Добірка наукової літератури з теми "Information security (INFOSEC)"

Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями

Оберіть тип джерела:

Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Information security (INFOSEC)".

Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.

Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.

Статті в журналах з теми "Information security (INFOSEC)"

1

Au, Cheuk Hang, and Walter S. L. Fung. "Integrating Knowledge Management into Information Security." International Journal of Knowledge Management 15, no. 1 (January 2019): 37–52. http://dx.doi.org/10.4018/ijkm.2019010103.

Повний текст джерела
Анотація:
Repeated information security (InfoSec) incidents have harmed the confidence of people on enterprises' InfoSec capability. While most organisations adopt control frameworks such as ISO27001 and COBIT, the role and contribution of knowledge management on InfoSec was inadequately considered. The authors integrated the concepts of knowledge-centric information security and IT Governance (ITG) into an ITG-driven knowledge framework (ITGKF) for reinforcing InfoSec maturity and auditability of enterprises. The authors also tried to assess whether ITG can embrace proper knowledge circulation within the InfoSec community. The authors confirmed the positive influence of IT governance on knowledge-centric information security (KCIS) and information security maturity and audit result (ISMAR), the positive influence of KCIS on ISMAR, and the mediating role of KCIS between ITG and ISMAR. These indicated the significance of KM in InfoSec area. Based on the findings, they proposed possible changes of integrating KM in different InfoSec practices and audit standard.
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Ma, Shoufeng, Shixin Zhang, Geng Li, and Yi Wu. "Exploring information security education on social media use." Aslib Journal of Information Management 71, no. 5 (September 16, 2019): 618–36. http://dx.doi.org/10.1108/ajim-09-2018-0213.

Повний текст джерела
Анотація:
Purpose Based on the literature on information security (InfoSec) education and uses and gratifications theory, the purpose of this paper is to propose and test a research model to examine the impact of InfoSec education on social media usage. Design/methodology/approach The authors employed structural equation modeling to test the research model, with a survey data set of 293 valid subjects from a WeChat subscription about InfoSec education named secrecy view. Findings The results reveal the significant impacts of perceived content quality, perceived social influence and perceived entertainment on user satisfaction in the context of security education and social media. User satisfaction is significantly associated with user stickiness and security knowledge improvement. Additionally, the authors found that user’s security awareness moderated the effect of perceived entertainment on user satisfaction. Research limitations/implications Using a single sample might constrain the contributions of this study. Practical implications The authors suggest practical guidelines for InfoSec education on social media by enhancing perceived content quality. Moreover, due to diverse user attributes, the social media operators should recommend targeted content to different users. Originality/value This study contributes to studies on InfoSec education of social media usage and identifies factors that affect user satisfaction with social media. Furthermore, the study enriches the security education practices by uncovering differences in security awareness with regard to user satisfaction.
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Sargana, Tauqeer Hussain, Mujahid Hussain Sargana, and Muhammad Anns. "Approaches to international information security and the discourse of cyberspace." Masyarakat, Kebudayaan dan Politik 33, no. 4 (October 27, 2020): 331. http://dx.doi.org/10.20473/mkp.v33i42020.331-338.

Повний текст джерела
Анотація:
This paper investigates the notion of sovereignty and territorial integrity of states in cyberspace by carefully examining the information security debate. Nowadays, issues related to infosec are posing fundamental challenges to the sovereignty and territorial integrity of nation-states. Our analysis has attempted to answer the critical question, which aspect makes infosec the most pressing issue of the 21st century? The United States, The Russian Federation, and China are the three technologically superior nations and are included in the study to compare their understanding of infosec issues. The authors have typically relied on their expertise to interpret primary and secondary data because of descriptive discourse. Moreover, the study is efficiently conducted through a deductive approach and has applied non-kineticism as a theoretical model. The results showed that due to the compelling non-kinetic application of infosec, the debate at international forums had become a victim of geopolitical considerations. Results also revealed that the discourse of infosec needs to be disassociated from social freedom as it has been adopted for military application and requires a national security perspective to confine the course of security implications. In abstract, the notion of infosec has given birth to new contestation in the domain of cyberspace that altogether would lead the competition into the ‘digital battlefield.’
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Ali, Syed Emad Azhar, Fong-Woon Lai, Ameenullah Aman, Muhammad Furquan Saleem, and Salaheldin Hamad. "Do Information Security Breach and Its Factors Have a Long-Run Competitive Effect on Breached Firms’ Equity Risk?" Journal of Competitiveness 14, no. 1 (March 31, 2022): 23–42. http://dx.doi.org/10.7441/joc.2022.01.02.

Повний текст джерела
Анотація:
A breach in information security (infosec) can materially impact a firm’s long-term competitiveness. For publicly listed firms, an infosec breach can have a long-lasting effect on their competitive stock performance, including their equity risk. Despite its significance, past research has focused primarily on examining the short-term effect of infosec breaches while ignoring its long-term effect on the firm’s equity risk. Therefore, in this research, we examined the long-run effect of 276 infosec breaches at publicly traded firms on equity risk from 2009 to 2018. We analyzed each firm’s equity risk compared to its competitive control firms of similar sizes and performances for three years, from one year before to two years after the breach, using a one-to-one matching methodology. The univariate analysis of infosec breaches on equity risk indicated that breach firms have a 7% higher equity risk than competitive control firms. Additionally, the quantile regression analysis of the effect of infosec breach factors on long-run equity risk showed that the rise in equity risk is higher if the breach involves the compromise of confidential information and is a repeat breach for the same firm. The findings provide a valuable resource for investors, managers, and researchers interested in understanding the long-term relationship between infosec breaches and a firm’s stock competitiveness.
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Marshall, Byron, Michael Curry, Robert E. Crossler, and John Correia. "Machine Learning and Survey-based Predictors of InfoSec Non-Compliance." ACM Transactions on Management Information Systems 13, no. 2 (June 30, 2022): 1–20. http://dx.doi.org/10.1145/3466689.

Повний текст джерела
Анотація:
Survey items developed in behavioral Information Security (InfoSec) research should be practically useful in identifying individuals who are likely to create risk by failing to comply with InfoSec guidance. The literature shows that attitudes, beliefs, and perceptions drive compliance behavior and has influenced the creation of a multitude of training programs focused on improving ones’ InfoSec behaviors. While automated controls and directly observable technical indicators are generally preferred by InfoSec practitioners, difficult-to-monitor user actions can still compromise the effectiveness of automatic controls. For example, despite prohibition, doubtful or skeptical employees often increase organizational risk by using the same password to authenticate corporate and external services. Analysis of network traffic or device configurations is unlikely to provide evidence of these vulnerabilities but responses to well-designed surveys might. Guided by the relatively new IPAM model, this study administered 96 survey items from the Behavioral InfoSec literature, across three separate points in time, to 217 respondents. Using systematic feature selection techniques, manageable subsets of 29, 20, and 15 items were identified and tested as predictors of non-compliance with security policy. The feature selection process validates IPAM's innovation in using nuanced self-efficacy and planning items across multiple time frames. Prediction models were trained using several ML algorithms. Practically useful levels of prediction accuracy were achieved with, for example, ensemble tree models identifying 69% of the riskiest individuals within the top 25% of the sample. The findings indicate the usefulness of psychometric items from the behavioral InfoSec in guiding training programs and other cybersecurity control activities and demonstrate that they are promising as additional inputs to AI models that monitor networks for security events.
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Zaini, Muhamad Khairulnizam, Mohamad Noorman Masrek, and Mad Khir Johari Abdullah Sani. "The impact of information security management practices on organisational agility." Information & Computer Security 28, no. 5 (June 13, 2020): 681–700. http://dx.doi.org/10.1108/ics-02-2020-0020.

Повний текст джерела
Анотація:
Purpose This study aims to determine the extent to which information security management (ISM) practices impact the organisational agility by examining the relationship between both concepts. Design/methodology/approach A quantitative method research design has been used in this study. This study was conducted throughout Malaysia with a total of 250 valid questionnaires obtained from managers and executives from the Multimedia Super Corridor (MSC)-status companies. Structural equation modelling (SEM) using partial least square was used to analyse the data and to test all nine hypotheses developed in this study. Findings Findings from this study indicate that operational agility (OA) is significantly related to ISM practices in MSC-status companies. The validation of the structural model of nine hypotheses developed for this study has demonstrated satisfactory results, exhibited six significant direct relationships and three insignificant relationships. Research limitations/implications This study has addressed the needs for a comprehensive, coherent and empirically tested ISM practices and organisational agility framework. The current theoretical framework used in this study emphasised on the ISM–organisational agility dimensions that are predominantly important to ascertain high level of ISM practices and perceived agility level among the information technology (IT) business companies in Malaysia. With the application of SEM for powerful analysis, the empirical-based framework established in this study was validated by the empirical findings, thus contributing significantly to the field of information security (InfoSec). Originality/value This study has filled the research gap between different constructs of ISM practices and OA. The model put forth in this study contributes in several ways to the InfoSec research community. The recognition of InfoSec practices that could facilitate organisational agility in the IT industry in Malaysia is vital and contributes to more value creation for the organisations.
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Rohn, Eli, Gilad Sabari, and Guy Leshem. "Explaining small business InfoSec posture using social theories." Information & Computer Security 24, no. 5 (November 14, 2016): 534–56. http://dx.doi.org/10.1108/ics-09-2015-0041.

Повний текст джерела
Анотація:
Purpose This study aims to investigate information technology security practices of very small enterprises. Design/methodology/approach The authors perform a formal information security field study using a representative sample. Using the Control Objectives for IT (COBIT) framework, the authors evaluate 67 information security controls and perform 206 related tests. The authors state six hypotheses about the findings and accept or reject those using inferential statistics. The authors explain findings using the social comparison theory and the rare events bias theory. Findings Only one-third of all the controls examined were designed properly and operated as expected. About half of the controls were either ill-designed or did not operate as intended. The social comparison theory and the rare events bias theory explain managers’s reliance on small experience samples which in turn leads to erroneous comprehension of their business environment, which relates to information security. Practical implications This information is valuable to executive branch policy makers striving to reduce information security vulnerability on local and national levels and small business organizations providing information and advice to their members. Originality/value Information security surveys are usually over-optimistic and avoid self-incrimination, yielding results that are less accurate than field work. To obtain grounded facts, the authors used the field research approach to gather qualitative and quantitative data by physically visiting active organizations, interviewing managers and staff, observing processes and reviewing written materials such as policies, procedure and logs, in accordance to common practices of security audits.
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Parsons, Kathryn, Agata McCormac, Malcolm Pattinson, Marcus Butavicius, and Cate Jerram. "A study of information security awareness in Australian government organisations." Information Management & Computer Security 22, no. 4 (October 7, 2014): 334–45. http://dx.doi.org/10.1108/imcs-10-2013-0078.

Повний текст джерела
Анотація:
Purpose – The purpose of this paper is to investigate the human-based information security (InfoSec) vulnerabilities in three Australian government organisations. Design/methodology/approach – A Web-based survey was developed to test attitudes, knowledge and behaviour across eight policy-based focus areas. It was completed by 203 participants across the three organisations. This was complemented by interviews with senior management from these agencies. Findings – Overall, management and employees had reasonable levels of InfoSec awareness. However, weaknesses were identified in the use of wireless technology, the reporting of security incidents and the use of social networking sites. These weaknesses were identified in the survey data of the employees and corroborated in the management interviews. Research limitations/implications – As with all such surveys, responses to the questions on attitude and behaviour (but not knowledge) may have been influenced by the social desirability bias. Further research should establish more extensive baseline data for the survey and examine its effectiveness in assessing the impact of training and risk communication interventions. Originality/value – A new survey tool is presented and tested which is of interest to academics as well as management and IT systems (security) auditors.
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Chang, Kuo-Chung, and Yoke May Seow. "Protective Measures and Security Policy Non-Compliance Intention." Journal of Organizational and End User Computing 31, no. 1 (January 2019): 1–21. http://dx.doi.org/10.4018/joeuc.2019010101.

Повний текст джерела
Анотація:
Internal vulnerabilities and insider threats top the list of information security (InfoSec) incidents; prompting organizations to establish InfoSec policy (ISP). Yet, mitigating user's ISP non-compliance is still an arduous task. Hence, this study aims to minimize user's ISP non-compliance intention by investigating their perception and attitude toward ISP non-compliance. Specifically, protective measures drawing upon the protection motivation theory - perceived severity of ISP non-compliance, rewards and familiarity with ISP - analyze users' attitude toward ISP non-compliance. Further, the new construct, information technology (IT) vision conflict, is the mismatch between the values that users hold and those embedded in the ISP. The misalignment of the two conflicting values moderates the relationship between the protective measures and attitude toward ISP non-compliance. Findings show that IT vision conflict weakens the negative relationship between perceived severity of ISP non-compliance and attitude toward ISP non-compliance; indirectly affecting ISP non-compliance intention.
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Pattinson, Malcolm, Marcus Butavicius, Kathryn Parsons, Agata McCormac, and Dragana Calic. "Managing information security awareness at an Australian bank: a comparative study." Information & Computer Security 25, no. 2 (June 12, 2017): 181–89. http://dx.doi.org/10.1108/ics-03-2017-0017.

Повний текст джерела
Анотація:
Purpose The aim of this study was first to confirm that a specific bank’s employees were generally more information security-aware than employees in other Australian industries and second to identify the major factors that contributed to this bank’s high levels of information security awareness (ISA). Design/methodology/approach A Web-based questionnaire (the Human Aspects of Information Security Questionnaire – HAIS-Q) was used in two separate studies to assess the ISA of individuals who used computers at their workplace. The first study assessed 198 employees at an Australian bank and the second study assessed 500 working Australians from various industries. Both studies used a Qualtrics-based questionnaire that was distributed via an email link. Findings The results showed that the average level of ISA among bank employees was consistently 20 per cent higher than that among general workforce participants in all focus areas and overall. There were no significant differences between the ISA scores for those who received more frequent training compared to those who received less frequent training. This result suggests that the frequency of training is not a contributing factor to an employee’s level of ISA. Research limitations/implications This current research did not investigate the information security (InfoSec) culture that prevailed within the bank in question because the objective of the research was to compare a bank’s employees with general workforce employees rather than compare organisations. The Research did not include questions relating to the type of training participants had received at work. Originality/value This study provided the bank’s InfoSec management with evidence that their multi-channelled InfoSec training regime was responsible for a substantially higher-than-average ISA for their employees. Future research of this nature should examine the effectiveness of various ISA programmes in light of individual differences and learning styles. This would form the basis of an adaptive control framework that would complement many of the current international standards, such as ISO’s 27000 series, NIST’s SP800 series and ISACA’s COBIT5.
Стилі APA, Harvard, Vancouver, ISO та ін.

Дисертації з теми "Information security (INFOSEC)"

1

Khoshbin, SeyedAli. "Educational Information Security Laboratories : A Literature Review." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-60364.

Повний текст джерела
Анотація:
Educational centers are investigating the feasibility of creating InfoSec laboratory for their students in order to enhance their practical experience. Experiments could be performed in either physical or virtual labs. The advantage of virtual lab compared to physical lab is utilization of minimal components with the aid of hypervisor software. In addition, reverting back computer configuration to original state rapidly, capability of altering resource configuration immediately and managing all virtual machines via a single console are some features that highlighted the use of this technology in the laboratories. Despite the virtual laboratory tremendous advantages, literature lacks a comprehensive review on implemented virtual labs. The purpose of this thesis is to fill this gap by inspecting the implemented virtual labs in education center. Consequently, the thesis outcome would provide an insight to other institutes and researchers to utilize these labs as models to decrease the effort and expenses for implementing InfoSec labs. The offered assignments of these labs would be elaborated in order to provide a sample for execution of these experiments for other researchers in their own environment. Furthermore, comparison of the discovered virtual labs based on availability, maintainability and security would be performed. Finally, a suggested physical layout of virtual lab is being presented. Twelve universities had been scrutinized which are aligned with the thesis goal.
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Takacs, Gergely. "Integration of CTI into security management." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-74246.

Повний текст джерела
Анотація:
Current thesis is a documentative approach to sum up experiences of a practical projectof implementing Cyber Threat Intelligence into an existing information securitymanagement system and delivering best practices using action design researchmethodology. The project itself was delivered to a multinational energy provider in 2017.The aim of the CTI-implementation was to improve the information security posture ofthe customer. The author, as participant of the delivery team presents an extensive reviewof the current literature on CTI and puts the need for threat intelligence into context. Theauthor claims that traditional security management is not able to keep up with currentcybersecurity threats which makes a new approach required. The thesis gives an insightof an actually working and continuously developed CTI-service and offers possible bestpractices for InfoSec professionals, adds theoretical knowledge to the body of knowledgeand opens up new research areas for researchers.
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Nyrén, Paul, and Oscar Isaksson. "The value of cybersecurity : Stock market reactions to security breach announcements." Thesis, KTH, Skolan för industriell teknik och management (ITM), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-264124.

Повний текст джерела
Анотація:
Companies around the world invest an increasing amount of money trying to protect themselves from cybercrime and unauthorized access of valuable data. The nature of these covert threats makes it seemingly impossible to quantify the risk of getting attacked. While it is possible to estimate the tangible costs of a security breach it is much harder to asses what a company stands to lose in terms of intangible costs. This thesis uses the Event Study methodology to determine the intangible losses of listed American companies who suffered data breaches. On average, the companies in the dataset loses 0.21% of their market cap after a security breach which, although not being statistically significant, translates to $267 million. Despite looking at several parameters to find significant predictors, only one turned out to be statistically significant, namely the number of records breached. These weak correlation is a result in itself; because of the low impact of a breach perhaps the companies lack proper incentives to protect their users' data.
Det ständigt växande cyberhotet gör att allt fler företag väljer att göra stora investeringar i datasäkerhet. Den dolda hotbilden gör det i stort sett omöjligt att kvantifiera sannolikheten för att råka ut för en attack. Även om det går att avgöra och förutspå de direkta kostnaderna kring ett dataintrång så är det nästintill omöjligt att avgöra de indirekta kostnaderna kring ett dataintrång. Detta arbete använder eventstudie-metodologin för att uppskatta de indirekta kostnaderna hos börsnoterade amerikanska företag efter att de haft ett dataintrång. Företagen i den undersökta datamängden förlorar i genomsnitt 0.21% av sitt marknadsvärde vilket, även om det saknar statistisk signifikans, motsvarar $267 miljoner. Arbetet undersöker ett antal parametrar för att hitta signifikanta prediktorer men endast en av de prediktorer vi undersökte var statistiskt signifikant, nämligen antalet läckta uppgifter. Dessa svaga samband är i sig intressanta; den till synes svaga inverkan av dataintrång på företagens börsvärde antyder att de kanske inte har så stora finansiella incitament att skydda sina kunders data.
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Johnson, David Philip. "How Attitude Toward the Behavior, Subjective Norm, and Perceived Behavioral Control Affects Information Security Behavior Intention." ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/4454.

Повний текст джерела
Анотація:
The education sector is at high risk for information security (InfoSec) breaches and in need of improved security practices. Achieving data protections cannot be through technical means alone. Addressing the human behavior factor is required. Security education, training, and awareness (SETA) programs are an effective method of addressing human InfoSec behavior. Applying sociobehavioral theories to InfoSec research provides information to aid IT security program managers in developing improved SETA programs. The purpose of this correlational study was to examine through the theoretical lens of the theory of planned behavior (TPB) how attitude toward the behavior (ATT), subjective norm (SN), and perceived behavioral control (PBC) affected the intention of computer end users in a K-12 environment to follow InfoSec policy. Data collection was from 165 K-12 school administrators in Northeast Georgia using an online survey instrument. Data analysis occurred applying multiple linear regression and logistic regression. The TPB model accounted for 30.8% of the variance in intention to comply with InfoSec policies. SN was a significant predictor of intention in the model. ATT and PBC did not show to be significant. These findings suggest improvement to K-12 SETA programs can occur by addressing normative beliefs of the individual. The application of improved SETA programs by IT security program managers that incorporate the findings and recommendations of this study may lead to greater information security in K-12 school systems. More secure school systems can contribute to social change through improved information protection as well as increased freedoms and privacy for employees, students, the organization, and the community.
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Kulle, Linus. "Intrusion Attack & Anomaly Detection in IoT Using Honeypots." Thesis, Malmö universitet, Fakulteten för teknik och samhälle (TS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-20676.

Повний текст джерела
Анотація:
This thesis is presented as an artifact of a project conducted at MalmöUniversity IoTaP LABS. The Internet of Things (IoT) is a growing field and its usehas been adopted in many aspects of our daily lives, which has led todigitalization and the creation of smart IoT ecosystems. However, with the rapidadoption of IoT, little or no focus has been put on the security implications,device proliferations and its advancements. This thesis takes a step forward toexplore the usefulness of implementing a security mechanism that canproactively be used to aid understanding attacker behaviour in an IoTenvironment. To achieve this, this thesis has outlined a number of objectivesthat ranges from how to create a deliberate vulnerability by using honeypots inorder to lure attacker’s in order to study their modus operandi. Furthermore,an Intrusion Attack Detection (Model) has been constructed that has aided withthis implementation. The IAD model, has been successfully implemented withthe help of interaction and dependence of key modules that have allowedhoneypots to be executed in a controlled IoT environment. Detailed descriptionsregarding the technologies that have been used in this thesis have also beenexplored to a greater extent. On the same note, the implemented system withthe help of an attack scenario allowed an attacker to access the system andcircumnavigate throughout the camouflaged network, thereafter, the attacker’sfootprints are mapped based on the mode of attack. Consequently, given thatthis implementation has been conducted in MAU environment, the results thathave been generated as a result of this implementations have been reportedcorrectly. Eventually, based on the results that have been generated by thesystem, it is worth to note that the research questions and the objective posedby the thesis have been met.
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Humpert-Vrielink, Frederik. "Die Rolle der Social Media im Information Security Management." Technische Universität Dresden, 2011. https://tud.qucosa.de/id/qucosa%3A28085.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Wild, Stefan. "Enhancing Security in Managing Personal Data by Web Systems." Universitätsverlag Chemnitz, 2016. https://monarch.qucosa.de/id/qucosa%3A20629.

Повний текст джерела
Анотація:
Web systems have become an integral part in daily life of billions of people. Social is a key characteristic today’s web projects need to feature in order to be successful in the social age. To benefit from an improved user experience, individual persons are continually invited to reveal more and more personal data to web systems. With a rising severity of attacks on web systems, it is evident that their security is inadequate for the amount of accumulated personal data. Numerous threat reports indicate that social media has become a top-ranking attack target, with climbing impacts, with ramifications beyond single individuals and with a booming black market to trade leaked personal data. To enhance information security in managing personal data by web systems for the mutual benefit of individual persons, companies and governments, this dissertation proposes a solution architecture and three research contributions. While the solution architecture establishes the foundation for a more secure management of personal data by web systems, the research contributions represent complementary components for protecting personal data against unwanted data disclosure, tampering and use without the actual data owner’s intent or knowledge. Not only do these components enable seamless integration and combination, but they also contribute to assure quality and maintainability. The dissertation concludes with discussing evaluation results and providing an outlook towards future work.
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Engelmann, Sabrina. "Beamforming and Protection Strategies in Gaussian MISO Wiretap Systems with Partial Channel State Information." Doctoral thesis, Saechsische Landesbibliothek- Staats- und Universitaetsbibliothek Dresden, 2015. http://nbn-resolving.de/urn:nbn:de:bsz:14-qucosa-172869.

Повний текст джерела
Анотація:
Within this thesis, we investigate the possibilities of physical layer secrecy for two special system models. In detail, we study beamforming and protection strategies in the Multiple-Input Single-Output (MISO) Gaussian Wiretap Channel (WTC) and the Gaussian two-hop relay WTC with multiple antennas at transmitter and receiver. In both system models, we examine the influence of partial Channel State Information (CSI) on the link to the eavesdropper and compare the achievable secrecy rates with the case of full CSI. We show for the MISO WTC that in the fast fading scenario the Beamforming Vector (BV) can be optimized such that the ergodic secrecy rate is maximized with regard to the degree of channel knowledge. Further we show that the ergodic secrecy rate can be significantly increased by usage of Artificial Noise (AN), if applied in a smart way. This means that the degree of channel knowledge on the link to the eavesdropper influences the portion of power that is spent for AN at the transmitter as well as the direction, in which the AN signal is sent. In addition, we apply the same beamforming and protection strategies to the slow fading scenario and find that these techniques also reduce the secrecy outage probability. For the two-hop relay WTC, we introduce Information Leakage Neutralization (IN) as a new protection strategy. If applied to a system model, where the transmitter has full CSI, the instantaneous secrecy rate performs almost as well as the instantaneous capacity of the peaceful system without an eavesdropper. The IN protected scheme outperforms the AN protected approach and performs much better than any beamforming scheme without additional protection mechanism. Another positive aspect of the IN protected scheme in the case of full CSI is that conventional channel codes can be applied instead of wiretap codes. For the case of partial CSI, where the transmitter has only an outdated estimate on the channel between relay and the eavesdropper, we show that the IN protected scheme can also be applied. Here, it strongly depends on the channel realizations and the delay of the estimate, whether the IN or the AN protection scheme should be applied
In dieser Arbeit wird das Leistungsvermögen der Sicherheit auf der physikalischen Schicht anhand von zwei speziellen Systemmodellen untersucht. Im Detail werden Beamforming- und Absicherungsstrategien im gaußschen Multiple-Input Single-Output (MISO) Wiretap Channel (WTC) und dem gaußschen Two-hop Relay WTC mit mehreren Antennen am Sender und Empfänger studiert. In beiden Systemmodellen wird der Einfluss von partieller Kanalkenntnis zum Abhörer betrachtet und die so erreichbaren Sicherheitsraten mit denen verglichen, die bei voller Kanalkenntnis erreichbar sind. Für den MISO WTC kann gezeigt werden, dass für Kanäle mit schnellem Schwund der Beamforming-Vektor in Hinblick auf die ergodische Sicherheitsrate unter Berücksichtigung des Grades der Kanalkenntnis optimiert werden kann. Zudem kann durch die intelligente Verwendung von künstlichem Rauschen (Artificial Noise, AN) die ergodische Sicherheitsrate signifikant erhöht werden. Hierbei nimmt der Grad der Kanalkenntnis direkt Einfluss auf die Aufteilung der Leistung zwischen Daten- und AN-Signal am Sender sowie auch auf die Richtung, in der das AN-Signal gesendet wird. Zudem kann gezeigt werden, dass dieselben Beamforming- und Absicherungsstrategien ebenfalls die Sicherheitsausfallwahrscheinlichkeit für Kanäle mit langsamem Schwund minimieren. Im gaußschen Two-hop Relay WTC wird Information Leakage Neutralization (IN) als neuartige Absicherungsstrategie eingeführt. Diese Absicherungsstrategie erreicht nahezu dieselben instantanen Raten wie ein friedvolles System ohne Abhörer, wenn es bei voller Kanalkenntnis am Sender eingesetzt wird. Weiterhin sind durch die IN-Absicherungsstrategie höhere Raten erreichbar als durch den Einsatz von AN. Zusätzlich kann im Fall von voller Kanalkenntnis auf den Einsatz von Wiretap-Codes verzichtet werden. Auch im Fall partieller Kanalkenntnis, wo der Sender nur eine veraltete Schätzung des Kanals zwischen Relay und Abhörer besitzt, kann gezeigt werden, dass die IN-Absicherungsstrategie angewendet werden kann. Hierbei hängt es jedoch stark von den Kanalrealisierungen und dem Alter der Kanalschätzung ab, ob die IN- oder die AN-Absicherungsstrategie bessere Ergebnisse bringt und daher angewandt werden sollte
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Grund, Klaus. "Untersuchungen zur Entwicklung des Lehr- und Forschungsbergwerkes der TU Bergakademie Freiberg: Das Bergwerk 2000+." Doctoral thesis, TU Bergakademie Freiberg, 2009. https://tubaf.qucosa.de/id/qucosa%3A22713.

Повний текст джерела
Анотація:
Auf der Grundlage der Analyse der infrastrukturellen Bedingungen im Lehr- und Forschungsbergwerk der TU Bergakademie Freiberg wurden Möglichkeiten zur Weiterentwicklung des Bergwerkes untersucht. Der vorgestellte Ansatz zur Lösung der logistischen Probleme und damit verbundener Möglichkeiten zur effizienten Nutzung des Bergwerkes für Lehre und Forschung durch den Bau einer Rampe verkörpert die Basis weiterer Untersuchungen. Die Vielfalt der Probleme, die sich aus der Implementierung einer neuen Struktur in das bestehende historische Bergwerk ergeben, wurde erörtert. Gleichzeitig wurde ausführlich auf die sich ergebenden Probleme zur Gewährleistung der Personensicherheit und der Sicherheit technischer Einrichtungen, veränderter Bedingungen der Zutrittskontrolle zum Grubenbetrieb und der komplexen Struktur der Informationsverwaltung hingewiesen. Abschließend wurde die neue administrative Struktur des Bergwerkes unter wirtschaftlichen Aspekten dargestellt.
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Pattinson, Malcolm Robert. "An examination of information system risk perceptions using the repertory grid technique." Thesis, 2012. http://hdl.handle.net/2440/87355.

Повний текст джерела
Анотація:
The increasing dependence on information systems (ISs) together with the emergence of new technologies, threats and risks has reinforced the need for a higher level of information security (InfoSec) within most organisations. The traditional management approach to mitigating such IS risks has been to implement hardware and software solutions. However, academics and practitioners are beginning to appreciate that solutions relating to the human behavioural aspects of InfoSec are an equally, if not more, effective solution. For example, if management know how their computer users perceive the risks to their organisation‘s ISs and what situational factors influence these perceptions, they can use this information to design and instigate intervention strategies to improve user behaviour. The aim of this research is to contribute to the knowledge pertaining to InfoSec behaviour by examining the perceptions that computer users have of the risks to their organisation‘s ISs and by indentifying the major situational factors that influence these perceptions. Due to the human cognitive aspect of this aim, the research design necessitated a qualitative component and therefore a two-stage hybrid qualitative-quantitative approach was adopted. Stage 1 involved a series of semi-structured interviews with typical computer users from a variety of organisations for the purpose of developing a Repertory Grid Technique (RGT) interviewing instrument to be used in the next stage. Stage 2 of this research involved a series of structured interviews, embedded with this instrument to elicit IS risk perceptions of computer users. This raw data was then analysed both qualitatively and quantitatively to generate research findings. The findings of these analyses indicate that, in general, computer users perceive that the most serious IS risks are: • damage to an organisation‘s reputation and credibility • an increase in costs; systems becoming unavailable and inaccessible, and • the inability to do their job properly. The situational factors that have a major impact on these IS risk perceptions are: • the type of loss suffered • the extent of personal impact, and • the severity and scope of the impact. When these findings are combined, the types of loss that are perceived as being most significant are: • loss of productivity (due to systems being unavailable and the inability to access data) • loss of reputation, credibility and image, and • financial loss (due to the need for additional resources to recover systems and data). This research also implies that: • Computer users with a high level of InfoSec awareness perceive reputation damage and loss of credibility as the most serious risk compared to those with less awareness of InfoSec who are more concerned about their own welfare, rather than the impact to their organisation. • The more InfoSec-aware computer users are, the more they believe that the existing controls and safeguards are the reason that InfoSec breaches will occur and will have a wide-ranging impact. • The higher an employee is within their organisational structure, the more concerned he or she is about organisational risks as compared to personal risks. • Male computer users identify damage to their organisation‘s reputation as a serious risk, however, they are more concerned about "why" the organisation is at risk. • Female computer users, on the other hand, seem to have a far more balanced view of the IS risks than their male counterparts, but do not recognise that damage to their organisation‘s reputation is a serious risk. Armed with these research findings, InfoSec managers are better placed to design human behavioural solutions, such as InfoSec awareness seminars, into their InfoSec management plans. Furthermore, this research demonstrates that the RGT is a highly appropriate technique to elicit IS risk perceptions of computer users and that management would benefit from its use if they needed to evaluate their own employees.
Thesis (Ph.D.) -- University of Adelaide, Business School, 2012
Стилі APA, Harvard, Vancouver, ISO та ін.

Книги з теми "Information security (INFOSEC)"

1

Security, United States Office of Information. InfoSec. Washington, DC]: Office of Information Security, General Services Administration, 1998.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Bayuk, Jennifer L. Stepping through the InfoSec program. Rolling Meadows, IL: ISACA, 2007.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

The basics of information security: Understanding the fundamentals of InfoSec in theory and practice. Waltham, MA: Syngress, 2011.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

F, Ransome James, ed. Business continuity and disaster recovery for infosec managers. Amsterdam: Elsevier, 2005.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

InfoSec, Office of Information Security. [S.l: s.n., 1998.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

InfoSec, Office of Information Security. [S.l: s.n., 1998.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

The InfoSec Handbook: An Introduction to Information Security. Apress, 2014.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Rao, Umesh Hodeghatta. The InfoSec Handbook: An Introduction to Information Security. Springer Nature, 2014.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Infosec Handbook: An Information Systems Security Reference Guide. Arca Systems, Incorporated, 1993.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Roadmap to Information Security: For IT and Infosec Managers. Delmar Cengage Learning, 2011.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Частини книг з теми "Information security (INFOSEC)"

1

Rao, Umesh Hodeghatta, and Umesha Nayak. "Current Trends in Information Security." In The InfoSec Handbook, 325–30. Berkeley, CA: Apress, 2014. http://dx.doi.org/10.1007/978-1-4302-6383-8_16.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Gupta, Anand, Deepank Gupta, and Nidhi Gupta. "InfoSec-MobCop – Framework for Theft Detection and Data Security on Mobile Computing Devices." In Communications in Computer and Information Science, 637–48. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-03547-0_60.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Paleri, Prabhakaran. "Informational Security (Infosec) (is)." In Revisiting National Security, 705–40. Singapore: Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-16-8293-3_17.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Cherdantseva, Yulia, and Jeremy Hilton. "Information Security and Information Assurance." In Organizational, Legal, and Technological Dimensions of Information System Administration, 167–98. IGI Global, 2014. http://dx.doi.org/10.4018/978-1-4666-4526-4.ch010.

Повний текст джерела
Анотація:
Despite great interest of researchers and professionals in Information Security (InfoSec) and Information Assurance (IA), there is still no commonly agreed understanding of the disciplines. This chapter clarifies the meaning, scope, and goals of InfoSec and IA as well as the relationship between the disciplines. Clarity of the scope and goals of InfoSec and IA is important because this knowledge serves as a foundation for the definition of (1) curricula for the InfoSec and IA education programs, (2) responsibilities of practitioners, and (3) organisations' InfoSec strategy and policies. The study analyses US and European InfoSec- and IA-related official publications and standards and discusses the perception of the disciplines in academic and industry works. The study highlights the importance of clear and precise definitions of InfoSec and IA and a need for the definitions to promote open-mindedness among practitioners and researchers. Since the existing definitions of InfoSec and IA do not fully reflect the complexity and the evolving nature of the disciplines, the contemporary adapted definitions of InfoSec and IA are elaborated in the chapter.
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Cherdantseva, Yulia, and Jeremy Hilton. "Information Security and Information Assurance." In Standards and Standardization, 1204–35. IGI Global, 2015. http://dx.doi.org/10.4018/978-1-4666-8111-8.ch058.

Повний текст джерела
Анотація:
Despite great interest of researchers and professionals in Information Security (InfoSec) and Information Assurance (IA), there is still no commonly agreed understanding of the disciplines. This chapter clarifies the meaning, scope, and goals of InfoSec and IA as well as the relationship between the disciplines. Clarity of the scope and goals of InfoSec and IA is important because this knowledge serves as a foundation for the definition of (1) curricula for the InfoSec and IA education programs, (2) responsibilities of practitioners, and (3) organisations' InfoSec strategy and policies. The study analyses US and European InfoSec- and IA-related official publications and standards and discusses the perception of the disciplines in academic and industry works. The study highlights the importance of clear and precise definitions of InfoSec and IA and a need for the definitions to promote open-mindedness among practitioners and researchers. Since the existing definitions of InfoSec and IA do not fully reflect the complexity and the evolving nature of the disciplines, the contemporary adapted definitions of InfoSec and IA are elaborated in the chapter.
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Dalziel, Henry. "Information Security Incident Management." In Infosec Management Fundamentals, 45–46. Elsevier, 2015. http://dx.doi.org/10.1016/b978-0-12-804172-7.00015-5.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Stefanek, George L. "INFOSEC network architecture design rules." In Information Security Best Practices, 19–39. Elsevier, 2002. http://dx.doi.org/10.1016/b978-187870796-3/50005-4.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Cherdantseva, Yulia, and Jeremy Hilton. "The 2011 Survey of Information Security and Information Assurance Professionals." In Organizational, Legal, and Technological Dimensions of Information System Administration, 243–56. IGI Global, 2014. http://dx.doi.org/10.4018/978-1-4666-4526-4.ch013.

Повний текст джерела
Анотація:
Information Assurance (IA) is an intensively discussed discipline. Perhaps the most striking feature of IA is that everyone has a different opinion about what it actually is. The literature analysis enables us to distinguish three different approaches to Information Assurance: 1) Technical approach, concentrated on protection of networks; 2) Business approach, where IA is perceived as the comprehensive and systematic management of Information Security (InfoSec); 3) General approach, where IA is considered as a way to establish a level of confidence in information. Interviews with InfoSec practitioners reveal that they interpret the term IA differently and have contradictory views on how IA relates to InfoSec. It was felt that a survey with a greater number of practitioners might help to identify a commonly accepted perception of IA and to clarify the goals of the discipline. In 2011, a survey was conducted among one hundred InfoSec and IA professionals across the world. This chapter presents the results of the survey.
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Mattord, Herbert J., and Michael E. Whitman. "InfoSec Policy - The Basis for Effective Security Programs." In Encyclopedia of Information Science and Technology, First Edition, 1518–23. IGI Global, 2005. http://dx.doi.org/10.4018/978-1-59140-553-5.ch267.

Повний текст джерела
Анотація:
The success of any information security program lies in policy development. The lack of success in any particular program can often be attributed to this unmet need to build the foundation for success. In 1989, the National Institute of Standards and Technology addressed this point in Special Publication SP 500-169: Executive Guide to the Protection of Information Resources (1989): The success of an information resources protection program depends on the policy generated, and on the attitude of management toward securing information on automated systems. You, the policy maker, set the tone and the emphasis on how important a role information security will have within your agency. Your primary responsibility is to set the information resource security policy for the organization with the objectives of reduced risk, compliance with laws and regulations and assurance of operational continuity, information integrity, and confidentiality (p.1).
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Koranteng, Felix Nti. "Towards a Student Security Compliance Model (SSCM)." In Research Anthology on Business Aspects of Cybersecurity, 363–75. IGI Global, 2022. http://dx.doi.org/10.4018/978-1-6684-3698-1.ch017.

Повний текст джерела
Анотація:
Users are considered the weakest link in ensuring information security (InfoSec). As a result, users' security behaviour remains crucial in many organizations. In response, InfoSec research has produced many behavioural theories targeted at explaining information security policy (ISP) compliance. Meanwhile, these theories mostly draw samples from employees often in developing countries. Such theories are not applicable to students in educational institutions since their psychological orientation with regards to InfoSec is different when compared with employees. Based on this premise, the chapter presents arguments founded on synthesis from existing literature. It proposes a students' security compliance model (SSCM) that attempts to explain predictive factors of students' ISP compliance intentions. The study encourages further research to confirm the proposed relationships using qualitative and quantitative techniques.
Стилі APA, Harvard, Vancouver, ISO та ін.

Тези доповідей конференцій з теми "Information security (INFOSEC)"

1

Alharthi, Dalal, and Amelia Regan. "Social Engineering Infosec Policies (SE-IPS)." In 8th International Conference on Artificial Intelligence and Applications (AIAP 2021). AIRCC Publishing Corporation, 2021. http://dx.doi.org/10.5121/csit.2021.110104.

Повний текст джерела
Анотація:
The sudden increase in employees working primarily or even exclusively at home has generated unique societal and economic circumstances which makes the protection of information assets a major problem for organizations. The application of security policies is essential for mitigating the risk of social engineering attacks. However, incorporating and enforcing successful security policies in an organization is not a straightforward task. To that end, this paper develops a model of Social Engineering InfoSec Policies (SE-IPs) and investigates the incorporation of those SE-IPs in organizations. This paper proposes a customizable model of SE-IPs that can be adopted by a wide variety of organizations. The authors designed and distributed a survey to measure the incorporation level of formal SE-IPs in organizations. After collecting and analyzing the data which included over fifteen hundred responses, the authors found that on average, organizations incorporated just over fifty percent of the identified formal Social Engineering InfoSec Policies.
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Parker, Fayyaadh, Jacques Ophoff, Jean-Paul Van Belle, and Ross Karia. "Security awareness and adoption of security controls by smartphone users." In 2015 Second International Conference on Information Security and Cyber Forensics (InfoSec). IEEE, 2015. http://dx.doi.org/10.1109/infosec.2015.7435513.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Zhu, Ruilin, and Lech Janczewski. "Typology of information systems security research: A methodological perspective." In 2015 Second International Conference on Information Security and Cyber Forensics (InfoSec). IEEE, 2015. http://dx.doi.org/10.1109/infosec.2015.7435512.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

van Vuuren, Ileen E., Elmarie Kritzinger, and Conrad Mueller. "Identifying gaps in IT retail Information Security policy implementation processes." In 2015 Second International Conference on Information Security and Cyber Forensics (InfoSec). IEEE, 2015. http://dx.doi.org/10.1109/infosec.2015.7435517.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Amankwa, Eric, Marianne Loock, and Elmarie Kritzinger. "Enhancing information security education and awareness: Proposed characteristics for a model." In 2015 Second International Conference on Information Security and Cyber Forensics (InfoSec). IEEE, 2015. http://dx.doi.org/10.1109/infosec.2015.7435509.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Kyaw, Ar Kar, Franco Sioquim, and Justin Joseph. "Dictionary attack on Wordpress: Security and forensic analysis." In 2015 Second International Conference on Information Security and Cyber Forensics (InfoSec). IEEE, 2015. http://dx.doi.org/10.1109/infosec.2015.7435522.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Al-Ahmad, Walid, and Basil Mohammed. "A code of practice for effective information security risk management using COBIT 5." In 2015 Second International Conference on Information Security and Cyber Forensics (InfoSec). IEEE, 2015. http://dx.doi.org/10.1109/infosec.2015.7435520.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Njenga, Kennedy, and Sifiso Ndlovu. "Mobile banking and information security risks: Demand-side predilections of South African lead-users." In 2015 Second International Conference on Information Security and Cyber Forensics (InfoSec). IEEE, 2015. http://dx.doi.org/10.1109/infosec.2015.7435511.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Cheribi, Haoua, and Mohamed Kheireddine Kholladi. "A security model for complex applications based on normative multi-agents system." In 2015 Second International Conference on Information Security and Cyber Forensics (InfoSec). IEEE, 2015. http://dx.doi.org/10.1109/infosec.2015.7435504.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Walaza, Mvelo, Marianne Loock, and Elmarie Kritzinger. "A pragmatic approach towards the integration of ICT security awareness into the South African education system." In 2015 Second International Conference on Information Security and Cyber Forensics (InfoSec). IEEE, 2015. http://dx.doi.org/10.1109/infosec.2015.7435503.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Ми пропонуємо знижки на всі преміум-плани для авторів, чиї праці увійшли до тематичних добірок літератури. Зв'яжіться з нами, щоб отримати унікальний промокод!

До бібліографії