Information Security:A review of information security issues and techniques

被引:0
|
作者
Alkhudhayr, Fatimah [1 ]
Alfarraj, Shouq [1 ]
Aljameeli, Buthina [1 ]
Elkhdiri, Salim [1 ]
机构
[1] Qassim Univ, IT Dept, BIND Res Grp, Coll Comp, Qasim, Saudi Arabia
关键词
information security; cyber security; Internet of Things; network security; attacks; NETWORK;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Currently, corporations are more into using distributed systems and relying on networks and communication facilities for transmitting critical and important information that needs to be secured. Therefore, protecting corporations' information becomes more important, and information security is essential to maintain. Information security is defined as protecting the information, the system, and the hardware that use, store and transmit the information, to ensure integrity, confidentiality and availability of data and operation procedures are protected. In this paper, we illustrate the factors that impact information security in different fields; cyber security, Internet of Things and network security from various studies and outline the security requirements to reduce this impact.
引用
收藏
页数:5
相关论文
共 50 条
  • [1] A Review on Information, Information Security and Security Processes
    Canbek, Gurol
    Sagiroglu, Seref
    [J]. JOURNAL OF POLYTECHNIC-POLITEKNIK DERGISI, 2006, 9 (03): : 165 - 174
  • [2] INFORMATION SECURITY ISSUES TRAINING
    Piza, D. M.
    Sleptsov, V. I.
    [J]. RADIO ELECTRONICS COMPUTER SCIENCE CONTROL, 2005, 1 : 130 - 133
  • [3] Issues in modeling information security
    Garrido, Jose M.
    [J]. INT CONF ON CYBERNETICS AND INFORMATION TECHNOLOGIES, SYSTEMS AND APPLICATIONS/INT CONF ON COMPUTING, COMMUNICATIONS AND CONTROL TECHNOLOGIES, VOL 1, 2007, : 325 - 328
  • [4] Information Security Issues of RFID
    Nyikes, Zoltan
    [J]. 2016 IEEE 14TH INTERNATIONAL SYMPOSIUM ON APPLIED MACHINE INTELLIGENCE AND INFORMATICS (SAMI), 2016, : 111 - 114
  • [5] Analyzing Information Security Issues Using Data Mining Techniques
    Schiopu, Daniela
    Tudor, Irina
    [J]. PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON VIRTUAL LEARNING, 2008, : 215 - 222
  • [6] Digital Watermarking Techniques and Security Issues in the Information and Communication Society
    Nin, Jordi
    Ricciardi, Sergio
    [J]. 2013 IEEE 27TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS (WAINA), 2013, : 1553 - 1558
  • [7] Outsourcing Information Security: Contracting Issues and Security Implications
    Cezar, Asunur
    Cavusoglu, Huseyin
    Raghunathan, Srinivasan
    [J]. MANAGEMENT SCIENCE, 2014, 60 (03) : 638 - 657
  • [8] A Review of techniques for security information for agent approaches in networks
    Halboosa, Estabraq Hussein Jasim
    Albakrya, Abbas M.
    [J]. PRZEGLAD ELEKTROTECHNICZNY, 2023, 99 (06): : 212 - 219
  • [9] Optical Techniques for Information Security
    Matoba, Osamu
    Nomura, Takanori
    Perez-Cabre, Elisabet
    Millan, Maria S.
    Javidi, Bahram
    [J]. PROCEEDINGS OF THE IEEE, 2009, 97 (06) : 1128 - 1148
  • [10] Information Security Issues in the Distributed Information Measurement System
    Zakasovskaya, E.
    Tarasov, V.
    Glushchenko, A.
    [J]. 2017 INTERNATIONAL CONFERENCE ON INDUSTRIAL ENGINEERING, APPLICATIONS AND MANUFACTURING (ICIEAM), 2017,