Securing Systems after Deployment

Conference paper
Part of the Advances in Intelligent Systems and Computing book series (volume 167)


Applications are generally designed and developed with little regards to security consideration. Fortunately, there is abundant of processes and technologies today that is available that can be used to easily secure an application while it is in the maintenance phase. In this paper, we have discussed how we can use symmetric and asymmetric cryptography methods and security architecture can be created to protect a system from various cipher attacks after deployment.


System Security Cryptography Security Architecture Database Security Application Security Cipher Attacks deployment software maintenance 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Raval, V., Fichadia, A.: Risks, Controls and Security Concepts and Applications. Wiley & Sons, Inc., Hoboken (2007)Google Scholar
  2. 2.
    Schumacher, R.: How to easily prevent SQL injection attacks [Web log message] (January 25, 2011), Retrieved from
  3. 3.
    Stallings, W., Brown, L.: Computer Security Principles and Practice. Pearson Prentice Hall, Upper Saddle River (2008)Google Scholar
  4. 4.
    Microsoft, MSDN Library (2011a), Retrieved from
  5. 5.
    Microsoft, IPSec (2011b), Retrieved from
  6. 6.
    The University of Texas at Austin, Windows 2003 Server Hardening Checklist (2009), Retrieved, from
  7. 7.
    Acunetix, Audit your website security with Acunetix Web Vulnerability Scanner (2011), Retrieved from
  8. 8.
    Hewlett-Packard Development Company, L.P., HP WebInspect software (2011),^9570_4000_100__ (retrieved February 19, 2011)
  9. 9., Some Types of Attacks on Cryptosystems (2011), Retrieved from
  10. 10.
    National Institute of Standards and Technology, Security Considerations in the System Development Life Cycle (2008), Retrieved from
  11. 11.
    Halton, M., Rahman, S.: The Top 10 Best Cloud-Security Practices in Next-Generation Networking. International Journal of Communication Networks and Distributed Systems (IJCNDS); Special Issue on: Recent Advances in Next-Generation and Resource-Constrained Converged Networks 8(½), 70–84 (2012)Google Scholar
  12. 12.
    Mohr, S., Rahman, S.: IT Security Issues within the Video Game Industry. International Journal of Computer Science & Information Technology (IJCSIT) 3(5) (October 2011)Google Scholar
  13. 13.
    Dees, K., Rahman, S.: Enhancing Infrastructure Security in Real Estate. International Journal of Computer Networks & Communications (IJCNC) ISSN: 0974-9322 [Online]; 0975- 2293 [Print]Google Scholar
  14. 14.
    Hood, D., Rahman, S.: IT Security Plan for Flight Simulation Program. International Journal of Computer Science, Engineering and Applications (IJCSEA) 1(5) (October 2011) ISSN: 2230-9616 [Online]; 2231-0088 [Print]Google Scholar
  15. 15.
    Schuett, M., Rahman, S.: Information Security Synthesis in Online Universities. International Journal of Network Security & Its Applications (IJNSA) 3(5) (September 2011) ISSN: 0974-9330(online); 0975-2307 (Print)Google Scholar
  16. 16.
    Slaughter, J., Rahman, S.: Information Security Plan for Flight Simulator Applications. International Journal of Computer Science & Information Technology (IJCSIT) 3(3) (June 2011) ISSN: 0975-3826(online); 0975-4660 (Print)Google Scholar
  17. 17.
    Benson, K., Rahman, S.: Security Risks in Mechanical Engineering Industries. International Journal of Computer Science and Engineering Survey (IJCSES) ISSN: 0976-2760 (Online); 0976-3252 (Print)Google Scholar

Copyright information

© Springer-Verlag GmbH Berlin Heidelberg 2012

Authors and Affiliations

  1. 1.Capella UniversityMinneapolisUSA
  2. 2.Dept. of Computer Science & Engg.University of Hawaii-HiloHiloUSA

Personalised recommendations