Information Systems Development and Usage with Consideration of Privacy and Cyber Security Aspects

被引:0
|
作者
Jablonski, Janusz [1 ]
Robak, Silva [1 ]
机构
[1] Uniwersytet Zielonogorski, Ul Prof Z Szafrana 4a, PL-65516 Zielona Gora, Poland
关键词
D O I
10.15439/2019F261
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
One of the contemporary problems, and at the same time a challenge, with development und usage of supply chain Information Systems are the issues associated with privacy and cyber security, which emerged due to new requirements of legal regulations and directives. The human factor belongs to the biggest risks within these issues. Leak of information, phishing, unauthorized access are the main problems. Also vulnerability of the systems due to new information technologies is an important topic. In this paper we discuss development and usage of Information Systems with regard to the security aspects associated to the software development lifecycle. We present our approach on examples of a user authentication process in logistics.
引用
收藏
页码:547 / 554
页数:8
相关论文
共 50 条
  • [31] Information Security Governance on National Cyber Physical Systems
    Setiawan, Ahmad Budi
    Syamsudin, Aries
    Sastrosubroto, Ashwin Sasongko
    PROCEEDINGS OF 2016 INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY SYSTEMS AND INNOVATION (ICITSI), 2016,
  • [32] A Harmonized Information Security Taxonomy for Cyber Physical Systems
    Pool, Johannes Hendrik
    Venter, Hein
    APPLIED SCIENCES-BASEL, 2022, 12 (16):
  • [33] Security and privacy in cloud-assisted cyber-physical systems
    Alcaraz, Cristina
    Huang, Xinyi
    Rome, Erich
    COMPUTER NETWORKS, 2018, 138 : 13 - 14
  • [34] Guest Editors' Introduction: Cyber-Physical Systems Security and Privacy
    Maniatakos, Michail
    Karri, Ramesh
    Cardenas, Alvaro A.
    IEEE DESIGN & TEST, 2017, 34 (04) : 5 - 6
  • [35] Special Issue on Security and Privacy in Smart Cyber-physical Systems
    Ben Othmane, Lotfi
    Jacobson, Doug
    Weippl, Edgar
    COMPUTERS & SECURITY, 2019, 87
  • [36] Development of cyber information security education and training system
    Bong-Hyun Kim
    Ki-Chan Kim
    Sung-Eon Hong
    Sang-Young Oh
    Multimedia Tools and Applications, 2017, 76 : 6051 - 6064
  • [37] Development of cyber information security education and training system
    Kim, Bong-Hyun
    Kim, Ki-Chan
    Hong, Sung-Eon
    Oh, Sang-Young
    MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (04) : 6051 - 6064
  • [38] Game Theory for Cyber Security and Privacy
    Do, Cuong T.
    Tran, Nguyen H.
    Hong, Choongseon
    Kamhoua, Charles A.
    Kwiat, Kevin A.
    Blasch, Erik
    Ren, Shaolei
    Pissinou, Niki
    Iyengar, Sundaraja Sitharama
    ACM COMPUTING SURVEYS, 2017, 50 (02) : 30 - 37
  • [39] Balancing Cyber-Security and Privacy
    Patakyova, Maria T.
    BRATISLAVA LAW REVIEW, 2020, 4 (01): : 181 - 183
  • [40] Taxonomy Analysis of Security Aspects in Cyber Physical Systems Applications
    Gawanmeh, Amjad
    Alomari, Ahmad
    2018 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS WORKSHOPS (ICC WORKSHOPS), 2018,