A high availability clustering and load balacing mechanism for information security infrastructure system

Author(s):  
Si-Choon Noh ◽  
Jeom-Goo Kim
Author(s):  
Viacheslav Politanskyi ◽  
Dmytro Lukianov ◽  
Hanna Ponomarova ◽  
Oleh Gyliaka

The article examines the characteristics of the functioning of information security in the e-government system, a phenomenon that is only possible based on the development of the information security infrastructure. The authors analyze information security as a key element of the concept of e-government, as well as various interpretations and ways of explaining the concept of information security. The research team's approach to the definition of the concept of information security is formed from the deep understanding of this concept, in terms of general theoretical analysis. Topics, objects, functions, types, principles, forms, levels of provision and structural elements of information security are studied. It is concluded that the organization of modern computer security of the State is undoubtedly a complex, systemic and multilevel phenomenon, whose state, dynamics, and perspectives are directly influenced by many external and internal factors, the most important being the political situation. In the world the presence of possible external and internal threats; state and level of development of information and communication of the country and internal political situation, among other aspects.


2015 ◽  
Vol 7 (1) ◽  
pp. 69-84 ◽  
Author(s):  
Yi Jie Tong ◽  
Wei Qi Yan ◽  
Jin Yu

With an increasing number of personal computers introduced in schools, enterprises and other large organizations, workloads of system administrators have been on the rise due to the issues related to energy costs, IT expenses, PC replacement expenditures, data storage capacity, and information security, etc. However, Application Virtualization (AV) has been proved as a successful cost-effective solution to solve these problems. In this paper, the analytics of a Virtual Desktop Infrastructure (VDI) system will be taken into consideration for a campus network. Our developed system will be introduced and justified. Furthermore, the rationality for these improvements will be introduced.


2010 ◽  
Vol 12 (2) ◽  
pp. 16-30 ◽  
Author(s):  
Varadharajan Sridhar

WirelessComSoft, a software company based in India, provided research and development outsourcing support in an Intellectual Property strong wireless communication products and services space. Over a period, WirelessComSoft developed a robust information security infrastructure and complied with industry standard auditing procedures. However, implementing information security across its different world-wide sites, updating it in tune with evolving user needs, deploying robust business continuity architecture, and maintaining logical and physical isolation of clients’ off-shore development centers were challenges that WirelessComSoft’s security implementation team grappled with every day. The case presents how information security infrastructure at WirelessComSoft evolved, the challenges faced and the methods implemented by the information security team to overcome these challenges.


Author(s):  
Mariana Hentea

Information security management is the framework for ensuring the effectiveness of information security controls over information resources to ensure no repudiation, authenticity, confidentiality, integrity and availability of the information. Organizations need a systematic approach for information security management that addresses security consistently at every level. However, the security infrastructure of most organizations came about through necessity rather than planning, a reactive-based approach as opposed to a proactive approach (Gordon, Loeb & Lucyshyn, 2003). Intrusion detection systems, firewalls, anti-virus software, virtual private networks, encryption and biometrics are security technologies in use today. Many devices and systems generate hundreds of events and report various problems or symptoms. Also, these devices may all come at different times and from different vendors, with different reporting and management capabilities and—perhaps worst of all—different update schedules. The security technologies are not integrated, and each technology provides the information in its own format and meaning. In addition, these systems across versions, product lines and vendors may provide little or no consistent characterization of events that represent the same symptom. Also, the systems are not efficient and scalable because they rely on human expertise to analyze periodically the data collected with all these systems. Network administrators regularly have to query different databases for new vulnerabilities and apply patches to their systems to avoid attacks. Quite often, different security staff is responsible and dedicated for the monitoring and analysis of data provided by a single system. Security staff does not periodically analyze the data and does not timely communicate analysis reports to other staff. The tools employed have very little impact on security prevention, because these systems lack the capability to generalize, learn and adapt in time.


Author(s):  
Stephen Kwamena Aikins

This chapter discusses the security risks and management implications for the use of information technology to manage urban and regional planning and development processes. The advancement in GIS technology and planning support systems has provided the opportunity for planning agencies to adopt innovative processes to aid and improve decision-making. Although studies show that a number of impediments to the widespread adoption these technologies exist, emerging trends point to opportunities for the integration of planning supporting systems with various models to help estimate urban growth, environmental, economic and social impact, as well as to facilitate participatory planning. At the same time, information security infrastructure and security preparedness of most public agencies lag behind vulnerabilities. Drawing on the literature on planning, e-planning and information security, the author argues that the emergence of e-planning as an efficient approach to urban planning and development also poses enormous security challenges that need to be managed to ensure integrity, confidentiality and availability of critical planning information for decision-making.


Author(s):  
Blessing Maumbe ◽  
Vesper T. Owei

Information security risks are a major threat to South Africa’s bid to build a broad-based information society. The integration of information security in e-government is no longer an option, but an imperative given the resulting “information overload” and the need to filter “good” from “bad” information. Unless South Africa integrates information security in its e-government development policy and practices, the acclaimed benefits of e-government will not be realized. The moral hazard problems arising from bad information behavior such as human manipulation, withholding information, unauthorized access, and violation of individual privacy and confidentiality heightens the need to combat info-security risks and vulnerabilities. South Africa’s readiness to deal with the information security risks has come under scrutiny. The information security infrastructure in South Africa is also not clearly understood. This chapter examines South Africa’s information security landscape and describes how institutional and agency coordination could help improve information security in e-government.


Author(s):  
Francisco Parrilla Ayuso ◽  
David Batista ◽  
Daniel Maldonado ◽  
Jon Colado ◽  
Sergio Jiménez Gómez ◽  
...  

Indra Sistemas S.A. have designed and developed a safety and secure solution system for the rail transportation environment based on a distributed architecture under the domain of the Industrial IoT that enables V2V, V2I, and I2I communications, allowing peer-to-peer data sharing. UPM has designed and implemented a HW-based security infrastructure for extreme edge devices in IoT. The implementation takes advantage of HW accelerator to enhance security in low resources devices with a very low overhead in cost and memory footprint. Current security solutions are problematic due to centralized control entity. The complexity of this kind of system resides in the management, in a decentralized way, of the security at each point of the distributed architecture. This chapter describes how the system secures all the infrastructure based on a distributed architecture without affecting the throughput and the high availability of the data in order to get a top-performance, in compliance with the strengthen safety and security constrains of the rail environment's regulations.


Sign in / Sign up

Export Citation Format

Share Document