Data Governance on EA Information Assets: Logical Reasoning for Derived Data

Author(s):  
Bernhard Waltl ◽  
Thomas Reschenhofer ◽  
Florian Matthes
2011 ◽  
Author(s):  
Oshin Vartanian ◽  
Ann Nakashima ◽  
Fethi Bouak ◽  
Ingrid Smith ◽  
Joseph Baranski ◽  
...  

2019 ◽  
Vol 1 (2) ◽  
pp. 25-33
Author(s):  
Mei Ling Phang ◽  
Swee Huay Heng

Information sharing has become prevalent due to the expansion of social networking in this 21st century. However, electronic devices are vulnerable to various kinds of attacks. Information might be disclosed, modified and accessed by an unauthorised third party which consequently leads to the breach of confidentiality, integrity and availability of the information. Therefore, it is of utmost importance to employ the technology of cryptography and steganography to protect information assets. Cryptography and steganography have weaknesses when they are working alone. Therefore, crypto-steganography, the combination of cryptography and steganography are introduced to overcome the weaknesses in order to provide a double layer of security and protection. This paper provides a general overview of steganography and cryptography as well as a comparison analysis of different crypto-steganographic schemes. A secure crypto-steganographic system for healthcare is then developed with the implementation and integration of the secure crypto-steganographic scheme proposed by Juneja and Sandhu. This healthcare system enables users to store and deliver message in a more secure way while achieving the main goals of both cryptography and steganography.


2019 ◽  
Vol 41 (2) ◽  
pp. 75-106
Author(s):  
Sunyoung Kim ◽  
Byungwoong Kwon

Author(s):  
Judith Barlaan

Information security is imperative for state colleges and universities (SUCs) to have a sound information security in protecting their information assets, enhancing institutional reputation and ensuring compliance with the law. This paper presents the level of implementation of information security in the state colleges and universities (SUCs) in the Philippines. Data  used  was  based  on questionnaire adapted from the Information Security Governance (ISG) Assessment Tool for Higher Education(EDUCAUSE/Internet2 Security Task 2004) and was  distributed  to  a  total  of  30  individuals  who  are  responsible  in managing and keeping  the  information assets of the SUCS. Findings revealed that information security is not yet fully implemented among the SUCS, this is a clear indication of failure or disaster, and these institutions are vulnerable to information security threats. SUCs are encouraged to implement comprehensive information security program at a strategic level involving the board of regents and top executives for safety and security.


2020 ◽  
pp. I-VIII
Author(s):  
Kristin Weber ◽  
Christiana Klingenberg
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document