Approaches for Information Security Modeling
نویسنده
چکیده
Introduction: In this era of globalisation, organizations heavily depend on IT to facilitate their business operations. IT provides with numerous opportunities and improved efficiency for many modern day organizations. It also comes with its own set of security risks. The ever changing risk context of an organization, collaboration with other organizations, ecommerce clearly insists upon an effective Information Security system. In this knowledge driven economy information is a critical asset to an organization. Considering the fact that information has been a critical asset for any organization or a business enterprise, Information Security has been less about being a technical aspect for the business and more important for the sustainability of the business. The exact role of Information Security is still not clearly defined in many organizations, while some still view Information Security as a cost centre, it has been shown that effectively managed Information Security organizations can be instrumental in helping an enterprise meet its business goals by improving efficiency. This paper is a survey of few recent security models to provide for Information Security modelling. The first section describes the security model requirements and the issues related with the concept. It is followed by the section describing the process of risk assessment and the key factors associated with it. The last section answers for the complete management of the risk.
منابع مشابه
A Survey of Anomaly Detection Approaches in Internet of Things
Internet of Things is an ever-growing network of heterogeneous and constraint nodes which are connected to each other and the Internet. Security plays an important role in such networks. Experience has proved that encryption and authentication are not enough for the security of networks and an Intrusion Detection System is required to detect and to prevent attacks from malicious nodes. In this ...
متن کاملResearching the Applicability of Mathematical Approaches for Modeling Cyber Security Processes
As the title implies the article substantiates the applicability of mathematical approaches for modeling cyber security processes. The article gives a detailed analysis of applicability of Markov processes and Game theory approach. In addition, the authors give requirements that can be applied for developing models . The authors come to the conclusion that it is necessary to use several mathema...
متن کاملOptimum decoder for multiplicative spread spectrum image watermarking with Laplacian modeling
This paper investigates the multiplicative spread spectrum watermarking method for the image. The information bit is spreaded into middle-frequency Discrete Cosine Transform (DCT) coefficients of each block of an image using a generated pseudo-random sequence. Unlike the conventional signal modeling, we suppose that both signal and noise are distributed with Laplacian distribution, because the ...
متن کاملAn Architecture for Security and Protection of Big Data
The issue of online privacy and security is a challenging subject, as it concerns the privacy of data that are increasingly more accessible via the internet. In other words, people who intend to access the private information of other users can do so more efficiently over the internet. This study is an attempt to address the privacy issue of distributed big data in the context of cloud computin...
متن کاملProcess algebraic modeling of authentication protocols for analysis of parallel multi-session executions
Many security protocols have the aim of authenticating one agent acting as initiator to another agent acting as responder and vice versa. Sometimes, the authentication fails because of executing several parallel sessions of a protocol, and because an agent may play both the initiator and responder role in parallel sessions. We take advantage of the notion of transition systems to specify authen...
متن کاملPROVIDE A MODEL FOR IDENTIFYING AND RANKING THE MANAGERIAL FACTORS AFFECTING INFORMATION SECURITY IN ORGANIZATION BY USING VIKOR METHOD; CASE STUDY: TEHRAN UNIVERSITY OF MEDICAL SCIENCES
<span style="color: #000000; font-family: Tahoma, sans-serif; font-size: 13px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: auto; text-align: -webkit-left; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px; display: inline !important; float: none; ba...
متن کامل