and Anand Mohan, “Minimizing Security Threats in Multimedia Systems”, Proc. of 2nd IEEE International Conference on Distributed Framework for Multimedia Applications, pp. 1-5, Penang, Malaysia, 2006.

Available: http://technet.microsoft.com/en-s/library

K. Sangani, “Review - living with windows vista,” IEEE Engineering & Technology, pp. 52 – 54, Vol.1, Aug. 2006.

L.N. Kumar and C Douligeris, “Demand and service matching at heavy loads: a dynamic bandwidth control mechanism for DQDB MANs,” IEEE Transactions on Communications, pp. 1485-1495, Vol. 44, 1996.

S.S. Kohali et al. “The impact of wireless LAN security on performance of different Windows operating systems,” Proc. of IEEE Symposium on Computers and Communications-2008, pp. 260- 264, July 2008.

D.R. Hayes, D.R. and S. Qureshi, “A framework for computer forensics investigations involving Microsoft Vista” IEEE Long Island Systems, Applications and Technology Conference, pp. 1-8, May 2008.

http: www.technet.microsoft.com/en-us/library/cc507844.aspx

S. Al-Khayatt et al. “A study of encrypted, tunneling models in virtual private networks,” Proc of IEEE International Conference on Information Technology: Coding and Computing, pp.139 – 143, April 2002.

Routing and Remote Access Service (Remote Access), Windows Server 2003 Networking Recipes ,Chapter 4, pp. 141-189, Springer publication, 2006.

Kyle Schurman, Hard HAT AREA, “X-ray Vision: Virus Penetration,” Computer Power User Artical.

S. Narayan et. al. “The Influence of Wireless 802.11g LAN Encryption Methods on Throughput and Round Trip Time for Various Windows Operating Systems,” 6th IEEE Annual Conference on Communication Networks and Services Research Conference - 2008, pp.171-175, May 2008.

Internet Authentication Service, Windows Server 2003 Networking Recipes, Chapter 6, pp. 243-287, Springer publication, 2006.

J. Nam et. al. “Load modulation power amplifier with lumped-element combiner for IEEE 802.11b/g WLAN applications,” Electronics Letters, pp. 24-50, Vol. 42, January 2006.

K. Sangani, “Lucky seven?” IEEE Engineering & Technology, pp. 32-33, Vol. 4, March 2009.




DOI: http://dx.doi.org/10.36039/AA032011009

Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.