Information security technologies: a classification approach

Asadi, Maryam Information security technologies: a classification approach. Iranian Journal of Information Science, 2005, vol. 20, n. 3&4, pp. 1-16. [Journal article (Paginated)]

[thumbnail of Information_Security.pdf]
Preview
PDF
Information_Security.pdf

Download (215kB) | Preview

English abstract

The most important advantage and mission for any computer network is to share the hardware and software resources as well as providing a quick and easy access to information. Controlling the extent of access to the shared resources, is one of the most important goals of a network security system. With expansion of computer networks (internet in particular), the attitude towards data security as well as security of other shared resources has entered a new level. It is therefore necessary for organizations to follow a specific strategy for implementation of a security system in order to protect valuable data. An appropriate security system, may lead to somewhat negative, unexpected consequences. Success in securing information is contingent upon protecting information and information systems against intrusions and attacks. To this end numerous security protocols are employed. The present paper attempts to classify these security protocols based on the level of interaction between technology and information as well as levels of security implementation of information systems.

Item type: Journal article (Paginated)
Keywords: Information security, Computer network, Classification
Subjects: L. Information technology and library technology > LH. Computer and network security.
Depositing user: Maryam Asadi
Date deposited: 23 Oct 2006
Last modified: 02 Oct 2014 12:04
URI: http://hdl.handle.net/10760/8258

References

Bace, R. G. (2000). Intrusion detection. Indianapolis, IN: Macmillan Technical Publishing.

Caelli, W., Longley, D., & Shain, M. (1994). Information security handbook. England: MacMillan.

Comer, D. E. (1999). Computer networks and Intranets: with Internet Applications. New York: Prentice-Hall.

Conway, S., & Sliger, C. (2002). building taxonomies. In: Unlocking knowledge assets (pp. 105-124). Washington: Microsoft press.

Information Security & Prevention of Computer Related Crime (INFOSEC). (2002). What is information security? Retrieved June 24, 2004, from http://www.infosec.gov.hk/english/general/infosec/what-infosec.htm

King, C. M., Dalton, C. E., & Osmanoglu, T. E. (2001). Security Architecture: Design, Deployment and Operations. London: McGraw-Hill.

Lexico Publishing Group, LLC. (2002). Dictionary.com. Retrieved June 24, 2004, from http://www.dictionary.com

Maiwald, E., & Sieglein, W. (2002). Security planning & disaster recovery. Osborne: McGraw-Hill.

McClure, S., Scambray, J., & Kurtz, G. (2002). Hacking exposed. (3rd ed.). London: McGraw-Hill.

Oppliger, R. (1998). Internet & Intranet security. Boston: Artech House.

Tiwana, A (1999). Web Security. Boston: Digital press.

Venter, H. S., & Eloff, J. H. P. (2003). A taxonomy for information security technologies. Computers & Security, 22(4), 299-307.

Encyclopedia and learning center. (2004). TechTarget Network: What is.com. Retrieved June 24, 2004, from http://whatis.techarget.com/definitionscategory/


Downloads

Downloads per month over past year

Actions (login required)

View Item View Item