Delve into our curated collection of the top research papers on Information Security. Gain insights into the latest methodologies, technologies, and strategies used to protect sensitive data. Whether you're a professional, academic, or enthusiast, these papers provide valuable knowledge to enhance your understanding of information security.
Looking for research-backed answers?Try AI Search
U. Rao, Umesha Nayak
journal unavailable
This book is intended to educate the average and experienced user of what kinds of different security practices and standards exist and will also cover how to manage security software and updates in order to be as protected as possible from all of the threats that they face.
F. Maymir-Ducharme, P. C. Clements, K. Wallnau + 2 more
journal unavailable
This report captures the development, lessons learned, and future recommendations from a collaborative research and development activity between the Air Force sponsored Comprehensive Approach to Reusable Defense Software (CARDS) Program, the Department of Defense (DoD), and the Software Engineering Institute (SEI). This activity explored innovative but practical techniques for formalizing and applying (i.e., reusing) models of information security (INFOSEC) concepts to the development of information systems.
M. Whitman, H. Mattord
journal unavailable
This book is designed to guide the information technology manager in dealing with the challenges associated with the security aspects of their role, providing concise guidance on assessing and improving an organization's security.
Jorge Blasco, Elizabeth A. Quaglia
journal unavailable
We present InfoSec Cinema, a film-based teaching activity that uses commercial films to teach information security. We analyse ten films to verify their suitability and build a public and editable database of information security events from films. Our findings show that most films embed enough security events to be used as a teaching tool. This could be used to produce information security teaching activities for a very wide range of audiences. Our experience in running two sessions of InfoSec Cinema was positive. Students were able to identify the most relevant events and even designed mitig...
J. Andress
journal unavailable
The Basics of Information Security covers the basic knowledge needed to understand the key concepts of confidentiality, integrity, and availability and dives into practical applications of these ideas in the areas of operational, physical, network, application, and operating system security.
J. M. McConnell
journal unavailable
Abstract : This instruction establishes the minimum standard for the training of information systems security (INFOSEC) professionals in the disciplines of telecommunications and automated information systems (AIS) security.
F. Maymir-Ducharme, P. Clements, K. Wallnau + 1 more
journal unavailable
This activity explored innovative but practical techniques for formalizing and applying models of information security (INFOSEC) concepts to the development of information systems.
authors unavailable
journal unavailable
This instruction establishes the minimum standard for the training of information systems security (INFOSEC) professionals in the disciplines of telecommunications and automated information systems (AIS) security.
Deven C. Pandya, Narendra J. Patel
IOSR Journal of Computer Engineering
The study identifies the research gap in E-Governance InfoSec domain and substantiates given research gap with relevant literature review and clearly depicts the requirement of research in the field of InfoSec in e-governance domain in a country like India.
Michael Aiello
journal unavailable
This study will investigate the correlation between a user’s InfoSec Literacy, credulousness, and their willingness to divulge information that can be used to compromise company data, to uncover if having technologically and socially competent end users would be beneficial to both IT and the business.
Abdullah Al Hayajneh, Hasnain Nizam Thakur, Kutub Thakur
Computer and Information Science
This study illustrates the combination of quantitative and qualitative evaluation methodologies, providing a comprehensive framework for the analysis and design of risk assessment, and advances the understanding of INFOSEC risk assessment.
Jason Andress
journal unavailable
This online revelation The Basics Of Information Security Understanding The Fundamentals Of Infosec In Theory And Practice Jason Andress can be one of the options to accompany you in imitation of having further time.
J. Andress
journal unavailable
The Basics of Information Security gives clear-non-technical explanations of how infosec works and how to apply these principles whether you're in the IT field or want to understand how it affects your career and business.
S. Srinivasan, Anup Kumar
journal unavailable
Key topics such as technologies for database protection, access control, multilevel security, database vulnerabilities and defenses, privacy and legal issues, impact of policies and some well known secure database models are presented.
J. M. Fox
journal unavailable
The study concluded the defense in depth policy does grant the Army an advantage over other organizations for providing information assurance, however, the Army would benefit from incorporating some of the common practices of private corporations in their overall information assurance plans.
J. Winkler, C. O’Shea
journal unavailable
This paper surveys issues and requirements for future Information Warfare (IW), and introduces the concepts for an area called: “dynamic information defense”, a broader strategy that integrates planning and analysis with a means for situational intelligence to achieve robust in-depth information defense.
S. Kranjac McIntosh
MILCOM 2000 Proceedings. 21st Century Military Communications. Architectures and Technologies for Information Superiority (Cat. No.00CH37155)
One of the first efforts of developing a software-based secure communication system that bases security on a combination of hardware and software design features is discussed, and the role of the 80486 features in software assurance is discussed.
The threat from computer crime and other information security breaches continues unabated and the financial toll is mounting, according to the latest joint CSI/FBI Computer Crime and Security Study.
S. McIntosh
journal unavailable
One of the first efforts of developing a software-based secure communication system that bases security on a combination of hardware and software design features is discussed, and the role of the 80486 features in software assurance is discussed.
Ricardo Villal, Braulio J. Solano-Rojas
journal unavailable
The Infosec-tree Model is proposed, a novel methodology with a hierarchical approach to guide that comprehensive assurance process for a computer or network system.
Jungduk Kim, Kih-Yang Hong
journal unavailable
The purpose of this paper is to provide several considerations to be taken into account when institutionalizing the information security(Infosec) pre-assessment, and the seven suggestions are proposed in developing and performing the infosec pre-Assessment scheme.
Wu Tao
Communications Technology
Based on the construction of infosec architecture in conformity with the classified security protection requirements, the author puts forward some principles for construction.
J. Anderson
journal unavailable
This report provides a baseline description of the state of multilevel processor/processing to the INFOSEC Research Council and at their discretion to the RD a background review of the highlights of the developments of MLS, issues and unmet R&D challenges surrounding MLS, and a set of recommended research topics.
M. Tinto
journal unavailable
This C Technical Report, "The Design and Evaluation of INFOSEC Systems: The Computer Security Contribution to the Composition Discussion," is issued by the National Computer Security Center (NCSC) under the authority of and in accordance with Department of Defense Directive 5215.1.
Jeff Bollinger, Brandon Enright, Matthew Valites
journal unavailable
This practical book demonstrates a data-centric approach to distilling complex security monitoring, incident response, and threat analysis ideas into their most basic elements by developing strategy, technique, and architecture.
Dagmar Rychnovská
Mezinárodní vztahy
It is argued that there are two distinct frames of security mobilized in the context of infodemic governance: information as a disease and Information as a weapon in contemporary global politics.
Erwin Louis Carrow
journal unavailable
The focus of this paper will demonstrate the need to clearly define and segregate various user space environments in the enterprise network infrastructure with controls ranging from administrative to technical and still provide the various services needed to facilitate the work space environment and administrative requirements of an enterprise system.
Michael Curry, Byron Marshall, Robert E. Crossler + 1 more
Data Base
A multi-stage InfoSec Process Action Model (IPAM) that can positively change individual InfoSec behavior will allow InfoSec researchers to focus more directly on the process that leads to action and develop better interventions that address problematic security behaviors.
Duy Dang-Pham
journal unavailable
New directions for InfoSec behavioural research based on the adoption of SNA methods to study InfoSec-related perceptions and behaviours are suggested, while findings about the selection and influence mechanisms offer theoretical insights and practical methods to enhance InfoSec in the workplace.
C. Irvine
journal unavailable
The Naval Postgraduate School Center for Information Systems Security (INFOSEC) Studies and Research (NPS CISR) is developing a comprehensive program in INFOSEC education and research that can become a resource for DoN/DoD and U.S Government in terms of educational materials and research.
Vera Shumilina, Alexander Kim
Science & World
The basic criteria of information security are given, and popular and malicious software, which destabilize and destroy the work of the information system, are discussed.
authors unavailable
journal unavailable
For Amy, the day began like any other at the Sequential Label and Supply Company (SLS) help desk; taking calls and helping office workers with computer problems was not glamorous, but she enjoyed the work; it was challenging and paid well.
Wendy Goucher
journal unavailable
This practical book confronts the stereotype of the information security auditor as a 'check list monkey' and gives an excellent introduction to the role, covering areas such as purpose, required skills, responsibilities, interface and career progression.
In order to understand mechanisms which provoke misuse of information and design and create adaptive information security systems, which can adequately respond to constantly changing dynamic environment and threats and can secure functioning of IPS under attacks and threats the IPS should be considered on more general level.
Colonel Professor Gheorghe Boaru
journal unavailable
The way of approaching the field of information security and military information systems is based on the fact that Romania is a NATO member and that, in joint military actions, it uses information systems that must be compatible and interoperable, but also protected. From the informational point of view, in the military actions there is a fight for information, through information and against information and therefore its security is a special activity, particularly with a view to classified information. The Alliance members, including Romania, must provide, individually or through bilateral ...
S. Hong, Jae-Pyo Park
Journal of the Korea Academia-Industrial cooperation Society
This paper presents an information protection model, a personal information protection model, and a protection model for public work protection in a metaverse environment and aims to verify its validity for verification of problems related to information protection, personal information protection, and public work protection in a metaverse environment.
Purum Kang, Jiwon Kang, K. Monsen
CIN: Computers, Informatics, Nursing
Investigation of the relationships between nurses' information security policy compliance, information competence, and information security attitudes found factors that influence information security behavior, including different approaches tailored to nurses' job positions and previous information security education.
何东杰
journal unavailable
The system includes a security information interaction terminal and a data processing server, wherein the dataprocessing server executes the authentication process based on electronically-formatted graphical authentication information which is analyzed from the security Information interaction request, and sends the authentication result back to the securityInformation interaction terminal.
Eric Amankwa, Marianne Loock, E. Kritzinger
The 9th International Conference for Internet Technology and Secured Transactions (ICITST-2014)
This paper presents working definitions for information security education, information security training and information security awareness, finding that these information security concepts are different in terms of their focus, purpose and methods of delivery.
杨绪森, 徐静雯
journal unavailable
The security information interaction system, the securityInformation interaction device and the security Information interaction method, disclosed by the invention, have the advantages of high safety and reliability, as well as convenience in use.
陈柳章
journal unavailable
The safety of personal information of users is improved, and furthermore, convenience of user operation is improved.
F. Mayer, W. Barker, T. Haley + 3 more
[1989 Proceedings] Fifth Annual Computer Security Applications Conference
The authors discuss the evaluation issues involved in an effort to take evaluated COMSEC technology and evaluated trusted system technology, and integrate them into a evaluatable INFOSEC product.
Gregory R. Doddrell
journal unavailable
This paper presents a meta-modelling procedure called "Formalizing information security requirements", which automates the very labor-intensive and therefore time-heavy and expensive process of formalising information security policies and procedures.
authors unavailable
International Journal of Recent Technology and Engineering
To understand the differences between terms like cyber security and information security is important because many banking regulatory bodies like Reserve bank of India, Hong Kong Monetary Authority, Monetary Authority of Singapore, etc. have asked banks to have separate cyber security AIS security policies.
Xia Yang
Applied Mechanics and Materials
This model combines protection, detection, recovery and control mechanisms to secure information system in their development lifecycle, which is more effective than the traditional ones.
A. Ibrahimova
Vilnius University Open Series
Taking into consideration its historical evolvement, it is evident that information security is not a new concept and personal security cannot be ensured without guaranteeing security within each organization.
Chen Bao-guo
journal unavailable
The development and problems of information security industry and information security economy are discussed, and their developing trend is presented.
Yuehua Wu, K. Takács-György
2023 IEEE 21st World Symposium on Applied Machine Intelligence and Informatics (SAMI)
It is concluded that information security risks are serious and inevitable in agriculture or food security and the need for information security risk management is significant in agriculture and food security.
This paper on information security and appropriate technology, from information security, information communication security, and information content of the three parts of the security of information security to make the discussion of safeguarding information security program.
E. Weippl, S. Schrittwieser, Sylvi Rennert
journal unavailable
The method of ethics case discussions is proposed to include ethics considerations in empirical research to include ethics considerations in empirical research in information security.