Most Read Research Articles


Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79
Call for Paper - May 2015 Edition
IJCA solicits original research papers for the May 2015 Edition. Last date of manuscript submission is April 20, 2015. Read More

Information Security – Evolution, Impact and Design Factors

Print
PDF
International Journal of Computer Applications
© 2014 by IJCA Journal
Volume 100 - Number 2
Year of Publication: 2014
Authors:
A. Suganthy
Moinak Maiti
10.5120/17496-8028

A Suganthy and Moinak Maiti. Article: Information Security - Evolution, Impact and Design Factors. International Journal of Computer Applications 100(2):14-19, August 2014. Full text available. BibTeX

@article{key:article,
	author = {A. Suganthy and Moinak Maiti},
	title = {Article: Information Security - Evolution, Impact and Design Factors},
	journal = {International Journal of Computer Applications},
	year = {2014},
	volume = {100},
	number = {2},
	pages = {14-19},
	month = {August},
	note = {Full text available}
}

Abstract

Securing the business critical information is the major concern that an organization is facing with the enormous growth in the internet. This paper explores the evolution of information security and the need for protecting the information from unauthorised access. This paper also explains how the information security problem increases with the development in the technology. The technological solutions for the security problem were also discussed with their current issues. This paper also suggests the design factors to be considered when developing an information security framework and presents the key issues that the researchers can focus on in this field.

References

  • NSA. "The Enigma". Aug 2011 from http://www. nsa. gov/public_info/press_room/2007/new_enigma_exhibit. shtml
  • Daniel A. Wren (2005). The History of Management Thought: Wren, 5 edition In From the invisible hand to the digital hand(PP. 485); Wiley
  • Roberts, Larry. "Program Plan for the ARPANET". Aug 2011from http://www. ziplink. net/~lroberts/SIGCOMM99_files/v3document. htm
  • Robert M. "Bob"Metcalfe3"Developer of Ethernet". Aug 2011 from http://web. mit. edu/invent/iow/metcalfe. html
  • Roger R. Schell, Peter J. Downey, and Gerald J. Popek, Preliminary Notes on the Design of Secure Military Computer Systems, (Jan. 1973), http://csrc. nist. gov/publications/history/sche73. pdf
  • Richard Bisbey II and Dennis Hollingworth, Protection Analysis: Final Report, (May 1978), ISI/SR-78-13, USC/Information Sciences Institute, Marina Del Rey,CA 90291.
  • F. T. Grampp and R. H. Morris, "UNIX Operating System Security," AT&T Bell Laboratories Technical Journal 63, no. 8 (1984): 1649–1672.
  • Peter Salus. "Net Insecurity: Then and Now (1969–1998). " Sane '98 http://www. nluug. nl/events/sane98/aftermath/salus. html
  • Herbert A. Simon (1997). Administrative Behaviour" A study of decision making processes in administrative organisations". USA: The Free Press.
  • Gareth Morgan (1980),"Paradigms, Metaphors, and Puzzle Solving in Organization Theory," Administrative Science Quarterly,Cornell University.
  • Information security. http://en. wikipedia. org/wiki/Informationsecurity
  • Parkerian Hexad, http://en. wikipedia. org/wiki/Parkerian_Hexad