Information security and data protection

被引:3
|
作者
Qureshi, AA [1 ]
Siegel, JG [1 ]
机构
[1] CUNY Queens Coll, Flushing, NY 11367 USA
关键词
computer security; data security; information security; network security; contingency planning; risk analysis; data backup; data recovery; security policy; audit trail;
D O I
10.1504/IJCAT.2001.000256
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The use or the Internet and networked computers has changed the computing environment significantly. While providing convenience. the systems are also more vulnerable to security threats. This article discusses actions that may be taken to enhance security. A comprehensive analysis should be conducted to identify resources that need to be protected. The resources should be classified according to the sensitivity level of information. A cost-benefit analysis should be performed to determine the level of security precautions that should be taken. Since it is impossible to have perfect security, consideration should be given to contingency planning and recovery. If security is compromised, the organization should be able to recover quickly and minimize damages.
引用
收藏
页码:1 / 16
页数:16
相关论文
共 50 条
  • [31] Learning to upgrade internet information security and protection strategy in big data era
    Guo, Junjun
    Wang, Le
    COMPUTER COMMUNICATIONS, 2020, 160 : 150 - 157
  • [32] Study of Information System Security of Government Data Center Based on the Classified Protection
    Qian, Li
    PROCEEDINGS OF THE 2013 8TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION (ICCSE 2013), 2013, : 1315 - 1319
  • [33] Modeling Data, Information and Knowledge for Security Protection of Hybrid IoT and Edge Resources
    Duan, Yucong
    Sun, Xiaobing
    Che, Haoyang
    Cao, Chunjie
    Li, Zhao
    Yang, Xiaoxian
    IEEE ACCESS, 2019, 7 : 99161 - 99176
  • [34] Study on the application of digital certificates in the protection of network information security and data integrity
    Li, H. (493885444@qq.com), 1600, Academy Publisher, P.O.Box 40,, OULU, 90571, Finland (08):
  • [35] Research on Computer Information Security Protection System Based on Big Data Background
    An, Ziyuan
    Chen, Jiajun
    Song, Kunyu
    Xu, Rui
    2023 3RD ASIA-PACIFIC CONFERENCE ON COMMUNICATIONS TECHNOLOGY AND COMPUTER SCIENCE, ACCTCS, 2023, : 207 - 211
  • [36] Legal Protection of China's Personal Information Security in the Age of Big Data
    Fan Hong-xia
    Li Qiao-lin
    PROCEEDINGS OF 2017 INTERNATIONAL CONFERENCE ON PUBLIC ADMINISTRATION (12TH) & INTERNATIONAL SYMPOSIUM ON WEST AFRICAN STUDIES (1ST), VOL II, 2017, : 431 - 435
  • [37] Protection Strategy Exploration for the Computer Network Information Security in the Big Data Age
    Xue, Liang
    Yang, Juan
    Fan, Weiguo
    PROCEEDINGS OF THE 2016 2ND WORKSHOP ON ADVANCED RESEARCH AND TECHNOLOGY IN INDUSTRY APPLICATIONS, 2016, 81 : 81 - 85
  • [38] Data protection and information security in biomedical research: A sequential explanatory mixed study
    Farah, Marialida
    Helou, Samar
    Raad, Elie
    El Helou, Elie
    INTERNATIONAL JOURNAL OF MEDICAL INFORMATICS, 2024, 192
  • [39] Construction of Big Data Information Security Protection System in Industrial Internet Environment
    Na, Rongcui
    Applied Mathematics and Nonlinear Sciences, 2024, 9 (01)
  • [40] DATA PROTECTION AND SECURITY PROBLEMS
    STUMPER, A
    KRIMINALISTIK, 1982, (05): : 234 - 236