Vulnerability in Information Technology and Computing- A Study in Technological Information Assurance
-
Published:2019-11-19
Issue:
Volume:
Page:87-94
-
ISSN:2581-6012
-
Container-title:International Journal of Management, Technology, and Social Sciences
-
language:en
-
Short-container-title:IJMTS
Author:
Paul P.K.1, Bhuimali A.2, Aithal P. S.3, Rajesh R.4
Affiliation:
1. Executive Director, MCIS, Department of CIS, Raiganj University (RGU), West Bengal, India 2. Vice Chancellor, Raiganj University, West Bengal, India 3. Vice Chancellor, Srinivas University, Karnataka, India 4. Principal, Rohini College of Engineering and Technology, TN, India
Abstract
Information Assurance is the prime name for the security and privacy related affairs. It is
responsible for the secure design, development and building of healthy sophisticated information systems. The technologies have become crucial for the development of content and information systems. Information Assurance is a new name in respect of Computing and IT Security; however, it has important significance as the area deals with both traditional and technological security related affairs. The IT Security primarily responsible for the computational secure systems whereas Information Assurance focuses not only on the design and development of secure systems but also policies, framework and regulations leading to secure information systems preparation. Among the technological space few common names are include vulnerabilities, virus, denial of services etc. Moreover, the vulnerabilities include the affairs of hardware, software, network, personal and physical site, organizational security systems etc. This paper talks about the basics of Information Assurance and allied affairs. Moreover, it talks about the vulnerabilities and affairs leading to computer access control, application security, authentication, authorization, aspects of data centric security, encryption, firewall etc. The paper also highlights the basic overview of the technologies and solution as well.
Publisher
Srinivas University
Reference28 articles.
1. Bacon, T., & Tikekar, R. (2003). Experiences with developing a computer security information assurance curriculum. Journal of Computing Sciences in Colleges, 18(4), 254-267. 2. Baskerville, R., & Siponen, M. (2002). An information security meta-policy for emergent organizations. Logistics Information Management, 15(5/6), 337- 346. 3. Bonner, W., & Chiasson, M. (2005). If fair information principles are the answer, what was the question? An actor-network theory investigation of the modern constitution of privacy. Information and Organization, 15(4), 267-293. 4. Borgesius, F. Z., Gray, J., & van Eechoud, M. (2015). Open data, privacy, and fair information principles: Towards a balancing framework. Berkeley Technology Law Journal, 30(3), 2073-2131. 5. Bulgurcu, B., Cavusoglu, H., & Benbasat, I. (2010). Information security policy compliance: an empirical study of rationality-based beliefs and information security awareness. MIS quarterly, 34(3), 523-548.
|
|