scholarly journals Information Security Risks in Civil Aviation Network: Classification, Identification and Preventive Strategies

Author(s):  
Lian Ran
2015 ◽  
Vol 11 (4) ◽  
pp. 52-69 ◽  
Author(s):  
Janine L. Spears ◽  
Tonia San Nicolas-Rocca

Community-based organizations (CBOs) in the health and human services sector handle very sensitive client information, such as psychiatric, HIV testing, criminal justice, and financial records. With annual revenue often in the range of $1 to $10 million, these organizations typically lack the financial, labor, and technical resources to identify and manage information security risks within their environment. Therefore, information security risk assessments were conducted at CBOs as part of a university service learning course intended to ultimately improve security within participating CBOs. Knowledge transfer between trainees and trainers is essential in order for security improvements to be realized. Therefore, this paper constructs a theoretical model of knowledge transfer that is used as a lens through which to examine initial study results of the CBO interventions as part of an exploratory study.


Author(s):  
Олександр Євгенійович Архипов ◽  
Андрій Володимирович Скиба ◽  
Олена Іванівна Хоріна

2016 ◽  
Vol 4 (2) ◽  
pp. 255-261
Author(s):  
Volodymyr Mokhor ◽  
Vasyl Tsurkan ◽  
Yaroslav Dorohyi ◽  
Serhii Mykhailov ◽  
Oleksandr Bakalynskyi ◽  
...  

2015 ◽  
Vol 3 (1) ◽  
pp. 60-67
Author(s):  
Volodymyr Mokhor ◽  
Vitalii Bezshtanko ◽  
Serhii Honchar ◽  
Hryhorii Kravtsov ◽  
Ihor Kotsiuba ◽  
...  

Author(s):  
Yushi Shen ◽  
Yale Li ◽  
Ling Wu ◽  
Shaofeng Liu ◽  
Qian Wen

This chapter is about guidance and implementation prepared by the Cloud Security Alliance (CSA) Security as a Service (SecaaS) workgroup, which is made up of users and practitioners in the field of information security. In preparing this implementation guide, input has been sought from experts throughout Europe, the Middle East, and the United States. A lot of professional judgment and experience are applied in the architecture, engineering, and implementation of a Security Information and Event Management (SIEM) guide to ensure that it logs the information necessary to successfully increase visibility and remove ambiguity, surrounding the security events and risks that an organization faces. By providing SIEM as a service under SecaaS, the provider has to be able to accept log and event information, customer information and event feeds, and conduct information security analysis, correlation, and support incident response. By providing flexible real-time access to SIEM information, it allows the party consuming the SIEM service to identify threats acting against their environment cloud. This identification then allows for the appropriate action and response to be taken to protect or mitigate the threat. The simple step of increasing visibility and removing ambiguity is a powerful tool to understanding the information security risks that an organization is facing.


2016 ◽  
Vol 12 (3) ◽  
pp. 1-20
Author(s):  
Eunjung Shin ◽  
Eric W. Welch

Concerns about electronic information security in government have increased alongside increased use of online media. However, to date, few studies have examined the social mechanisms influencing electronic information security. This article applies a socio-technical framework to model how technical, organizational and environmental complexities limit electronic information security perceived by local government managers. Furthermore, it examines to what extent organizational design buffers security risks. Using data from a 2010 national survey of local government managers, this article empirically tests the proposed model in the context of U.S. local government's online media use. Findings show that, in addition to technical complexity, organizational and environmental complexities are negatively associated with local managers' awareness of and confidence in electronic information security. On the other hand, internal security policy and decentralized decision-making appear to buffer security risks and enhance perceived information security.


Sign in / Sign up

Export Citation Format

Share Document