CFP last date
20 December 2024
Reseach Article

Information Security - Evolution, Impact and Design Factors

by A. Suganthy, Moinak Maiti
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 100 - Number 2
Year of Publication: 2014
Authors: A. Suganthy, Moinak Maiti
10.5120/17496-8028

A. Suganthy, Moinak Maiti . Information Security - Evolution, Impact and Design Factors. International Journal of Computer Applications. 100, 2 ( August 2014), 14-19. DOI=10.5120/17496-8028

@article{ 10.5120/17496-8028,
author = { A. Suganthy, Moinak Maiti },
title = { Information Security - Evolution, Impact and Design Factors },
journal = { International Journal of Computer Applications },
issue_date = { August 2014 },
volume = { 100 },
number = { 2 },
month = { August },
year = { 2014 },
issn = { 0975-8887 },
pages = { 14-19 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume100/number2/17496-8028/ },
doi = { 10.5120/17496-8028 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:28:52.605360+05:30
%A A. Suganthy
%A Moinak Maiti
%T Information Security - Evolution, Impact and Design Factors
%J International Journal of Computer Applications
%@ 0975-8887
%V 100
%N 2
%P 14-19
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Securing the business critical information is the major concern that an organization is facing with the enormous growth in the internet. This paper explores the evolution of information security and the need for protecting the information from unauthorised access. This paper also explains how the information security problem increases with the development in the technology. The technological solutions for the security problem were also discussed with their current issues. This paper also suggests the design factors to be considered when developing an information security framework and presents the key issues that the researchers can focus on in this field.

References
  1. NSA. "The Enigma". Aug 2011 from http://www. nsa. gov/public_info/press_room/2007/new_enigma_exhibit. shtml
  2. Daniel A. Wren (2005). The History of Management Thought: Wren, 5 edition In From the invisible hand to the digital hand(PP. 485); Wiley
  3. Roberts, Larry. "Program Plan for the ARPANET". Aug 2011from http://www. ziplink. net/~lroberts/SIGCOMM99_files/v3document. htm
  4. Robert M. "Bob"Metcalfe3"Developer of Ethernet". Aug 2011 from http://web. mit. edu/invent/iow/metcalfe. html
  5. Roger R. Schell, Peter J. Downey, and Gerald J. Popek, Preliminary Notes on the Design of Secure Military Computer Systems, (Jan. 1973), http://csrc. nist. gov/publications/history/sche73. pdf
  6. Richard Bisbey II and Dennis Hollingworth, Protection Analysis: Final Report, (May 1978), ISI/SR-78-13, USC/Information Sciences Institute, Marina Del Rey,CA 90291.
  7. F. T. Grampp and R. H. Morris, "UNIX Operating System Security," AT&T Bell Laboratories Technical Journal 63, no. 8 (1984): 1649–1672.
  8. Peter Salus. "Net Insecurity: Then and Now (1969–1998). " Sane '98 http://www. nluug. nl/events/sane98/aftermath/salus. html
  9. Herbert A. Simon (1997). Administrative Behaviour" A study of decision making processes in administrative organisations". USA: The Free Press.
  10. Gareth Morgan (1980),"Paradigms, Metaphors, and Puzzle Solving in Organization Theory," Administrative Science Quarterly,Cornell University.
  11. Information security. http://en. wikipedia. org/wiki/Informationsecurity
  12. Parkerian Hexad, http://en. wikipedia. org/wiki/Parkerian_Hexad
Index Terms

Computer Science
Information Sciences

Keywords

Evolution of Information security Security protection mechanism Security Framework Design Issues