The Need for Information Security

Author(s):  
Abhishek Chopra ◽  
Mukund Chaudhary
Author(s):  
Michael E. Whitman ◽  
Anthony M. Townsend ◽  
Robert J. Aalberts

As the pervasiveness of networks create a more open set of information systems for the mobile and diverse needs of the organization, increased attention must be paid to the corresponding increase in exposure of those systems to attacks from internal and external sources. The first step to preparing the organization against these threats is the development of a systems security policy which provides instruction for the development and implementation of a security posture, as well as provides guidelines for the acceptable and expected uses of the systems. This chapter provides background support for the need for information security policy, and outlines a sample structure that may be used to develop such a policy.


2013 ◽  
Vol 4 (3) ◽  
pp. 79-88
Author(s):  
Nighat Mir

With the increasing growth in internet use, information has turned into e-information and provides a greater freedom for information sharing. This also brings a greater need for information security by protecting copyrights of online authors. A novel tamper proof web watermarking technique has been proposed in this paper that uses the textual features of different languages. Initially three different languages (English, Urdu and Arabic) have been used in this research for testing and verification, however this idea can be extended to other languages. Watermarks are generated based on language features and further secured by encryption using advanced encryption standard algorithm to ensure another layer of security. Encrypted watermarks have been embedded into HTML page utilizing the structural aspects of markup language. Experimental results have shown that copied information can be recognized by using the proposed system even after modification attacks without requiring the disclosure of watermark information.


Author(s):  
Laura Lally

In the post-9/11 environment, there has been an increasing awareness of the need for information security. This chapter presents an analysis of the Y2K problem and 9/11 disaster from the perspective of Lally’s extension of Perrow’s Normal Accident Theory and the Theory of High Reliability Organizations. Insights into: 1) how characteristics of current IT infrastructures and organizational cultures make disasters more likely, 2) how organizations can respond to potential threats and mitigate the damage of those that do materialize, and 3) how IT can be used to identify future threats and mitigate their impact in the future, emerge from the analysis.


2008 ◽  
pp. 3419-3432
Author(s):  
Laura Lally

In the post-9/11 environment, there has been an increasing awareness of the need for information security. This chapter presents an analysis of the Y2K problem and 9/11 disaster from the perspective of Lally’s extension of Perrow’s Normal Accident Theory and the Theory of High Reliability Organizations. Insights into: 1) how characteristics of current IT infrastructures and organizational cultures make disasters more likely, 2) how organizations can respond to potential threats and mitigate the damage of those that do materialize, and 3) how IT can be used to identify future threats and mitigate their impact in the future, emerge from the analysis.


1998 ◽  
Vol 1998 (8) ◽  
pp. 14-17 ◽  
Author(s):  
Marie A. Wright

Sign in / Sign up

Export Citation Format

Share Document