Abstract

The recent developments in information technology have made major changes in all fields. The transfer of information through networks has become irreplaceable due to its advantages in facilitating the requirements of modern life through developing methods of storing and distributing information. This in turn has led to an increase in information problems and risks that threaten the security of the institution’s information and can be used in distributed systems environment.
 This study focused on two parts; the first is to review the most important applications of the graph theory in the field of network security, and the second is focused on the possibility of using the Euler graph as a Method Object that is employed in Remote Method Invocation (RMI) technique. This algorithm was compared with the most popular algorithms, such as RSA and 3DES. The results were acceptable and need to be improved in the future.

Highlights

  • Information is one of the most important parts of an organization

  • Information technology (IT) security is based on four procedures of the organization that protects the organization's ability to operate, enable secure operation of applications employed on the organization's IT systems, protect and use the data collected by the institutions, and protect the technology assets used in an organization

  • The results show that each encryption algorithm has its own strengths and weaknesses

Read more

Summary

Introduction

Information is one of the most important parts of an organization. Its protection and preservation are essential and need to be periodically provided with strong and non-porous security. Information security consists of a combination of systems, processes and internal controls that provide assurance of the integrity and confidentiality of data and operating procedures in the organization. Providing these components has become increasingly complex and expensive. There are challenges and risks that involve the security of IT applied in the institutions, especially in encryption [2]. For this reason, there has been a need to introduce other techniques such as graph theory

Methods
Results
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call