Information and Information Security

被引:1
|
作者
Henno, Jaak [1 ]
机构
[1] Tallinn Univ Technol, EE-19086 Tallinn, Estonia
关键词
Internet; Information; Security; Passwords;
D O I
10.3233/978-1-61499-611-8-103
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
News about hacking have become so common that most people do not follow them anymore and many do not even care, considering hacking an inevitable vice. But situation is rapidly deteriorating and many people (even in academy) are not aware or do not take seriously the emerging future, where Internet is a 'free wild West' where everyone can freely break everything and steel whatever seems to be valuable. Here is presented overview of current situation, analyzed reasons for this and presented some ideas about future and an overview of progress made in Estonia in secure use of e-tools.
引用
收藏
页码:103 / 120
页数:18
相关论文
共 50 条
  • [1] A Review on Information, Information Security and Security Processes
    Canbek, Gurol
    Sagiroglu, Seref
    [J]. JOURNAL OF POLYTECHNIC-POLITEKNIK DERGISI, 2006, 9 (03): : 165 - 174
  • [2] Nurse Information Security Policy Compliance, Information Competence, and Information Security Attitudes Predict Information Security Behavior
    Kang, Purum
    Kang, Jiwon
    Monsen, Karen A.
    [J]. CIN-COMPUTERS INFORMATICS NURSING, 2023, 41 (08) : 595 - 602
  • [3] A Conceptual Analysis of Information Security Education, Information Security Training and Information Security Awareness Definitions
    Amankwa, Eric
    Loock, Marianne
    Kritzinger, Elmarie
    [J]. 2014 9TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2014, : 248 - 252
  • [4] Information Security:A review of information security issues and techniques
    Alkhudhayr, Fatimah
    Alfarraj, Shouq
    Aljameeli, Buthina
    Elkhdiri, Salim
    [J]. 2019 2ND INTERNATIONAL CONFERENCE ON COMPUTER APPLICATIONS & INFORMATION SECURITY (ICCAIS), 2019,
  • [5] Information security matters: What is information security worth?
    Ross, Steven J.
    [J]. ISACA Journal, 2019, 2 : 4 - 6
  • [6] Information security matters: fifty years of information security
    Ross, Steven J.
    [J]. ISACA Journal, 2019, 1 : 4 - 6
  • [7] INFORMATION SECURITY
    LIVINGSTON, MS
    [J]. BULLETIN OF THE ATOMIC SCIENTISTS, 1956, 12 (05) : 172 - 174
  • [8] INFORMATION SECURITY
    HIGHLAND, HJ
    [J]. COMPUTERS & SECURITY, 1995, 14 (04) : 274 - 275
  • [9] Information Security
    You, Ilsun
    Weippl, Edgar
    [J]. JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2013, 19 (16) : 2347 - 2348
  • [10] Information security
    Matotek, Ratko
    [J]. GRADEVINAR, 2024, 76 (02): : 192 - 194