Goals and Practices in Maintaining Information Systems Security

被引:4
|
作者
Erlich, Zippy [1 ]
Zviran, Moshe [2 ]
机构
[1] Open Univ Israel, Dept Comp Sci, Raanana, Israel
[2] Tel Aviv Univ, Leon Racanati Grad Sch Business Adm, Fac Management, Informat Syst, Tel Aviv, Israel
关键词
Authentication; Availability; Confidentially; Integrity; Intrusion Detection Systems (IDS); Intrusion Prevention Systems (IPS); Security Policy;
D O I
10.4018/jisp.2010070103
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
With the rapid growth of information systems and networks, security is a major concern of organizations. The main goals of information systems security are confidentially, integrity, and availability. The cornerstone of an organization's security lies in designing, developing and implementing proper information systems' security policy that balances security goals with the organization's needs. In this paper, the authors discuss the goals of information systems security and the techniques to achieve them. Specifically, the paper focuses on access control and the various authentication approaches, as well as intrusion detection and prevention systems. As attacks become more frequent and devastating, ongoing research is required to adapt and improve security technologies and policies to reflect new modes of attack to keep information systems secure.
引用
收藏
页码:40 / 50
页数:11
相关论文
共 50 条
  • [1] GOALS, PRACTICES AND PROBLEMS OF EDUCATION-INFORMATION SYSTEMS
    FIFE, JD
    [J]. PROSPECTS, 1977, 7 (03) : 423 - 434
  • [2] Communicating Information Systems Goals: A Case in Internet Banking Security
    Koskosas, Ioannis V.
    [J]. COMPUTER SCIENCE AND INFORMATION SYSTEMS, 2009, 6 (01) : 71 - 92
  • [3] MAINTAINING THE SECURITY OF PROPRIETARY INFORMATION
    SANDT, BW
    [J]. ABSTRACTS OF PAPERS OF THE AMERICAN CHEMICAL SOCIETY, 1984, 188 (AUG): : 25 - CINF
  • [4] Maintaining security and privacy of patient information
    Ferrante, Frank E.
    [J]. 2006 28th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, Vols 1-15, 2006, : 6392 - 6392
  • [5] Embedding security practices in contemporary information systems development approaches
    Tryfonas, T.
    Kiountouzis, E.
    Poulymenakou, A.
    [J]. Information Management and Computer Security, 2001, 9 (04): : 183 - 197
  • [6] Governing border security infrastructures: Maintaining large-scale information systems
    Glouftsios, Georgios
    [J]. SECURITY DIALOGUE, 2021, 52 (05) : 452 - 470
  • [7] Information systems security policy implementation in practice: from best practices to situated practices
    Niemimaa, Elina
    Niemimaa, Marko
    [J]. EUROPEAN JOURNAL OF INFORMATION SYSTEMS, 2017, 26 (01) : 1 - 20
  • [8] Maintaining Information Security in the New Technological Scenario
    Aguilar Andrijic Malandrin, Leandro Jose
    Melo de Brito Carvalho, Tereza Cristina
    [J]. PACIFIC ASIA JOURNAL OF THE ASSOCIATION FOR INFORMATION SYSTEMS, 2013, 5 (03): : 43 - 64
  • [9] Improving Security Practices in Health Information Systems with STRIDE threat modeling
    Hossain, Md Ismail
    Hasan, Ragib
    [J]. 2023 IEEE 9TH WORLD FORUM ON INTERNET OF THINGS, WF-IOT, 2023,
  • [10] Maintaining quality in information systems
    Fox, TL
    Guynes, CS
    Prybutok, VR
    Windsor, J
    [J]. JOURNAL OF COMPUTER INFORMATION SYSTEMS, 1999, 40 (01) : 76 - 80