Critical Information Security Challenges: An Appraisal

被引:0
|
作者
Mir, Mohammad Shuaib [1 ]
Wani, Sharyar [1 ]
Ibrahim, Jamauldin [1 ]
机构
[1] Int Islamic Univ Malaysia, Dept Informat Syst, Kulliyah Informat & Commun Technol, Gombak 53100, Malaysia
关键词
Information Leakage; Security Issues; Identity Theft; Security Policy; Critical Challenges; Credentials;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Information is one of the most crucial assets of current day organizations. However, managing this information has become a never ending challenge. Adequate security and privacy are of great essence for information systems containing valuable data and information. Leakage of such information can facilitate large-scale identity theft and successful impersonation of a victim lets the identity thief commit fraud. Identity theft occurs when someone uses another individual's personal information to pose as that individual. This study highlights the importance of information security management in organizations and identifies various critical security challenges that often lead to information leakage within the organizations. Qualitative method of research has been employed for data collection and analysis. The results obtained are categorized into eleven critical security challenges in order of the number of cases reported for each of them.
引用
收藏
页数:4
相关论文
共 50 条
  • [41] Security in information systems: Advances and new challenges
    Blanco, Carlos
    Rosado, David G.
    Enrique Sanchez, Luis
    Juerjens, Jan
    COMPUTER STANDARDS & INTERFACES, 2014, 36 (04) : 687 - 688
  • [42] Internet of Things: information security challenges and solutions
    Natalia Miloslavskaya
    Alexander Tolstoy
    Cluster Computing, 2019, 22 : 103 - 119
  • [43] Challenges and Best Practices in Information Security Management
    McLaughlin, Mark-David
    Gogan, Janis
    MIS QUARTERLY EXECUTIVE, 2018, 17 (03) : 237 - 262
  • [44] Electronic information and digitization - Preservation and security challenges
    Anderson, ML
    TO PRESERVE AND PROTECT: THE STRATEGIC STEWARDSHIP OF CULTURAL RESOURCES, 2002, : 207 - +
  • [45] A CBK for Information Security and Critical Information and Communication Infrastructure Protection
    Theoharidou, Marianthi
    Xidara, Dimitra
    Gritzalis, Dimitris
    INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2008, 1 : 81 - 96
  • [46] ARCHITECTURAL MODEL FOR INFORMATION SECURITY ANALYSIS OF CRITICAL INFORMATION INFRASTRUCTURES
    Ma, Zhendong
    Smith, Paul
    Skopik, Florian
    IDIMT-2013: INFORMATION TECHNOLOGY HUMAN VALUES, INNOVATION AND ECONOMY, 2013, 42 : 197 - 204
  • [47] Strategies of containment: A critical appraisal of postwar American national security policy
    Brinkley, D
    AMERICAN HERITAGE, 2004, 55 (06) : 62 - 62
  • [48] Africa and the UN Security Council, 1945-2010: a critical appraisal
    Souare, Issaka K.
    AFRICAN SECURITY REVIEW, 2011, 20 (01) : 83 - 94
  • [49] Critical Theory as an Approach to the Ethics of Information Security
    Bernd Carsten Stahl
    Neil F. Doherty
    Mark Shaw
    Helge Janicke
    Science and Engineering Ethics, 2014, 20 : 675 - 699
  • [50] Information Security Culture Critical Success Factors
    Alnatheer, Mohammed A.
    2015 12TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY - NEW GENERATIONS, 2015, : 731 - 735