Information security technologies as a commodity input

2005 ◽  
Vol 13 (1) ◽  
pp. 5-15 ◽  
Author(s):  
Andrew Stewart
Author(s):  
O. Semenenko ◽  
Y. Dobrovolsky ◽  
V. Koverga ◽  
O. Sechenev

Evolution of security technologies shows that only the concept of an integrated approach to information security can provide modern information security requirements. A comprehensive approach means the complex development of all the necessary methods and means of information protection. Today, the information exchange and information systems in the Ministry of Defense of Ukraine have certain means and approaches to the destruction of information, but each of them has different estimates of the effectiveness of their use, as well as different cost of their purchase and use. Therefore, the main purpose of the article is to carry out a comprehensive analysis of means of destroying confidential information of methods of its destruction in order to formulate practical recommendations for choosing the most effective and economically feasible for the Ministry of Defense of Ukraine. The perfection of methods and means of destroying information from magnetic media is an important element of modern information security. The results of the analysis carried out in the article are the disclosure of the main features of modern devices for the elimination of magnetic records, as well as the ability to formulate a list of basic requirements for modern devices for the destruction of information from magnetic media. Today, technical means of information security, in particular, the elimination of information on magnetic media, are constantly being improved, absorbing the latest advances in modern security technologies. Their model range, which takes into account the diversity of customer requirements, such as the type of energy supply, the level of mobility, reliability and operating conditions, expands. All this determines the relevance of research topics in this direction in the future.


2005 ◽  
Vol 34 (1) ◽  
pp. 13-18 ◽  
Author(s):  
Khin Than Win

The objective of this study is to answer the research question, ‘Are current information security technologies adequate for electronic health records (EHRs)?’ In order to achieve this, the following matters have been addressed in this article: (i) What is information security in the context of EHRs? (ii) Why is information security important for EHRs? and (iii) What are the current technologies for information security available to EHRs? It is concluded that current EHR security technologies are inadequate and urgently require improvement. Further study regarding information security of EHRs is indicated.


Author(s):  
Е.А. Исаев ◽  
E.A. Isaev

The rapid development of information technology in today's society dictates new requirements for information security technologies of data, methods of remote access and data processing, integrated reduction of financial expenses on working with information. In recent years, the ideal solution to all these problems that is widely suggested is the concept of cloud computing. This technique really makes a number of clear advantages when working with information and is already widely used in a number of areas of scientific and business activities, but many aspects of information security, characteristic of cloud computing is still far from a satisfactory solution. The article discusses the main challenges of information security of cloud computing. A review of methods to ensure data security, the choice of the most secure cloud computing is discussed, and models to provide the method of increasing the security of cloud computing are looked at.


Research ◽  
2021 ◽  
Vol 2021 ◽  
pp. 1-17
Author(s):  
Senyang Liu ◽  
Xiaohu Liu ◽  
Jinying Yuan ◽  
Jie Bao

The issue of information security is closely related to every aspect of daily life. For pursuing a higher level of security, much effort has been continuously invested in the development of information security technologies based on encryption and storage. Current approaches using single-dimension information can be easily cracked and imitated due to the lack of sufficient security. Multidimensional information encryption and storage are an effective way to increase the security level and can protect it from counterfeiting and illegal decryption. Since light has rich dimensions (wavelength, duration, phase, polarization, depth, and power) and synergy between different dimensions, light as the input is one of the promising candidates for improving the level of information security. In this review, based on six different dimensional features of the input light, we mainly summarize the implementation methods of multidimensional information encryption and storage including material preparation and response mechanisms. In addition, the challenges and future prospects of these information security systems are discussed.


Author(s):  
Mariana Hentea

Information security management is the framework for ensuring the effectiveness of information security controls over information resources to ensure no repudiation, authenticity, confidentiality, integrity and availability of the information. Organizations need a systematic approach for information security management that addresses security consistently at every level. However, the security infrastructure of most organizations came about through necessity rather than planning, a reactive-based approach as opposed to a proactive approach (Gordon, Loeb & Lucyshyn, 2003). Intrusion detection systems, firewalls, anti-virus software, virtual private networks, encryption and biometrics are security technologies in use today. Many devices and systems generate hundreds of events and report various problems or symptoms. Also, these devices may all come at different times and from different vendors, with different reporting and management capabilities and—perhaps worst of all—different update schedules. The security technologies are not integrated, and each technology provides the information in its own format and meaning. In addition, these systems across versions, product lines and vendors may provide little or no consistent characterization of events that represent the same symptom. Also, the systems are not efficient and scalable because they rely on human expertise to analyze periodically the data collected with all these systems. Network administrators regularly have to query different databases for new vulnerabilities and apply patches to their systems to avoid attacks. Quite often, different security staff is responsible and dedicated for the monitoring and analysis of data provided by a single system. Security staff does not periodically analyze the data and does not timely communicate analysis reports to other staff. The tools employed have very little impact on security prevention, because these systems lack the capability to generalize, learn and adapt in time.


2015 ◽  
pp. 1436-1455
Author(s):  
Carol Hsu ◽  
Tawei Wang

Given the multifaceted problems and complexities of information security, the manner in which top management teams make investment and management decisions regarding security technologies, policy initiatives, and employee education could have a significant impact on the likelihood of information security breaches in organizations. In the context of information security management, it is not clear from management literature regarding how the characteristics of the top management team are associated with the possibility of information security breaches. The results demonstrate that the average length and heterogeneity of tenure could increase the possibility of breaches. However, age heterogeneity and the size of the top management team are negatively related to such a possibility. In addition, the findings suggest a nonlinear association between average age and tenure and the possibility of security breaches. The authors conclude the chapter with theoretical and practical implications on the organizational and managerial aspects of information security management.


Sign in / Sign up

Export Citation Format

Share Document