Security Aspects of Virtualization and Its Impact on Business Information Security

Author(s):  
Fawad Ahmed ◽  
Aqil Burney ◽  
Ahsan Malik

Information security has reliably been a significant issue in data innovation. In the distributed computing condition, it turns out to be especially genuine in light of the fact that the distributed is suitable in better places even in all the globe. Distributed and security insurance are the two fundamental components of client's worries about the cloud innovation. Despite the fact that numerous procedures on the themes in distributed computing have been researched in the two ventures, information security and security assurance are getting progressively significant for the future improvement of distributed computing innovation in government, industry, and business. Information security and protection assurance issues are significant to both equipment and programming in the cloud design. This examination is to survey diverse security methods and difficulties from both programming and equipment angles for ensuring information in the cloud and targets upgrading the information security and protection assurance for the dependable cloud condition. In this paper, we make a relative research examination of the current research work with respect to the information security and security assurance procedures utilized in the distributed computing.


Author(s):  
Yuri Bobbert

This paper examines research methods for designing and engineering a Business Information Security (BIS) artefact. Preventing and responding to cybercrime is becoming an integral part of management practices which are supervised by the Board of Directors (BoD), and it can no longer be perceived as just traditional IT. In order to improve the maturity of business information security a transformation is needed and this requires adequate reporting and dashboarding. Dashboard functions such as the current versus the desired state of the Maturity of Business Information Security (MBIS) reflect certain parameters that boards can influence. Determining the key dashboard functions that reflect these parameters of control was the main motivation for this research paper and the ultimate goal was to engineer a BIS artefact. We propose a research and design method that could be used to establish an experimental dashboard with initial parameters of control based on a Group Support System (GSS) approach. Finally, GSS is evaluated as a method for a) examining which parameters are effective for BIS, from multiple perspectives and b) helping to implement the artefact (make it fit the purpose) as well as the associated business alignment and decision-making.


2014 ◽  
Vol 8 (3) ◽  
pp. 1424-1429
Author(s):  
Syed Hamid Hasan ◽  
Mohamed Salim Trigui ◽  
Anser Ghazzaal Ali Alquraishee

The process of protecting the accessibility,  reliability, and secrecy of information is called Information security. We see a great increase in accessing of computer databases for stored information. Increasing number of companies are storing individual and business information on computers. Most of this information is not meant for the public eyes and is very sensitive. The following paper discusses the development of a block cipher based cryptographic algorithm that uses the logical gates like XOR and other shifting operations. The results of the experiment prove the algorithm to be efficient and secure.


The objective of the work is to propose a formal technique encompassing the logic and the illogic involved in the security of information science. The received or collected information about the existing or past security incidents in business processes is to be identified for their correctness and preciseness. The emphasis on various segments of the information is analyzed as per the intention of the informer and the involvement of the recipient. The expectation and the acceptance of business information is quantitatively modeled so as to take a correct decision with the proposed logics when multiple business processes handling variety of information with different truth factors are collaborated. The logical deduction, abduction and induction techniques are applied to minimize the vagueness and ambiguity factors. The preciseness of the present information and the emphasis of the past information related to security are formally used to predict the reality of future information security incidents in a business scenario.


Author(s):  
Оксана Константиновна Коробкова ◽  
Анна Дмитриевна Гаврилова ◽  
Ирина Константиновна Китаева

В статье рассматриваются промышленный шпионаж как форма недобро-совестной конкуренции, его понятие, методы. В работе сформулированы направления борьбы с промышленным шпионажем. The article deals with industrial espionage as a form of unfair competition, its concept and methods. The paper outlines the ways to combat industrial espionage.


Author(s):  
Yuri Bobbert ◽  
Hans Mulder

Most information security methodologies are aimed at large enterprise organizations with a top-down structure, while relatively smaller organizations have insufficient knowledge to adopt this methodology. Most of the frameworks used by enterprises focus on high-level policy-making and the overwhelming amount of controls might suffocate practitioners in smaller organizations. This article examines the results of an exploratory study, performed in the Netherlands in Q1&Q2 of 2010. The study used expert panel research followed by a survey. The research found essential interventions to easily and effectively increase security maturity for mid market organizations. The research also found barriers for not implementing these interventions by the midmarket. This paper provides a minimum core set of practices for organizations. It shows that mid market organizations struggle with implementing relevant interventions. This research contributes a new pragmatic approach to assist mid market organizations’ practitioners with more guidance on how to effectively establish the desired state of security maturity.


Sign in / Sign up

Export Citation Format

Share Document