Contemporary Authentication Access Approach for High Security Information Systems

Author(s):  
Emiliya Dimitrova ◽  
Dragomira Dimitrova ◽  
Vasil Dimitrov ◽  
Ventsislav Trifonov
Author(s):  
Luís Enrique Sánchez ◽  
Antonio Santos-Olmo ◽  
Eduardo Fernandez-Medina ◽  
Mario Piattini

The information society is increasingly more dependent upon Information Security Management Systems (ISMSs), and the availability of these systems has become crucial to the evolution of Small and Medium-size Enterprises (SMEs). However, this type of companies requires ISMSs which have been adapted to their specific characteristics, and these systems must be optimized from the point of view of the resources necessary to deploy and maintain them. Over the last 10 years, the authors have obtained considerable experience in the establishment of ISMSs, and during this time, they have observed that the structure and characteristics of SMEs as regards security management are frequently very similar (since they can all be grouped by business size and sector), thus signifying that it is possible to construct patterns for ISMSs that can be reused and refined. In this chapter, the authors present the strategy that they have designed to manage and reuse security information in information system security management. This strategy is framed within a methodology designed for integral security management and its information systems maturity, denominated as “Methodology for Security Management and Maturity in Small and Medium-size Enterprises (MSM2-SME),” and it is defined in a reusable model called “Reusable Pattern for Security Management (RPSM),” which systematically defines, manages, and reuses the aforementioned methodology through a sub-process denominated as “Generation of Security Management Patterns (GSMP).” This model is currently being applied in real cases, and is thus constantly improving.


Author(s):  
Christopher G. Reddick

This chapter examines homeland security information systems (HSIS) with a focus on local governments. Local governments are typically the first at the scene when responding to an emergency or a terrorist attack. The most notable incidents are Hurricane Katrina and the terrorist attacks of September 11, 2001. In both of these incidents the first responders were the local governments, which faced dual issues of communication and information sharing. It is important to understand the current level of preparedness and use of HSIS in local governments. This chapter tries to discern the relative priority of HSIS compared to other priorities of local governments in the realm of homeland security. This chapter first outlines some background information on local governments with respect to their organizational structure and level of homeland security preparedness. The second section outlines the stages of e-government adoption, which is commonly discussed in the local e-government literature. Third, there is a discussion of homeland security information sharing between the federal, state, and local governments. There is some evidence presented from existing surveys of the impact of HSIS on local governments. Finally, there is survey results presented from a study conducted by the International City/ County Management Association (ICMA) on homeland security preparedness. This survey information is used to determine where HSIS fits into local priorities on homeland security.


Author(s):  
Christopher G. Reddick

This chapter focuses on Homeland Security Information Systems (HSIS) in the federal government. One definition of HSIS, in the federal government, is the application of information technology to homeland security with the aim of detecting fragmented clues, assembling them as a puzzle, then using the information to stop a terrorist attack (Nunn, 2005). Nunn’s definition focuses on the use of information for data mining for deducing possible terrorist attacks and responses to these incidents. This chapter recognizes the importance of data analysis, but uses a broader definition of federal HSIS being the use of information systems to prepare for and respond to a terrorist attack or significant national emergency. This definition of HSIS covers the importance of data mining to discover how information fits together as pieces of the puzzle, but it also incorporates other elements of information technology (IT) that are used to respond and prepare for a national incident. This chapter will first examine the Department of Homeland Security which has a tremendous influence over homeland security policy and information systems in the United States. There is an examination in this chapter of the environmental context of HSIS in the federal government, demonstrating some of the important pieces of legislation that have an influence in this area. This chapter discusses the roles and responsibilities of federal government Chief Information Officers (CIOs) to discern the scope of their responsibilities. A section of this chapter examines some principles of effective IT management in federal agencies. The final part of this chapter provides the results of a survey of CIOs in federal government departments/agencies to determine the influence of HSIS on their organizations.


Sign in / Sign up

Export Citation Format

Share Document