Information Security:A review of information security issues and techniques

被引:0
|
作者
Alkhudhayr, Fatimah [1 ]
Alfarraj, Shouq [1 ]
Aljameeli, Buthina [1 ]
Elkhdiri, Salim [1 ]
机构
[1] Qassim Univ, IT Dept, BIND Res Grp, Coll Comp, Qasim, Saudi Arabia
关键词
information security; cyber security; Internet of Things; network security; attacks; NETWORK;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Currently, corporations are more into using distributed systems and relying on networks and communication facilities for transmitting critical and important information that needs to be secured. Therefore, protecting corporations' information becomes more important, and information security is essential to maintain. Information security is defined as protecting the information, the system, and the hardware that use, store and transmit the information, to ensure integrity, confidentiality and availability of data and operation procedures are protected. In this paper, we illustrate the factors that impact information security in different fields; cyber security, Internet of Things and network security from various studies and outline the security requirements to reduce this impact.
引用
收藏
页数:5
相关论文
共 50 条
  • [41] Key technologies in information security - A review
    Athisha, G
    Sankaranarayanan, K
    [J]. IETE TECHNICAL REVIEW, 2005, 22 (03) : 173 - 181
  • [42] Information security based on soft computing techniques
    Siripanwattana, Witaya
    Srinoy, Surat
    [J]. IMECS 2008: INTERNATIONAL MULTICONFERENCE OF ENGINEERS AND COMPUTER SCIENTISTS, VOLS I AND II, 2008, : 271 - 275
  • [43] A Review on Gamification for Information Security Training
    Sharif, Karzan Hussein
    Ameen, Siddeeq Yousif
    [J]. 2021 INTERNATIONAL CONFERENCE OF MODERN TRENDS IN INFORMATION AND COMMUNICATION TECHNOLOGY INDUSTRY (MTICTI 2021), 2021, : 123 - 130
  • [44] Information security matters: fifty years of information security
    Ross, Steven J.
    [J]. ISACA Journal, 2019, 1 : 4 - 6
  • [45] Applications of trusted review to information security
    Yesberg, J
    Henderson, M
    [J]. INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2001, 2119 : 305 - 319
  • [46] Discussion on Information Security Techniques Curriculum Construction
    Sun, Nigang
    Zheng, Hong
    Li, Jianhua
    Guo, Weibin
    [J]. ICFCSE 2011: 2011 INTERNATIONAL CONFERENCE ON FUTURE COMPUTER SUPPORTED EDUCATION, VOL 1, 2011, : 182 - 184
  • [47] Huge information extraction techniques of Data Security
    Mylavarapu, Raghu T.
    Mylavarapu, Bharadwaja Krishnadev
    [J]. PROCEEDINGS OF THE 2018 SECOND INTERNATIONAL CONFERENCE ON INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICICCT), 2018, : 179 - 183
  • [48] Information security management: A bibliographic review
    Cardenas-Solano, Leidy-Johanna
    Martinez-Ardila, Hugo
    Becerra-Ardila, Luis-Eduardo
    [J]. PROFESIONAL DE LA INFORMACION, 2016, 25 (06): : 931 - 948
  • [49] Data mining techniques for information security applications
    Al-Shawi, Amany
    [J]. WILEY INTERDISCIPLINARY REVIEWS-COMPUTATIONAL STATISTICS, 2011, 3 (03): : 221 - 229
  • [50] INFORMATION TECHNIQUES AND CRIME - FORMS AND SECURITY MEASURES
    POERTING, P
    [J]. BETRIEBSWIRTSCHAFTLICHE FORSCHUNG UND PRAXIS, 1990, 42 (03): : 177 - 187