CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Information Security: Threats Perception, Passive and Active measures for Information Assurance

Published on April 2012 by S. L. Kapoor, Abdul Wahid
Development of Reliable Information Systems, Techniques and Related Issues (DRISTI 2012)
Foundation of Computer Science USA
DRISTI - Number 1
April 2012
Authors: S. L. Kapoor, Abdul Wahid
00fbce2b-c856-4af8-8664-16c1ade34564

S. L. Kapoor, Abdul Wahid . Information Security: Threats Perception, Passive and Active measures for Information Assurance. Development of Reliable Information Systems, Techniques and Related Issues (DRISTI 2012). DRISTI, 1 (April 2012), 39-42.

@article{
author = { S. L. Kapoor, Abdul Wahid },
title = { Information Security: Threats Perception, Passive and Active measures for Information Assurance },
journal = { Development of Reliable Information Systems, Techniques and Related Issues (DRISTI 2012) },
issue_date = { April 2012 },
volume = { DRISTI },
number = { 1 },
month = { April },
year = { 2012 },
issn = 0975-8887,
pages = { 39-42 },
numpages = 4,
url = { /proceedings/dristi/number1/6739-1010/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 Development of Reliable Information Systems, Techniques and Related Issues (DRISTI 2012)
%A S. L. Kapoor
%A Abdul Wahid
%T Information Security: Threats Perception, Passive and Active measures for Information Assurance
%J Development of Reliable Information Systems, Techniques and Related Issues (DRISTI 2012)
%@ 0975-8887
%V DRISTI
%N 1
%P 39-42
%D 2012
%I International Journal of Computer Applications
Abstract

Companies and countries are investing billions to protect their information from unauthorized people. The media hypes every new attack on the Internet, with this information the information system manager campaigns for more and more funding. There are many Information System Managers in the field today that are uninformed on the potential threat that loom on the Internet. All managing information must be aware of the threats in order to make informed decisions about the measures that will be put into place as well as the priorities that we will give each measure to ensure that all critical information is protected. It is only through this enlightenment that we will be able to make informed decisions in purchasing security tools and developing policy for our users. The technology has shrunk the world by providing a wealth of information at our finger tips. Often the security of that information is taken care of in reactive manner by deploying resources defensively through firewalls and the access control. Some active electronic warfare measures for deception of the adversary are recommended to achieve information assurance by achieving information superiorities.

References
  1. WhiteHat Website Security Statistics Report | 10th Edition | Fall 2010
  2. Reuters. Microsoft Break-in, 9:25 EST October 27, 2000, accessible at http://www.zdnet.com/intweek/stories/news/0,4164,2645864,00.html
  3. Baocun, Wang and Fei, Li, Information Warfare, excerpted from The Liberation Army Daily, June 13 and June 20, 1995.Available at http://www.fas.org/irp/world/china/docs/
  4. SANS Institute. How to Eliminate the Ten Most Critical Internet Security Threats. January 18, 2001. Available at http://www.sans.org
  5. WASC Threat Classification v2.0–http://projects.webappsec.org/Threat-Class
  6. SANS Institute. How to Eliminate the Ten Most Critical Internet Security Threats. January 18, 2001. Available at http://www.sans.org
  7. Gen Gordan R. Sullivan and Col James M. Dubik, "War in the Information Age," Military Review 74 (April 1994): 46-62.
Index Terms

Computer Science
Information Sciences

Keywords

Information Assurance Information Security