Deep Structures of Information Systems Security
نویسندگان
چکیده
Companies tend to adopt security approaches that align with some subset of the four categories of IS security techniques checklists, risk analysis, formal methods and soft modeling. To develop a structure of secure IS that upholds confidentiality, integrity and availability of information there remains a need for an integral security model that incorporates the benefits of other security designs outside the chosen ones. Organizations demand security models that cater to their unique operational characteristics. The paper uses the deep-structure model of Wand and Weber (1990) to help reveal the deep structure characteristics of IS security using three models representational model identifies subsystems within an organization; statetracking model ensures security changes trace real world security system changes; and decomposition model defines specific external events that are stimuli to changes on internal events. A conceptual security model is presented that manifests the meaning of dynamic, custom-fit and flexible IS security structure which also incorporates features from checklists, risk analysis, soft modeling and formal methods.
منابع مشابه
امنیت اطلاعات سامانه های تحت وب نهاد کتابخانه های عمومی کشور
Purpose: This paper aims to evaluate the security of web-based information systems of Iran Public Libraries Foundation (IPLF). Methodology: Survey method was used as a method for implementation. The tool for data collection was a questionnaire, based on the standard ISO/IEC 27002, that has the eleven indicators and 79 sub-criteria, which examines security of web-based information systems of IP...
متن کاملDetection of children's activities in smart home based on deep learning approach
Monitoring behavior of children in the home is the extremely important to avoid the possible injuries. Therefore, an automated monitoring system for monitoring behavior of children by researchers has been considered. The first step for designing and executing an automated monitoring system on children's behavior in closed spaces is possible with recognize their activity by the sensors in the e...
متن کاملDetection of children's activities in smart home based on deep learning approach
Monitoring behavior of children in the home is the extremely important to avoid the possible injuries. Therefore, an automated monitoring system for monitoring behavior of children by researchers has been considered. The first step for designing and executing an automated monitoring system on children's behavior in closed spaces is possible with recognize their activity by the sensors in the e...
متن کاملUsers as the Biggest Threats to Security of Health Information Systems
There are a lot of researches in the world about attacks on information systems (IS). Although there have been many attempts to classify threats of IS’s especially in Health Information Systems (HIS), it is still necessary for all health organization to identify new threats and their sources which threaten security of health care domain. The main aim of this paper is to present a research agend...
متن کاملOn the design and security of a lattice-based threshold secret sharing scheme
In this paper, we introduce a method of threshold secret sharing scheme (TSSS) in which secret reconstruction is based on Babai's nearest plane algorithm. In order to supply secure public channels for transmitting shares to parties, we need to ensure that there are no quantum threats to these channels. A solution to this problem can be utilization of lattice-based cryptosystems for these channe...
متن کامل