SlideShare une entreprise Scribd logo
1  sur  4
Télécharger pour lire hors ligne
International Journal of Trend in Scientific Research and Development (IJTSRD)
Volume 4 Issue 4, June 2020 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470
@ IJTSRD | Unique Paper ID – IJTSRD30888 | Volume – 4 | Issue – 4 | May-June 2020 Page 186
An Empirical Study on Information Security
Bhavya Verma1, Purva Choudhary1, Dr. Deepak Chahal2
1MCA Student, 2Professor,
1,2Department of IT, Jagan Institute of Management Studies, Rohini, New Delhi, India
ABSTRACT
Information security or Infosec worries with protecting information from
unauthorized access. Its a part of information risk management and it
therefore involves preventing or reducing the probability of unauthorized
access, use, disclosure, disruption, deletion, corruption, modification, inspect
or recording. In this article we will talk about the IT security, various threads
to information security, different obstacles of information security and the
various ways in which internet can be lucrative.
KEYWORDS: Information, Security, Virus, Authentication
How to cite this paper: Bhavya Verma |
Purva Choudhary | Dr. Deepak Chahal "An
Empirical Study on Information Security"
Published in
International Journal
of Trend in Scientific
Research and
Development
(ijtsrd), ISSN: 2456-
6470, Volume-4 |
Issue-4, June 2020,
pp.186-189, URL:
www.ijtsrd.com/papers/ijtsrd30888.pdf
Copyright © 2020 by author(s) and
International Journal ofTrendinScientific
Research and Development Journal. This
is an Open Access article distributed
under the terms of
the Creative
CommonsAttribution
License (CC BY 4.0)
(http://creativecommons.org/licenses/by
/4.0)
INTRODUCTION
Information security is also called as InfoSec. It is not all
about security information from illicit access, rather it’s the
practice of preventing illicit access, disclosure, inspection,
recording, etc of information.Thepreeminentofinformation
security is the balanced protection of the Confidentiality,
Integrity and Availability (also known as CIA). Security is
looked in terms of how data is stored, coded, transmitted,
encrypted and deleted. Various statistics has shown that
companies take security of the data of an individual with
very high priority [1].
IT Security
IT security is also known as computer science, which talks
about security to technology. Computer security are not just
needed at homes these days, hackers worldwide are smart
enough to penetrate through huge servers leaking all the
required information, thus in these cases, IT security is
needed. This scenario may be expensive,a significant breach
costs an organization far more. Big breaches almost
jeopardize small businesses leading to huge fall out of these
small businesses.
Even though information security and IT security sounds
familiar, but the difference that lies between them is that in
infosec, various set of tools are designed which helps in
providing sensitivity in business sector, where as computer
science talks about security to data which becomes limited
within the digital world.
Threads to information security may encompass following:-
1. Computer viruses
Computer virus was introduced by Ran Weber in 1999,
which is a vile software which crosses the thresholdintoour
computers without consent. It creates a replica of itself
heading to activate its malicious activities and thus continue
to spread all over the system.
2. Theft
Any theft on the hardware, software or the data of any
organization leads to huge loss to the organization
3. Sabotage
Sabotage, as the name suggest, means deliberately
destroying anything. Hackers worldwide have an in-depth
knowledge of how they could sabotage information of the
organization which could cause maximum vandalism to the
system.
4. Vandalism
Vandalism affects hardware, software and the data of an
organization wilfully leading toitseffectintheentiresystem.
ISO 27002:2005 defines information security for prevising
into three major elements:-
I. Confidentiality
Any unintended sourceifhindersinsidetheorganizationhad
to be put to a stop. This is done through confidentiality. All
sorts of secrete, sensitive and protectionpronedata needsto
be kept away from all the malicious invaders.Confidentiality
IJTSRD30888
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD30888 | Volume – 4 | Issue – 4 | May-June 2020 Page 187
can only be accessed depending upon the availability and
accessibility by the trusted users only. Protection can be
done with the help of encryption, access control structure,
file permission, etc
II. Integrity
When we need to secure our data, it is not just limited to the
security of data, it involves various other factors also like
maintaining the consistency, accuracy, trustworthiness, etc
of data. It is very important in data security that it does not
just provide the access to ensure that the data cannot be
changed or alter by malicious officials. Integrity to data
security can only be ensured by implementingtheconcept of
file permission and user access controls in addition to these
two vital concepts, it is very important to place some means
for detecting any changes in data that might occurasa result
of non-human caused events. All sorts of backups or
redundancies which has to take place must be available to
restore the affected data and secure itstrictlyforfurtheruse.
As all the existing technologies somehow have a loop hole
that cannot be removed or is being improved to remove the
potential threat loop hole [2].
III. Availability
Availability is best ensured by tightly storing all Hardware,
performing hardware repairs as soon as needed and
maintaining an efficient packet space freed from software
conflicts. It is also important to stay current with all the
program upgrades required. Providing adequate
communication bandwidth andpreventingtheemergenceof
bottles is very important. Backtracking, poor performance,
RAID and even high availability teams can reduce the
adverse effects when hardware issues arise. Rapid and
harmonious disaster preparedness is essential in cases of
serious crime; that authority depends on the existence of a
comprehensive disaster recovery plan (DRP). Protecting
protection against data loss or interruption in connection
should include unexpected events such as natural disasters
and fire. to prevent data loss from such occurrences, a
backup copy may be stored at a location-based location, or
perhaps while fireproof, not securely waterproof. Today,
networks are complex arrangements that cannot be left to
chance. Each design must be researched,assembled,proven,
and then implemented [3]. Additional security tools or
software such as firewalls and proxy services may monitor
downtime and inaccessible data due to malicious actions
such as service-Do-service (DoS) attacks and network
attacks.
Obstacles to information security:-
I. Financial Services Workers Fooled by CD Scam
Studies conducted in the financial district of London have
shown what years of security experts say: employees - even
those who work with the most sensitivefinancial data -don't
know or don't care about basic security measures.
In this study, CDs were given to passengers as they entered
the city. Recipients were told that the discs contained a
special Valentine's Day promotion. In fact, the CDs contain
something other than the code that informs the company
that was doing the work on how many recipients tried to
open the CD. Among the deportees were employees of the
world's largest retail bank and two insurers.
Employees, by installing the CD in their offices andinstalling
it directly on their PCs, go far beyond the security of their
company. Experts say employees need to understand that
they are the first and easiest way in their company's
network.
II. Security Incident Investigations Within Banks
The method of bank security investigations is receiving a lot
of attention these days. In the past, standardproceduresand
procedures for responding to an incident were acceptable.
However, due to security practices and regulations that
directly affect banks, theseinstitutions requireverydifferent
approaches to their security investigations to account for
these new regulations and security measures.
Security incident investigations are activities aimed at
answering questions (when, where, what,towhom,howand
why) regarding a specific event that affected an
organization's informationorinfrastructureinanunwanted,
anonymous and / or illegal manner.
In comparison with many other types of security checks,
security incident investigations are more environmentally-
friendly (e.g. an incident has already been identified), and
this puts additional pressure andtime/resourcescompared
to other security activities.
However, security incident investigations are not entirely
independent of other data security operations. Other
functions may provide useful input before / during an
investigation, may be started as a result of an investigation
or accept as input of a search result.
III. Trouble In Authentication
Bank fraud and identity theft are a shock to both the banker
and the consumer. The number of consumers involved in
widespread credit card fraud would be great. The impact on
people's bank accounts is likely to increase acceptance of
"disruptive technologies", e.g., hardware tokens. This could
be a storm suitable for banks. You have the customer's
permission to tell them what to do.
Large banks have been working for many years in ensuring
the integrity and are ready to take on this challenge. What
concerns me most about community banks and credit
unions. They are currently having a difficult time competing
with online banks and payment of taxes.
What's wrong with multitasking? The problem with
customer authentication information is that it is provided to
the customer. Someone asks as you might have your social
security number, yourmother'smaiden name,andyouknow
the name of your first pet, first-born, and your favourite
food.
If I have your laptop, your fob, your wallet and everything
else in your wallet, you're out of luck. If I use a thumb print
gun, I only have one print name for it.
Anything that can be contained in a database can be
extracted from a database. Everything in your home, car,
office, hotel room and Starbucks can be stolen. We need to
come up with something stolen. The difference betweentwo
things and a lot of things is just the number of things I need
from you.
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD30888 | Volume – 4 | Issue – 4 | May-June 2020 Page 188
Enter the authentication at risk. The risk analysis engine will
look at your banking performance, analyse it, and the
differences in the flag. This is similar to how access control
systems work. If there seems to be something very unusual
about the online banking area of the work, or the number of
transactions, or the number of transactions, the sale is
significant.
While banks pursue dual-user authentication, website
authentication is still a problem to be solved. With user
authentication, the user is authorized by the bank. But what
about verification of the bank's website to the user? How
does a user know that he or she has come to the right
website rather than the phishing site?
The authentication vendor of your choice must be able to
demonstrate not only the strict user authentication method,
the online risk management method, but also the website
authentication method. Electronic signatures areoneway of
looking at website verification.
IV. Phishing: An Insidious Threat to Financial
Institutions
Illegal hacking using illegal emails to get people out of their
account numbers and passwords is on the rise. Hijacking
product names of banks, merchants and credit card
companies, chefs often make recipients accountable. Under-
hacking techniques instil fraud on PCs to steal information
directly, sometimes using the Trojan keylogger software.
Fortunately, a combination of technological solutions exists
to detect and reduce cybercrime attacks. The long-term
solution is the use of law and industry resources to quickly
identify and deter hackers, as well as government
intervention in Asian andEasternEuropeancountrieswhere
organized crime is rampant. However there are a number of
steps that individual organizations can take and which
should take a different approach.
The first thing to understand is that identitytheftculminates
in a social engineering revolution, where victims are misled
into transmitting information that can be used to hijack
accounts or create other mayhem.
In addition to stealing sensitive data,theFDICsaid,attackers
can resort to other means to steal information, such as
hacking, retrieving hard-copied documents or staring at
someone, using the contents, and uploading malicious
software to a consumer-owned computer.
There are two main reasons why phishingandothertypesof
attacks have been used more often and with increasing
success. They should cause identity theft, and some account
theft: User authentication by the financial services industry
for remote customer access is weak, and the Internet has no
E-mail and Web site verification.
V. Online Activities at Work
Buyers in the U.S. They are responding to the increasingfear
of online identity theft. Businesses - especially those in the
financial services sector - must counter this trend by
emphasizing their efforts to deploy acquisition-based
applications.
A new survey (see below) shows the first evidence that fear
of identity theft is starting to take online usage statistics.
Internet usage rates are very important for banks and other
financial services institutions. The sector is characterizedby
high competition,small differencesbetweeninstitutions, and
low levels of customer loyalty.
Two key strategies have emerged in the struggle to growthe
size and scale of the current customer base:
Maximize Internet Bank usage. By increasing the
percentage of customers who use online services,banks
can increase their customerrevenue,reducetransaction
costs, and increase long-term reliability.
Lower the churn. By reducing the percentage of
customers converting their business to another
institution, banks can maintain market share in a
competitive market otherwise.
Although there are fears about a Consumer Reports survey,
the need for Internet-based banks continues to grow. The
Pew Internet & American Life Projectreportsthatmorethan
50 million adults are now banking online. This figure has
increased 47% since 2002.
Info-Tech sees the online market as a symbol of the great
competitiveness of the banking sector. Despite the growing
demand for the market, the perception of risk is seen as a
threat to the ongoing access to online services. Building
better software andleadtosomegoodreproducibleresearch
as compared to virtual machines [4].
Institutions that redirect their contributions to addressing
security concerns and meeting the need to explode will
receive a competitive advantage over those who choose to
take a conservative approach. Banks can pay for this
practice.
Ways to Make the Most of Internet Use:
1. Address security forward. Issues of identity theft have
become a major concern for consumers. Online marketing
efforts should focus specifically on the steps the bank takes
to protect all usage and personal data. Create a program to
communicate the following key issues:
Messages are sent to the home business page detailing
specific steps the bank is known to have taken.
A direct product of the bank's security efforts. Include this
product in all customer publications.
The FAQs outline steps that customers can take to increase
their online safety. This includes using 128-bit-encrypted
browsers, never responding to e-mail from any bank, and
warning signs of URL URLs.Tomaximizepurchases,focuson
cost and time savings for consumers.
2. Track current usage. Understand how current services
are used by using Web analytics to get end-userinformation.
Research customers to better understand why they use
online resources. Include inspections of branch servicesand
telephone services and ensure that all points of contact are
made.
Describe the first answers to this data. If the key
performance indicators are violated, have a plan to explain
who is doing it and who is funding it to address the issue.
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD30888 | Volume – 4 | Issue – 4 | May-June 2020 Page 189
3. Educate the customer. Do not assume that all customers
are automatically ready to go online. Late immigrants may
need more supervision and training before they can be free.
Add FAQs and other training content to the centre’s website
to make sure they get the help they need.
4. Look to leaders. The Canadianbankingmarketis leading
the world in online banking penetration. According to a
recent report by comScore Media Metrix Canada, 40% of
Canadians use online banking services.
Conclusion
Information security as we can understand is a key
instrument in IT security when we have to talk about. It can
never be taken lightly while consideringthereverberation of
its failure and the corresponding after effects which can
affect the entire system. It becomes escalating important as
the level of safety and the responsibility that is required to
ensure business continuity and safety for the information
that is derived from the data used in the system. A look at
top threats was identified as computer virus, theft, sabotage
and vandalism. Thus,ISO27002:2005hasdefinedtheneedof
preserving information security with three majorelements:
Confidentiality, Integrity and availability.
References:
[1] Bhutani S. et al, Data privacy and security issues in
India: An empirical study, International Journal of
Research in Engineering, Volume 1; Issue 4; October
2019; Page No. 15-17.
[2] Chahal D. et al. Cyber Securence Affected by Big Data
and Artificial Intelligence, International Journal Of
Innovative Research In Technology, Volume 6 Issue 6,
November 2019.
[3] Bhatnagar A. et al. Juniper Networks: An Overview of
the Concept, IJSRD - International Journal for Scientific
Research & Development| Vol. 6, Issue 10, 2018.
[4] Kharb L, Automated Deployment of Software
Containers Using Dockers, International Journal of
Emerging Technologies in Engineering Research
(IJETER) Volume 4, Issue 10, October (2016).

Contenu connexe

Tendances

3 ways to secure your law firm’s information and reputation
3 ways to secure your law firm’s information and reputation3 ways to secure your law firm’s information and reputation
3 ways to secure your law firm’s information and reputationNikec Solutions
 
Cybersecurity-Real World Approach FINAL 2-24-16
Cybersecurity-Real World Approach FINAL 2-24-16Cybersecurity-Real World Approach FINAL 2-24-16
Cybersecurity-Real World Approach FINAL 2-24-16James Rutt
 
Toward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationToward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationE.S.G. JR. Consulting, Inc.
 
IT Security and Management - Semi Finals by Mark John Lado
IT Security and Management - Semi Finals by Mark John LadoIT Security and Management - Semi Finals by Mark John Lado
IT Security and Management - Semi Finals by Mark John LadoMark John Lado, MIT
 
Julius Clark is Making Criminal Hackers Miserable
Julius Clark is Making Criminal Hackers MiserableJulius Clark is Making Criminal Hackers Miserable
Julius Clark is Making Criminal Hackers MiserableJulius Clark, CISSP, CISA
 
Cybersecurity in the Age of Mobility
Cybersecurity in the Age of MobilityCybersecurity in the Age of Mobility
Cybersecurity in the Age of MobilityBooz Allen Hamilton
 
Security and Privacy Big Challenges in Internet of things
Security and Privacy Big Challenges in Internet of thingsSecurity and Privacy Big Challenges in Internet of things
Security and Privacy Big Challenges in Internet of thingsIRJET Journal
 
IT Security and Management - Prelim Lessons by Mark John Lado
IT Security and Management - Prelim Lessons by Mark John LadoIT Security and Management - Prelim Lessons by Mark John Lado
IT Security and Management - Prelim Lessons by Mark John LadoMark John Lado, MIT
 
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...IRJET Journal
 
Workshop incident response n handling-bssn 12 nop 2019-ignmantra
Workshop incident response n handling-bssn 12 nop 2019-ignmantraWorkshop incident response n handling-bssn 12 nop 2019-ignmantra
Workshop incident response n handling-bssn 12 nop 2019-ignmantraIGN MANTRA
 
Securing Your Digital Files from Legal Threats
Securing Your Digital Files from Legal ThreatsSecuring Your Digital Files from Legal Threats
Securing Your Digital Files from Legal ThreatsAbbie Hosta
 
Bridging the Data Security Gap
Bridging the Data Security GapBridging the Data Security Gap
Bridging the Data Security Gapxband
 
Cyber security: challenges for society- literature review
Cyber security: challenges for society- literature reviewCyber security: challenges for society- literature review
Cyber security: challenges for society- literature reviewIOSR Journals
 
Cybersecurity Business Risk, Literature Review
Cybersecurity Business Risk, Literature ReviewCybersecurity Business Risk, Literature Review
Cybersecurity Business Risk, Literature ReviewEnow Eyong
 
Personal Data Protection in Indonesia
Personal Data Protection in IndonesiaPersonal Data Protection in Indonesia
Personal Data Protection in IndonesiaEryk Budi Pratama
 

Tendances (20)

3 ways to secure your law firm’s information and reputation
3 ways to secure your law firm’s information and reputation3 ways to secure your law firm’s information and reputation
3 ways to secure your law firm’s information and reputation
 
internet security and cyber lawUnit1
internet security and  cyber lawUnit1internet security and  cyber lawUnit1
internet security and cyber lawUnit1
 
Cybersecurity-Real World Approach FINAL 2-24-16
Cybersecurity-Real World Approach FINAL 2-24-16Cybersecurity-Real World Approach FINAL 2-24-16
Cybersecurity-Real World Approach FINAL 2-24-16
 
Toward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationToward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network Automation
 
IT Security and Management - Semi Finals by Mark John Lado
IT Security and Management - Semi Finals by Mark John LadoIT Security and Management - Semi Finals by Mark John Lado
IT Security and Management - Semi Finals by Mark John Lado
 
Forensics
ForensicsForensics
Forensics
 
Julius Clark is Making Criminal Hackers Miserable
Julius Clark is Making Criminal Hackers MiserableJulius Clark is Making Criminal Hackers Miserable
Julius Clark is Making Criminal Hackers Miserable
 
Cybersecurity in the Age of Mobility
Cybersecurity in the Age of MobilityCybersecurity in the Age of Mobility
Cybersecurity in the Age of Mobility
 
Security and Privacy Big Challenges in Internet of things
Security and Privacy Big Challenges in Internet of thingsSecurity and Privacy Big Challenges in Internet of things
Security and Privacy Big Challenges in Internet of things
 
WPCCS 16 Presentation
WPCCS 16 PresentationWPCCS 16 Presentation
WPCCS 16 Presentation
 
Information & Cyber Security Risk
Information & Cyber Security RiskInformation & Cyber Security Risk
Information & Cyber Security Risk
 
IT Security and Management - Prelim Lessons by Mark John Lado
IT Security and Management - Prelim Lessons by Mark John LadoIT Security and Management - Prelim Lessons by Mark John Lado
IT Security and Management - Prelim Lessons by Mark John Lado
 
Ijnsa050215
Ijnsa050215Ijnsa050215
Ijnsa050215
 
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
 
Workshop incident response n handling-bssn 12 nop 2019-ignmantra
Workshop incident response n handling-bssn 12 nop 2019-ignmantraWorkshop incident response n handling-bssn 12 nop 2019-ignmantra
Workshop incident response n handling-bssn 12 nop 2019-ignmantra
 
Securing Your Digital Files from Legal Threats
Securing Your Digital Files from Legal ThreatsSecuring Your Digital Files from Legal Threats
Securing Your Digital Files from Legal Threats
 
Bridging the Data Security Gap
Bridging the Data Security GapBridging the Data Security Gap
Bridging the Data Security Gap
 
Cyber security: challenges for society- literature review
Cyber security: challenges for society- literature reviewCyber security: challenges for society- literature review
Cyber security: challenges for society- literature review
 
Cybersecurity Business Risk, Literature Review
Cybersecurity Business Risk, Literature ReviewCybersecurity Business Risk, Literature Review
Cybersecurity Business Risk, Literature Review
 
Personal Data Protection in Indonesia
Personal Data Protection in IndonesiaPersonal Data Protection in Indonesia
Personal Data Protection in Indonesia
 

Similaire à An Empirical Study on Information Security Risks

Cyber Security Intelligence
Cyber Security IntelligenceCyber Security Intelligence
Cyber Security Intelligenceijtsrd
 
Cyber Crime and Cyber Security
Cyber Crime and Cyber SecurityCyber Crime and Cyber Security
Cyber Crime and Cyber Securityijtsrd
 
Information security
Information securityInformation security
Information securityOnkar Sule
 
IT Security - Guidelines
IT Security - GuidelinesIT Security - Guidelines
IT Security - GuidelinesPedro Espinosa
 
Fundamentals of-information-security
Fundamentals of-information-security Fundamentals of-information-security
Fundamentals of-information-security madunix
 
Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfCareerera
 
What is Importance of Cyber Security
What is Importance of Cyber Security What is Importance of Cyber Security
What is Importance of Cyber Security Wee Tang
 
A Survey On Data Leakage Detection
A Survey On Data Leakage DetectionA Survey On Data Leakage Detection
A Survey On Data Leakage DetectionIJERA Editor
 
E-Commerce Privacy and Security System
E-Commerce Privacy and Security SystemE-Commerce Privacy and Security System
E-Commerce Privacy and Security SystemIJERA Editor
 
E-Commerce Privacy and Security System
E-Commerce Privacy and Security SystemE-Commerce Privacy and Security System
E-Commerce Privacy and Security SystemIJERA Editor
 
AnevaluationofsecurestorageofauthenticationdataIJISR.pdf
AnevaluationofsecurestorageofauthenticationdataIJISR.pdfAnevaluationofsecurestorageofauthenticationdataIJISR.pdf
AnevaluationofsecurestorageofauthenticationdataIJISR.pdftonkung6
 
Privacy Management System: Protect Data or Perish
Privacy Management System: Protect Data or PerishPrivacy Management System: Protect Data or Perish
Privacy Management System: Protect Data or PerishRSIS International
 
Cybersecurity solution-guide
Cybersecurity solution-guideCybersecurity solution-guide
Cybersecurity solution-guideAdilsonSuende
 
DIGITAL EMPOWERMENT ASSIGNMENT.docx
DIGITAL EMPOWERMENT ASSIGNMENT.docxDIGITAL EMPOWERMENT ASSIGNMENT.docx
DIGITAL EMPOWERMENT ASSIGNMENT.docxHateMe9
 
Information security
Information securityInformation security
Information securitySanjay Tiwari
 
Data Leak Protection Using Text Mining and Social Network Analysis
Data Leak Protection Using Text Mining and Social Network AnalysisData Leak Protection Using Text Mining and Social Network Analysis
Data Leak Protection Using Text Mining and Social Network AnalysisIJERD Editor
 
The Evolving Landscape on Information Security
The Evolving Landscape on Information SecurityThe Evolving Landscape on Information Security
The Evolving Landscape on Information SecuritySimoun Ung
 
3 guiding priciples to improve data security
3 guiding priciples to improve data security3 guiding priciples to improve data security
3 guiding priciples to improve data securityKeith Braswell
 
ControlsforProtectingCriticalInformationInfrastructurefromCyberattacks (1).pdf
ControlsforProtectingCriticalInformationInfrastructurefromCyberattacks (1).pdfControlsforProtectingCriticalInformationInfrastructurefromCyberattacks (1).pdf
ControlsforProtectingCriticalInformationInfrastructurefromCyberattacks (1).pdfsulu98
 

Similaire à An Empirical Study on Information Security Risks (20)

Cyber Security Intelligence
Cyber Security IntelligenceCyber Security Intelligence
Cyber Security Intelligence
 
Cyber Crime and Cyber Security
Cyber Crime and Cyber SecurityCyber Crime and Cyber Security
Cyber Crime and Cyber Security
 
Information security
Information securityInformation security
Information security
 
IT Security - Guidelines
IT Security - GuidelinesIT Security - Guidelines
IT Security - Guidelines
 
Fundamentals of-information-security
Fundamentals of-information-security Fundamentals of-information-security
Fundamentals of-information-security
 
Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdf
 
What is Importance of Cyber Security
What is Importance of Cyber Security What is Importance of Cyber Security
What is Importance of Cyber Security
 
A Survey On Data Leakage Detection
A Survey On Data Leakage DetectionA Survey On Data Leakage Detection
A Survey On Data Leakage Detection
 
E-Commerce Privacy and Security System
E-Commerce Privacy and Security SystemE-Commerce Privacy and Security System
E-Commerce Privacy and Security System
 
E-Commerce Privacy and Security System
E-Commerce Privacy and Security SystemE-Commerce Privacy and Security System
E-Commerce Privacy and Security System
 
AnevaluationofsecurestorageofauthenticationdataIJISR.pdf
AnevaluationofsecurestorageofauthenticationdataIJISR.pdfAnevaluationofsecurestorageofauthenticationdataIJISR.pdf
AnevaluationofsecurestorageofauthenticationdataIJISR.pdf
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
 
Privacy Management System: Protect Data or Perish
Privacy Management System: Protect Data or PerishPrivacy Management System: Protect Data or Perish
Privacy Management System: Protect Data or Perish
 
Cybersecurity solution-guide
Cybersecurity solution-guideCybersecurity solution-guide
Cybersecurity solution-guide
 
DIGITAL EMPOWERMENT ASSIGNMENT.docx
DIGITAL EMPOWERMENT ASSIGNMENT.docxDIGITAL EMPOWERMENT ASSIGNMENT.docx
DIGITAL EMPOWERMENT ASSIGNMENT.docx
 
Information security
Information securityInformation security
Information security
 
Data Leak Protection Using Text Mining and Social Network Analysis
Data Leak Protection Using Text Mining and Social Network AnalysisData Leak Protection Using Text Mining and Social Network Analysis
Data Leak Protection Using Text Mining and Social Network Analysis
 
The Evolving Landscape on Information Security
The Evolving Landscape on Information SecurityThe Evolving Landscape on Information Security
The Evolving Landscape on Information Security
 
3 guiding priciples to improve data security
3 guiding priciples to improve data security3 guiding priciples to improve data security
3 guiding priciples to improve data security
 
ControlsforProtectingCriticalInformationInfrastructurefromCyberattacks (1).pdf
ControlsforProtectingCriticalInformationInfrastructurefromCyberattacks (1).pdfControlsforProtectingCriticalInformationInfrastructurefromCyberattacks (1).pdf
ControlsforProtectingCriticalInformationInfrastructurefromCyberattacks (1).pdf
 

Plus de ijtsrd

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementationijtsrd
 
Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...ijtsrd
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospectsijtsrd
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...ijtsrd
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...ijtsrd
 
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...ijtsrd
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Studyijtsrd
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...ijtsrd
 
The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...ijtsrd
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...ijtsrd
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...ijtsrd
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...ijtsrd
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadikuijtsrd
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...ijtsrd
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...ijtsrd
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Mapijtsrd
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Societyijtsrd
 
Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...ijtsrd
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...ijtsrd
 
Streamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine LearningStreamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine Learningijtsrd
 

Plus de ijtsrd (20)

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation
 
Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
 
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Study
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
 
The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Map
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Society
 
Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
 
Streamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine LearningStreamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine Learning
 

Dernier

Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)cama23
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptxiammrhaywood
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfVanessa Camilleri
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYKayeClaireEstoconing
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptshraddhaparab530
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4JOYLYNSAMANIEGO
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxlancelewisportillo
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 

Dernier (20)

Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdf
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.ppt
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 

An Empirical Study on Information Security Risks

  • 1. International Journal of Trend in Scientific Research and Development (IJTSRD) Volume 4 Issue 4, June 2020 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470 @ IJTSRD | Unique Paper ID – IJTSRD30888 | Volume – 4 | Issue – 4 | May-June 2020 Page 186 An Empirical Study on Information Security Bhavya Verma1, Purva Choudhary1, Dr. Deepak Chahal2 1MCA Student, 2Professor, 1,2Department of IT, Jagan Institute of Management Studies, Rohini, New Delhi, India ABSTRACT Information security or Infosec worries with protecting information from unauthorized access. Its a part of information risk management and it therefore involves preventing or reducing the probability of unauthorized access, use, disclosure, disruption, deletion, corruption, modification, inspect or recording. In this article we will talk about the IT security, various threads to information security, different obstacles of information security and the various ways in which internet can be lucrative. KEYWORDS: Information, Security, Virus, Authentication How to cite this paper: Bhavya Verma | Purva Choudhary | Dr. Deepak Chahal "An Empirical Study on Information Security" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456- 6470, Volume-4 | Issue-4, June 2020, pp.186-189, URL: www.ijtsrd.com/papers/ijtsrd30888.pdf Copyright © 2020 by author(s) and International Journal ofTrendinScientific Research and Development Journal. This is an Open Access article distributed under the terms of the Creative CommonsAttribution License (CC BY 4.0) (http://creativecommons.org/licenses/by /4.0) INTRODUCTION Information security is also called as InfoSec. It is not all about security information from illicit access, rather it’s the practice of preventing illicit access, disclosure, inspection, recording, etc of information.Thepreeminentofinformation security is the balanced protection of the Confidentiality, Integrity and Availability (also known as CIA). Security is looked in terms of how data is stored, coded, transmitted, encrypted and deleted. Various statistics has shown that companies take security of the data of an individual with very high priority [1]. IT Security IT security is also known as computer science, which talks about security to technology. Computer security are not just needed at homes these days, hackers worldwide are smart enough to penetrate through huge servers leaking all the required information, thus in these cases, IT security is needed. This scenario may be expensive,a significant breach costs an organization far more. Big breaches almost jeopardize small businesses leading to huge fall out of these small businesses. Even though information security and IT security sounds familiar, but the difference that lies between them is that in infosec, various set of tools are designed which helps in providing sensitivity in business sector, where as computer science talks about security to data which becomes limited within the digital world. Threads to information security may encompass following:- 1. Computer viruses Computer virus was introduced by Ran Weber in 1999, which is a vile software which crosses the thresholdintoour computers without consent. It creates a replica of itself heading to activate its malicious activities and thus continue to spread all over the system. 2. Theft Any theft on the hardware, software or the data of any organization leads to huge loss to the organization 3. Sabotage Sabotage, as the name suggest, means deliberately destroying anything. Hackers worldwide have an in-depth knowledge of how they could sabotage information of the organization which could cause maximum vandalism to the system. 4. Vandalism Vandalism affects hardware, software and the data of an organization wilfully leading toitseffectintheentiresystem. ISO 27002:2005 defines information security for prevising into three major elements:- I. Confidentiality Any unintended sourceifhindersinsidetheorganizationhad to be put to a stop. This is done through confidentiality. All sorts of secrete, sensitive and protectionpronedata needsto be kept away from all the malicious invaders.Confidentiality IJTSRD30888
  • 2. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD30888 | Volume – 4 | Issue – 4 | May-June 2020 Page 187 can only be accessed depending upon the availability and accessibility by the trusted users only. Protection can be done with the help of encryption, access control structure, file permission, etc II. Integrity When we need to secure our data, it is not just limited to the security of data, it involves various other factors also like maintaining the consistency, accuracy, trustworthiness, etc of data. It is very important in data security that it does not just provide the access to ensure that the data cannot be changed or alter by malicious officials. Integrity to data security can only be ensured by implementingtheconcept of file permission and user access controls in addition to these two vital concepts, it is very important to place some means for detecting any changes in data that might occurasa result of non-human caused events. All sorts of backups or redundancies which has to take place must be available to restore the affected data and secure itstrictlyforfurtheruse. As all the existing technologies somehow have a loop hole that cannot be removed or is being improved to remove the potential threat loop hole [2]. III. Availability Availability is best ensured by tightly storing all Hardware, performing hardware repairs as soon as needed and maintaining an efficient packet space freed from software conflicts. It is also important to stay current with all the program upgrades required. Providing adequate communication bandwidth andpreventingtheemergenceof bottles is very important. Backtracking, poor performance, RAID and even high availability teams can reduce the adverse effects when hardware issues arise. Rapid and harmonious disaster preparedness is essential in cases of serious crime; that authority depends on the existence of a comprehensive disaster recovery plan (DRP). Protecting protection against data loss or interruption in connection should include unexpected events such as natural disasters and fire. to prevent data loss from such occurrences, a backup copy may be stored at a location-based location, or perhaps while fireproof, not securely waterproof. Today, networks are complex arrangements that cannot be left to chance. Each design must be researched,assembled,proven, and then implemented [3]. Additional security tools or software such as firewalls and proxy services may monitor downtime and inaccessible data due to malicious actions such as service-Do-service (DoS) attacks and network attacks. Obstacles to information security:- I. Financial Services Workers Fooled by CD Scam Studies conducted in the financial district of London have shown what years of security experts say: employees - even those who work with the most sensitivefinancial data -don't know or don't care about basic security measures. In this study, CDs were given to passengers as they entered the city. Recipients were told that the discs contained a special Valentine's Day promotion. In fact, the CDs contain something other than the code that informs the company that was doing the work on how many recipients tried to open the CD. Among the deportees were employees of the world's largest retail bank and two insurers. Employees, by installing the CD in their offices andinstalling it directly on their PCs, go far beyond the security of their company. Experts say employees need to understand that they are the first and easiest way in their company's network. II. Security Incident Investigations Within Banks The method of bank security investigations is receiving a lot of attention these days. In the past, standardproceduresand procedures for responding to an incident were acceptable. However, due to security practices and regulations that directly affect banks, theseinstitutions requireverydifferent approaches to their security investigations to account for these new regulations and security measures. Security incident investigations are activities aimed at answering questions (when, where, what,towhom,howand why) regarding a specific event that affected an organization's informationorinfrastructureinanunwanted, anonymous and / or illegal manner. In comparison with many other types of security checks, security incident investigations are more environmentally- friendly (e.g. an incident has already been identified), and this puts additional pressure andtime/resourcescompared to other security activities. However, security incident investigations are not entirely independent of other data security operations. Other functions may provide useful input before / during an investigation, may be started as a result of an investigation or accept as input of a search result. III. Trouble In Authentication Bank fraud and identity theft are a shock to both the banker and the consumer. The number of consumers involved in widespread credit card fraud would be great. The impact on people's bank accounts is likely to increase acceptance of "disruptive technologies", e.g., hardware tokens. This could be a storm suitable for banks. You have the customer's permission to tell them what to do. Large banks have been working for many years in ensuring the integrity and are ready to take on this challenge. What concerns me most about community banks and credit unions. They are currently having a difficult time competing with online banks and payment of taxes. What's wrong with multitasking? The problem with customer authentication information is that it is provided to the customer. Someone asks as you might have your social security number, yourmother'smaiden name,andyouknow the name of your first pet, first-born, and your favourite food. If I have your laptop, your fob, your wallet and everything else in your wallet, you're out of luck. If I use a thumb print gun, I only have one print name for it. Anything that can be contained in a database can be extracted from a database. Everything in your home, car, office, hotel room and Starbucks can be stolen. We need to come up with something stolen. The difference betweentwo things and a lot of things is just the number of things I need from you.
  • 3. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD30888 | Volume – 4 | Issue – 4 | May-June 2020 Page 188 Enter the authentication at risk. The risk analysis engine will look at your banking performance, analyse it, and the differences in the flag. This is similar to how access control systems work. If there seems to be something very unusual about the online banking area of the work, or the number of transactions, or the number of transactions, the sale is significant. While banks pursue dual-user authentication, website authentication is still a problem to be solved. With user authentication, the user is authorized by the bank. But what about verification of the bank's website to the user? How does a user know that he or she has come to the right website rather than the phishing site? The authentication vendor of your choice must be able to demonstrate not only the strict user authentication method, the online risk management method, but also the website authentication method. Electronic signatures areoneway of looking at website verification. IV. Phishing: An Insidious Threat to Financial Institutions Illegal hacking using illegal emails to get people out of their account numbers and passwords is on the rise. Hijacking product names of banks, merchants and credit card companies, chefs often make recipients accountable. Under- hacking techniques instil fraud on PCs to steal information directly, sometimes using the Trojan keylogger software. Fortunately, a combination of technological solutions exists to detect and reduce cybercrime attacks. The long-term solution is the use of law and industry resources to quickly identify and deter hackers, as well as government intervention in Asian andEasternEuropeancountrieswhere organized crime is rampant. However there are a number of steps that individual organizations can take and which should take a different approach. The first thing to understand is that identitytheftculminates in a social engineering revolution, where victims are misled into transmitting information that can be used to hijack accounts or create other mayhem. In addition to stealing sensitive data,theFDICsaid,attackers can resort to other means to steal information, such as hacking, retrieving hard-copied documents or staring at someone, using the contents, and uploading malicious software to a consumer-owned computer. There are two main reasons why phishingandothertypesof attacks have been used more often and with increasing success. They should cause identity theft, and some account theft: User authentication by the financial services industry for remote customer access is weak, and the Internet has no E-mail and Web site verification. V. Online Activities at Work Buyers in the U.S. They are responding to the increasingfear of online identity theft. Businesses - especially those in the financial services sector - must counter this trend by emphasizing their efforts to deploy acquisition-based applications. A new survey (see below) shows the first evidence that fear of identity theft is starting to take online usage statistics. Internet usage rates are very important for banks and other financial services institutions. The sector is characterizedby high competition,small differencesbetweeninstitutions, and low levels of customer loyalty. Two key strategies have emerged in the struggle to growthe size and scale of the current customer base: Maximize Internet Bank usage. By increasing the percentage of customers who use online services,banks can increase their customerrevenue,reducetransaction costs, and increase long-term reliability. Lower the churn. By reducing the percentage of customers converting their business to another institution, banks can maintain market share in a competitive market otherwise. Although there are fears about a Consumer Reports survey, the need for Internet-based banks continues to grow. The Pew Internet & American Life Projectreportsthatmorethan 50 million adults are now banking online. This figure has increased 47% since 2002. Info-Tech sees the online market as a symbol of the great competitiveness of the banking sector. Despite the growing demand for the market, the perception of risk is seen as a threat to the ongoing access to online services. Building better software andleadtosomegoodreproducibleresearch as compared to virtual machines [4]. Institutions that redirect their contributions to addressing security concerns and meeting the need to explode will receive a competitive advantage over those who choose to take a conservative approach. Banks can pay for this practice. Ways to Make the Most of Internet Use: 1. Address security forward. Issues of identity theft have become a major concern for consumers. Online marketing efforts should focus specifically on the steps the bank takes to protect all usage and personal data. Create a program to communicate the following key issues: Messages are sent to the home business page detailing specific steps the bank is known to have taken. A direct product of the bank's security efforts. Include this product in all customer publications. The FAQs outline steps that customers can take to increase their online safety. This includes using 128-bit-encrypted browsers, never responding to e-mail from any bank, and warning signs of URL URLs.Tomaximizepurchases,focuson cost and time savings for consumers. 2. Track current usage. Understand how current services are used by using Web analytics to get end-userinformation. Research customers to better understand why they use online resources. Include inspections of branch servicesand telephone services and ensure that all points of contact are made. Describe the first answers to this data. If the key performance indicators are violated, have a plan to explain who is doing it and who is funding it to address the issue.
  • 4. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD30888 | Volume – 4 | Issue – 4 | May-June 2020 Page 189 3. Educate the customer. Do not assume that all customers are automatically ready to go online. Late immigrants may need more supervision and training before they can be free. Add FAQs and other training content to the centre’s website to make sure they get the help they need. 4. Look to leaders. The Canadianbankingmarketis leading the world in online banking penetration. According to a recent report by comScore Media Metrix Canada, 40% of Canadians use online banking services. Conclusion Information security as we can understand is a key instrument in IT security when we have to talk about. It can never be taken lightly while consideringthereverberation of its failure and the corresponding after effects which can affect the entire system. It becomes escalating important as the level of safety and the responsibility that is required to ensure business continuity and safety for the information that is derived from the data used in the system. A look at top threats was identified as computer virus, theft, sabotage and vandalism. Thus,ISO27002:2005hasdefinedtheneedof preserving information security with three majorelements: Confidentiality, Integrity and availability. References: [1] Bhutani S. et al, Data privacy and security issues in India: An empirical study, International Journal of Research in Engineering, Volume 1; Issue 4; October 2019; Page No. 15-17. [2] Chahal D. et al. Cyber Securence Affected by Big Data and Artificial Intelligence, International Journal Of Innovative Research In Technology, Volume 6 Issue 6, November 2019. [3] Bhatnagar A. et al. Juniper Networks: An Overview of the Concept, IJSRD - International Journal for Scientific Research & Development| Vol. 6, Issue 10, 2018. [4] Kharb L, Automated Deployment of Software Containers Using Dockers, International Journal of Emerging Technologies in Engineering Research (IJETER) Volume 4, Issue 10, October (2016).