Trends in Information Security Regulation
نویسندگان
چکیده
Laws and regulations are used to create legal obligations and define crimes. Information security concerns have prompted legislation and regulations at different levels and in different sectors to enforce legal practices and to define digital crimes. The results of digital investigations are often used as evidences whether there are guilty acts according to information security regulations. Because the importance of information increases on a daily basis to both government and the economy, securing data is becoming increasingly necessary in various sectors. While progress has been made towards a well-defined set of AbsTRACT
منابع مشابه
Aggregate Analysis of Security Surveys in Quest of Current Information Security Landscape
Security is often viewed as an arms race between attackers, who try to exploit vulnerabilities and security administrators, who try to protect system against these attacks. In this regard, analysis of emerging security trends can be helpful in planning proper countermeasures to ensure security. Several studies and surveys exist that provide statistical information on security trends and issues....
متن کاملIT Security Trends
This paper examines recent trends in the area of information security. It presents attacks and vulnerabilities of IT systems and networks, addresses the IT security market, and discusses the IT security hype cycle. Concerning technology trends, the paper focuses on two specific fields: cryptography, which is the basis for a large variety of security services, and user authentication, including ...
متن کاملProposals for Amending the Regulation of the Administrative System
The paper presents the history of the Middle Hungarian administrative system. This administrative system is operating under the current government regulation and the administration is depicted as an information security element. The paper describes the operation of the administrative order of today's challenges. The electronic administration is a result due to the increasing number of enterpris...
متن کاملIdentifying Information Security Risk Components in Military Hospitals in Iran
Background and Aim: Information systems are always at risk of information theft, information change, and interruptions in service delivery. Therefore, the present study was conducted to develop a model for identifying information security risk in military hospitals in Iran. Methods: This study was a qualitative content analysis conducted in military hospitals in Iran in 2019. The sample consist...
متن کاملIntroducing New Trends for Persian CAPTCHA
To distinguish between human user and computer program to enhance security, a popular test called CAPTCHA is used on Web. CAPTCHA has an important role in preventing Denial Of Service (DOS) attacks in computer networks. There are many different types of CAPTCHA in different languages. Due to the expansion of Persian-language and documents on internet, creating a suitable Persian CAPTCHA seems t...
متن کامل