Cognition and the future of information security

Author(s):  
Sattar B. Sadkhan
Author(s):  
Sachin Upadhyay

The Internet of Things (IoT) opens opportunities for handheld devices, home appliances, and software to share and communicate information on the Internet. Advances in the areas of embedded systems, computing, and networking are leading to an infrastructure composed of millions of heterogeneous devices. These devices will not simply convey information but process it in transit, connect peer to peer, and form advanced collaborations. This “Internet of Things (IoT)” infrastructure will be strongly integrated with the environment. This paper focuses on researching on the architecture and technology of Internet of Things. Moreover, the applications of Internet of Things are interpreted in this paper. We begin with general information security background of IoT and continue on with information security related challenges that IoT will encountered. Finally, we will also point out research directions that could be the future work for the solutions to the security challenges that IoT encounters. The future is Internet of Things, which will transform the real world objects into intelligent virtual objects.


2019 ◽  
Vol 9 (2) ◽  
pp. 50-56
Author(s):  
Potapova Irina

This article presents examples of optimization of IT-infrastructure. Issues of information security at the time of digital economy are discussed. The article lists modern trends of optimization at IT-infrastructure use of bioinformatics knowledge. Examples of cloud services and the use of hybrid clouds are given. The information system of the future is defined. There is an integration of the existing system into a single digital platform and a description is given of ensuring the work of the social bloc of the country. The author defines the software visualizer, which opens unlimited possibilities for manipulating disk resources.


Author(s):  
Laura Lally

In the post-9/11 environment, there has been an increasing awareness of the need for information security. This chapter presents an analysis of the Y2K problem and 9/11 disaster from the perspective of Lally’s extension of Perrow’s Normal Accident Theory and the Theory of High Reliability Organizations. Insights into: 1) how characteristics of current IT infrastructures and organizational cultures make disasters more likely, 2) how organizations can respond to potential threats and mitigate the damage of those that do materialize, and 3) how IT can be used to identify future threats and mitigate their impact in the future, emerge from the analysis.


2008 ◽  
pp. 3419-3432
Author(s):  
Laura Lally

In the post-9/11 environment, there has been an increasing awareness of the need for information security. This chapter presents an analysis of the Y2K problem and 9/11 disaster from the perspective of Lally’s extension of Perrow’s Normal Accident Theory and the Theory of High Reliability Organizations. Insights into: 1) how characteristics of current IT infrastructures and organizational cultures make disasters more likely, 2) how organizations can respond to potential threats and mitigate the damage of those that do materialize, and 3) how IT can be used to identify future threats and mitigate their impact in the future, emerge from the analysis.


Sign in / Sign up

Export Citation Format

Share Document