SlideShare une entreprise Scribd logo
1  sur  5
Télécharger pour lire hors ligne
IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661, p- ISSN: 2278-8727Volume 15, Issue 2 (Nov. - Dec. 2013), PP 30-34
www.iosrjournals.org
www.iosrjournals.org 30 | Page
Recapitulating the development initiatives of a robust information
security safeguard: RITSB-the proposed solution
Jahidul Arafat1
and Md. Ahsan Habib2
1
Researcher, HT Research and Consultancy, UK.
2
Department of Information and Communication Technology, Mawlana Bhashani Science and Technology
University, Bangladesh
Abstract: Most current information security systems performance vary with the nature of the filed its being
operating. With an increased emphasizes on the adoption of security tools and technologies, the anomalies and
intrusion are mostly said defined to be detected on system's algorithm, when most systems have well defined
mechanism for rapid reaction and identification of intrusions. However, despite this support for anomaly
detection, this is usually limited and often require a full recompilation of the system to deploy a comprehensive
framework of security governance, strategies and practices employing the policies in implementation.
As a result, the absence of a robust security framework securing both the education and corporate
resources has heightened the tension for a strategic information security solutions which might ends with cost,
complexities and cumbersome to develop. This paper thereby presents an alternative comprehensive system
namely RITS-B which accommodates both the nature of education and organizations without a need to for a
further modification. Implication of the proposed approach at real time depicts its suitability in the arena of
concern.
Keywords: Information Security, Governance, Strategies, Practices, Regional Cultures and Believes.
I. Introduction
Information technology security in higher education is the process of securing the higher education
environment without disrupting the openness, accessibility, academic and intellectual freedom which is at the
very heart of the higher education environment. It is one of the fundamental process towards the broader
security because the further processing steps depends of what types of security breaches has been occurred and
what strategies are in place to cope up with these. Despite the numerous functionality of security, IT security in
Higher education is still a subject of on-going investment and it cannot be conclusively stated that education
field is highly secured because of the application, technological and intrusion’s diversity. As a consequence, the
task of choosing the best method which will not only ensure mission critical level security to each bit of higher
education information but also not compromise with its core missions is still a difficult challenge.
1.1 Structure of the study
This paper is organized as follows: the literature review related to the basic idea on higher education
and corporate level IT security needs and various hard and soft aspects of security to secure their arena including
their advantages and disadvantages is detailed in section 2. The RITS-B approach is presented in section 3. The
quantitative survey results are provided in section 4 and finally section 5 shows some concluding remarks.
II. Literature Review
2.1 What if information security?
By far the most commonly used meaning for information security is the preservation of (Dark et al,
2006; Voloudakis & King, 2003; Ward & Hawkins, 2003):
a) Confidentiality or protection from unauthorized use or disclosure of information.
b) Integrity, ensuring data accuracy and completeness through protection from unauthorized, unanticipated, or
unintentional modification, and including authenticity.
c) Availability, making data available to the authorized users on a timely basis and when needed and
d) Scalability, scaling the belief of educational culture of one region from that of other regions and stimulate
institution’s interest to contribute in the field of information security concerns while preserving oaths and
mandates of learning and knowledge sharing.
Thus the study can, in turn, characterize each of these seven protection categories: confidentiality,
integrity, authenticity, scalability, non-repudiation, accountability, and availability-by levels of sensitivity: high
(serious injury to an institution), medium (serious injury), and low (minor injury).
Recapitulating the development initiatives of a robust information security safeguard: RITSB-the
www.iosrjournals.org 31 | Page
2.2 Hard and Soft Information security solutions
Several survey papers (Arabasz & Pirani, 2002; Kvavik & Voloudakis, 2003; Yanosky & Salaway, 2006)
cover the major Information Technology Security Approaches available in the literature. Most of the security
schemes can be roughly categorized into two approaches:
 The Hard i.e. Technical Method
 The Soft i.e. Non-Technical Method
Basically, the first approach explores the information security technologies used by the higher education
institutions. What tools have they chosen to install, to prevent harm to their information assets? The security
levels are then deduced from the boundary of these installed high functional tools. The usual tools that are
employed in hard methods include antivirus software, SSL for web transactions, centralized data backup,
network firewall, enterprise directory, VPN for remote access, intrusion detection and prevention tools,
encryption, content monitoring/filtering, electronic signature and shibboleth. The first approach fails to gain
total effectiveness in the higher education information security process due to the following reasons: (a) Money
matters when developing IT security strategies but much depends on how, when and where it is used, by whom
and with what level of effort and skill. (b) Integrating adopted technologies with current and future practices is
the lion’s share then just that of selecting it. (c) And peoples’ troubles in understanding the adopted technologies
(Yanosky & Salaway, 2006).
The strategies for the second approach exploit the importance of soft IT interventions (e.g.
organization, Cultural aspects, awareness program, training programs, policies, executive attention etc.) to
produce a secured campus environment around the educational institution and having the advantages such as: (a)
It is very simple in nature (b) It evaluates all the spatial properties of Information security. (c) Representation of
security pattern is much more effective and well structured than only technology based security processing. (d)
It gives dynamic and formalized solution to security concerns. (e) It is based on the belief that openness and
accessibility of higher education environment will not only be preserved but also be secured. The features of this
approach provide well organized security solution with some limitations on concerns and generalization because
of academic and departmental diversities.
2.3 Robust information security solution: rational to have
These hints are significant for higher education, where much information used for teaching and
research requires the highest level of integrity and availability but low level of confidentiality and for Muslim
nation flexible sense of scalability also need to be defined. And to ensure such level an institution have two
choices: either to follow the security approach (a) or (b) as mentioned in section I or go for the use of a blended
approach- balancing the features of (a) and (b) according to its academia’s believes, needs and constrains to
foster the institution’s security goal. Where this balancing scheme requires the exploration of the following
issues (Bellovin et al, 2006; Albrecht & Caruso, 2003; Pirani, Sheep Pond Associates, Voloudakis, Ernst &
Young, 2003):
1. Make IT security a priority.
2. Selecting security controls and products.
3. Defining and empowering acceptable behavior [by students, faculty, and staff].
4. Preserve the academia’s religion, regional and cultural believes.
5. Revise instructional security policy and improve the use of existing security tools.
6. Making consistent, timely, and cost-effective management decisions.
7. Improve security for further research and education networks.
8. Integrate work in higher education with national effort to strengthen critical infrastructure and
9. Empowering [members of the institution’s community to do their work] securely.
All these are the pledge of the education and organization to gain success in openness and privacy in the field of
information security.
III. Development initiatives of robust information security solution
To improve the security scheme, a strategy consists in combining these approaches in order to obtain a
robust security by exploiting the advantages of one method to overcome the limitations of the other one called
Robust IT Security Balancing (RITS-B) Approach is presented in this paper. This is an attempt to unify different
methods of higher education information security approaches under a common topology based on the both hard
and soft interventions with that of Muslim culture and believes. This RITS-B Approach considers all the soft
aspects of information security i.e. information security Policies, Awareness, Leadership and Practices for the
Recapitulating the development initiatives of a robust information security safeguard: RITSB-the
www.iosrjournals.org 32 | Page
user community on the acceptable use of technological tools to develop such strategic framework of security
environment where facts, national and religion perspectives will be merged up to lead to a proactive leadership
and information security system without violating the freedom and openness that is at the very heart of the
academia. In the RITS-B approach, soft security aspects are used not to describe which contents should they have
rather what should be the status of these in place security aspects and what characteristics should they bare for the
acceptable use of the existing security tools and technologies to the campus community and thereby to secure
their information arena.
3.1 The RITS-B : The Proposed Approach
The proposed RITS-B approach is detailed in Roadmap 1. It consists of nine (09) steps those were
grouped into three basic modules as discussed in section A, B and C to achieve the sustainability in the process
of higher education secrecy and security for Muslim nations. An institution is defined by its value criterion as
discussed above where its security challenges lies on its scope and scale- to assess the security concerns. The
heterogeneous and diverse nature of institution and academia fuel the further processing needs of security in the
domain of technology and generic soft interventions that is presented in section B and section C respectively. If
the institutions are in the need of security then put the above mentioned nine steps under the same umbrella of
secrecy where the institution’s cultures, believes and values shows the further light towards the journey on
robust security and sustainability in this complicated and insecure world environment.
Roadmap 01: Robust IT Security Balancing (RITS-B) Approach
Precondition: Institutions to be secured
Post condition: A more secured higher education environment
1. Define the institution’s information security scope
a. Develop a framework on fact and national perspective for campus security
b. Identify security policies, tools, procedure and practices
2. Defining IT Security Strategic Assessment Scale
a. Reactive
b. Technology Centric
c. Cultural
d. Fortified
3. Document the institution’s technological needs
a. Technology/Tools vary
i. with that of application and intrusions
ii. with that of institutions wants, needs and abilities
b. Main purpose: is to fulfill the requirements of (1) to (9) of section II
4. Model the Management System Information Security on campus
a. Based on: DI-AI methodology
b. Should follow the standards of NBR ISO/IEC-27001:2005
5. Model Information Security Organizational Structure
a. Formulate a centralized office
b. Decentralize it into ITPO and ITSO
c. Have some dedicated staffs
6. Development of security plans and policies
7. Communication and awareness
8. Model the pattern of institutional IT Security Practices
9. Implementation of security Easy to Use Scheme
IV. RITS-B implication at education and corporate level
In analyzing the security performance of the RITS-B approach, the responses of 6 senior university
administrators- the majority of whom were Chief IT Officer and other director of CICT (Centre of Information
and Communication Technology) /academic/administrative computing along with 66 academic personnel at 6
engineering institutions of Bangladesh were synthesized, from a June 2010 survey as reported in Information
Technology Security Management in Engineering Universities in Bangladesh by Jahidul Arafat, Lecturer,
Research Associate, HTRC, UK. The existing security trends of these institutions were queried by the respective
researcher and in the light of the findings the RITS-B approach is developed and later the surveyed institutions
were asked to implement this newly developed security scheme in their arena. The impact of the implementation
status of this RITS-B approach at those institutions were further analyzed against three survey questions to
Recapitulating the development initiatives of a robust information security safeguard: RITSB-the
www.iosrjournals.org 33 | Page
assess respondents’ opinions on the success of their IT security outcomes (Likert scale ranging from: 1=
strongly agree, 2= agree, 3= Disagree, and 4= Strongly Disagree):
 How would you characterize your program success?
 Are data, network, and applications that are your responsibility secure?
 Is your institution more secure today than it was two years ago?
Table1. Impact of RITS-B’S implementation status over institution’s (both education and corporate
organization) IT security outcomes
Implementation
Status of RITS-B
Approach
IT Security Outcomes
Program is Successful Systems are
Secure
More Secure than 2 years ago
Fully Implemented WA - - -
S.Div. - - -
Partially
Implemented
WA 2.25 1.75 1.25
S.Div. 0.500 0.500 0.500
Didn’t Implement WA 3.50 3.00 2.50
S.Div. 0.707 0.000 0.707
Scale: 1(Strongly Agree) = SA, 2(Agree) = A, 3(Disagree) = D and 4(Strongly Disagree)= SD. N=6 (Institutions), WA=
Weighted Average. S.Div.= Standard Deviation.
Table 1 shows that institutions which implemented the proposed RITS-B approach in their arena either fully or
partially rate their IT security outcomes higher than those which didn’t. This thereby dictates the significance of
having this newly developed security model in the campus arena to gain robustness in the process of secrecy and
security without violating the freedom and openness.
V. Conclusion
The Soft IT Security (SITS) approach is a useful and important technique in higher education
information security. In spite of its excellent persona such as simplicity, effectiveness and incident supervision,
it is unable to achieve global optimum because of academic and departmental diversities. On the other hand, the
proposed Robust IT Security Balancing (RITSB) Approach considers the stages of Identification-Prioritization-
Revision-Dynamicity for an acceptable use of soft security issues over the hard interventions and on the end
user community while considering the academia’s diversities, believes and constraints. In the RITS-B approach,
the degree used for merging the hard and soft security concerns with that of the institution’s belief, culture and
constraints are derived dynamically based on similarity and value criterions of the regions and institutions. For
these reasons, the RITS-B Approach is able to present the institution’s security concerns from a holistic
position. The quantitative survey results show that the institutions which had implemented this proposed
security solution in their arena feeling more secure than two years ago. They also rated their system’s security
and program’s success much higher than that of others. This increases the application area of the SITS approach
where the robustness and dynamisms are needed.
References
[1]. Arabasz, P., & Pirani, J. (2002). Wireless networking in higher education, EDUCAUSE Center for Applied Research, Vol. 2,
Available from: http://www.educause.edu/ecar/> [accessed 11 June 2010].
[2]. Albrecht, B. & Caruso, J.B. (2003). Information Technology Security at Indiana University, Case Study, ECAR, No. 8.
[3]. Bellovin, S., Blaze, M., Brickell, E., Brooks, C., Cerf, V., Diffie, W., Landau, S., Peterson, J., & Treichler, J. (2006). Security
implications of applying the Communications Assistance to Law Enforcement Act to voice over IP.
[4]. Dark, M., Epstein, R., Morales, L., Countermine, T., Yuan, Q., Muhammed, Ali., Rose, M., & Harter, N. (2006). A Framework for
Information Security Ethics Education. 10th Colloquium for Information Systems Security Education- University of Maryland, 4, pp.
109-115.
[5]. Ellen E.C., & Luker M.A. (2000). Finding the Will and the Way: Preparing Your Campus for a Networked Future, EDUCAUSE
Leadership Strategies Series- San Francisco: Jossey-Bass Inc. Publishers, Vol. 1, pp. 85.
[6]. EDUCAUSE. (2006). CALEA (Communications Assistance for Law Enforcement Act), [online], Available
from:<http://www.educause.edu/Browse /645?PARENT_ID=698> [accessed 21 August 2010].
[7]. Fender, J. (2006, June 13). LSU beefs up computer security. Capitol News Bureau [online], Available
from:<http://www.2theadvocate.com/news/3040126.html> [accessed 21 June 2010].
[8]. Gray, T. (2005). Network Security Credo, [online], EDUCAUSE Quarterly Publication, 14(2), 12-14,
http://staff.washington.edu/gray
[9]. Executive Guide (1998). Information Security Management: Learning From Leading Organizations, GAO/AIMD-98-68, May.
[10]. Kvavik, R. B., & Voloudakis, J. (with Caruso, J. B., Katz, R. N., King, P., & Pirani, J. A.). (2003). Information technology security:
Governance, strategy, and practice in higher education, EDUCAUSE Center for Applied Research, Vol. 5, Available from:
<http://www.educause.edu/ecar>
[11]. Pirani, J.A., Sheep Pond Associates, Voloudakis, J., Ernst, C.G. & Young. (2003). Information Technology Security at MIT, Case
Study, ECAR, No. 9.
Recapitulating the development initiatives of a robust information security safeguard: RITSB-the
www.iosrjournals.org 34 | Page
[12]. Pirani, J.A., Sheep Pond Associates & ECAR. (2003). Incident response: Lesson Learned from Georgia Tech, the university of
Montana & University of Texan at Austin, Case Study, ECAR, No. 7.
[13]. Rivlin, A. (1995). Circular No. A-123. Washington, DC: U.S. Office of Management and Budget, [online], Available:
http://www.whitehouse.gov /OMB /circulars/a123/a123.html [21 August 2010].
[14]. Rezmierski, V. E., Rothschild, D. M., Kazanis, A. S., & Rivas, R. D. (2005). Final report of the computer incident factor analysis
and categorization (CIFAC) project, Vol. 2, Available from: <http://www.educause.edu/ ir/library/pdf/CSD4455.pdf> [accessed 21
August 2010].
[15]. Sieberg, D. (2005, September 26). Hackers shift focus to financial gain [online], Available from:
<http://www.cnn.com/2005/TECH/internet /09/26/identity.hacker/index.html> [accessed 21 August 2010].
[16]. Voloudakis, J. & King, P. (2003). Information Technology Security at the University of Washington, Case Study, ECAR, No. 10.
[17]. Visa Inc. (2004, December 15). Payment card industry data security standard [online], Available:
http://usa.visa.com/business/accepting_visa/ops_risk_management /cisp_merchants.html [21 August 2010].
[18]. Ward D., & Hawkins B.L. (2003). Presidential Leadership for Information Technology. EDUCASE Review, 38(3), 45.
[19]. Yanosky, R. & Salaway, G. (2006). Identity management in higher education: A baseline study, EDUCAUSE Center for Applied
Research, Vol. 2, Available from: http://www.educause.edu/ecar/

Contenu connexe

Tendances

Improving Delivery Effectiveness of Information Security Learning Continuum
Improving Delivery Effectiveness of Information Security Learning ContinuumImproving Delivery Effectiveness of Information Security Learning Continuum
Improving Delivery Effectiveness of Information Security Learning ContinuumMansoor Faridi, CISA
 
Ics 3210 information systems security and audit - edited
Ics 3210   information systems security and audit - editedIcs 3210   information systems security and audit - edited
Ics 3210 information systems security and audit - editedNelson Kimathi
 
Information Security Management in University Campus Using Cognitive Security
Information Security Management in University Campus Using Cognitive SecurityInformation Security Management in University Campus Using Cognitive Security
Information Security Management in University Campus Using Cognitive SecurityCSCJournals
 
Information Security Management System: Emerging Issues and Prospect
Information Security Management System: Emerging Issues and ProspectInformation Security Management System: Emerging Issues and Prospect
Information Security Management System: Emerging Issues and ProspectIOSR Journals
 
Information Security Governance: Concepts, Security Management & Metrics
Information Security Governance: Concepts, Security Management & MetricsInformation Security Governance: Concepts, Security Management & Metrics
Information Security Governance: Concepts, Security Management & MetricsMarius FAILLOT DEVARRE
 
Mobile Device Users’ Susceptibility To Phishing Attacks
Mobile Device Users’ Susceptibility To Phishing AttacksMobile Device Users’ Susceptibility To Phishing Attacks
Mobile Device Users’ Susceptibility To Phishing AttacksAIRCC Publishing Corporation
 
WIRELESS SECURITY MEASUREMENT USING DATA VALUE INDEX
WIRELESS SECURITY MEASUREMENT USING DATA VALUE INDEXWIRELESS SECURITY MEASUREMENT USING DATA VALUE INDEX
WIRELESS SECURITY MEASUREMENT USING DATA VALUE INDEXIJNSA Journal
 
An information security governance framework
An information security governance frameworkAn information security governance framework
An information security governance frameworkAnne ndolo
 
Paper id 25201417
Paper id 25201417Paper id 25201417
Paper id 25201417IJRAT
 
Fundamental Areas of Cyber Security on Latest Technology
Fundamental Areas of Cyber Security on Latest TechnologyFundamental Areas of Cyber Security on Latest Technology
Fundamental Areas of Cyber Security on Latest Technologyijtsrd
 
report on Mobile security
report on Mobile securityreport on Mobile security
report on Mobile securityJAYANT RAJURKAR
 
NIST Privacy Engineering Working Group -- Risk Models
 NIST Privacy Engineering Working Group -- Risk Models NIST Privacy Engineering Working Group -- Risk Models
NIST Privacy Engineering Working Group -- Risk ModelsDavid Sweigert
 
Zlatibor risk based balancing of organizational and technical controls for ...
Zlatibor   risk based balancing of organizational and technical controls for ...Zlatibor   risk based balancing of organizational and technical controls for ...
Zlatibor risk based balancing of organizational and technical controls for ...Dejan Jeremic
 
Information security approach in open distributed multi agent virtual learnin...
Information security approach in open distributed multi agent virtual learnin...Information security approach in open distributed multi agent virtual learnin...
Information security approach in open distributed multi agent virtual learnin...ijcsit
 
Information Security Governance: Concepts, Security Management & Metrics
Information Security Governance: Concepts, Security Management & MetricsInformation Security Governance: Concepts, Security Management & Metrics
Information Security Governance: Concepts, Security Management & MetricsOxfordCambridge
 
Information Sharing of Cyber Threat Intelligence with their Issue and Challenges
Information Sharing of Cyber Threat Intelligence with their Issue and ChallengesInformation Sharing of Cyber Threat Intelligence with their Issue and Challenges
Information Sharing of Cyber Threat Intelligence with their Issue and Challengesijtsrd
 
A LITERATURE SURVEY AND ANALYSIS ON SOCIAL ENGINEERING DEFENSE MECHANISMS AND...
A LITERATURE SURVEY AND ANALYSIS ON SOCIAL ENGINEERING DEFENSE MECHANISMS AND...A LITERATURE SURVEY AND ANALYSIS ON SOCIAL ENGINEERING DEFENSE MECHANISMS AND...
A LITERATURE SURVEY AND ANALYSIS ON SOCIAL ENGINEERING DEFENSE MECHANISMS AND...IJNSA Journal
 

Tendances (19)

Improving Delivery Effectiveness of Information Security Learning Continuum
Improving Delivery Effectiveness of Information Security Learning ContinuumImproving Delivery Effectiveness of Information Security Learning Continuum
Improving Delivery Effectiveness of Information Security Learning Continuum
 
Ics 3210 information systems security and audit - edited
Ics 3210   information systems security and audit - editedIcs 3210   information systems security and audit - edited
Ics 3210 information systems security and audit - edited
 
Information Security Management in University Campus Using Cognitive Security
Information Security Management in University Campus Using Cognitive SecurityInformation Security Management in University Campus Using Cognitive Security
Information Security Management in University Campus Using Cognitive Security
 
Information Security Management System: Emerging Issues and Prospect
Information Security Management System: Emerging Issues and ProspectInformation Security Management System: Emerging Issues and Prospect
Information Security Management System: Emerging Issues and Prospect
 
Information Security Governance: Concepts, Security Management & Metrics
Information Security Governance: Concepts, Security Management & MetricsInformation Security Governance: Concepts, Security Management & Metrics
Information Security Governance: Concepts, Security Management & Metrics
 
Mobile Device Users’ Susceptibility To Phishing Attacks
Mobile Device Users’ Susceptibility To Phishing AttacksMobile Device Users’ Susceptibility To Phishing Attacks
Mobile Device Users’ Susceptibility To Phishing Attacks
 
WIRELESS SECURITY MEASUREMENT USING DATA VALUE INDEX
WIRELESS SECURITY MEASUREMENT USING DATA VALUE INDEXWIRELESS SECURITY MEASUREMENT USING DATA VALUE INDEX
WIRELESS SECURITY MEASUREMENT USING DATA VALUE INDEX
 
An information security governance framework
An information security governance frameworkAn information security governance framework
An information security governance framework
 
Paper id 25201417
Paper id 25201417Paper id 25201417
Paper id 25201417
 
N018138696
N018138696N018138696
N018138696
 
Fundamental Areas of Cyber Security on Latest Technology
Fundamental Areas of Cyber Security on Latest TechnologyFundamental Areas of Cyber Security on Latest Technology
Fundamental Areas of Cyber Security on Latest Technology
 
report on Mobile security
report on Mobile securityreport on Mobile security
report on Mobile security
 
NIST Privacy Engineering Working Group -- Risk Models
 NIST Privacy Engineering Working Group -- Risk Models NIST Privacy Engineering Working Group -- Risk Models
NIST Privacy Engineering Working Group -- Risk Models
 
Zlatibor risk based balancing of organizational and technical controls for ...
Zlatibor   risk based balancing of organizational and technical controls for ...Zlatibor   risk based balancing of organizational and technical controls for ...
Zlatibor risk based balancing of organizational and technical controls for ...
 
Information security approach in open distributed multi agent virtual learnin...
Information security approach in open distributed multi agent virtual learnin...Information security approach in open distributed multi agent virtual learnin...
Information security approach in open distributed multi agent virtual learnin...
 
Ict security essay
Ict security essay Ict security essay
Ict security essay
 
Information Security Governance: Concepts, Security Management & Metrics
Information Security Governance: Concepts, Security Management & MetricsInformation Security Governance: Concepts, Security Management & Metrics
Information Security Governance: Concepts, Security Management & Metrics
 
Information Sharing of Cyber Threat Intelligence with their Issue and Challenges
Information Sharing of Cyber Threat Intelligence with their Issue and ChallengesInformation Sharing of Cyber Threat Intelligence with their Issue and Challenges
Information Sharing of Cyber Threat Intelligence with their Issue and Challenges
 
A LITERATURE SURVEY AND ANALYSIS ON SOCIAL ENGINEERING DEFENSE MECHANISMS AND...
A LITERATURE SURVEY AND ANALYSIS ON SOCIAL ENGINEERING DEFENSE MECHANISMS AND...A LITERATURE SURVEY AND ANALYSIS ON SOCIAL ENGINEERING DEFENSE MECHANISMS AND...
A LITERATURE SURVEY AND ANALYSIS ON SOCIAL ENGINEERING DEFENSE MECHANISMS AND...
 

En vedette

Towards Web 3.0: An Application Oriented Approach
Towards Web 3.0: An Application Oriented ApproachTowards Web 3.0: An Application Oriented Approach
Towards Web 3.0: An Application Oriented ApproachIOSR Journals
 
A Review of BSS Based Digital Image Watermarking and Extraction Methods
A Review of BSS Based Digital Image Watermarking and Extraction MethodsA Review of BSS Based Digital Image Watermarking and Extraction Methods
A Review of BSS Based Digital Image Watermarking and Extraction MethodsIOSR Journals
 
Design of Ball Screw Mechanism for Retro Fit of External Grinding Machine
Design of Ball Screw Mechanism for Retro Fit of External Grinding MachineDesign of Ball Screw Mechanism for Retro Fit of External Grinding Machine
Design of Ball Screw Mechanism for Retro Fit of External Grinding MachineIOSR Journals
 
Project Managers Vs Operations Managers: A comparison based on the style of l...
Project Managers Vs Operations Managers: A comparison based on the style of l...Project Managers Vs Operations Managers: A comparison based on the style of l...
Project Managers Vs Operations Managers: A comparison based on the style of l...IOSR Journals
 
A Survey of Image Segmentation based on Artificial Intelligence and Evolution...
A Survey of Image Segmentation based on Artificial Intelligence and Evolution...A Survey of Image Segmentation based on Artificial Intelligence and Evolution...
A Survey of Image Segmentation based on Artificial Intelligence and Evolution...IOSR Journals
 
A Utility Interactive Electricity Generation Schemes with Renewable Resources
A Utility Interactive Electricity Generation Schemes with Renewable ResourcesA Utility Interactive Electricity Generation Schemes with Renewable Resources
A Utility Interactive Electricity Generation Schemes with Renewable ResourcesIOSR Journals
 
Particulate Sintering of Iron Ore and Empirical Analysis of Sintering Time Ba...
Particulate Sintering of Iron Ore and Empirical Analysis of Sintering Time Ba...Particulate Sintering of Iron Ore and Empirical Analysis of Sintering Time Ba...
Particulate Sintering of Iron Ore and Empirical Analysis of Sintering Time Ba...IOSR Journals
 
A Novel Flipflop Topology for High Speed and Area Efficient Logic Structure D...
A Novel Flipflop Topology for High Speed and Area Efficient Logic Structure D...A Novel Flipflop Topology for High Speed and Area Efficient Logic Structure D...
A Novel Flipflop Topology for High Speed and Area Efficient Logic Structure D...IOSR Journals
 
Design of Adjustable Reconfigurable Wireless Single Core CORDIC based Rake Re...
Design of Adjustable Reconfigurable Wireless Single Core CORDIC based Rake Re...Design of Adjustable Reconfigurable Wireless Single Core CORDIC based Rake Re...
Design of Adjustable Reconfigurable Wireless Single Core CORDIC based Rake Re...IOSR Journals
 
Fraud Prevention, Mitigation and Management Practices In Nigerian Firms
Fraud Prevention, Mitigation and Management Practices In Nigerian FirmsFraud Prevention, Mitigation and Management Practices In Nigerian Firms
Fraud Prevention, Mitigation and Management Practices In Nigerian FirmsIOSR Journals
 
Changes During Passive Recovery In Lower Limbs Tiredness After Strenuous Workout
Changes During Passive Recovery In Lower Limbs Tiredness After Strenuous WorkoutChanges During Passive Recovery In Lower Limbs Tiredness After Strenuous Workout
Changes During Passive Recovery In Lower Limbs Tiredness After Strenuous WorkoutIOSR Journals
 
Optimization of Complete Monopole Antennato Exhibit Wideband Capabilities.
Optimization of Complete Monopole Antennato Exhibit Wideband Capabilities.Optimization of Complete Monopole Antennato Exhibit Wideband Capabilities.
Optimization of Complete Monopole Antennato Exhibit Wideband Capabilities.IOSR Journals
 
Establishment of A Small Scale Non-Woven Tissue Processing Industry
Establishment of A Small Scale Non-Woven Tissue Processing IndustryEstablishment of A Small Scale Non-Woven Tissue Processing Industry
Establishment of A Small Scale Non-Woven Tissue Processing IndustryIOSR Journals
 
An Efficient implementation of PKI architecture based Digital Signature using...
An Efficient implementation of PKI architecture based Digital Signature using...An Efficient implementation of PKI architecture based Digital Signature using...
An Efficient implementation of PKI architecture based Digital Signature using...IOSR Journals
 
“Influence of Behavioral Biases on Cognitive Abilities”
“Influence of Behavioral Biases on Cognitive Abilities”“Influence of Behavioral Biases on Cognitive Abilities”
“Influence of Behavioral Biases on Cognitive Abilities”IOSR Journals
 
2-Dimensional Wavelet pre-processing to extract IC-Pin information for disarr...
2-Dimensional Wavelet pre-processing to extract IC-Pin information for disarr...2-Dimensional Wavelet pre-processing to extract IC-Pin information for disarr...
2-Dimensional Wavelet pre-processing to extract IC-Pin information for disarr...IOSR Journals
 
Determination of nonlinear absorption (β) and refraction (n2)by the Z-scan me...
Determination of nonlinear absorption (β) and refraction (n2)by the Z-scan me...Determination of nonlinear absorption (β) and refraction (n2)by the Z-scan me...
Determination of nonlinear absorption (β) and refraction (n2)by the Z-scan me...IOSR Journals
 
A Survey of Agent Based Pre-Processing and Knowledge Retrieval
A Survey of Agent Based Pre-Processing and Knowledge RetrievalA Survey of Agent Based Pre-Processing and Knowledge Retrieval
A Survey of Agent Based Pre-Processing and Knowledge RetrievalIOSR Journals
 
A Study on Mid-Career Blues with refers to Hyundai Motor India Limited, Irung...
A Study on Mid-Career Blues with refers to Hyundai Motor India Limited, Irung...A Study on Mid-Career Blues with refers to Hyundai Motor India Limited, Irung...
A Study on Mid-Career Blues with refers to Hyundai Motor India Limited, Irung...IOSR Journals
 
“An analytical study on medal tally of top ten countries in 2012 Olympic Game...
“An analytical study on medal tally of top ten countries in 2012 Olympic Game...“An analytical study on medal tally of top ten countries in 2012 Olympic Game...
“An analytical study on medal tally of top ten countries in 2012 Olympic Game...IOSR Journals
 

En vedette (20)

Towards Web 3.0: An Application Oriented Approach
Towards Web 3.0: An Application Oriented ApproachTowards Web 3.0: An Application Oriented Approach
Towards Web 3.0: An Application Oriented Approach
 
A Review of BSS Based Digital Image Watermarking and Extraction Methods
A Review of BSS Based Digital Image Watermarking and Extraction MethodsA Review of BSS Based Digital Image Watermarking and Extraction Methods
A Review of BSS Based Digital Image Watermarking and Extraction Methods
 
Design of Ball Screw Mechanism for Retro Fit of External Grinding Machine
Design of Ball Screw Mechanism for Retro Fit of External Grinding MachineDesign of Ball Screw Mechanism for Retro Fit of External Grinding Machine
Design of Ball Screw Mechanism for Retro Fit of External Grinding Machine
 
Project Managers Vs Operations Managers: A comparison based on the style of l...
Project Managers Vs Operations Managers: A comparison based on the style of l...Project Managers Vs Operations Managers: A comparison based on the style of l...
Project Managers Vs Operations Managers: A comparison based on the style of l...
 
A Survey of Image Segmentation based on Artificial Intelligence and Evolution...
A Survey of Image Segmentation based on Artificial Intelligence and Evolution...A Survey of Image Segmentation based on Artificial Intelligence and Evolution...
A Survey of Image Segmentation based on Artificial Intelligence and Evolution...
 
A Utility Interactive Electricity Generation Schemes with Renewable Resources
A Utility Interactive Electricity Generation Schemes with Renewable ResourcesA Utility Interactive Electricity Generation Schemes with Renewable Resources
A Utility Interactive Electricity Generation Schemes with Renewable Resources
 
Particulate Sintering of Iron Ore and Empirical Analysis of Sintering Time Ba...
Particulate Sintering of Iron Ore and Empirical Analysis of Sintering Time Ba...Particulate Sintering of Iron Ore and Empirical Analysis of Sintering Time Ba...
Particulate Sintering of Iron Ore and Empirical Analysis of Sintering Time Ba...
 
A Novel Flipflop Topology for High Speed and Area Efficient Logic Structure D...
A Novel Flipflop Topology for High Speed and Area Efficient Logic Structure D...A Novel Flipflop Topology for High Speed and Area Efficient Logic Structure D...
A Novel Flipflop Topology for High Speed and Area Efficient Logic Structure D...
 
Design of Adjustable Reconfigurable Wireless Single Core CORDIC based Rake Re...
Design of Adjustable Reconfigurable Wireless Single Core CORDIC based Rake Re...Design of Adjustable Reconfigurable Wireless Single Core CORDIC based Rake Re...
Design of Adjustable Reconfigurable Wireless Single Core CORDIC based Rake Re...
 
Fraud Prevention, Mitigation and Management Practices In Nigerian Firms
Fraud Prevention, Mitigation and Management Practices In Nigerian FirmsFraud Prevention, Mitigation and Management Practices In Nigerian Firms
Fraud Prevention, Mitigation and Management Practices In Nigerian Firms
 
Changes During Passive Recovery In Lower Limbs Tiredness After Strenuous Workout
Changes During Passive Recovery In Lower Limbs Tiredness After Strenuous WorkoutChanges During Passive Recovery In Lower Limbs Tiredness After Strenuous Workout
Changes During Passive Recovery In Lower Limbs Tiredness After Strenuous Workout
 
Optimization of Complete Monopole Antennato Exhibit Wideband Capabilities.
Optimization of Complete Monopole Antennato Exhibit Wideband Capabilities.Optimization of Complete Monopole Antennato Exhibit Wideband Capabilities.
Optimization of Complete Monopole Antennato Exhibit Wideband Capabilities.
 
Establishment of A Small Scale Non-Woven Tissue Processing Industry
Establishment of A Small Scale Non-Woven Tissue Processing IndustryEstablishment of A Small Scale Non-Woven Tissue Processing Industry
Establishment of A Small Scale Non-Woven Tissue Processing Industry
 
An Efficient implementation of PKI architecture based Digital Signature using...
An Efficient implementation of PKI architecture based Digital Signature using...An Efficient implementation of PKI architecture based Digital Signature using...
An Efficient implementation of PKI architecture based Digital Signature using...
 
“Influence of Behavioral Biases on Cognitive Abilities”
“Influence of Behavioral Biases on Cognitive Abilities”“Influence of Behavioral Biases on Cognitive Abilities”
“Influence of Behavioral Biases on Cognitive Abilities”
 
2-Dimensional Wavelet pre-processing to extract IC-Pin information for disarr...
2-Dimensional Wavelet pre-processing to extract IC-Pin information for disarr...2-Dimensional Wavelet pre-processing to extract IC-Pin information for disarr...
2-Dimensional Wavelet pre-processing to extract IC-Pin information for disarr...
 
Determination of nonlinear absorption (β) and refraction (n2)by the Z-scan me...
Determination of nonlinear absorption (β) and refraction (n2)by the Z-scan me...Determination of nonlinear absorption (β) and refraction (n2)by the Z-scan me...
Determination of nonlinear absorption (β) and refraction (n2)by the Z-scan me...
 
A Survey of Agent Based Pre-Processing and Knowledge Retrieval
A Survey of Agent Based Pre-Processing and Knowledge RetrievalA Survey of Agent Based Pre-Processing and Knowledge Retrieval
A Survey of Agent Based Pre-Processing and Knowledge Retrieval
 
A Study on Mid-Career Blues with refers to Hyundai Motor India Limited, Irung...
A Study on Mid-Career Blues with refers to Hyundai Motor India Limited, Irung...A Study on Mid-Career Blues with refers to Hyundai Motor India Limited, Irung...
A Study on Mid-Career Blues with refers to Hyundai Motor India Limited, Irung...
 
“An analytical study on medal tally of top ten countries in 2012 Olympic Game...
“An analytical study on medal tally of top ten countries in 2012 Olympic Game...“An analytical study on medal tally of top ten countries in 2012 Olympic Game...
“An analytical study on medal tally of top ten countries in 2012 Olympic Game...
 

Similaire à Recapitulating the development initiatives of a robust information security safeguard: RITSB-the proposed solution

A Proposed Model for Datacenter in -Depth Defense to Enhance Continual Security
A Proposed Model for Datacenter in -Depth Defense to Enhance Continual SecurityA Proposed Model for Datacenter in -Depth Defense to Enhance Continual Security
A Proposed Model for Datacenter in -Depth Defense to Enhance Continual SecurityHossam Al-Ansary
 
12022, 929 AM Originality Reporthttpsucumberlands.bl
12022, 929 AM Originality Reporthttpsucumberlands.bl12022, 929 AM Originality Reporthttpsucumberlands.bl
12022, 929 AM Originality Reporthttpsucumberlands.blBenitoSumpter862
 
12022, 929 AM Originality Reporthttpsucumberlands.bl
12022, 929 AM Originality Reporthttpsucumberlands.bl12022, 929 AM Originality Reporthttpsucumberlands.bl
12022, 929 AM Originality Reporthttpsucumberlands.blCicelyBourqueju
 
Electronic Healthcare Record Security and Management in Healthcare Organizations
Electronic Healthcare Record Security and Management in Healthcare OrganizationsElectronic Healthcare Record Security and Management in Healthcare Organizations
Electronic Healthcare Record Security and Management in Healthcare Organizationsijtsrd
 
Cultivating Proactive Cybersecurity Culture among IT Professional to Combat E...
Cultivating Proactive Cybersecurity Culture among IT Professional to Combat E...Cultivating Proactive Cybersecurity Culture among IT Professional to Combat E...
Cultivating Proactive Cybersecurity Culture among IT Professional to Combat E...AI Publications
 
Sheet1Country ACountry BProduct 110 Reds9 GreensProduct 22 Reds2.2.docx
Sheet1Country ACountry BProduct 110 Reds9 GreensProduct 22 Reds2.2.docxSheet1Country ACountry BProduct 110 Reds9 GreensProduct 22 Reds2.2.docx
Sheet1Country ACountry BProduct 110 Reds9 GreensProduct 22 Reds2.2.docxedgar6wallace88877
 
PSQH July-Aug 2015 Simplified ST Model - Woods-Pestotnik
PSQH July-Aug 2015 Simplified ST Model - Woods-PestotnikPSQH July-Aug 2015 Simplified ST Model - Woods-Pestotnik
PSQH July-Aug 2015 Simplified ST Model - Woods-PestotnikMichael Woods, MD, MMM
 
Ikeepsafe Cyber Safety, Ethics and Security Competencies
Ikeepsafe Cyber Safety, Ethics and Security CompetenciesIkeepsafe Cyber Safety, Ethics and Security Competencies
Ikeepsafe Cyber Safety, Ethics and Security CompetenciesJohn Macasio
 
information security management
information security managementinformation security management
information security managementGurpreetkaur838
 
A Bring Your Own Device Risk Assessment Model
A Bring Your Own Device Risk Assessment ModelA Bring Your Own Device Risk Assessment Model
A Bring Your Own Device Risk Assessment ModelCSCJournals
 
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVES
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVESAN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVES
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVESijcsit
 
Security, Compliance & Loss Prevention Part 6.pptx
Security, Compliance & Loss Prevention Part 6.pptxSecurity, Compliance & Loss Prevention Part 6.pptx
Security, Compliance & Loss Prevention Part 6.pptxSheldon Byron
 
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017Maurice Dawson
 
An Empirical Study on the Security Measurements of Websites of Jordanian Publ...
An Empirical Study on the Security Measurements of Websites of Jordanian Publ...An Empirical Study on the Security Measurements of Websites of Jordanian Publ...
An Empirical Study on the Security Measurements of Websites of Jordanian Publ...CSCJournals
 
Multi-Dimensional Privacy Protection for Digital Collaborations.
Multi-Dimensional Privacy Protection for Digital Collaborations.Multi-Dimensional Privacy Protection for Digital Collaborations.
Multi-Dimensional Privacy Protection for Digital Collaborations.CSCJournals
 
Fundamentals of-information-security
Fundamentals of-information-security Fundamentals of-information-security
Fundamentals of-information-security madunix
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
Secured cloud support for global software
Secured cloud support for global softwareSecured cloud support for global software
Secured cloud support for global softwareijseajournal
 
Information Systems Security & Strategy
Information Systems Security & StrategyInformation Systems Security & Strategy
Information Systems Security & StrategyTony Hauxwell
 

Similaire à Recapitulating the development initiatives of a robust information security safeguard: RITSB-the proposed solution (20)

820 1961-1-pb
820 1961-1-pb820 1961-1-pb
820 1961-1-pb
 
A Proposed Model for Datacenter in -Depth Defense to Enhance Continual Security
A Proposed Model for Datacenter in -Depth Defense to Enhance Continual SecurityA Proposed Model for Datacenter in -Depth Defense to Enhance Continual Security
A Proposed Model for Datacenter in -Depth Defense to Enhance Continual Security
 
12022, 929 AM Originality Reporthttpsucumberlands.bl
12022, 929 AM Originality Reporthttpsucumberlands.bl12022, 929 AM Originality Reporthttpsucumberlands.bl
12022, 929 AM Originality Reporthttpsucumberlands.bl
 
12022, 929 AM Originality Reporthttpsucumberlands.bl
12022, 929 AM Originality Reporthttpsucumberlands.bl12022, 929 AM Originality Reporthttpsucumberlands.bl
12022, 929 AM Originality Reporthttpsucumberlands.bl
 
Electronic Healthcare Record Security and Management in Healthcare Organizations
Electronic Healthcare Record Security and Management in Healthcare OrganizationsElectronic Healthcare Record Security and Management in Healthcare Organizations
Electronic Healthcare Record Security and Management in Healthcare Organizations
 
Cultivating Proactive Cybersecurity Culture among IT Professional to Combat E...
Cultivating Proactive Cybersecurity Culture among IT Professional to Combat E...Cultivating Proactive Cybersecurity Culture among IT Professional to Combat E...
Cultivating Proactive Cybersecurity Culture among IT Professional to Combat E...
 
Sheet1Country ACountry BProduct 110 Reds9 GreensProduct 22 Reds2.2.docx
Sheet1Country ACountry BProduct 110 Reds9 GreensProduct 22 Reds2.2.docxSheet1Country ACountry BProduct 110 Reds9 GreensProduct 22 Reds2.2.docx
Sheet1Country ACountry BProduct 110 Reds9 GreensProduct 22 Reds2.2.docx
 
PSQH July-Aug 2015 Simplified ST Model - Woods-Pestotnik
PSQH July-Aug 2015 Simplified ST Model - Woods-PestotnikPSQH July-Aug 2015 Simplified ST Model - Woods-Pestotnik
PSQH July-Aug 2015 Simplified ST Model - Woods-Pestotnik
 
Ikeepsafe Cyber Safety, Ethics and Security Competencies
Ikeepsafe Cyber Safety, Ethics and Security CompetenciesIkeepsafe Cyber Safety, Ethics and Security Competencies
Ikeepsafe Cyber Safety, Ethics and Security Competencies
 
information security management
information security managementinformation security management
information security management
 
A Bring Your Own Device Risk Assessment Model
A Bring Your Own Device Risk Assessment ModelA Bring Your Own Device Risk Assessment Model
A Bring Your Own Device Risk Assessment Model
 
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVES
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVESAN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVES
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVES
 
Security, Compliance & Loss Prevention Part 6.pptx
Security, Compliance & Loss Prevention Part 6.pptxSecurity, Compliance & Loss Prevention Part 6.pptx
Security, Compliance & Loss Prevention Part 6.pptx
 
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
 
An Empirical Study on the Security Measurements of Websites of Jordanian Publ...
An Empirical Study on the Security Measurements of Websites of Jordanian Publ...An Empirical Study on the Security Measurements of Websites of Jordanian Publ...
An Empirical Study on the Security Measurements of Websites of Jordanian Publ...
 
Multi-Dimensional Privacy Protection for Digital Collaborations.
Multi-Dimensional Privacy Protection for Digital Collaborations.Multi-Dimensional Privacy Protection for Digital Collaborations.
Multi-Dimensional Privacy Protection for Digital Collaborations.
 
Fundamentals of-information-security
Fundamentals of-information-security Fundamentals of-information-security
Fundamentals of-information-security
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
Secured cloud support for global software
Secured cloud support for global softwareSecured cloud support for global software
Secured cloud support for global software
 
Information Systems Security & Strategy
Information Systems Security & StrategyInformation Systems Security & Strategy
Information Systems Security & Strategy
 

Plus de IOSR Journals (20)

A011140104
A011140104A011140104
A011140104
 
M0111397100
M0111397100M0111397100
M0111397100
 
L011138596
L011138596L011138596
L011138596
 
K011138084
K011138084K011138084
K011138084
 
J011137479
J011137479J011137479
J011137479
 
I011136673
I011136673I011136673
I011136673
 
G011134454
G011134454G011134454
G011134454
 
H011135565
H011135565H011135565
H011135565
 
F011134043
F011134043F011134043
F011134043
 
E011133639
E011133639E011133639
E011133639
 
D011132635
D011132635D011132635
D011132635
 
C011131925
C011131925C011131925
C011131925
 
B011130918
B011130918B011130918
B011130918
 
A011130108
A011130108A011130108
A011130108
 
I011125160
I011125160I011125160
I011125160
 
H011124050
H011124050H011124050
H011124050
 
G011123539
G011123539G011123539
G011123539
 
F011123134
F011123134F011123134
F011123134
 
E011122530
E011122530E011122530
E011122530
 
D011121524
D011121524D011121524
D011121524
 

Dernier

Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...PsychoTech Services
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024Janet Corral
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 

Dernier (20)

Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 

Recapitulating the development initiatives of a robust information security safeguard: RITSB-the proposed solution

  • 1. IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661, p- ISSN: 2278-8727Volume 15, Issue 2 (Nov. - Dec. 2013), PP 30-34 www.iosrjournals.org www.iosrjournals.org 30 | Page Recapitulating the development initiatives of a robust information security safeguard: RITSB-the proposed solution Jahidul Arafat1 and Md. Ahsan Habib2 1 Researcher, HT Research and Consultancy, UK. 2 Department of Information and Communication Technology, Mawlana Bhashani Science and Technology University, Bangladesh Abstract: Most current information security systems performance vary with the nature of the filed its being operating. With an increased emphasizes on the adoption of security tools and technologies, the anomalies and intrusion are mostly said defined to be detected on system's algorithm, when most systems have well defined mechanism for rapid reaction and identification of intrusions. However, despite this support for anomaly detection, this is usually limited and often require a full recompilation of the system to deploy a comprehensive framework of security governance, strategies and practices employing the policies in implementation. As a result, the absence of a robust security framework securing both the education and corporate resources has heightened the tension for a strategic information security solutions which might ends with cost, complexities and cumbersome to develop. This paper thereby presents an alternative comprehensive system namely RITS-B which accommodates both the nature of education and organizations without a need to for a further modification. Implication of the proposed approach at real time depicts its suitability in the arena of concern. Keywords: Information Security, Governance, Strategies, Practices, Regional Cultures and Believes. I. Introduction Information technology security in higher education is the process of securing the higher education environment without disrupting the openness, accessibility, academic and intellectual freedom which is at the very heart of the higher education environment. It is one of the fundamental process towards the broader security because the further processing steps depends of what types of security breaches has been occurred and what strategies are in place to cope up with these. Despite the numerous functionality of security, IT security in Higher education is still a subject of on-going investment and it cannot be conclusively stated that education field is highly secured because of the application, technological and intrusion’s diversity. As a consequence, the task of choosing the best method which will not only ensure mission critical level security to each bit of higher education information but also not compromise with its core missions is still a difficult challenge. 1.1 Structure of the study This paper is organized as follows: the literature review related to the basic idea on higher education and corporate level IT security needs and various hard and soft aspects of security to secure their arena including their advantages and disadvantages is detailed in section 2. The RITS-B approach is presented in section 3. The quantitative survey results are provided in section 4 and finally section 5 shows some concluding remarks. II. Literature Review 2.1 What if information security? By far the most commonly used meaning for information security is the preservation of (Dark et al, 2006; Voloudakis & King, 2003; Ward & Hawkins, 2003): a) Confidentiality or protection from unauthorized use or disclosure of information. b) Integrity, ensuring data accuracy and completeness through protection from unauthorized, unanticipated, or unintentional modification, and including authenticity. c) Availability, making data available to the authorized users on a timely basis and when needed and d) Scalability, scaling the belief of educational culture of one region from that of other regions and stimulate institution’s interest to contribute in the field of information security concerns while preserving oaths and mandates of learning and knowledge sharing. Thus the study can, in turn, characterize each of these seven protection categories: confidentiality, integrity, authenticity, scalability, non-repudiation, accountability, and availability-by levels of sensitivity: high (serious injury to an institution), medium (serious injury), and low (minor injury).
  • 2. Recapitulating the development initiatives of a robust information security safeguard: RITSB-the www.iosrjournals.org 31 | Page 2.2 Hard and Soft Information security solutions Several survey papers (Arabasz & Pirani, 2002; Kvavik & Voloudakis, 2003; Yanosky & Salaway, 2006) cover the major Information Technology Security Approaches available in the literature. Most of the security schemes can be roughly categorized into two approaches:  The Hard i.e. Technical Method  The Soft i.e. Non-Technical Method Basically, the first approach explores the information security technologies used by the higher education institutions. What tools have they chosen to install, to prevent harm to their information assets? The security levels are then deduced from the boundary of these installed high functional tools. The usual tools that are employed in hard methods include antivirus software, SSL for web transactions, centralized data backup, network firewall, enterprise directory, VPN for remote access, intrusion detection and prevention tools, encryption, content monitoring/filtering, electronic signature and shibboleth. The first approach fails to gain total effectiveness in the higher education information security process due to the following reasons: (a) Money matters when developing IT security strategies but much depends on how, when and where it is used, by whom and with what level of effort and skill. (b) Integrating adopted technologies with current and future practices is the lion’s share then just that of selecting it. (c) And peoples’ troubles in understanding the adopted technologies (Yanosky & Salaway, 2006). The strategies for the second approach exploit the importance of soft IT interventions (e.g. organization, Cultural aspects, awareness program, training programs, policies, executive attention etc.) to produce a secured campus environment around the educational institution and having the advantages such as: (a) It is very simple in nature (b) It evaluates all the spatial properties of Information security. (c) Representation of security pattern is much more effective and well structured than only technology based security processing. (d) It gives dynamic and formalized solution to security concerns. (e) It is based on the belief that openness and accessibility of higher education environment will not only be preserved but also be secured. The features of this approach provide well organized security solution with some limitations on concerns and generalization because of academic and departmental diversities. 2.3 Robust information security solution: rational to have These hints are significant for higher education, where much information used for teaching and research requires the highest level of integrity and availability but low level of confidentiality and for Muslim nation flexible sense of scalability also need to be defined. And to ensure such level an institution have two choices: either to follow the security approach (a) or (b) as mentioned in section I or go for the use of a blended approach- balancing the features of (a) and (b) according to its academia’s believes, needs and constrains to foster the institution’s security goal. Where this balancing scheme requires the exploration of the following issues (Bellovin et al, 2006; Albrecht & Caruso, 2003; Pirani, Sheep Pond Associates, Voloudakis, Ernst & Young, 2003): 1. Make IT security a priority. 2. Selecting security controls and products. 3. Defining and empowering acceptable behavior [by students, faculty, and staff]. 4. Preserve the academia’s religion, regional and cultural believes. 5. Revise instructional security policy and improve the use of existing security tools. 6. Making consistent, timely, and cost-effective management decisions. 7. Improve security for further research and education networks. 8. Integrate work in higher education with national effort to strengthen critical infrastructure and 9. Empowering [members of the institution’s community to do their work] securely. All these are the pledge of the education and organization to gain success in openness and privacy in the field of information security. III. Development initiatives of robust information security solution To improve the security scheme, a strategy consists in combining these approaches in order to obtain a robust security by exploiting the advantages of one method to overcome the limitations of the other one called Robust IT Security Balancing (RITS-B) Approach is presented in this paper. This is an attempt to unify different methods of higher education information security approaches under a common topology based on the both hard and soft interventions with that of Muslim culture and believes. This RITS-B Approach considers all the soft aspects of information security i.e. information security Policies, Awareness, Leadership and Practices for the
  • 3. Recapitulating the development initiatives of a robust information security safeguard: RITSB-the www.iosrjournals.org 32 | Page user community on the acceptable use of technological tools to develop such strategic framework of security environment where facts, national and religion perspectives will be merged up to lead to a proactive leadership and information security system without violating the freedom and openness that is at the very heart of the academia. In the RITS-B approach, soft security aspects are used not to describe which contents should they have rather what should be the status of these in place security aspects and what characteristics should they bare for the acceptable use of the existing security tools and technologies to the campus community and thereby to secure their information arena. 3.1 The RITS-B : The Proposed Approach The proposed RITS-B approach is detailed in Roadmap 1. It consists of nine (09) steps those were grouped into three basic modules as discussed in section A, B and C to achieve the sustainability in the process of higher education secrecy and security for Muslim nations. An institution is defined by its value criterion as discussed above where its security challenges lies on its scope and scale- to assess the security concerns. The heterogeneous and diverse nature of institution and academia fuel the further processing needs of security in the domain of technology and generic soft interventions that is presented in section B and section C respectively. If the institutions are in the need of security then put the above mentioned nine steps under the same umbrella of secrecy where the institution’s cultures, believes and values shows the further light towards the journey on robust security and sustainability in this complicated and insecure world environment. Roadmap 01: Robust IT Security Balancing (RITS-B) Approach Precondition: Institutions to be secured Post condition: A more secured higher education environment 1. Define the institution’s information security scope a. Develop a framework on fact and national perspective for campus security b. Identify security policies, tools, procedure and practices 2. Defining IT Security Strategic Assessment Scale a. Reactive b. Technology Centric c. Cultural d. Fortified 3. Document the institution’s technological needs a. Technology/Tools vary i. with that of application and intrusions ii. with that of institutions wants, needs and abilities b. Main purpose: is to fulfill the requirements of (1) to (9) of section II 4. Model the Management System Information Security on campus a. Based on: DI-AI methodology b. Should follow the standards of NBR ISO/IEC-27001:2005 5. Model Information Security Organizational Structure a. Formulate a centralized office b. Decentralize it into ITPO and ITSO c. Have some dedicated staffs 6. Development of security plans and policies 7. Communication and awareness 8. Model the pattern of institutional IT Security Practices 9. Implementation of security Easy to Use Scheme IV. RITS-B implication at education and corporate level In analyzing the security performance of the RITS-B approach, the responses of 6 senior university administrators- the majority of whom were Chief IT Officer and other director of CICT (Centre of Information and Communication Technology) /academic/administrative computing along with 66 academic personnel at 6 engineering institutions of Bangladesh were synthesized, from a June 2010 survey as reported in Information Technology Security Management in Engineering Universities in Bangladesh by Jahidul Arafat, Lecturer, Research Associate, HTRC, UK. The existing security trends of these institutions were queried by the respective researcher and in the light of the findings the RITS-B approach is developed and later the surveyed institutions were asked to implement this newly developed security scheme in their arena. The impact of the implementation status of this RITS-B approach at those institutions were further analyzed against three survey questions to
  • 4. Recapitulating the development initiatives of a robust information security safeguard: RITSB-the www.iosrjournals.org 33 | Page assess respondents’ opinions on the success of their IT security outcomes (Likert scale ranging from: 1= strongly agree, 2= agree, 3= Disagree, and 4= Strongly Disagree):  How would you characterize your program success?  Are data, network, and applications that are your responsibility secure?  Is your institution more secure today than it was two years ago? Table1. Impact of RITS-B’S implementation status over institution’s (both education and corporate organization) IT security outcomes Implementation Status of RITS-B Approach IT Security Outcomes Program is Successful Systems are Secure More Secure than 2 years ago Fully Implemented WA - - - S.Div. - - - Partially Implemented WA 2.25 1.75 1.25 S.Div. 0.500 0.500 0.500 Didn’t Implement WA 3.50 3.00 2.50 S.Div. 0.707 0.000 0.707 Scale: 1(Strongly Agree) = SA, 2(Agree) = A, 3(Disagree) = D and 4(Strongly Disagree)= SD. N=6 (Institutions), WA= Weighted Average. S.Div.= Standard Deviation. Table 1 shows that institutions which implemented the proposed RITS-B approach in their arena either fully or partially rate their IT security outcomes higher than those which didn’t. This thereby dictates the significance of having this newly developed security model in the campus arena to gain robustness in the process of secrecy and security without violating the freedom and openness. V. Conclusion The Soft IT Security (SITS) approach is a useful and important technique in higher education information security. In spite of its excellent persona such as simplicity, effectiveness and incident supervision, it is unable to achieve global optimum because of academic and departmental diversities. On the other hand, the proposed Robust IT Security Balancing (RITSB) Approach considers the stages of Identification-Prioritization- Revision-Dynamicity for an acceptable use of soft security issues over the hard interventions and on the end user community while considering the academia’s diversities, believes and constraints. In the RITS-B approach, the degree used for merging the hard and soft security concerns with that of the institution’s belief, culture and constraints are derived dynamically based on similarity and value criterions of the regions and institutions. For these reasons, the RITS-B Approach is able to present the institution’s security concerns from a holistic position. The quantitative survey results show that the institutions which had implemented this proposed security solution in their arena feeling more secure than two years ago. They also rated their system’s security and program’s success much higher than that of others. This increases the application area of the SITS approach where the robustness and dynamisms are needed. References [1]. Arabasz, P., & Pirani, J. (2002). Wireless networking in higher education, EDUCAUSE Center for Applied Research, Vol. 2, Available from: http://www.educause.edu/ecar/> [accessed 11 June 2010]. [2]. Albrecht, B. & Caruso, J.B. (2003). Information Technology Security at Indiana University, Case Study, ECAR, No. 8. [3]. Bellovin, S., Blaze, M., Brickell, E., Brooks, C., Cerf, V., Diffie, W., Landau, S., Peterson, J., & Treichler, J. (2006). Security implications of applying the Communications Assistance to Law Enforcement Act to voice over IP. [4]. Dark, M., Epstein, R., Morales, L., Countermine, T., Yuan, Q., Muhammed, Ali., Rose, M., & Harter, N. (2006). A Framework for Information Security Ethics Education. 10th Colloquium for Information Systems Security Education- University of Maryland, 4, pp. 109-115. [5]. Ellen E.C., & Luker M.A. (2000). Finding the Will and the Way: Preparing Your Campus for a Networked Future, EDUCAUSE Leadership Strategies Series- San Francisco: Jossey-Bass Inc. Publishers, Vol. 1, pp. 85. [6]. EDUCAUSE. (2006). CALEA (Communications Assistance for Law Enforcement Act), [online], Available from:<http://www.educause.edu/Browse /645?PARENT_ID=698> [accessed 21 August 2010]. [7]. Fender, J. (2006, June 13). LSU beefs up computer security. Capitol News Bureau [online], Available from:<http://www.2theadvocate.com/news/3040126.html> [accessed 21 June 2010]. [8]. Gray, T. (2005). Network Security Credo, [online], EDUCAUSE Quarterly Publication, 14(2), 12-14, http://staff.washington.edu/gray [9]. Executive Guide (1998). Information Security Management: Learning From Leading Organizations, GAO/AIMD-98-68, May. [10]. Kvavik, R. B., & Voloudakis, J. (with Caruso, J. B., Katz, R. N., King, P., & Pirani, J. A.). (2003). Information technology security: Governance, strategy, and practice in higher education, EDUCAUSE Center for Applied Research, Vol. 5, Available from: <http://www.educause.edu/ecar> [11]. Pirani, J.A., Sheep Pond Associates, Voloudakis, J., Ernst, C.G. & Young. (2003). Information Technology Security at MIT, Case Study, ECAR, No. 9.
  • 5. Recapitulating the development initiatives of a robust information security safeguard: RITSB-the www.iosrjournals.org 34 | Page [12]. Pirani, J.A., Sheep Pond Associates & ECAR. (2003). Incident response: Lesson Learned from Georgia Tech, the university of Montana & University of Texan at Austin, Case Study, ECAR, No. 7. [13]. Rivlin, A. (1995). Circular No. A-123. Washington, DC: U.S. Office of Management and Budget, [online], Available: http://www.whitehouse.gov /OMB /circulars/a123/a123.html [21 August 2010]. [14]. Rezmierski, V. E., Rothschild, D. M., Kazanis, A. S., & Rivas, R. D. (2005). Final report of the computer incident factor analysis and categorization (CIFAC) project, Vol. 2, Available from: <http://www.educause.edu/ ir/library/pdf/CSD4455.pdf> [accessed 21 August 2010]. [15]. Sieberg, D. (2005, September 26). Hackers shift focus to financial gain [online], Available from: <http://www.cnn.com/2005/TECH/internet /09/26/identity.hacker/index.html> [accessed 21 August 2010]. [16]. Voloudakis, J. & King, P. (2003). Information Technology Security at the University of Washington, Case Study, ECAR, No. 10. [17]. Visa Inc. (2004, December 15). Payment card industry data security standard [online], Available: http://usa.visa.com/business/accepting_visa/ops_risk_management /cisp_merchants.html [21 August 2010]. [18]. Ward D., & Hawkins B.L. (2003). Presidential Leadership for Information Technology. EDUCASE Review, 38(3), 45. [19]. Yanosky, R. & Salaway, G. (2006). Identity management in higher education: A baseline study, EDUCAUSE Center for Applied Research, Vol. 2, Available from: http://www.educause.edu/ecar/