Goals and Practices in Maintaining Information Systems Security

被引:4
|
作者
Erlich, Zippy [1 ]
Zviran, Moshe [2 ]
机构
[1] Open Univ Israel, Dept Comp Sci, Raanana, Israel
[2] Tel Aviv Univ, Leon Racanati Grad Sch Business Adm, Fac Management, Informat Syst, Tel Aviv, Israel
关键词
Authentication; Availability; Confidentially; Integrity; Intrusion Detection Systems (IDS); Intrusion Prevention Systems (IPS); Security Policy;
D O I
10.4018/jisp.2010070103
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
With the rapid growth of information systems and networks, security is a major concern of organizations. The main goals of information systems security are confidentially, integrity, and availability. The cornerstone of an organization's security lies in designing, developing and implementing proper information systems' security policy that balances security goals with the organization's needs. In this paper, the authors discuss the goals of information systems security and the techniques to achieve them. Specifically, the paper focuses on access control and the various authentication approaches, as well as intrusion detection and prevention systems. As attacks become more frequent and devastating, ongoing research is required to adapt and improve security technologies and policies to reflect new modes of attack to keep information systems secure.
引用
收藏
页码:40 / 50
页数:11
相关论文
共 50 条
  • [41] DEPENDABILITY AND SECURITY OF THE INFORMATION SYSTEMS
    Capek, Jan
    [J]. ANNALS OF DAAAM FOR 2008 & PROCEEDINGS OF THE 19TH INTERNATIONAL DAAAM SYMPOSIUM, 2008, : 199 - 200
  • [42] Factors affecting perception of information security and their impacts on IT adoption and security practices
    Huang, Ding-Long
    Rau, Pei-Luen Patrick
    Salvendy, Gavriel
    Gao, Fei
    Zhou, Jia
    [J]. INTERNATIONAL JOURNAL OF HUMAN-COMPUTER STUDIES, 2011, 69 (12) : 870 - 883
  • [43] Information Security Culture: Towards an Instrument for Assessing Security Management Practices
    Lim, Loo S.
    Maynard, Sean B.
    Ahmad, Atif
    Chang, Shanton
    [J]. INTERNATIONAL JOURNAL OF CYBER WARFARE AND TERRORISM, 2015, 5 (02) : 31 - 52
  • [44] MAINTAINING SECURITY
    WILLARD, RK
    [J]. SOCIETY, 1982, 19 (03) : 75 - 76
  • [45] Analysis of Information Security of Distributed Information Systems
    Grusho, Alexander
    Grusho, Nick
    Levykin, Michael
    Timonina, Elena
    [J]. 2017 9TH INTERNATIONAL CONGRESS ON ULTRA MODERN TELECOMMUNICATIONS AND CONTROL SYSTEMS AND WORKSHOPS (ICUMT), 2017, : 96 - 100
  • [46] Information warfare and the information systems security professional
    Kovacich, GL
    [J]. COMPUTERS & SECURITY, 1997, 16 (01) : 14 - 24
  • [47] PERSONALIZED INFORMATION SECURITY IN HEALTH INFORMATION SYSTEMS
    Kablukov, A. A.
    Ivankova, I. A.
    [J]. ZAPOROZHYE MEDICAL JOURNAL, 2012, (06) : 91 - 93
  • [48] Comparison of Information Security Systems for Asymptotic Information Security Management Critical Information Infrastructures
    Erokhin, Sergey
    Petukhov, Andrey
    Pilyugin, Pavel
    [J]. PROCEEDINGS OF THE 28TH CONFERENCE OF OPEN INNOVATIONS ASSOCIATION FRUCT, 2021, : 89 - 95
  • [49] TOOLS TO ALIGN GOALS AND INFORMATION-SYSTEMS
    CHMURA, A
    CROCKETT, HD
    [J]. IEEE SOFTWARE, 1995, 12 (03) : 108 - 109
  • [50] ADVANCED INFORMATION-SYSTEMS AND THE GOALS OF SCHOOLING
    THOMAS, RM
    [J]. ANDREW SEYBOLDS OUTLOOK ON PROFESSIONAL COMPUTING, 1987, 5 (12): : 12 - 15