$20 Bonus + 25% OFF
Securing Higher Grades Costing Your Pocket? Book Your Assignment at The Lowest Price Now!

Information System Security: Procedia Computer Science

tag 0 Download5 Pages / 1,210 Words tag Add in library Click this icon and make it bookmark in your library to refer it later. GOT IT


Discuss about the Information System Security for Procedia Computer Science.


Lot of aspects needs to be analyzed for develop an effective new business website. Organizations must take security precaution before utilizing new opportunities. They needs to analyze some aspects before engaging in website business. Risk, assets, migrations and vulnerabilities are the most vital aspects to consider (Wiemer et al., 2013). Security: Organization must check the security of the new website. The transaction process of goods and money must be secured. Some factors needs to analyze as Basic firewall protection, http Intrusion, Advanced server exploitation protection, web server and PHP hardening, Root FTP access, CXS scans and monthly vulnerability scans (Watters & Keane, 2015). They also needs to comply with the payment card industry’s Data Security Standers to protect customer vital information. It also involves in infrastructure standard and server setup. Off-site back up is also mandatory for disaster recovery. Losing the database means loss of all record of sales (Von Solms & Van Niekerk, 2013).  Next area to be consider is firewall which are used to defend the infrastructure from the malicious software and viruses. Web’s Firewall Products can be used to prevent this malicious attacks and it also allow constant scan on server activity. It is very effective to prevent new threats vial signature-based intrusion prevention. SSL certificate services can be utilized to provide a secure encryption for online transaction. It also assist business to secure the servers from any third party access. 

Spambot is basically a program which is intended to harvest, collect e-,mail address from the internet in order to create a mailing list for sending unsolicited e-mail  known as spam (Rhodes-Ousley, 2013). This spam were send to millions of e-mail address of vulnerable windows computer.  Nowadays, there are several spambot discovered which does not even detected by spam filters. Onliner is one of the spambot capable of bypassing spam filters according to the ZDNet. After reaching the destination the email has been seen disguised as invoices from authenticate source such as government, Bank and DHL notification (Jouini, Rabai & Aissa, 2014).  In the modern society, information has turn to a valuable asset. The majority of this are collected on computer systems which often connected with a network. Information can be compromised thorough many malware braches as Spambot.  Having an information security policy is essential in order to protect the vital information as well as strengthen its position in the market. IS increases efficiency as well Assist Company to investigate to identify recurring incidents and areas of risk.  Information security has four main important strategies elements which are utilized in the case of any breach (Laudon & Laudon2016). This elements are: 

  • Understand the reasons and evaluate the effectiveness of its response.
  • Assess the risks associated with the breach
  • Containment and recovery
  • Notify the appropriate people/organization

The paerkerian model is basically set of six elements of Information Security which are possession and control, confidentiality, integrity, availability, unity and authenticity. The data gathered by Spambot effect systems Confidentiality, integrity and availability. Spambot collects e-mail address from online and used to compromise vital data set (Jouini, Rabai & Aissa, 2014). Confidentiality defines as safe ground which are designed to prevent data loss by authenticating the user. There are several methods utilized to ensure confidentiality such as data encryption, Authentication with biometric, security tokens or key fobs. Integrality is designed to maintain trustworthiness, accuracy and consistency.  Data must not be altered by unauthorized people. Spambot is used to alter ESPs so that the culprit can hide his identity though captured e-mail address.  These measures includes file permissions and user access controls. Availability involves software conflicts as it is also an important to keep current with all necessary system updates.   Redundancy, failover, RAID even high-availability clusters can mitigate serious consequences when hardware issues do occur (Crossler et al. 2013).  Fast and adaptive disaster recovery is essential for the worst case scenarios. Security measures such as firewall, anti-malware and proxy servers can be useful to prevent this type of data breach. 

DES was first developed a long time ago in 1977 as a US federal standard.  It is widely known as data encryption Algorithm, a 64 bit block cipher that is capable of transferring 64 bit plaintext into a 64 bit cipher text while employing a 56 bit key. Though it was criticize fot its short key size (256), it is still widely popular all over the world. Many business adopt the DES as there was no particular competitor schema available, especially financial sectors. The 2-key DES was proposed by Tuchman in 1978 (Enck et al. 2014). It operates while maintain K1=K3. First, k1 is used to encrypt and K2 is used to decrypt and finally re-encryption done by k1. It has several advantage as it reduce the key storage and transmission requirements. Companies used 2-key DES to prevent attacks which cannot be stopped by 3_key DES. Despite the fact that 2-ket DES is less secure than 3-Key DES, many organization uses 2-key DES, particularly electronic payment industry. The basic EMV standard utilizes @-key DES worldwide. Most of the debit and credit cards are manufactured while utilizing the double-length key triple DES encipherment algorithm to encipherment the MAC mechanism.

Triple DES is widely recommended for the effective cryptographic schema. After failure of single DES by brute Force attack, the triple DES schema was implemented that still utilized by many industry (Crossler et al. 2013). It’s also became an ANSI standard in the US. Rather than performing three consecutive encryptions, the encryption is performed by k1 then the decryption is done by the K2 and finally another encryption was done by k3. The encrypt-decrypt-encrypt approach has many significant advantages as k1, k2 and k3 can be chosen independently (Enck et al. 2014). The triple DES remain standard version in the ISO/IEC 18033-3. The key statement to reproduce it elsewhere is following:

  • 80-bits key length must be used rather than 112 bits of two-key triple DES in specific application.
  • The plaintext encryption number with a single key must be limited as well depends on the required security level. 


Crossler, R. E., Johnston, A. C., Lowry, P. B., Hu, Q., Warkentin, M., & Baskerville, R. (2013). Future directions for behavioral information security research. computers & security, 32, 90-101.

Enck, W., Gilbert, P., Han, S., Tendulkar, V., Chun, B. G., Cox, L. P., ... & Sheth, A. N. (2014). TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones. ACM Transactions on Computer Systems (TOCS), 32(2), 5.

Jouini, M., Rabai, L. B. A., & Aissa, A. B. (2014). Classification of security threats in information systems. Procedia Computer Science, 32, 489-496.

Laudon, K. C., & Laudon, J. P. (2016). Management information system. Pearson Education India.

Rhodes-Ousley, M. (2013). Information security: the complete reference. McGraw Hill Education.

Von Solms, R., & Van Niekerk, J. (2013). From information security to cyber security. computers & security, 38, 97-102.

Watters, J. P., & Keane, M. (2015). U.S. Patent No. 9,015,846. Washington, DC: U.S. Patent and Trademark Office.

Wiemer, D., Gustave, C., Chow, S. T., & McFarlane, B. K. (2013). U.S. Patent No. 8,438,643. Washington, DC: U.S. Patent and Trademark Office.

Download Sample

Get 100% money back after download, simply upload your unique content* of similar no. of pages or more. We verify your content and once successfully verified 100% value credited to your wallet within 7 days.

Upload Unique Document

Document Under Evaluation

Get Credits into Your Wallet

*The content must not be available online or in our existing Database to qualify as unique.

Cite This Work

To export a reference to this article please select a referencing stye below:

My Assignment Help. (2019). Information System Security: Procedia Computer Science. Retrieved from

"Information System Security: Procedia Computer Science." My Assignment Help, 2019,

My Assignment Help (2019) Information System Security: Procedia Computer Science [Online]. Available from:
[Accessed 05 July 2020].

My Assignment Help. 'Information System Security: Procedia Computer Science' (My Assignment Help, 2019) <> accessed 05 July 2020.

My Assignment Help. Information System Security: Procedia Computer Science [Internet]. My Assignment Help. 2019 [cited 05 July 2020]. Available from: provides affordable essay help to students in Australia. Being a cheap essay writing service, we aim at providing the best in the minimum. We offer tons of freebies and a good discount for placing orders with us. All our efforts are aimed at ensuring that having a reliable and quality academic assignment help doesn’t drill hole in your pocket. Our writers draft paper from scratch, resourcing updated facts and information to be used in the paper. Exhaustive research resources are at our disposal to draft quality research papers. Some of our popular services include research paper help, dissertation help, thesis help, homework help, coursework help and class-apart works in lot other academic papers.

Latest Management Samples

HI6026 Audit, Assurance And Compliance For Sustainable Sales In Food

Download : 0 | Pages : 12

Answer: Introduction “Woolworths Group” is recognized as one of the leading Australian data manufacturer with its operations in both New Zealand and Australia. The company is known for being the second largest in terms of its revenue ranking next to “Perth-based retail-focused conglomerate Wesfarmers”. The group is further identified for being the largest retail player in terms of “liquor retailer, hotel and gaming...

Read More arrow

7808ICT Information Security Management For Human Readable Security Features

Download : 0 | Pages : 8
  • Course Code: 7808ICT
  • University: Griffith University
  • Country: Australia

Answer: Introduction Smart card are termed as smart as they are integrated with a computer chip. Smart cards are devices that helps in identification of user and provide cost efficiency features [1]. Smart cards are used in various fields including health services, banking, telephone, employee ID, transport and physical access control. The security of users affect the trust of the user with the company or any other business organization.  ...

Read More arrow

PACC6008 Business Decision Making For Statistics And Graphical Representation

Download : 0 | Pages : 5
  • Course Code: PACC6008
  • University: Newcastle University
  • Country: United Kingdom

Answer: Question 1 The institute is interested in wages of US workers in 2018. Descriptive statistics and graphical representation of the variable Wages and Education is highlighted below (Foster, 2013). Numerical summary  Graphical representation  Comment Wage Level It is evident from the above computation that the mean hourly wage level is $25.62. Also, the shape of the graph would be asymmetric considering that high positive ...

Read More arrow Tags: Australia Sydney Management Master of Health Administration  University of Sydney 

MGT2HRM Human Resource Management For The Poor Safety Environment

Download : 0 | Pages : 10
  • Course Code: MGT2HRM
  • University: La Trobe University
  • Country: Australia

Answer: Introduction Antonsen (2017) stated that employees are the most valuable asset of an organization as they works for accomplishing the organizational goals. The staffs work hard for developing the products, representing the brand and fuel the success. Thomas and Galla (2013) furthermore highlighted that poor safety environment at the workplace resulted in high absenteeism, serious injuries and employee turnover rates. This report thus ...

Read More arrow Tags: Australia Melbourne Management Business Law University of Melbourne 

HRM 702 Employment Law System

Download : 0 | Pages : 10

Answer: Introduction Affirmative action is referred to the procedures undertaken with the aim of protecting the minority communities—especially the people of color, women, transgender, aboriginals and many more. The dawn of Affirmative Action in US was seen in the 1960s with the main motive to fight discrimination based on race and skin color, as well as discrimination based on sex and gender (Ma & Schapira, 2017). History of intole...

Read More arrow

Save Time & improve Grade

Just share Requriment and get customize Solution.

We will use e-mail only for:

arrow Communication regarding your orders

arrow To send you invoices, and other billing info

arrow To provide you with information of offers and other benefits




Overall Rating



Our Amazing Features


On Time Delivery

Our writers make sure that all orders are submitted, prior to the deadline.


Plagiarism Free Work

Using reliable plagiarism detection software, only provide customized 100 percent original papers.


24 X 7 Live Help

Feel free to contact our assignment writing services any time via phone, email or live chat.


Services For All Subjects

Our writers can provide you professional writing assistance on any subject at any level.


Best Price Guarantee

Our best price guarantee ensures that the features we offer cannot be matched by any of the competitors.

Our Experts

Assignment writing guide
student rating student rating student rating student rating student rating 5/5

610 Order Completed

100% Response Time

Cheryl Zhao

PhD in Statistics

Singapore, Singapore

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

2109 Order Completed

99% Response Time

Emma Zhong

Ph.D in Project Management with Specialization in Project Communications Management

Singapore, Singapore

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 4/5

2594 Order Completed

95% Response Time

Michael Johnson

Masters of MSc in Economics

Washington, United States

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

453 Order Completed

98% Response Time

Howard Asuncion

LLM in Criminal Law

London, United Kingdom

Hire Me

FREE Tools


Plagiarism Checker

Get all your documents checked for plagiarism or duplicacy with us.


Essay Typer

Get different kinds of essays typed in minutes with clicks.


GPA Calculator

Calculate your semester grades and cumulative GPa with our GPA Calculator.


Chemical Equation Balancer

Balance any chemical equation in minutes just by entering the formula.


Word Counter & Page Calculator

Calculate the number of words and number of pages of all your academic documents.

Refer Just 5 Friends to Earn More than $2000

Check your estimated earning as per your ability




Your Approx Earning

Live Review

Our Mission Client Satisfaction

Very pleased with the work I get back from the assignment help. Thank you for the work provided.


User Id: 455661 - 05 Jul 2020


student rating student rating student rating student rating student rating

Awesome fantastically ] perfect I loved his work right on time loved it thank you


User Id: 452319 - 05 Jul 2020


student rating student rating student rating student rating student rating

I wasn’t impressed. I had to do a lot of editing and the writing is just not impressive


User Id: 447023 - 05 Jul 2020


student rating student rating student rating student rating student rating

Quick turn-around. Easy to understand. All requirements covered. I will be using MAH again!


User Id: 383727 - 04 Jul 2020


student rating student rating student rating student rating student rating
callback request mobile
Have any Query?