The Impact Assessment of IT Infrastructure on Information Security: A Survey Report

被引:1
|
作者
Shrivastava, Ankur Kumar [1 ]
机构
[1] Sai Nath Univ, Ranchi 834001, Jharkhand, India
关键词
Risk assessment; Threat evaluation; Risk gauge: Quantitative; Qualitative; Privacy; Integrity; Vulnerability;
D O I
10.1016/j.procs.2016.02.062
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Information technology infrastructure trigger unending concern for IT players accountable for information security. Sensitive organization information can be easily acquired and lost. The community dearth of self-confidence in information technology (IT) infrastructure is not purely about security of worth, but also about faith in the information group. Integrity, privacy and vulnerability security fears are the important cause web user is not confident over the web. Proposes to investigate the integrity, privacy and vulnerability security fears of IT user in order to establish a consensus among them. Uses data from 127 contributors to come to a decision that the following major concerns (in the descending of importance) exist: integrity, privacy, security and fears, unauthorized access, data leaked, impersonation and forged identity and e-mail safety. The objective of the survey was to collect statistics to quantify the influence of Information technology infrastructure on organization information security. (C) 2016 The Authors. Published by Elsevier B.V.
引用
收藏
页码:314 / 322
页数:9
相关论文
共 50 条
  • [41] Assessing the risk of an information infrastructure through security dependencies
    Baiardi, F.
    Suin, S.
    Telmon, C.
    Pioli, M.
    CRITICAL INFORMATION INFRASTRUCTURES SECURITY, 2006, 4347 : 42 - +
  • [42] A study of information security practice in a critical infrastructure application
    Jaatun, Martin Gilje
    Albrechtsen, Eirik
    Line, Maria B.
    Johnsen, Stig Ole
    Waero, Irene
    Longva, Odd Helge
    Tondel, Inger Anne
    AUTONOMIC AND TRUSTED COMPUTING, PROCEEDINGS, 2008, 5060 : 527 - +
  • [43] Information system security assessment
    Mrazik, Frantisek
    Kollar, Jan
    2008 6TH INTERNATIONAL SYMPOSIUM ON APPLIED MACHINE INTELLIGENCE AND INFORMATICS, 2008, : 234 - 236
  • [44] INFORMATION SECURITY PMP REPORT
    Wegener, Henning
    Westby, Jody R.
    INTERNATIONAL SEMINAR ON NUCLEAR WAR AND PLANETARY EMERGENCIES, 43RD SESSION, 2011, : 593 - 593
  • [45] Computational Intelligence for Information Security: A Survey
    Wang, Ruili
    Ji, Wanting
    IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTATIONAL INTELLIGENCE, 2020, 4 (05): : 616 - 629
  • [46] A Survey on Information Security in Cloud Computing
    Orantes Jimenez, Sandra Dinora
    Aguirre Anaya, Eleazar
    COMPUTACION Y SISTEMAS, 2020, 24 (02): : 819 - 833
  • [47] INFORMATION SECURITY PMP REPORT
    Wegener, Henning
    Westby, Jody R.
    INTERNATIONAL SEMINAR ON NUCLEAR WAR AND PLANETARY EMERGENCIES, 44TH SESSION, 2012, : 561 - 562
  • [48] Anomaly detection survey for information security
    Kaur, Harsurinder
    Pannu, Husanbir Singh
    SIN'17: PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON SECURITY OF INFORMATION AND NETWORKS, 2017, : 251 - +
  • [49] A Survey of Interdependent Information Security Games
    Laszka, Aron
    Felegyhazi, Mark
    Buttyan, Levente
    ACM COMPUTING SURVEYS, 2015, 47 (02)
  • [50] Survey of Big Data Information Security
    Miloslavskaya, Natalia
    Makhmudova, Aida
    2016 IEEE 4TH INTERNATIONAL CONFERENCE ON FUTURE INTERNET OF THINGS AND CLOUD WORKSHOPS (FICLOUDW), 2016, : 133 - 138