ICT Systems Security and Privacy Protection
2018, Springer eBooks
https://doi.org/10.1007/978-3-319-99828-2…
13 pages
1 file
Sign up for access to the world's latest research
Abstract
The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use. The publisher, the authors and the editors are safe to assume that the advice and information in this book are believed to be true and accurate at the date of publication. Neither the publisher nor the authors or the editors give a warranty, express or implied, with respect to the material contained herein or for any errors or omissions that may have been made. The publisher remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Related papers
The Journal of Strategic Information Systems, 2007
Information Systems Frontiers
H. Raghav Rao, for the opportunity to put together this special issue. Furthermore, we thank the advisory guest editor, the various guest editors and referees for their comment/insights on the accepted papers in this special issue. We are grateful for the help provided by IFIP Working Group 8.6 2019 workshop team: honorary chair George Kasper, the general chairs Deborah Bunker and Richard Boateng and the doctoral consortium chair H. Raghav Rao, of the University of Texas at San Antonio. H. Raghav Rao rendered invaluable support in bringing the whole idea of having the IFIP 8.6 2019 working conference in Ghana to fruition. We thank John Effah and the leadership of Information Systems Department of the University of Ghana for organizing the workshop. Finally, we are immensely grateful to University of Ghana Business School (UGBS) for agreeing to host the workshop and providing logistics that made the workshop possible.
As information systems and networks (ICTs) are increasingly used by governments, different organisations, businesses and end-users worldwide, there has been a common interest in promoting the security of such systems through a variety of methods and approaches. This interest is important to address the challenges posed by the potential harm from security failures of the systems to national economies, international trade and the overall participation of individuals in social, cultural, economical and political life. Given that different countries are in different stages of ICT use and sophistication, it follows that different approaches are necessary to cater for the desired security, that is, approaches tailored to meet local conditions (within a country). Varying obstacles and challenges in attaining ICT security are the result, in part, of the difference in contexts in the environments found in different countries. For instance, contexts found in developed countries are significan...
2005
As information systems and networks (ICTs) are increasingly used by governments, different organisations, businesses and end-users worldwide, there has been a common interest in promoting the security of such systems through a variety of methods and approaches. This interest is important to address the challenges posed by the potential harm from security failures of the systems to national economies, international trade and the overall participation of individuals in social, cultural, economical and political life.
This publication has been developed by NIST in accordance with its statutory responsibilities under the Federal Information Security Modernization Act (FISMA) of 2014, 44 U.S.C. § 3551 et seq., Public Law (P.L.) 113-283. NIST is responsible for developing information security standards and guidelines, including minimum requirements for federal systems, but such standards and guidelines shall not apply to national security systems without the express approval of appropriate federal officials exercising policy authority over such systems. This guideline is consistent with the requirements of the Office of Management and Budget (OMB) Circular A-130. Nothing in this publication should be taken to contradict the standards and guidelines made mandatory and binding on federal agencies by the Secretary of Commerce under statutory authority. Nor should these guidelines be interpreted as altering or superseding the existing authorities of the Secretary of Commerce, Director of the OMB, or any other federal official. This publication may be used by nongovernmental organizations on a voluntary basis and is not subject to copyright in the United States. Attribution would, however, be appreciated by NIST.
FBIM Transactions, 2019
With the development of computerization, information and communication technologies (ICT) are rapidly penetrating in all areas of human life. The state of information security and security of information systems is at a relatively low level. Threats and risks related to ICT by relevance and severity of possible consequences are most often directed at the state level, somewhat less towards banks, insurance companies, marketing and other companies that have larger amounts of personal data of users. However, small businesses and individuals are also very often exposed to the attacks. The authors analyze the legal environment in the IT sector of the Slovak Republic. After introductory considerations, the paper analyzes the legal regulations of the European Union and, in particular, of the Slovak Republic. The accent was placed on the security standards of the information systems of Slovakia. After that, the technical norms of relevance to the security of information and communication technologies are discussed. The authors dealt with long-term issues of security and the spread of good practice in the protection of property, information and communication systems. The aim of this article is to present the standard security and information systems of the European Union. Based on the research carried out, the authors point out that the goal of the academic environment should be to continuously find solutions to the new and emerging challenges that arise every day. One of the most difficult tasks is the transfer of this new knowledge into the legal framework and technical standards.
ArXiv, 2013
Todays modern society is extremely dependent on computer based information systems. Many of the organizations would simply not be able to function properly without services provided by these systems, just like financing organizations. Although interruption might decrease the efficiency of an organization, theft or unintentional disclosure of entrusted private data could have more serious consequences, such as legal actions as well as loss of business due to lack of trust from potential users. This dependence on information systems has lead to a need for securing these systems and this in turn has created a need for knowing how secure they are. The introduction of the information society has changed how people interact with government agencies. Government agencies are now encouraged to uphold a 24-hour electronic service to the citizens. The introduction of government services on the Internet is meant to facilitate communication with agencies, decrease service times and to lessen the...
2020
The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use.
Individual chapters of this publication are distributed under the terms of the Creative Commons Attribution 3.0 Unported License which permits commercial use, distribution and reproduction of the individual chapters, provided the original author(s) and source publication are appropriately acknowledged. If so indicated, certain images may not be included under the Creative Commons license. In such cases users will need to obtain permission from the license holder to reproduce the material. More details and guidelines concerning content reuse and adaptation can be found at http://www.intechopen.com/copyright-policy.html. Notice Statements and opinions expressed in the chapters are these of the individual contributors and not necessarily those of the editors or publisher. No responsibility is accepted for the accuracy of information contained in the published chapters. The publisher assumes no responsibility for any damage or injury to persons or property arising out of the use of any materials, instructions, methods or ideas contained in the book.
E3S Web of Conferences, 2021
As a result of the spread of malicious information and spam in the Network, unauthorized access, disclosure, distortion, modification, destruction of both personal data of an individual user and digital data that make up the infrastructure of an entire state are possible. Therefore, ensuring information security is today one of the most important tasks of a society that seeks to preserve the current state of its territory of residence in the conditions of various external influences. Within the framework of information protection, a set of measures is implemented to ensure the security of data while maintaining their availability, confidentiality and integrity. The article deals with the problems of ensuring information security in the context of the transition to the digital economy. The article describes the main challenges and threats to databases in the form of unauthorized use, distortion, modification, and destruction of information. The directions and tools for preserving and...

Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.