Information security � Key management

2020 ◽  
Symmetry ◽  
2019 ◽  
Vol 11 (8) ◽  
pp. 1019
Author(s):  
María Dolores Gómez Olvera ◽  
Juan Antonio López Ramos ◽  
Blas Torrecillas Jover

Key management is a central problem in information security. The development of quantum computation could make the protocols we currently use unsecure. Because of that, new structures and hard problems are being proposed. In this work, we give a proposal for a key exchange in the context of NIST recommendations. Our protocol has a twisted group ring as setting, jointly with the so-called decomposition problem, and we provide a security and complexity analysis of the protocol. A computationally equivalent cryptosystem is also proposed.


2014 ◽  
Vol 926-930 ◽  
pp. 1962-1965
Author(s):  
Chang Liu ◽  
Fang Wang ◽  
Chang Li Sun

The interaction of electricity is one of the basic characteristics of smart grid, for interactive methods of using electricity and the information security risk and demand research. First of all, from the risk perspective, the interaction of electric power information security and wide area environment using power mode under the comparison qualitative, focuses on the differences in the objective conditions. The two in the threat generated subjective motive and the consequences of the accident etc.. On this basis, combined with the characteristics of the interaction system with electric business process and high volume, starting from the confidentiality, integrity and availability of information security requirements refine the usability evaluation, key management and abnormal behavior detection such as the 3 aspects of difficult problems.


2018 ◽  
Vol 17 (02) ◽  
pp. 527-545 ◽  
Author(s):  
Aiiad Albeshri ◽  
Vijey Thayananthan

In the big data processes, management and analytics are primary areas where we can introduce the decision making on information security to mitigate the big data breaches. According to the growing number of online systems and big data handling, mitigating the big data breaches is the serious problem during the processing period which needs to be monitored using appropriate technique. The goal of this research is to prevent the big data breaches using correct decision making based on information security concepts such as access control with authentication which depend on the management policies. The analytical approach of information security solution can also be useful for securing the big data infrastructure and key management that improve the big data breaches. As an analytical method, information security which focuses on detecting and securing the big data breaches is considered with access control. Here, we have introduced the multi-priority model influenced with the network calculus and access control which monitors the breaches during the big data processing. In the results and analysis, we can provide a graph which shows the monitoring improvement for decision making during the mitigation of big data breaches.


2014 ◽  
Vol 27 (5) ◽  
pp. 644-667 ◽  
Author(s):  
Abhishek Narain Singh ◽  
M.P. Gupta ◽  
Amitabh Ojha

Purpose – Despite many technically sophisticated solutions, managing information security has remained a persistent challenge for organizations. Emerging IT/ICT media have posed new security challenges to business information and information assets. It is felt that technical solutions alone are not sufficient to address the information security challenge. It has been argued that organizations also need to consider the management aspects of information security. Consequently, literature, especially in the last decade, has witnessed various scholarly works in this direction. Therefore, a synthesis exercise is required to bring clarity on categorizing the issues of organizational information security management (ISM) to take the research forward. The purpose of this paper is to identify management factors that address organizational information security challenges. Design/methodology/approach – Using a mix method approach, the paper adopts the qualitative (keyword analysis and experts’ opinion) and quantitative (questionnaire survey) research routes. Exploratory factor analysis is conducted to find out the key factors of organizational ISM. Findings – The paper categorizes various organizational ISM functions into ten factors. Spanning across three levels (strategic, tactical and operational), these factors cover various management issues of organizational ISM. Originality/value – The paper takes the ISM literature forward by statistically validating the key management factors of organizational ISM. The study outcome should help to draw the attention of organizations toward the managerial challenges of organizational ISM.


Sign in / Sign up

Export Citation Format

Share Document