Information security and data protection

被引:3
|
作者
Qureshi, AA [1 ]
Siegel, JG [1 ]
机构
[1] CUNY Queens Coll, Flushing, NY 11367 USA
关键词
computer security; data security; information security; network security; contingency planning; risk analysis; data backup; data recovery; security policy; audit trail;
D O I
10.1504/IJCAT.2001.000256
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The use or the Internet and networked computers has changed the computing environment significantly. While providing convenience. the systems are also more vulnerable to security threats. This article discusses actions that may be taken to enhance security. A comprehensive analysis should be conducted to identify resources that need to be protected. The resources should be classified according to the sensitivity level of information. A cost-benefit analysis should be performed to determine the level of security precautions that should be taken. Since it is impossible to have perfect security, consideration should be given to contingency planning and recovery. If security is compromised, the organization should be able to recover quickly and minimize damages.
引用
收藏
页码:1 / 16
页数:16
相关论文
共 50 条
  • [1] The protection of personal data and the security of information
    Ribagorda Garnacho, Arturo
    REVISTA JURIDICA DE CASTILLA Y LEON, 2008, (16): : 373 - 399
  • [2] Information security and protection of personal data
    Siskin, Dilan Serife
    TURKISH LIBRARIANSHIP, 2018, 32 (04) : 342 - 345
  • [3] Information security and data protection in medicine
    Darms, M.
    Hassfeld, S.
    Fedtke, S.
    MKG-CHIRURG, 2020, 13 (04): : 240 - 247
  • [4] UK DATA PROTECTION ACT - PRINCIPLE OF INFORMATION SECURITY AND SECURITY MEASURES
    INTERNATIONAL JOURNAL ON INFORMATION TECHNOLOGIES AND SECURITY, 2012, 4 (03): : 55 - 66
  • [5] Cyber Security and Habeas Data:The Latin American Response to Information Security and Data Protection
    Parraguez Kobek, Luisa
    Caldera, Erick
    OASIS-OBSERVATORIO DE ANALISIS DE LOS SISTEMAS INTERNACIONALES, 2016, (24): : 109 - 128
  • [6] SPORTS DATA PRIVACY PROTECTION AND INFORMATION SECURITY MANAGEMENT
    Jin, Biao
    SCALABLE COMPUTING-PRACTICE AND EXPERIENCE, 2024, 25 (05): : 4390 - 4398
  • [7] A Study on Information Security Management with Personal Data Protection
    Huang, Chien-Cheng
    Farn, Kwo-Jean
    Lin, Frank Yeong-Sung
    2011 IEEE 17TH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS (ICPADS), 2011, : 624 - 630
  • [8] Protection of Personal Information Security in the Age of Big Data
    Zou, Hui
    PROCEEDINGS OF 2016 12TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2016, : 586 - 589
  • [9] Network Information Security Data Protection Based on Data Encryption Technology
    Ping, Han
    WIRELESS PERSONAL COMMUNICATIONS, 2022, 126 (03) : 2719 - 2729
  • [10] Network Information Security Data Protection Based on Data Encryption Technology
    Han Ping
    Wireless Personal Communications, 2022, 126 : 2719 - 2729