INFORMATION SECURITY IEEE PAPERS AND PROJECTS-2020



Information Security refers to the processes and methodologies which are designed and implemented to protect print, electronic, or any other form of confidential, private and sensitive information or data from unauthorized access, use, misuse, disclosure, destruction, modification, or disruption.



Combination of hiding and encryption for data security
free download

Abstract One of the techniques used in information security is the concealment technique, where the information to be hidden within another information medium to be saved in the process of messaging between two sides without detection

A comparative study of symmetric cryptography mechanism on DES, AES and EB64 for information security
free download

The usages of Information technology were numerous in every aspect of life. As it were, an adequate security has often been a great challenge which has to be more focused on. Different methods have been employed to secure and protect the shared and sensitive data

Information Security Methodology, Replication Studies and Information Security Education J. UCS Special Issue
free download

In recent years, research started to focus on the scientific fundamentals of information security . These fundamentals include several important aspects such as the unified description of attacNs and countermeasures, the reproducibility of experiments and means

Identify of factors affecting information security awareness and weight analysis Process
free download

Information exchange is a key aspect of using technology in everyday life. Crimes associated with the lack of information security awareness (ISA), misuse and carelessness are on the increase and often result in heavy losses and serious consequences. In order for

SPEECH INFORMATION SECURITY ASSESSING IN CASE OF COMBINED MASKING SIGNALS
free download

The paper presents the results of experimental studies directed to the speech intelligibility assessment while protecting it from leakage via acoustic channels by masking with combined acoustic signals, including white noise and speech-like signals. The speech

Basic principles of information security
free download

So, in the latest realities, the security of information resources can only be ensured by a comprehensive information security system, which must be planned, continuous, specific, targeted, reliable, and active. The information security system should be based on a set of

EVALuATING THE THREAT TO NATIONAL INFORMATION SECuRITY
free download

An effective strategy for managing the national information security with capabilities to resist information threats significantly impacts its further development. This study aims to assess the level of threat to the information security of countries based on the integral index. It is

The Business-Minded Chief Information Security Officer
free download

Abstract Information technology (IT) risk and information security management are top of mind for corporate boards and senior business leaders. Continued intensity of cyber terrorism attacks, regulatory and compliance requirements, and customer privacy concerns

Improving the administrative decision-making of organizations in Iraq using information security
free download

Information security has become one of the most important aspects of modern electronic society. It is a vital concern and vital issue. The different ways of storing and transfer information in different ways between the network, security threats and challenges haveThe usage of data dashboards is essential for ensuring fast and accurate decision making. A prompt understanding of the required parameters and their visualization are important components of information security management. This article describes a set of dashboard

IoT and Smart Home Data Breach Risks from the Perspective of Data Protection and Information Security Law
free download

Background: IoT and smart devices have become extremely popular in the last few years. With their capabilities to collect data, it is reasonable to have concerns about the protection of users personal information and privacy in general. Objectives: Compare existing

Integration of Data Envelopment Analysis in Business Process Models: A Novel Approach to Measure Information Security .
free download

This article explores the question of how to measure information security . Organisational information security is difficult to evaluate in this complex area because it includes numerous factors. The human factor has been acknowledged as one of the most challenging factors to

What do we know about information security governance From the basement to the boardroom : towards digital security governance
free download

This paper reviews the information security governance (ISG) literature and emphasises the tensions that exist at the intersection of the rapidly changing business climate and the current body of knowledge on ISG. These changing contextual boundaries are driven by a

The Methodology for Assessing Information Security Risks for Robotic Systems
free download

Today, robotic systems are becoming very popular. They are typically used to monitor critical objects. Human lives often depend on the correct operation of a robotic system. Therefore, risk analysis of a robotic information system is an important task. However, to date there is

The Importance of Information Security in Travel Enterprises: Kuşadası Case
free download

In society today, the value and security of information is a remarkable issue for all individuals and enterprises. Individuals have doubts about the security of this information while using their personal information . Besides, the enterprises carry out practices on the security of the Over the past few decades, digital advancements have continuously become an essential aspect in almost all parts of the workplace. However, along with advancement comes major threat to individuals, businesses, and government where information is one the most With the intensive development of project management processes, the increasing number of project stakeholders which demand constant access to the up-to-date project information and the large territorial distribution of project modules, the issue of ensuring the information

Challenges in Addressing Information Security Compliance in Healthcare Research: The Human Factor
free download

This retrospective case report aimed to evaluate the impact of information security compliance in research programs across a large federal healthcare organization. The authors sought to discern whether the methodologies employed for promoting and ensuring

Analysis and Research of Enterprise Information System Security Based on e-Commerce
free download

Nowadays, the world has entered the information age. Information systems have been widely used in various fields of society, and the importance of information has been widely accepted. Enterprises need to guarantee the security of e-commerce information system

A Cost-Optimization Scheme Using Security Vulnerability Measurement for Efficient Security Enhancement.
free download

The security risk management used by some service providers is not appropriate for effective security enhancement. The reason is that the security risk management methods did not take into account the opinions of security experts, types of service, and security

THREATS OF PROPAGANDA AND THE INFORMATION WAR ON LITHUANIAN SECURITY
free download

National security is a complex issue consisting of different elements. The conventional military level occupies an essential position among these elements; however, it can be noted that the importance of other elements has grown rapidly in recent decades. Today, it is

Comparative Analysis of Steganography Technique for Information Security
free download

Organisations need information security to reduce the risk of unauthorized information disclosure, use, modification and destruction. To avoid this risk and ensure security diverse solutions are available such as Cryptography, Steganography and Watermarking

Digital Competence and Information Security in Adolescents
free download

The paper presents the results of an empirical study of digital competencies and characteristics of Internet addictive behavior among adolescents. Received data shows that a low level of digital competence is one of the factors reducing information security and it

INFORMATION SECURITY MANAGEMENT
free download

In this technology advance era, most of the counties are trend to promote high technological in business development for increase the profitability and market value. The information technology (IT) project having a dynamic and complex nature caused high uncertainty andThe 13th Chinese Conference on Trusted Computing and Information Security (CTCIS 2019) continued in a series of events dedicated to trusted computing and information security focusing on new theories, mechanisms, infrastructures, services, tools, and

Performance analysis of compression algorithms for information security : A Review
free download

Data compression is a vital part of information security since compressed data is much more secure and convenient to handle. Effective data compression technique creates an effective, secure, easy communicable redundant data. There are two types of compression

Security analysis of the covid-19 contact tracing specifications by apple inc. and google inc.
free download

Our analysis focuses mostly on system security considerations yet also includes information security considerations. We pandemic. Keywords COVID-19 Contact Tracing System Security Information Security 1 Introduction

Information Security in the Quantum Era
free download

Abstract Information security plays a major role in the dynamics of todays interconnected world. Despite the successful implementation and effectiveness of modern cryptographic techniques, their inherent limitations can be exploited by quantum computers. In this article

Measurement of Employee Awareness Levels for Information Security at the Center of Analysis and Information Services Judicial Commission Republic of
free download

The Center for Analysis and Information Services (Palinfo) at the Judicial Commission closely related to the management of information systems which are used to process organizational internal data and information systems on public services. Data processingAbstract Information security has evolved over the years and has become increasingly important to society at large. Similarly, information security measurement and testing have evolved over the years, from the days of BS 7799 to the present day ISO 27001 and others

Information Security Awareness in Romanian Public Administration: An Exploratory Case Study
free download

This article analyzes the way public servants understand the necessity for information security in the digitalisation of public administration and sets out to describe a series of technical solutions with a view to protecting digital data. This paper focuses on a study whichThis volume contains the proceedings of the 15th International Conference on Critical Information Infrastructures Security (CRITIS 2020). The conference was organized by the Bristol Cyber Security Group at University of Bristol and held for the first time in the UK

MODELING INFORMATION SECURITY MANAGEMENT SYSTEM OF ENTERPRISE ON THE BASIS OF ORGANIZATIONAL MANAGEMENT CYCLE
free download

The article elucidates the issue of the information security management system and its significance for an enterprise. The emphasis is laid on the drivers of the information security management system modeling. The basis for a case study is the world experience and

Assessing Information Security Vulnerabilities and Threats to Implementing Security Mechanism and Security Policy Audit
free download

In spite of the massive investment of money, time and efforts an organization devotes to growth and enhancement with continuous improvements of a sound information security strategy, the human factor is ultimately and eventually the one behind the keyboard. As a

A Quick Survey on Information And computer Security
free download

In the last 20 years technology has penetrated every aspect of the business environment. The workplace is no longer static. It moves as employees move from one office to another. As businesses become more flexible, security is no longer the sole responsibility of a small

Zoom security issues: heres everything thats gone wrong (so far)
free download

Page 1. Running Head: INFORMATION SECURITY 1 Information Security Student`s Name: Institutional Affiliation: Page 2. INFORMATION SECURITY 2 Part I: Mobile Device Security Investigation Report Section 1: Mobile Device Application

FORMATION OF PROFESSIONAL COMPETENCE IN THE FIELD OF INFORMATION SECURITY AMONG FUTURE ECONOMISTS
free download

The successful implementation of the model of the process of forming professional competence in the field of information security for future economists in the context of university education is ensured by the creation of the following pedagogical conditions: a

A STUDY ON INFORMATION SECURITY IMPACT ON THE DELIVERY OF IT MANAGED SERVICES
free download

The outsourcing of the IT infrastructure administration or contracting of some specialized IT services are common practices for many organisations. The reasons are multiple and vary, from the lack of internal IT competent staff up, to the fulfilment of some cost decrease Over the years, millions of data and information in transit have been abused, compromised or lost to cybercriminals/hackers due to inefficient security measures adopted during data transmission. To address this issue this paper reviewed the two basic data security

An Efficient Incident Recovery Based Information Security model Using Fuzzy Rough Sets for Green Business Environment
free download

The objective of the work is to propose a fuzzy rough set based incident response plan with attack modeling and verification technique encompassing the information assurance in green business environment. Developed or gathered data about the current or past security

Network-Mediated Knowledge Spillovers in ICT/ Information Security January Neil Gandal Nadav Kunievsky
free download

A large literature has used patent data to measure knowledge spillovers across inventions but few papers have explicitly considered the collaboration networks formed by inventors as a mechanism for shaping these knowledge flows. This paper develops a method to measure

STUDY ON INFORMATION SECURITY MANAGEMENT SYSTEM AND BUSINESS CONTINUITY MANAGEMENT IN THE CONTEXT OF THE GLOBAL CRISIS
free download

Parallel to the need-based expansion of business processes with new intelligent technologies and automated applications within digitization, the continuous further development of the technical and organizational adaptation processes to the security

Analysis of Cyber Security Threat Environment and Information Security System of Financial Industry Under New Situation
free download

With the rise of Internet finance model, the deterioration of external security environment and the increasing complexity of its own system architecture, the banking industry is facing increasingly severe network security threats. This paper analyses the network security

Information Security and Org Deposit Money Banks in Por Niger
free download

This research examined the relation efficiency in selected Banks in Port Harcourt dimension of the independent variable while re dependent variable while the study had technolo sectional survey in its investigation of the variab administered questionnaire. The population

Security of minors in the information society: analysis of cyber risks and threats
free download

O Rybakova М СОѐ РЖАНИРuzulo.su Purpose of the paper: studying the risk factors of the modern information society and their impact on the health and development of a minors personality. Method used: the dialectical method which is the basis for studying the processes of total informatisation of the society

A Survey of College Students Personal Information Security Awareness in the Era of Big Data
free download

With the advent of the era of big data, college students enjoy the convenience of digital life, but also make personal information security to a certain extent exposed in the network. This survey analyzes the personal information security awareness of college students, trying to

Master of Science in Information Security and Cryptography
free download

In recent times, machine gaining knowledge has transformed areas such as processer visualisation, morphological and speech identification and processing. The implementation of machine learning is frim built on data and gathering the data in confidentiality disturbing IFIP SEC conferences are the flagship events of the International Federation for Information Processing (IFIP) Technical Committee 11 on Information Security and Privacy Protection in Information Processing Systems (TC-11)

Risk Appetite Assessment Algorithm-A Starting Point for Small And Medium Size Organisation for Understanding Information Security Requirements
free download

Towards the end of the thesis, a sample predictive analysis for an organizations risk appetite is presented. This model is built and adapted through a supervised machine learning algorithm which learns through experience from the trained data in order predicts

A SURVEY OF INFORMATION SECURITY IMPLEMENTATIONS FOR EMBEDDED SYSTEMS
free download

This paper examines the implementations of the well-known information security1 components of confidentiality, integrity, and availability (the CIA triad2) as applied to embedded systems, and how these implementations can be used to defend against various

Cashless Society, Financial Inclusion and Information Security in Nigeria: The Case for Adoption of Multifactor Biometric Authentication
free download

Cashless society is a system in which all purchases of goods and services are made by credit card or e-payments system. It is a policy that reduces the amount of physical cash that people carry around. Therefore, the system heavily rely on the alternative banking channels

The conceptual model of information confrontation of virtual communities in social networking services
free download

strategies to carry out the information fight of virtual communities in social networking services, to choose optimal strategies, to predict the development of conflicts in the information space and to develop effective measures to counter threats to the states information securityBlockchain technology is perceived as one of the most promising techniques with its characteristics of decentralization, openness, and tamper resistance. Numerous studies have investigated blockchain technologies for specific application domains, such as Internet

A Change Management Perspective to Implementing a Cyber Security Culture
free download

Because of the possible breaches in information security it has become pertinent that organisations change organisational and individual cultures to become more secure Change management plays a vital role in instituting an information security culture

Zero Day Attack Prediction with Parameter Setting Using Bi Direction Recurrent Neural Network in Cyber Security .
free download

Zero day attack is a form of cyber-attack that exploits the vulnerabilities of a systems, protocols, software, computer port and Networks. When vulnerabilities are detected the main target must be known. However, some attacks can be prone to unpatched vulnerabilitiesThe relevance of this work is due to the fact that in the conditions of digitalization of the economy, the tax authorities are forced to actively use the achievements of information technology in their work in order to improve the efficiency of employees and reduce their

The Human Factor as a Risk Element in Information Systems Security
free download

The following contribution concerns the Human Factor as a critical element of the Security of Information Systems. It posits the significance of Psychology as an appropriate prediction tool for the selection of suita ble employees, and concurrently, attempts to demonstrate the

Survey: Security for Text Document Protection Using different security
free download

available file from cloud. Keyword: Information Security Digital Watermarking, Copyright Protection. Introduction columns and four rows for processing as a matrix SHA: Hash functions are extremely useful and appear in almost all information security applications

Data Security Concerns and Consumers Trust in Online Business
free download

Data Security Concerns and Consumers Trust in Online Business Bilquis Ferdousi School of Information Security and Applied Computing Eastern Michigan University Ypsilanti, MI 4819 USA bferdous@emich.edu Abstract Integrity Availability Data/ Information Security Page 4

Differences in IT Security Behavior and Knowledge of Private Users in Germany
free download

The German Federal Office for Information Security (Bundesamt für Sicherheit in der Informationstechnik) offers advice and recommendations for private users on how to behave securely 13. Li, Y., Siponen, M.: A call for research on home users information security behaviour