scholarly journals Classification of personal data security threats in information systems

T-Comm ◽  
2020 ◽  
Vol 14 (1) ◽  
pp. 56-60
Author(s):  
V.A. Dokuchaev ◽  
◽  
V.V. Maklachkova ◽  
V.Yu. Statev ◽  
◽  
...  
2017 ◽  
Vol 2 (3) ◽  
pp. 1
Author(s):  
Hanane Bennasar ◽  
Mohammad Essaaidi ◽  
Ahmed Bendahmane ◽  
Jalel Benothmane

Cloud computing cyber security is a subject that has been in top flight for a long period and even in near future. However, cloud computing permit to stock up a huge number of data in the cloud stockage, and allow the user to pay per utilization from anywhere via any terminal equipment. Among the major issues related to Cloud Computing security, we can mention data security, denial of service attacks, confidentiality, availability, and data integrity. This paper is dedicated to a taxonomic classification study of cloud computing cyber-security. With the main objective to identify the main challenges and issues in this field, the different approaches and solutions proposed to address them and the open problems that need to be addressed.


2018 ◽  
Vol 3 (2) ◽  
pp. 85
Author(s):  
Chicherov K.A. ◽  
Norkina A. N.

This article presents issues of protecting confidential data, ways to support information security, types of information security threats resulting in an authorized access to confidential data, countermeasures and security measures to ensure confidential data security. Keywords: confidential data, information security, information security threat(s), personal data, information systems, data security.


Author(s):  
В. Марценюк ◽  
І. Дідманідзе ◽  
I. Андрущак ◽  
Т. Крадінова ◽  
К. Рудь

The article deals with the normative and methodological bases of classification of information security threats related to the use of malware against information systems. The threats to the impact on the information systems of certain types of malware are highlighted. In the process, antivirus experts desing and develop new methodologies to make them stronger, more and more every day.  The purpose of this paper is to reviev these methodologies and outline their strengths and weaknesses to encourage those and interested in more investigation on these areas.


Author(s):  
A. Pluzhnikov

It is becoming increasingly important to ensure the protection of personal information contained in information systems from unauthorized access and other harmful influences. Protection against threats to information systems is an integral part of the main activities of federal, regional and local authorities aimed at increasing the efficiency of their activities. The paper analyzes the implementation of information systems in the management process of regional and local government authorities using the example of the Voronezh region. It is concluded that the personal data of subjects stored in the information systems of public authorities are subject to internal security threats, and therefore should be constantly monitored in order to assess potential harm. The main methods that are currently used to conduct such an assessment are considered and the factors that prevent their effective use in relation to information systems of personal data of public authorities are highlighted. It is concluded that it is necessary to adapt the existing systems for analyzing and assessing the damage of personal data information systems of state authorities, taking into account all areas of their activities that are subject to damage from the impact of threats in accordance with the requirements of the current legislation of the Russian Federation.


2014 ◽  
Vol 32 ◽  
pp. 489-496 ◽  
Author(s):  
Mouna Jouini ◽  
Latifa Ben Arfa Rabai ◽  
Anis Ben Aissa

1979 ◽  
Vol 18 (04) ◽  
pp. 214-222
Author(s):  
K. Sauter

The problems encountered in achieving data security within computer-supported information systems increased with the development of modern computer systems. The threats are manifold and have to be met by an appropriate set of hardware precautions, organizational procedures and software measures which are the topic of this paper. Design principles and software construction rules are treated first, since the security power of a system is considerably determined by its proper design. A number of software techniques presented may support security mechanisms ranging from user identification and authentication to access control, auditing and threat monitoring. Encryption is a powerful tool for protecting data during physical storage and transmission as well.Since an increasing number of health information systems with information-integrating functions are database-supported, the main issues and terms of database systems and their specific security aspects are summarized in the appendix.


Author(s):  
M.A. Kobilev ◽  
E.S. Abramov

The article considers false information systems and conducts their comparative analysis, considering the tasks that they perform, which technologies rely on, and what role is played in protecting information when they are used. The goal is to identify relevant false information systems, to formulate criteria in accordance with which classification is carried out. The problems of false information systems are identified, further work in this topic is determined.


Sign in / Sign up

Export Citation Format

Share Document