information security 2021



Accounting Information Security and IT Governance Under COBIT 5 Framework: A Case Study
free download

This paper aims to explore the role of applying information technology governance using the COBIT 5 framework in improving the security of accounting information systems. The paper also aims to assess the level of governance of information technology in the Trade Bank of This paper analyzes the vulnerability and identification of attacks on corporate networks, the properties of adaptability and development, security model, studied the methods that will reduce the costs of implementing the information security system, consider the analogy Bio

Disentangling the Concept of Information Security Properties: Enabling Effective Information Security Governance
free download

The hyper-dynamic, global adoption of digital technologies due to the Covid-19 pandemic and the increasing digitalization of business models necessitate a dialogue on fundamental concepts that assist organizations in defining appropriate requirements for their information The development of digital technologies leads to an aggravation of the problem of information security and the protection of personal data of network users. The purpose of this chapter is to identify the main threats to information security in the development of the digital Given the increasing financial impact of cybercrime, it has become critical for companies to manage information security risk. The practitioner literature has long argued that the internal audit function (IAF) can play an important role both in providing assurance with respect to

Modern conditions of information security and human life
free download

One of the main tasks of the modern state is to ensure the information security of the individual, which is characterized by the protection of the psyche and consciousness from dangerous information influences: manipulation, misinformation . Now our society is

Towards an Ontology for Enterprise Level Information Security Policy Analysis.
free download

Securing the information and ICT assets in an enterprise is a vital as well as a challenging task because of the increase in cyber-attacks. Information Security policies are designed for an enterprise to prevent security breaches. An enterprise needs to adhere to and abide by

Information Security Project
free download

D SRIVASTAVA103.47.12.35 The objective of this project is to demonstrate the cross site scripting attacks in the word of the internet. SQL injection attack is widely used by attackers to gain unauthorized access to systems. This software can be very helpful in understanding how the XSS attack works if the

Investigating the Level of Awareness on Information Security Amongst Users at Botho University
free download

The growth of technology advancement has promoted a borderless environment among users, organizations, global industry and easy access to information. The use of the internet and computer systems in a teaching environment parallel increased the number of threats in

Aspects of Ensuring Information Security in the Educational and Pedagogical Sphere
free download

The article examines the concept of information security of society and man, the requirements and problems of its provision in the context of global telecommunications and the Internet; manifestation of information security in education, in the educational and

Application of Mathematical Signature Technology in Computer Information Security Design
free download

Digital signature technology is an effective means to ensure the confidentiality, integrity and security of information transmission, and it plays an important role in computer security protection. Based on this, this paper analyzes the application of digital signature technology

Information Security and Competition
free download

Cyber-attacks are a pervasive threat in the digital economy, with the potential to harm firms and their customers. Larger firms constitute more valuable targets to hackers, thereby creating negative network effects. These can be mitigated by investments in security, which

An Information Security Protocol for Automotive Ethernet
free download

Automotive Ethernet is considered the backbone network of future vehicles owing to its high bandwidth, high throughput, and low cost. With the appearance of the connected car environment, in-vehicle networks (eg, automotive Ethernet) are now connected to external

Crimes against the information security of minors committed through information and telecommunication networks (including the Internet)
free download

The article analyzes crimes against information security of minors, committed through information and telecommunication networks (including the Internet), infringing upon such rights and interests of children as the right to life, health, sexual integrity, normal sexual

Building a fuzzy cognitive map of the information security risk formation model
free download

With the development of artificial intelligence technologies, it is necessary to assess the possibilities of their direct and indirect applications from an environmental point of view in order to realize their full potential artificial intelligence technologies for the benefit of planet

INFORMATION SECURITY RISK AUDIT IN ORGANIZATIONS
free download

Information protection has become a significant concern for many organizations. Establishing a security program is the process by which security is provided to the company. It involves five steps: establishing the main steps and the staff responsible for ensuringThis book highlights are potential cyber-security overview, perspective challenges which affect advanced Vehicular technology. It considers vehicular security issues and possible solutions, with the aim of providing secure vehicle-tovehicle, vehicle-to

A Review on Information Security in Cloud Based System during Covid-19 Pandemic
free download

Work from Home is the new trend in corporate working culture in this Covid-19 pandemic situation. Of course it is a preventative measure to avoid the infection from the disease. Not only companies or corporate world but also education sectors are hugely depending on

A Model of an Information Security Management System Based on NTC-ISO/IEC 27001 Standard
free download

In an era of globalization, in which technology has allowed the development of companies to be promoted, data and information become essential assets in organizations, which are exposed to hackers, computer viruses, cyber espionage, and infrastructure failures are some

An Inward Focus of Attention During Information Security Decision Making: Electrophysiological Evidence
free download

Insider threat represents a significant source of violations of information security . Our previous research using event-related potentials (ERPs) has revealed patterns of neural activity that distinguish ethical decision making from decisions that do not involve an ethical Network security is a wider term used to represent security measures applied to the network, which acts as a broadcasting Environment. Computer network is the collection of computers which includes protocol and hardware to connect them in order to share information and

Information Security in Business: A Bibliometric Analysis of the 100 Top Cited Articles
free download

This study aims a bibliometric analysis of the 100 top-cited articles extracted from the Web of Science database on the topic of information security in the business context. A retrospective method was applied to the dataset extracted from the Web of Science Database. A total of

The Exploration of the Training Mode in the Major of Information Security in University
free download

According to the current demand for information security talents, combined with the exploration practice in this major for more than 10 years, the paper puts forward the information security professional talent training mode- production and learning cooperation The 23rd International Conference on Information Security and Cryptology (ICISC 2020) was held in virtual format during December 2 2020. This years conference was hosted by the KIISC (Korea Institute of Information Security and Cryptology). The aim of this conference

A Model Curriculum for Programs of Study in Information Security /Cybersecurity March 2021
free download

Greetings! We would like to take this opportunity to thank you for allowing us to share our lessons learned in the development of Information Security Cybersecurity Curriculum at KSU. As part of our ongoing commitment to Security education, we have decided to formally

THE INFORMATION SECURITY INFLUENCED BY THE LEADERSHIP STYLES: A STUDY IN THE CONTEXT OF BRAZILIAN MULTIPLE BANKS
free download

Employees are still considered the weakest link in IS and managers play an important role in encouraging the desired behavior. This is relevant in the context of Brazilian multiple banks, but there is no academic research in this context. To address this gap, this study analyzed

Labour Relations and the Information Security of the State during the Covid-19 Pandemics
free download

The technological changes directly influence human values, way of life, communication, education, new digital competencies, economic productivity, social rights, privacy, access to information, and more. Understanding and describing these effects is key for understanding

Construction of Innovation and Entrepreneurship Training System for Network Information Security Talents
free download

This paper studies how to create a training system of innovation and entrepreneurship ability of Cyberspace Security Specialty by researching the current situation of college education, stimulate students innovative thinking and entrepreneurial consciousness, and

Information Security Among Young People in the Process of Globalization Mass Cultural and Spiritual Threats
free download

Proceedings of Multidisciplinary International Scientific-Practical Conference Current Issues of Science, Education and Industry in Modern Research 1012th December JournalNX-ISSN No: 2581-4230 Impact Factor 7.223 INFORMATION SECURITY AMONG

Information Security at Schools: A Practical Game-Based Application with Sustained Impact
free download

ABSTRACT 1 The process of awareness raising should be seen as an important factor in enhancing knowledge of information security issues and developing appropriate behavior in response to them. In the project described here, this is carried out by means of awareness

technologies for criminal purposes, the need to unite the efforts of the international community to fight against cyberterrorism, and ensuring information security
free download

A Sheripbayev Yesse University президентінің м. а. ББ yu.edu.kz Contemporary processes of globalization have posed a number of fundamentally new and complex problems facing humanity. Threats to national security in the face of terrorism have always existed. However, with the development of computer technologies and the

A framework for Information Security Management Adoption in Higher Education Institutions in Somalia: Perspectives PMT and TOE
free download

AJ Mohamud muj.so This research paper examines the level of information security in higher education institutions in Somalia by identifying the factors influencing information security management. This research was applied by using protection motivation theory and

On the governments obligation to protect citizens network information security in the digital era
free download

Citation: Li Xiaoyu. On the governments obligation to protect citizens network information security in the digital era/Li Xiaoyu; scientific adviser PA Barakhvostov//«Цифровой Левиафан»: трансформация государства, общества и институтов в эпоху

Factors Affecting the Security of Information Systems: A
free download

system security organization structures. However, despite of all the measures, information security is still a catastrophe. Poor understanding of information security key factor seem to be the main problem. The difference in ICT

The Use Of Artificial Intelligence In Data Security
free download

Student of the Department of Applied Mathematics Jizzakh branch of National University of Uzbekistan Jizzakh, Uzbekistan rakhmatov@workmail.com Abstract: An analysis of possible ways to use artificial intelligence in the field of information security was conducted

International Law Thinking on Data Security In TikTok Incident
free download

voice in the field of information data, improve the data flow rule. Keywords: Ban promulgation, Data flow, National Information security Data network order 1. INTRODUCTION In July this year, the United States in the trump of

INFORMMATION SECURITY IN THE COURSE OF COUNTERACTING HYBRID AGGRESSION
free download

org/0000-0003-4860-9571 INFORMMATION SECURITY IN THE COURSE OF COUNTERACTING HYBRID AGGRESSION The publication is devoted to outlining a general approach to understanding the theoretical foundations of information security of the state, in particular in

Introduction to the Minitrack on Security and Privacy Aspects of Human-Computer-Interactions
free download

Especially the human factor of information systems is a pivotal role in information security and increasingly relevant in establishing user-privacy concepts However, studies show users are also seen as the weakest link in information security

INFORMATION PROTECTION AND SECURITY IN MODERN ORGANIZATIONS
free download

processes and limit their effectiveness. REFERENCES Coles-Kemp, L. (2009) Information Security Management: an entangled research challenge , Information Security Technical Report, 14(4), 181-185. Dhillon, G. Backhouse, J

Multidimensional information encryption and storage: when the input is light
free download

The issue of information security is closely related to every aspect of daily life. For pursuing a higher level of security, much effort has been continuously invested in the development of information security technologies based on encryption and storage