scholarly journals A THEORETICAL FRAMEWORK FOR UTILIZING DATA WAREHOUSING TO PREDICT INFORMATION SECURITY THREATS

2013 ◽  
Vol 25 (3) ◽  
pp. 32-51 ◽  
Author(s):  
Salvatore Aurigemma

To combat potential security threats, organizations rely upon information security policies to guide employee actions. Unfortunately, employee violations of such policies are common and costly enough that users are often considered the weakest link in information security. This paper presents a composite theoretical framework for understanding employee behavioral compliance with organizational information security policies. Building off of the theory of planned behavior, a composite model is presented that incorporates the strengths of previous studies while minimizing theoretical gaps present in other behavioral compliance models. In building the framework, related operational constructs are examined and normalized to allow better comparison of past studies and help focus future research efforts.


2019 ◽  
Vol 22 (4) ◽  
pp. 336-341
Author(s):  
D. V. Ivanov ◽  
D. A. Moskvin

In the article the approach and methods of ensuring the security of VANET-networks based on automated counteraction to information security threats through self-regulation of the network structure using the theory of fractal graphs is provided.


2014 ◽  
Vol 22 (1) ◽  
pp. 24-41 ◽  
Author(s):  
Deepa Mani ◽  
Kim-Kwang Raymond Choo ◽  
Sameera Mubarak

Purpose – Opportunities for malicious cyber activities have expanded with the globalisation and advancements in information and communication technology. Such activities will increasingly affect the security of businesses with online presence and/or connected to the internet. Although the real estate sector is a potential attack vector for and target of malicious cyber activities, it is an understudied industry. This paper aims to contribute to a better understanding of the information security threats, awareness, and risk management standards currently employed by the real estate sector in South Australia. Design/methodology/approach – The current study comprises both quantitative and qualitative methodologies, which include 20 survey questionnaires and 20 face-to-face interviews conducted in South Australia. Findings – There is a lack of understanding about the true magnitude of malicious cyber activities and its impact on the real estate sector, as illustrated in the findings of 40 real estate organisations in South Australia. The findings and the escalating complexities of the online environment underscore the need for regular ongoing training programs for basic online security (including new cybercrime trends) and the promotion of a culture of information security (e.g. when using smart mobile devices to store and access sensitive data) among staff. Such initiatives will enable staff employed in the (South Australian) real estate sector to maintain the current knowledge of the latest cybercrime activities and the best cyber security protection measures available. Originality/value – This is the first academic study focusing on the real estate organisations in South Australia. The findings will contribute to the evidence on the information security threats faced by the sector as well as in develop sector-specific information security risk management guidelines.


Author(s):  
Bisma Gulzar ◽  
Ankur Gupta

As IoT applications are pervasively deployed across multiple domains, the potential impact of their security vulnerabilities are also accentuated. Sensor nodes represent a critical security vulnerability in the IoT ecosystem as they are exposed to the environment and accessible to hackers. When compromised or manipulated, sensor nodes can transmit incorrect data which can have a damaging impact on the overall operation and effectiveness of the system. Researchers have addressed the security vulnerabilities in sensor nodes with several mechanisms being proposed to address them. This paper presents DAM (Detect, Avoid, Mitigate), a theoretical framework to evaluate the security threats and solutions for sensor security in IoT applications and deployments. The framework leads to the classification of sensor security threats and categorization of available solutions which can be used to either detect vulnerabilities and attacks, recover from them or completely avoid them. The proposed framework will be useful for evaluating sensor security in real-world IoT deployments in terms of potential threats and designing possible solution


2012 ◽  
Vol 3 (2) ◽  
pp. 57-69 ◽  
Author(s):  
Ali M. Al-Khouri

This article provides an overview of the literature surrounding emerging markets and the global paradigm shift taking place towards the development of digital economies. It provides a review of recent practices in the government sector. The article promotes the concept of developing a government based identity management infrastructure to support the progress en route for building the digital economy. In light of increasing information security threats in today’s interconnected world, the article emphasizes that only through identification and authentication capabilities, emerging markets can maintain sustainability.


Author(s):  
Алексей Горлов ◽  
Aleksey Gorlov ◽  
Михаил Рытов ◽  
Mikhail Rytov ◽  
Дмитрий Лысов ◽  
...  

This article discusses the process of automating the assessment of the effectiveness of software and hardware information protection by creating an automated system. The main functions of the proposed system are: conducting an audit of information security, forming a model of information security threats, forming recommendations for creating a software and hardware system for protecting information, and creating organizational-technical documentation. The developed automated system for evaluating the effectiveness of software and hardware protection of information allows in an automated way to build a model of information security threats, to form organizational and technical documentation governing the protection of confidential information, and also to make recommendations for improving the software and hardware system for protecting information. The use of this system will significantly reduce the time and material costs of auditing information security and developing additional measures to protect information.


Author(s):  
Vasudev Dehalwar ◽  
Akhtar Kalam ◽  
Mohan Lal Kolhe ◽  
Aladin Zayegh

2021 ◽  
Author(s):  
Julia Kuznetsova ◽  
Konstantin Sakharov ◽  
Igor Salov ◽  
Vladislav Kemkin ◽  
Boris Doroshenko ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document