Abstract
The recent developments in information technology have made major changes in all fields. The transfer of information through networks has become irreplaceable due to its advantages in facilitating the requirements of modern life through developing methods of storing and distributing information. This in turn has led to an increase in information problems and risks that threaten the security of the institution’s information and can be used in distributed systems environment.
 This study focused on two parts; the first is to review the most important applications of the graph theory in the field of network security, and the second is focused on the possibility of using the Euler graph as a Method Object that is employed in Remote Method Invocation (RMI) technique. This algorithm was compared with the most popular algorithms, such as RSA and 3DES. The results were acceptable and need to be improved in the future.
Highlights
Information is one of the most important parts of an organization
Information technology (IT) security is based on four procedures of the organization that protects the organization's ability to operate, enable secure operation of applications employed on the organization's IT systems, protect and use the data collected by the institutions, and protect the technology assets used in an organization
The results show that each encryption algorithm has its own strengths and weaknesses
Summary
Information is one of the most important parts of an organization. Its protection and preservation are essential and need to be periodically provided with strong and non-porous security. Information security consists of a combination of systems, processes and internal controls that provide assurance of the integrity and confidentiality of data and operating procedures in the organization. Providing these components has become increasingly complex and expensive. There are challenges and risks that involve the security of IT applied in the institutions, especially in encryption [2]. For this reason, there has been a need to introduce other techniques such as graph theory
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have