Information security and data protection

被引:3
|
作者
Qureshi, AA [1 ]
Siegel, JG [1 ]
机构
[1] CUNY Queens Coll, Flushing, NY 11367 USA
关键词
computer security; data security; information security; network security; contingency planning; risk analysis; data backup; data recovery; security policy; audit trail;
D O I
10.1504/IJCAT.2001.000256
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The use or the Internet and networked computers has changed the computing environment significantly. While providing convenience. the systems are also more vulnerable to security threats. This article discusses actions that may be taken to enhance security. A comprehensive analysis should be conducted to identify resources that need to be protected. The resources should be classified according to the sensitivity level of information. A cost-benefit analysis should be performed to determine the level of security precautions that should be taken. Since it is impossible to have perfect security, consideration should be given to contingency planning and recovery. If security is compromised, the organization should be able to recover quickly and minimize damages.
引用
收藏
页码:1 / 16
页数:16
相关论文
共 50 条
  • [41] SECURITY AND DATA PROTECTION - NO ALTERNATIVE
    BULL, HP
    KRIMINALISTIK, 1982, (04): : 226 - 227
  • [42] Information security protection in hybrid office
    Ma, Jun
    Alias, Syazwina
    Huang, Chunya
    ACM International Conference Proceeding Series, : 21 - 25
  • [43] Information security protection in hybrid office
    Ma, Jun
    Alias, Syazwina
    Huang, Chunya
    PROCEEDINGS OF 2024 3RD INTERNATIONAL CONFERENCE ON CYBER SECURITY, ARTIFICIAL INTELLIGENCE AND DIGITAL ECONOMY, CSAIDE 2024, 2024, : 21 - 25
  • [44] Information Security Protection in Software Testing
    Wang, Yubin
    Yao, Jinyu
    Yu, Xiaoxue
    2018 14TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2018, : 449 - 452
  • [45] Information security: threats and protection mechanisms
    Howard, A
    Paridaens, O
    Gamm, A
    ALCATEL TELECOMMUNICATIONS REVIEW, 2001, (02): : 117 - 121
  • [46] Information disclosure and security information protection at water utilities
    Herrick, Charles
    Blaha, Frank J.
    JOURNAL AMERICAN WATER WORKS ASSOCIATION, 2007, 99 (11): : 40 - 42
  • [47] What actually is ... Data Protection/Data Security?
    Lang, Michael
    UROLOGE, 2021, 60 (07): : 952 - 952
  • [48] IoT and Smart Home Data Breach Risks from the Perspective of Data Protection and Information Security Law
    Vojkovic, Goran
    Milenkovic, Melita
    Katulic, Tihomir
    BUSINESS SYSTEMS RESEARCH JOURNAL, 2020, 11 (03): : 167 - 185
  • [49] Implementation of Information Security Management Systems for Data Protection in Organizations: A systematic literature review
    Marhad, Siti Suhaida
    Abd Goni, Siti Zaleha
    Sani, Mad Khir Johari Abdullah
    ENVIRONMENT-BEHAVIOUR PROCEEDINGS JOURNAL, 2024, 9 : 197 - 203
  • [50] Editorial: Special Issue on "Information Security and Data Protection in Future Generation Communication and Networking"
    Park, Jong Hyuk
    Chao, Han-Chieh
    Chen, Whai-En
    Kitsos, Paris
    WIRELESS PERSONAL COMMUNICATIONS, 2009, 51 (01) : 1 - 3