scholarly journals Reasons in Support of Data Security and Data Security Management as Two Independent Concepts: A New Model

2016 ◽  
Vol 10 (1) ◽  
pp. 4-10 ◽  
Author(s):  
Hamid Moghaddasi ◽  
Samad Sajjadi ◽  
Mehran Kamkarhaghighi

Introduction:Any information which is generated and saved needs to be protected against accidental or intentional losses and manipulations if it is to be used by the intended users in due time. As such, information managers have adopted numerous measures to achieve data security within data storage systems, along with the spread of information technology.Background:The “data security models” presented thus far have unanimously highlighted the significance of data security management. For further clarification, the current study first introduces the “needs and improvement” cycle; the study will then present some independent definitions, together with a support umbrella, in an attempt to shed light on the data security management.Findings:Data security focuses on three features or attributes known as integrity, identity of sender(s) and identity of receiver(s). Management in data security follows an endless evolutionary process, to keep up with new developments in information technology and communication. In this process management develops new characteristics with greater capabilities to achieve better data security. The characteristics, continuously increasing in number, with a special focus on control, are as follows: private zone, confidentiality, availability, non-repudiation, possession, accountability, authenticity, authentication and auditability.Conclusion:Data security management steadily progresses, resulting in more sophisticated features. The developments are in line with new developments in information and communication technology and novel advances in intrusion detection systems (IDS). Attention to differences between data security and data security management by international organizations such as the International Standard Organization (ISO), and International Telecommunication Union (ITU) is necessary if information quality is to be enhanced.

Cloud computing is undergoing a perpetual advancement and new developments through distributed computing approaches and implementation of advanced virtualization technologies within the framework of recent powerful computing and web management systems. As Cloud computing evolves, the organizations can manage their data with small operational expenses. With the use of web services, cloud computing allows access to ubiquitous data storage and utilization of resources. On the other hand, the benefits of cloud computing come along with issues and challenges such as data security, reliability and availability of the resources in the cloud. In this paper, we present the design of a secure Resource Management System to monitor and control the geographically distributed resources in various segments under the enterprise scenario.


2014 ◽  
Vol 908 ◽  
pp. 509-512
Author(s):  
Wei Jiang ◽  
Feng Yang

Internet of things (IOT) has become an important trend in the development of information technology. How to deal with huge amounts of internet data is becoming more and more important. In this paper, we have a further research in the technology of applied-information about mass content of network data security processing model. This model is mainly composed of massive internet of data acquisition, data storage, based on the rules of mass data processing and data security management, etc. The model can be applied to all kinds of massive internet data monitoring system based on rules, such as: the lake water quality monitoring system based on Internet of things, PM2.5 monitoring system, and so on.


2022 ◽  
Vol 12 (2) ◽  
pp. 800
Author(s):  
Yunong Zhang ◽  
Anmin Zhang ◽  
Dianjun Zhang ◽  
Zhen Kang ◽  
Yi Liang

Since the e-Navigation strategy was put forward, various countries and regions in the world have researched e-Navigation test platforms. However, the sources of navigation data are multi-source, and there are still difficulties in the unified acquisition, processing, analysis and application of multi-source data. Users often find it difficult to obtain the required comprehensive navigation information. The purpose of this paper is to use e-Navigation architecture to design and develop maritime data security management platform, strengthen navigation safety guarantee, strengthen Marine environment monitoring, share navigation and safety information, improve the ability of shipping transportation organizations in ports, and protect the marine environment. Therefore, this paper proposes a four-layer system architecture based on Java 2 Platform Enterprise Edition (J2EE) technology, and designs a unified maritime data storage, analysis and management platform, which realizes the intelligent, visualized and modular management of maritime data at shipside and the shore. This platform can provide comprehensive data resource services for ship navigation and support the analysis and mining of maritime big data. This paper expounds on the design, development scheme and demonstration operation scheme of the maritime data security management platform from the system structure and data exchange mode.


2020 ◽  
Author(s):  
Dedy Agung Prabowo ◽  
Ujang Juhardi ◽  
Bambang Agus Herlambang

Recently, Information technology develops rapidly. It is possible for us to get some informationquickly, properly and efficiently. The information technology also has many advantages fo r people. Theneed for information is increasing according to the need of its users. This proves that informationtechnology can make our job easier and it can help us to save our time particularly for the job thatrelated to information and data processin g. With the increasing use of computer technology today, italso brings up some problems. One of them is security and confidentiality problem which is animportant aspect in an information system. Data security is an important thing in maintaining theconf identiality of particular data that only can be known by those who have right. RC6 is a symmetrickey algorithm which encrypts 128 bit plaintext blocks to 128 bit ciphertext blocks. The encryptionprocess involves four operations which is the critical arit hmetic operation of this block cipher. As alegal state, Indonesia has issued a regulation in a form of laws governing information and electronictransaction or commonly referred to UU ITE. Besides, Islam is a religion that comprehensively givesthe guidan ce of life for people. Islam has provided guidance in the various fields ranging from social,politics, economics and various other fields.


Sign in / Sign up

Export Citation Format

Share Document