Trends in Information Security Regulation

نویسندگان

  • Christopher A. Canning
  • Baoying Wang
چکیده

Laws and regulations are used to create legal obligations and define crimes. Information security concerns have prompted legislation and regulations at different levels and in different sectors to enforce legal practices and to define digital crimes. The results of digital investigations are often used as evidences whether there are guilty acts according to information security regulations. Because the importance of information increases on a daily basis to both government and the economy, securing data is becoming increasingly necessary in various sectors. While progress has been made towards a well-defined set of AbsTRACT

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Aggregate Analysis of Security Surveys in Quest of Current Information Security Landscape

Security is often viewed as an arms race between attackers, who try to exploit vulnerabilities and security administrators, who try to protect system against these attacks. In this regard, analysis of emerging security trends can be helpful in planning proper countermeasures to ensure security. Several studies and surveys exist that provide statistical information on security trends and issues....

متن کامل

IT Security Trends

This paper examines recent trends in the area of information security. It presents attacks and vulnerabilities of IT systems and networks, addresses the IT security market, and discusses the IT security hype cycle. Concerning technology trends, the paper focuses on two specific fields: cryptography, which is the basis for a large variety of security services, and user authentication, including ...

متن کامل

Proposals for Amending the Regulation of the Administrative System

The paper presents the history of the Middle Hungarian administrative system. This administrative system is operating under the current government regulation and the administration is depicted as an information security element. The paper describes the operation of the administrative order of today's challenges. The electronic administration is a result due to the increasing number of enterpris...

متن کامل

Identifying Information Security Risk Components in Military Hospitals in Iran

Background and Aim: Information systems are always at risk of information theft, information change, and interruptions in service delivery. Therefore, the present study was conducted to develop a model for identifying information security risk in military hospitals in Iran. Methods: This study was a qualitative content analysis conducted in military hospitals in Iran in 2019. The sample consist...

متن کامل

Introducing New Trends for Persian CAPTCHA

To distinguish between human user and computer program to enhance security, a popular test called CAPTCHA is used on Web. CAPTCHA has an important role in preventing Denial Of Service (DOS) attacks in computer networks. There are many different types of CAPTCHA in different languages. Due to the expansion of Persian-language and documents on internet, creating a suitable Persian CAPTCHA seems t...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010