information security IEEE PAPER 2022


Information Security refers to the processes and methodologies which are designed and implemented to protect print, electronic, or any other form of confidential, private and sensitive information or data from unauthorized access, use, misuse, disclosure, destruction, modification, or disruption.

impact of the users information security knowledge level on information security incidents to increase the level of industrial automated systems security and prevent information security

Analysis and Intellectual Structure of the Multi-Factor Authentication in Information Security
free download

In this way, security can be ensured to mitigate security attacks [1 6] like distributed denial of service (DDoS) attacks [7 10] as the first line of defense. Furthermore, information security

The Role of Information Deserts in Information Security Awareness and Behaviour
free download

of local information landscapes, this paper presents the first attempt to link this model with contextual factors in information security behaviour. It is posited that the success of security

Improved One-Dimensional Piecewise Chaotic Maps for Information Security
free download

Nowadays, information security represents an important requirement with the advancement In particular, the security of the transmitted images, which include personal information .

Probabilistic Analysis of an Impact of Information Security on Standard Process Performance in a Life Cycle of Systems
free download

information security must be provided. It means the standard processes are identical from the point of view of an impact of information security on used and system information security

ANALYSIS OF CURRENT TRENDS IN THE DEVELOPMENT OF DSLS AND THE POSSIBILITY OF USING THEM IN THE FIELD OF INFORMATION SECURITY
free download

possibilities of using DSLs in the field of information security . and security auditing, as subfields of the information security we divide them into these two information security subfields.

KEY RISKS OF ENSURING THE SECURITY OF RUSSIAN BANKS
free download

The Bank of Russia has identified the main areas of information security protection, in which it proposes to make a transition to risk-based models of protection against

SECURITY OF PERSONAL DATA ON THE NETWORK
free download

data, information security and studies methods of protecting information on the network. and scale of coverage, but also information security . The increasing complexity of methods and

OF LEGAL REGULATION OF THE SECURITY OF A PERSON, SOCIETY, STATE IN THE FORMATION OF THE INFORMATION SOCIETY IN UKRAINE
free download

three components: information security the security of information with limited information security is aimed at the following: creating a legal framework to provide security for information

SECURITY MANAGEMENT CULTURES AND LECTURERSACADEMIC SERVICE DELIVERY IN TERTIARY INSTITUTIONS IN AKWA IBOM STATE, NIGERIA
free download

Results obtained revealed that information security culture and physical security cultures significantly related with lecturers academic service delivery. It was concluded that

INFORMATION AND COMMUNICATION SECURITY
free download

What if no bankcard services available and money transfer is down as well This article introduces the infrastructure used for financial services as a critical infrastructure. The

Introduction to the Minitrack on Organizational Cybersecurity: Advanced Cyber Defense, Cyber Analytics, and Security Operations
free download

Information security policies as apparatus for communicating security principles with employees are the cornerstone of organizational information security . Resultantly, extant literature

Design and Installation of Security System for the Data Center of Cavite State University-Main Campus
free download

Information security is the confidentiality, integrity, and availability of information (von Solms of information integrity aims at ensuring that information is protected from unauthorized or

BRIFING NOTE FOR Department of National Defence Security Issues Related to the Use of Information Technology (IT)
free download

is a high correlation between awareness and security . The more the employees are aware of about cyber security based on his/her role in the organization, and the information he/she

CYBER SECURITY ISSUES IN ALBANIAN HIGHER EDUCATION INSTITUTIONS CURRICULA
free download

E Ceko crj.cit.edu.al strengthen overall information security higher education can emerge from the pandemic capable of managing cyber security risks that will undoubtedly continue to surface (Kelly. 2021).

CYBER- SECURITY KNOWLEDGE AND PRACTICE OF NURSES IN PRIVATE HOSPITALS IN NORTHERN DURBAN, KWAZULU-NATAL
free download

As South Africa transitions towards her eHealth strategic objectives, this study evaluated an essential element of information security the cyber security awareness and practice of her Abstract The paper looks at the development of a mathematical model of the process of continuous mutual investment of projects in the sphere of information security and information

Concept for Improving Cloud Security Standards
free download

These Patterns also deliver the context for all other information about the cloud s IT security . Using the Patterns, user organizations (Cloud Service Consumer, CSC) can differentiate

Cyber securities and cyber security politics
free download

the Federal Office for Information Security (BSI). In addition, the cooperation KRITIS, which was intended to enable the state and economy to exchange information effectively, was

Blockchain: For Security Issues and Challenges in IOT
free download

Numerous IoT applications work with private information for address the issue of information security and namelessness. information or shrewd vehicles that protect the security of the

Beyond Cyber Security Tools: The Increasing Roles Of Human Factors And Cyber Insurance In The Survival of Social Media Organisations
free download

and adequate infrastructure and information security control than it could be recovering from a data breach. While there is numerous research on the issue of cyber security the topic,

CLOUD COMPUTING SECURITY
free download

security issues faced by the users. You can even find out about the security operating organization which ensures the security can know information related to cloud security references

Introduction: Cyber security between socio-technological uncertainty and political fragmentation
free download

Yet, cyber security is more than information security : Rather than just seeking to protect information assets it also extends to humans and their interests (Von Solms and Van Niekerk

Uncertainty, fragmentation, and international obligations as shaping influences: Cyber security policy development in Albania
free download

These operators of critical and important information infrastructure are obliged to implement at least the minimum levels of information security requirements approved by AKCESK (the

DESIGN AND IMPLEMENTATION OF A DEVS-BASED CYBER-ATTACK SIMULATOR FOR CYBER SECURITY .
free download

many security systems have been developed against to these attacks, attacks and security breaches of information In this study, it is aimed to understand the security weaknesses and physical way, and transmission or information storage and retrieval, electronic adaptation, are safe to assume that the advice and information in this book are believed to be true and

Research on Applying the WTO Security Exception Clause to the Security Dispute Caused by Cross-border Data Flows
free download

However, while cross-border data flows are flourishing, their security has become an issue. Cross-border data flow security can be classified as information security in cyber security . physical way, and transmission or information storage and retrieval, electronic adaptation, are safe to assume that the advice and information in this book are believed to be true and

Cryptography Techniques for Software Security
free download

we know importance of IT security . Data Information Computer and network security are important for any business or organization. Software security often remains out of focus.

Digital Infrastructure Policies for Data Security and Privacy in Smart Cities
free download

information on citizens and the surrounding environment for enabling smart services. Since those data collections can include personal/sensitive information ensuring security security

Development paradigms of cyberspace endogenous safety and security
free download

security problems. security problems to find a revolutionary security defense structure that does not rely on (but does not exclude) prior knowledge. (1) Cyberspace endogenous security Therefore, it needs to provide a communication mechanism to implement information modes, which is better for supporting a variety of information synchronization methods.

Data Lineage Management with Unlearning Method for Machine Learning Security and Privacy Issues
free download

For users, once they have provided their information in an application, it is difficult to remove it From the security perspective, if an attacker compromises the machine learning model by

CLOUD COMPUTING AND ITS VARIABLE TECHNIQUES IN OBTAINING DATA SECURITY PARAMETER
free download

In this we have reported the identified security challenges and mitigation techniques from SLR also given information about survey participants and explained the analyzed results fromto the information security policy at the banking system is good 19. Adhering to the information security Adhering to the information security policy at the banking system is important 21.

AN IN-DEPTH VISION TO HARDWARE DESIGN SECURITY VULNERABILITIES
free download

and research institutions, information security tool vendors, and product and making it general information or through examining CWE and SANS institute for security have established

A Blockchain-based Secure Storage Scheme for Medical Information
free download

medical information is stored securely and accurately. However, current medical information is To address these issues, this paper proposes a healthcare information security storage

Enhancing Security of Cloud based LMS by deploying secure Loopback Protocol
free download

LMS is mostly on on ever-evolving information technologies. VPN IP security to provide more advanced security and the successor to Transport Layer Security . SSL VPN provides

Implementations on identity-based signature schemes based on variants of CSIDH
free download

and Application of Cryptology and Information Security pp. Journal of the Korea Institute of Information Security Cryptology, 31(3), pp. 497-50 2021.

The Main Tasks of the Network of Computer Security Incident Response Teams in the Light of the Act on the National Cybersecurity System in Poland
free download

and handling of events that breach network security active response in the event of direct to information security and research activities on the scope of methods for detecting security

Juice Jacking: Security Issues and Improvements in USB Technology. Sustainability 202 1 939
free download

device, which has good security but at present, there is a huge gap in USB security leading to data for information security such as data encryption and authentication via the USB line. a significant variety of optical information security systems that take advantage of the inherent benefits of optics to outperform existing digital security methods. Along with encryption,

Customer Satisfaction with Digital Wallet Services: An Analysis of Security Factors
free download

The security information given by digital wallet services thus assist customers in learning more about security Hence, improvised information security management principles are

Enhancement of Security Mechanism In Virtualization Environment
free download

the status of virtualization security . ENISA Security applications with VMI require observing the low-level interaction events between the guest OS and VMM to acquire useful information .

CPU Fuzzing for Discovering Hardware-caused Information Leakage
free download

Microarchitectural side channels are powerful attack techniques Attack cryptographic implementations Spy on user behavior Augment traditional software exploits Building blocks for patients information owing to a lack of security over these information that demands strict protocols and security chiefly tication and protection in medical information security . This work

The ambiguity of cyber security politics in the context of multidimensional uncertainty
free download

cyber security has firmly established itself as one of the top national security issues of the Ukraine s approach to cyber and information security 157 168; bureaucratic bits and bytes

On IND-qCCA security in the ROM and its applications
free download

We can simply see that the PCO oracle returns 1 bit of information thus PKE loses at most q bits of security when a PCO oracle is available. More formally, given A, one can build B as

Mobile Security Risks Overview
free download

one OWASP as of now accumulates information for it. In any case, the information stockpiling and correspondence also awful coding rehearses and lacking security for information

Research of Blockchain Financial Application Standard: Multi-dimensional Perspective and Development Path
free download

financial application information security involves computer security operating system, various security protocols, security The information security standards are standards related to the

Hezah! Ransomware: Externalities, Cost Internalization, and Security Investment Intentionality
free download

security outcomes, depending on whether the restrictions govern security input choices or security van Niekerk, From information security to cyber security Computers Security vol.

Covert Channels in Transport Layer Security : Performance and Security Assessment
free download

included server housing and domain registrations, as well as auditing the information security management system. Her current position is system architect at a governmental agency.

Information Management Systems and its Impact on the Performance of Financial Markets (Applied Study on the Iraqi Stock Exchange)
free download

With an average of (4.08), which is just below the capacity of the system to provide information security with an average of (3.95), and the third and last is the Simplification of Business

The risk assessment on the security of industrial internet infrastructure under intelligent convergence with the case of GEs intellectual transformation
free download

network security connection data security application control security etc. Its core is to a multi-level information security defense system to ensure system security in each technical

Attested Execution Secure Processor-based Architecture for Self-Sovereign Identity Systems Preserving Privacy
free download

Unlike the existing SSI systems, we propose to utilize hardware-assisted security and incorporate Gatt into the SSI system protocols, ΠGatt . It consists of generic functions relying on Gatt

Software Security for the People: Free and Open Resources for Software Security Training
free download

information security . These courses cover a wide spectrum of topics but focus only in a limited way on software security software security skills and practices needed to build security into

Employment information of former students with cybersecurity specialization reviewed utilizing NICE Framework
free download

The specialization option for cyber security was added to the Information and Communication Technology (ICT) studies at JAMK University of Applied Sciences in 2015. This research

Use of network and cyber security tools to counter the security obstacles
free download

This information could include personal and confidential information about the company, its employees, and its customers. Another thing to remember is that the sort of treat differs

Types of Attacks in Wireless Communication Networks
free download

information security requirements in wireless networks. In this paper, the wireless communication definition, their types, equipment, security types of threats to information security which

METHODS FOR THE SECURE USE OF EXTERNAL SERVERS TO SOLVE COMPUTATIONALLY-COMPLEX PROBLEMS WITH SECRET PARAMETERS
free download

This problem is one of the important scientific directions in the field of information security in applied problems of cloud computing and security issues of client-server interactions. The

information security IEEE PAPER 2021


-

Accounting Information Security and IT Governance Under COBIT 5 Framework: A Case Study
free download

This paper aims to explore the role of applying information technology governance using the COBIT 5 framework in improving the security of accounting information systems. The paper also aims to assess the level of governance of information technology in the Trade Bank of This paper analyzes the vulnerability and identification of attacks on corporate networks, the properties of adaptability and development, security model, studied the methods that will reduce the costs of implementing the information security system, consider the analogy Bio

Disentangling the Concept of Information Security Properties: Enabling Effective Information Security Governance
free download

The hyper-dynamic, global adoption of digital technologies due to the Covid-19 pandemic and the increasing digitalization of business models necessitate a dialogue on fundamental concepts that assist organizations in defining appropriate requirements for their information The development of digital technologies leads to an aggravation of the problem of information security and the protection of personal data of network users. The purpose of this chapter is to identify the main threats to information security in the development of the digital Given the increasing financial impact of cybercrime, it has become critical for companies to manage information security risk. The practitioner literature has long argued that the internal audit function (IAF) can play an important role both in providing assurance with respect to

Modern conditions of information security and human life
free download

One of the main tasks of the modern state is to ensure the information security of the individual, which is characterized by the protection of the psyche and consciousness from dangerous information influences: manipulation, misinformation . Now our society is

Towards an Ontology for Enterprise Level Information Security Policy Analysis.
free download

Securing the information and ICT assets in an enterprise is a vital as well as a challenging task because of the increase in cyber-attacks. Information Security policies are designed for an enterprise to prevent security breaches. An enterprise needs to adhere to and abide by

Information Security Project
free download

D SRIVASTAVA103.47.12.35 The objective of this project is to demonstrate the cross site scripting attacks in the word of the internet. SQL injection attack is widely used by attackers to gain unauthorized access to systems. This software can be very helpful in understanding how the XSS attack works if the

Investigating the Level of Awareness on Information Security Amongst Users at Botho University
free download

The growth of technology advancement has promoted a borderless environment among users, organizations, global industry and easy access to information. The use of the internet and computer systems in a teaching environment parallel increased the number of threats in

Aspects of Ensuring Information Security in the Educational and Pedagogical Sphere
free download

The article examines the concept of information security of society and man, the requirements and problems of its provision in the context of global telecommunications and the Internet; manifestation of information security in education, in the educational and

Application of Mathematical Signature Technology in Computer Information Security Design
free download

Digital signature technology is an effective means to ensure the confidentiality, integrity and security of information transmission, and it plays an important role in computer security protection. Based on this, this paper analyzes the application of digital signature technology

Information Security and Competition
free download

Cyber-attacks are a pervasive threat in the digital economy, with the potential to harm firms and their customers. Larger firms constitute more valuable targets to hackers, thereby creating negative network effects. These can be mitigated by investments in security, which

An Information Security Protocol for Automotive Ethernet
free download

Automotive Ethernet is considered the backbone network of future vehicles owing to its high bandwidth, high throughput, and low cost. With the appearance of the connected car environment, in-vehicle networks (eg, automotive Ethernet) are now connected to external

Crimes against the information security of minors committed through information and telecommunication networks (including the Internet)
free download

The article analyzes crimes against information security of minors, committed through information and telecommunication networks (including the Internet), infringing upon such rights and interests of children as the right to life, health, sexual integrity, normal sexual

Building a fuzzy cognitive map of the information security risk formation model
free download

With the development of artificial intelligence technologies, it is necessary to assess the possibilities of their direct and indirect applications from an environmental point of view in order to realize their full potential artificial intelligence technologies for the benefit of planet

INFORMATION SECURITY RISK AUDIT IN ORGANIZATIONS
free download

Information protection has become a significant concern for many organizations. Establishing a security program is the process by which security is provided to the company. It involves five steps: establishing the main steps and the staff responsible for ensuringThis book highlights are potential cyber-security overview, perspective challenges which affect advanced Vehicular technology. It considers vehicular security issues and possible solutions, with the aim of providing secure vehicle-tovehicle, vehicle-to

A Review on Information Security in Cloud Based System during Covid-19 Pandemic
free download

Work from Home is the new trend in corporate working culture in this Covid-19 pandemic situation. Of course it is a preventative measure to avoid the infection from the disease. Not only companies or corporate world but also education sectors are hugely depending on

A Model of an Information Security Management System Based on NTC-ISO/IEC 27001 Standard
free download

In an era of globalization, in which technology has allowed the development of companies to be promoted, data and information become essential assets in organizations, which are exposed to hackers, computer viruses, cyber espionage, and infrastructure failures are some

An Inward Focus of Attention During Information Security Decision Making: Electrophysiological Evidence
free download

Insider threat represents a significant source of violations of information security . Our previous research using event-related potentials (ERPs) has revealed patterns of neural activity that distinguish ethical decision making from decisions that do not involve an ethical Network security is a wider term used to represent security measures applied to the network, which acts as a broadcasting Environment. Computer network is the collection of computers which includes protocol and hardware to connect them in order to share information and

Information Security in Business: A Bibliometric Analysis of the 100 Top Cited Articles
free download

This study aims a bibliometric analysis of the 100 top-cited articles extracted from the Web of Science database on the topic of information security in the business context. A retrospective method was applied to the dataset extracted from the Web of Science Database. A total of

The Exploration of the Training Mode in the Major of Information Security in University
free download

According to the current demand for information security talents, combined with the exploration practice in this major for more than 10 years, the paper puts forward the information security professional talent training mode- production and learning cooperation The 23rd International Conference on Information Security and Cryptology (ICISC 2020) was held in virtual format during December 2 2020. This years conference was hosted by the KIISC (Korea Institute of Information Security and Cryptology). The aim of this conference

A Model Curriculum for Programs of Study in Information Security /Cybersecurity March 2021
free download

Greetings! We would like to take this opportunity to thank you for allowing us to share our lessons learned in the development of Information Security Cybersecurity Curriculum at KSU. As part of our ongoing commitment to Security education, we have decided to formally

THE INFORMATION SECURITY INFLUENCED BY THE LEADERSHIP STYLES: A STUDY IN THE CONTEXT OF BRAZILIAN MULTIPLE BANKS
free download

Employees are still considered the weakest link in IS and managers play an important role in encouraging the desired behavior. This is relevant in the context of Brazilian multiple banks, but there is no academic research in this context. To address this gap, this study analyzed

Labour Relations and the Information Security of the State during the Covid-19 Pandemics
free download

The technological changes directly influence human values, way of life, communication, education, new digital competencies, economic productivity, social rights, privacy, access to information, and more. Understanding and describing these effects is key for understanding

Construction of Innovation and Entrepreneurship Training System for Network Information Security Talents
free download

This paper studies how to create a training system of innovation and entrepreneurship ability of Cyberspace Security Specialty by researching the current situation of college education, stimulate students innovative thinking and entrepreneurial consciousness, and

Information Security Among Young People in the Process of Globalization Mass Cultural and Spiritual Threats
free download

Proceedings of Multidisciplinary International Scientific-Practical Conference Current Issues of Science, Education and Industry in Modern Research 1012th December JournalNX-ISSN No: 2581-4230 Impact Factor 7.223 INFORMATION SECURITY AMONG

Information Security at Schools: A Practical Game-Based Application with Sustained Impact
free download

ABSTRACT 1 The process of awareness raising should be seen as an important factor in enhancing knowledge of information security issues and developing appropriate behavior in response to them. In the project described here, this is carried out by means of awareness

technologies for criminal purposes, the need to unite the efforts of the international community to fight against cyberterrorism, and ensuring information security
free download

A Sheripbayev Yesse University президентінің м. а. ББ yu.edu.kz Contemporary processes of globalization have posed a number of fundamentally new and complex problems facing humanity. Threats to national security in the face of terrorism have always existed. However, with the development of computer technologies and the

A framework for Information Security Management Adoption in Higher Education Institutions in Somalia: Perspectives PMT and TOE
free download

AJ Mohamud muj.so This research paper examines the level of information security in higher education institutions in Somalia by identifying the factors influencing information security management. This research was applied by using protection motivation theory and

On the governments obligation to protect citizens network information security in the digital era
free download

Citation: Li Xiaoyu. On the governments obligation to protect citizens network information security in the digital era/Li Xiaoyu; scientific adviser PA Barakhvostov//«Цифровой Левиафан»: трансформация государства, общества и институтов в эпоху

Factors Affecting the Security of Information Systems: A
free download

system security organization structures. However, despite of all the measures, information security is still a catastrophe. Poor understanding of information security key factor seem to be the main problem. The difference in ICT

The Use Of Artificial Intelligence In Data Security
free download

Student of the Department of Applied Mathematics Jizzakh branch of National University of Uzbekistan Jizzakh, Uzbekistan rakhmatov@workmail.com Abstract: An analysis of possible ways to use artificial intelligence in the field of information security was conducted

International Law Thinking on Data Security In TikTok Incident
free download

voice in the field of information data, improve the data flow rule. Keywords: Ban promulgation, Data flow, National Information security Data network order 1. INTRODUCTION In July this year, the United States in the trump of

INFORMMATION SECURITY IN THE COURSE OF COUNTERACTING HYBRID AGGRESSION
free download

org/0000-0003-4860-9571 INFORMMATION SECURITY IN THE COURSE OF COUNTERACTING HYBRID AGGRESSION The publication is devoted to outlining a general approach to understanding the theoretical foundations of information security of the state, in particular in

Introduction to the Minitrack on Security and Privacy Aspects of Human-Computer-Interactions
free download

Especially the human factor of information systems is a pivotal role in information security and increasingly relevant in establishing user-privacy concepts However, studies show users are also seen as the weakest link in information security

INFORMATION PROTECTION AND SECURITY IN MODERN ORGANIZATIONS
free download

processes and limit their effectiveness. REFERENCES Coles-Kemp, L. (2009) Information Security Management: an entangled research challenge , Information Security Technical Report, 14(4), 181-185. Dhillon, G. Backhouse, J

Multidimensional information encryption and storage: when the input is light
free download

The issue of information security is closely related to every aspect of daily life. For pursuing a higher level of security, much effort has been continuously invested in the development of information security technologies based on encryption and storage