Goals and Practices in Maintaining Information Systems Security

被引:4
|
作者
Erlich, Zippy [1 ]
Zviran, Moshe [2 ]
机构
[1] Open Univ Israel, Dept Comp Sci, Raanana, Israel
[2] Tel Aviv Univ, Leon Racanati Grad Sch Business Adm, Fac Management, Informat Syst, Tel Aviv, Israel
关键词
Authentication; Availability; Confidentially; Integrity; Intrusion Detection Systems (IDS); Intrusion Prevention Systems (IPS); Security Policy;
D O I
10.4018/jisp.2010070103
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
With the rapid growth of information systems and networks, security is a major concern of organizations. The main goals of information systems security are confidentially, integrity, and availability. The cornerstone of an organization's security lies in designing, developing and implementing proper information systems' security policy that balances security goals with the organization's needs. In this paper, the authors discuss the goals of information systems security and the techniques to achieve them. Specifically, the paper focuses on access control and the various authentication approaches, as well as intrusion detection and prevention systems. As attacks become more frequent and devastating, ongoing research is required to adapt and improve security technologies and policies to reflect new modes of attack to keep information systems secure.
引用
收藏
页码:40 / 50
页数:11
相关论文
共 50 条
  • [31] Challenges and Best Practices in Information Security Management
    McLaughlin, Mark-David
    Gogan, Janis
    [J]. MIS QUARTERLY EXECUTIVE, 2018, 17 (03) : 237 - 262
  • [32] Maintaining Meaning of Information when it is Shared amongst Information Systems
    Aisbett, Janet
    Zhao, Shuxin
    Gibbon, Greg
    Dampney, C. N. G.
    [J]. INTERNATIONAL JOURNAL OF ENTERPRISE INFORMATION SYSTEMS, 2006, 2 (02) : 63 - 77
  • [33] Verifying information flow goals in Security-Enhanced Linux
    Guttman, Joshua
    Herzog, Amy
    Ramsdell, John
    Skorupka, Clement
    [J]. JOURNAL OF COMPUTER SECURITY, 2005, 13 (01) : 115 - 134
  • [34] The Security of Information Systems in Business
    Beldjilali, Tarik
    [J]. INNOVATION AND KNOWLEDGE MANAGEMENT IN TWIN TRACK ECONOMIES: CHALLENGES & SOLUTIONS, VOLS 1-3, 2009, : 893 - 899
  • [35] Safety and security of information systems
    Shaw, R
    [J]. TOWARDS SECURITY IN MEDICAL TELEMATICS: LEGAL AND TECHNICAL ASPECTS, 1996, 27 : 190 - 199
  • [36] Security Framework for Information Systems
    Martins, Jose
    dos Santos, Henrique
    Nunes, Paulo
    [J]. PROCEEDINGS OF THE 8TH EUROPEAN CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2009, : 164 - 176
  • [37] Airport information systems security
    Wilson, DL
    [J]. IEEE AEROSPACE AND ELECTRONIC SYSTEMS MAGAZINE, 2003, 18 (04) : 25 - 27
  • [38] INFORMATION SECURITY IN OPEN SYSTEMS
    KARILA, A
    [J]. IFIP TRANSACTIONS C-COMMUNICATION SYSTEMS, 1992, 6 : 459 - 478
  • [39] Security in healthcare information systems
    Omogbadegun, Z. O.
    [J]. Information Processing in the Service of Mankind and Health, 2006, : 185 - 206
  • [40] INFORMATION SECURITY IN OPEN SYSTEMS
    KREUTZ, H
    [J]. ELECTRONIC INFORMATION SYSTEMS: REALIZATION, CHOICES AND USE, 1989, : 91 - 100