The Impact Assessment of IT Infrastructure on Information Security: A Survey Report

被引:1
|
作者
Shrivastava, Ankur Kumar [1 ]
机构
[1] Sai Nath Univ, Ranchi 834001, Jharkhand, India
关键词
Risk assessment; Threat evaluation; Risk gauge: Quantitative; Qualitative; Privacy; Integrity; Vulnerability;
D O I
10.1016/j.procs.2016.02.062
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Information technology infrastructure trigger unending concern for IT players accountable for information security. Sensitive organization information can be easily acquired and lost. The community dearth of self-confidence in information technology (IT) infrastructure is not purely about security of worth, but also about faith in the information group. Integrity, privacy and vulnerability security fears are the important cause web user is not confident over the web. Proposes to investigate the integrity, privacy and vulnerability security fears of IT user in order to establish a consensus among them. Uses data from 127 contributors to come to a decision that the following major concerns (in the descending of importance) exist: integrity, privacy, security and fears, unauthorized access, data leaked, impersonation and forged identity and e-mail safety. The objective of the survey was to collect statistics to quantify the influence of Information technology infrastructure on organization information security. (C) 2016 The Authors. Published by Elsevier B.V.
引用
收藏
页码:314 / 322
页数:9
相关论文
共 50 条
  • [1] A Survey on Security Assessment of Metering Infrastructure in Smart Grid Systems
    Anzalchi, Arash
    Sarwat, Arif
    [J]. IEEE SOUTHEASTCON 2015, 2015,
  • [2] A Survey on PEV Charging Infrastructure: Impact Assessment and Planning
    Abdalrahman, Ahmed
    Zhuang, Weihua
    [J]. ENERGIES, 2017, 10 (10)
  • [3] A SURVEY OF CRITICAL INFRASTRUCTURE SECURITY
    Hurst, William
    Merabti, Madjid
    Fergus, Paul
    [J]. CRITICAL INFRASTRUCTURE PROTECTION VIII, 2014, 441 : 127 - 138
  • [4] Homeland security & infrastructure information
    Walker, DE
    [J]. ASHRAE JOURNAL, 2004, 46 (05) : 61 - 61
  • [5] Information Security Risk Assessment in Critical Infrastructure: A Hybrid MCDM Approach
    Turskis, Zenonas
    Goranin, Nikolaj
    Nurusheva, Assel
    Boranbayev, Seilkhan
    [J]. INFORMATICA, 2019, 30 (01) : 187 - 211
  • [6] Security techniques for the global information infrastructure
    Fumy, W
    Haas, I
    [J]. GLOBECOM 98: IEEE GLOBECOM 1998 - CONFERENCE RECORD, VOLS 1-6: THE BRIDGE TO GLOBAL INTEGRATION, 1998, : 3141 - 3146
  • [7] Survey of information security
    Shen ChangXiang
    Zhang HuangGuo
    Feng Dengguo
    Cao Zhenfu
    Huang Jiwu
    [J]. SCIENCE IN CHINA SERIES F-INFORMATION SCIENCES, 2007, 50 (03): : 273 - 298
  • [8] Survey of information security
    ChangXiang Shen
    HuangGuo Zhang
    DengGuo Feng
    ZhenFu Cao
    JiWu Huang
    [J]. Science in China Series F: Information Sciences, 2007, 50 : 273 - 298
  • [9] Security techniques for the global information infrastructure
    Fumy, Walter
    Haas, Ingbert
    [J]. Conference Record / IEEE Global Telecommunications Conference, 1998, 6 : 3141 - 3146
  • [10] INFORMATION SECURITY MANAGEMENT FOR CLOUD INFRASTRUCTURE
    Tsaregorodtsev, A. V.
    Lvovich, I. Ya.
    Shikhaliev, M. S.
    Zelenina, A. N.
    Choporov, O. N.
    [J]. INTERNATIONAL JOURNAL ON INFORMATION TECHNOLOGIES AND SECURITY, 2019, 11 (03): : 91 - 100