Academia.eduAcademia.edu

Outline

Information Security Threats and Information Assurance

Abstract

Today, the benefits of rapidly developing technology, as well as come to the fore the problems brought about. For this reason, individuals, institutions and organizations take measures to ensure the security of information. Information assurance is the practice of managing risks related to the use, processing, storage and transmission of information or data and the systems and processes used for those purposes. Thus, information security is now provided with information assurance measures. The presented work, especially in today's digital and networking technologies in order to ensure effective information security threats and describes the scope of what required for information assurance.

References (12)

  1. Bensghir T. K., Altınsoy S. Ö., A corporate restructuring proposal for the management of cyber security in Turkey, 3rd International Conf. on Information Security and Cryptology, 14-20, Ankara, 2008.
  2. Sevgi L., 11 September 2001 -Electronic wars, information security and national defense in changing world, EMO special issue, 2001.
  3. Ozenc K.., , ensuring the security of personal and corporate information in information and communication technologies, 2nd International Conf. on Information Security and Cryptology, 183-190, Ankara, 2007.
  4. Japanese Government's Efforts to Address Information Security Issues (November 2007), http://www.nisc.go.jp/eng/
  5. Kara M., Software/hardware security evaluation in Turkey, TÜBİTAK-UEKAE, 2009.
  6. Kara M., Secure File Storage and Deletion in Computer Systems, TÜBİTAK-UEKAE, 2011.
  7. National Cyber Security Exercise in Turkey, 2013 http://www.tk.gov.tr/bilgi_teknolojileri/siber_guvenl ik/usgt2013.php
  8. Sevgi L., Electronic wars, information espionage and tempest, Endüstriyel & Otomasyon, January 2005.
  9. Sevgi L., EMC and prevention methods: (i) Screening, Endüstriyel & Otomasyon, September, 2004.
  10. Yalman Y., Erturk I., A hidden data transfer system implementation within digital voice for wireless communications, Journal of Polytechnic, Vol. 11: 319-327. 2008.
  11. Bandirmali N., Erturk I., WSNSec: A scalable data link layer security protocol for WSNs, Ad Hoc Networks, doi:10.1016/j.adhoc. 2011.04.013.
  12. Yalman Y., Erturk I., Karahan A., Software design and implementation for revealing digital stego images, 4th Int. Computer and Instructional Tech. Symposium (ICITS'10), 1082-1086, 2010.