Securing Higher Grades Costing Your Pocket? Book Your Assignment at The Lowest Price Now!

Information System Security: Procedia Computer Science

tag 0 Download5 Pages 1,210 Words tag Add in library Click this icon and make it bookmark in your library to refer it later. GOT IT

Question:

Discuss about the Information System Security for Procedia Computer Science.
 
 

Answer:

Lot of aspects needs to be analyzed for develop an effective new business website. Organizations must take security precaution before utilizing new opportunities. They needs to analyze some aspects before engaging in website business. Risk, assets, migrations and vulnerabilities are the most vital aspects to consider (Wiemer et al., 2013). Security: Organization must check the security of the new website. The transaction process of goods and money must be secured. Some factors needs to analyze as Basic firewall protection, http Intrusion, Advanced server exploitation protection, web server and PHP hardening, Root FTP access, CXS scans and monthly vulnerability scans (Watters & Keane, 2015). They also needs to comply with the payment card industry’s Data Security Standers to protect customer vital information. It also involves in infrastructure standard and server setup. Off-site back up is also mandatory for disaster recovery. Losing the database means loss of all record of sales (Von Solms & Van Niekerk, 2013).  Next area to be consider is firewall which are used to defend the infrastructure from the malicious software and viruses. Web’s Firewall Products can be used to prevent this malicious attacks and it also allow constant scan on server activity. It is very effective to prevent new threats vial signature-based intrusion prevention. SSL certificate services can be utilized to provide a secure encryption for online transaction. It also assist business to secure the servers from any third party access. 

Spambot is basically a program which is intended to harvest, collect e-,mail address from the internet in order to create a mailing list for sending unsolicited e-mail  known as spam (Rhodes-Ousley, 2013). This spam were send to millions of e-mail address of vulnerable windows computer.  Nowadays, there are several spambot discovered which does not even detected by spam filters. Onliner is one of the spambot capable of bypassing spam filters according to the ZDNet. After reaching the destination the email has been seen disguised as invoices from authenticate source such as government, Bank and DHL notification (Jouini, Rabai & Aissa, 2014).  In the modern society, information has turn to a valuable asset. The majority of this are collected on computer systems which often connected with a network. Information can be compromised thorough many malware braches as Spambot.  Having an information security policy is essential in order to protect the vital information as well as strengthen its position in the market. IS increases efficiency as well Assist Company to investigate to identify recurring incidents and areas of risk.  Information security has four main important strategies elements which are utilized in the case of any breach (Laudon & Laudon2016). This elements are: 

 
  • Understand the reasons and evaluate the effectiveness of its response.
  • Assess the risks associated with the breach
  • Containment and recovery
  • Notify the appropriate people/organization

The paerkerian model is basically set of six elements of Information Security which are possession and control, confidentiality, integrity, availability, unity and authenticity. The data gathered by Spambot effect systems Confidentiality, integrity and availability. Spambot collects e-mail address from online and used to compromise vital data set (Jouini, Rabai & Aissa, 2014). Confidentiality defines as safe ground which are designed to prevent data loss by authenticating the user. There are several methods utilized to ensure confidentiality such as data encryption, Authentication with biometric, security tokens or key fobs. Integrality is designed to maintain trustworthiness, accuracy and consistency.  Data must not be altered by unauthorized people. Spambot is used to alter ESPs so that the culprit can hide his identity though captured e-mail address.  These measures includes file permissions and user access controls. Availability involves software conflicts as it is also an important to keep current with all necessary system updates.   Redundancy, failover, RAID even high-availability clusters can mitigate serious consequences when hardware issues do occur (Crossler et al. 2013).  Fast and adaptive disaster recovery is essential for the worst case scenarios. Security measures such as firewall, anti-malware and proxy servers can be useful to prevent this type of data breach. 

DES was first developed a long time ago in 1977 as a US federal standard.  It is widely known as data encryption Algorithm, a 64 bit block cipher that is capable of transferring 64 bit plaintext into a 64 bit cipher text while employing a 56 bit key. Though it was criticize fot its short key size (256), it is still widely popular all over the world. Many business adopt the DES as there was no particular competitor schema available, especially financial sectors. The 2-key DES was proposed by Tuchman in 1978 (Enck et al. 2014). It operates while maintain K1=K3. First, k1 is used to encrypt and K2 is used to decrypt and finally re-encryption done by k1. It has several advantage as it reduce the key storage and transmission requirements. Companies used 2-key DES to prevent attacks which cannot be stopped by 3_key DES. Despite the fact that 2-ket DES is less secure than 3-Key DES, many organization uses 2-key DES, particularly electronic payment industry. The basic EMV standard utilizes @-key DES worldwide. Most of the debit and credit cards are manufactured while utilizing the double-length key triple DES encipherment algorithm to encipherment the MAC mechanism.

Triple DES is widely recommended for the effective cryptographic schema. After failure of single DES by brute Force attack, the triple DES schema was implemented that still utilized by many industry (Crossler et al. 2013). It’s also became an ANSI standard in the US. Rather than performing three consecutive encryptions, the encryption is performed by k1 then the decryption is done by the K2 and finally another encryption was done by k3. The encrypt-decrypt-encrypt approach has many significant advantages as k1, k2 and k3 can be chosen independently (Enck et al. 2014). The triple DES remain standard version in the ISO/IEC 18033-3. The key statement to reproduce it elsewhere is following:

  • 80-bits key length must be used rather than 112 bits of two-key triple DES in specific application.
  • The plaintext encryption number with a single key must be limited as well depends on the required security level. 
 

Reference:

Crossler, R. E., Johnston, A. C., Lowry, P. B., Hu, Q., Warkentin, M., & Baskerville, R. (2013). Future directions for behavioral information security research. computers & security, 32, 90-101.

Enck, W., Gilbert, P., Han, S., Tendulkar, V., Chun, B. G., Cox, L. P., ... & Sheth, A. N. (2014). TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones. ACM Transactions on Computer Systems (TOCS), 32(2), 5.

Jouini, M., Rabai, L. B. A., & Aissa, A. B. (2014). Classification of security threats in information systems. Procedia Computer Science, 32, 489-496.

Laudon, K. C., & Laudon, J. P. (2016). Management information system. Pearson Education India.

Rhodes-Ousley, M. (2013). Information security: the complete reference. McGraw Hill Education.

Von Solms, R., & Van Niekerk, J. (2013). From information security to cyber security. computers & security, 38, 97-102.

Watters, J. P., & Keane, M. (2015). U.S. Patent No. 9,015,846. Washington, DC: U.S. Patent and Trademark Office.

Wiemer, D., Gustave, C., Chow, S. T., & McFarlane, B. K. (2013). U.S. Patent No. 8,438,643. Washington, DC: U.S. Patent and Trademark Office.

OR

Cite This Work

To export a reference to this article please select a referencing stye below:

My Assignment Help. (2019). Information System Security: Procedia Computer Science. Retrieved from https://myassignmenthelp.com/free-samples/information-system-security-procedia-computer-science.

"Information System Security: Procedia Computer Science." My Assignment Help, 2019, https://myassignmenthelp.com/free-samples/information-system-security-procedia-computer-science.

My Assignment Help (2019) Information System Security: Procedia Computer Science [Online]. Available from: https://myassignmenthelp.com/free-samples/information-system-security-procedia-computer-science
[Accessed 15 December 2019].

My Assignment Help. 'Information System Security: Procedia Computer Science' (My Assignment Help, 2019) <https://myassignmenthelp.com/free-samples/information-system-security-procedia-computer-science> accessed 15 December 2019.

My Assignment Help. Information System Security: Procedia Computer Science [Internet]. My Assignment Help. 2019 [cited 15 December 2019]. Available from: https://myassignmenthelp.com/free-samples/information-system-security-procedia-computer-science.


MyAssignmenthelp.com provides affordable essay help to students in Australia. Being a cheap essay writing service, we aim at providing the best in the minimum. We offer tons of freebies and a good discount for placing orders with us. All our efforts are aimed at ensuring that having a reliable and quality academic assignment help doesn’t drill hole in your pocket. Our writers draft paper from scratch, resourcing updated facts and information to be used in the paper. Exhaustive research resources are at our disposal to draft quality research papers. Some of our popular services include research paper help, dissertation help, thesis help, homework help, coursework help and class-apart works in lot other academic papers.

Latest Management Samples

ACC8003 Accounting Information Systems And Controls

Download : 0 | Pages : 6

Answers: Answer to question 3 The case of a furniture company is considered, there are various problems that are faced by the company at time of their growth. The issue is there are many unstaffed staffs that are not able to understand the basic operations and functions. Thus, for this training should be offered so that problem of failure could be resolved. While understanding the case study of Queensland’s furniture it was found that ...

Read More arrow

MGT601 Dynamic Leadership 1

Download : 0 | Pages : 8

Answer: Introduction: My journey as a leader started in my family. Being the first born, I had the responsibility to look after my siblings especially when the parents were not around. My parents trusted me, and they knew that everything would be fine when they were not around. They used to assign tasks such as feeding my young brother and ensuring that he does not cry. At church, I was appointed as the Sunday school leader, and I used ...

Read More arrow

HRMG204 Organizational Behavior 1

Download : 1 | Pages : 12

Answer: Introduction: The Australian Defense Force Academy failed due to the filming of two male and female cadets who were having consensual sex, whereby the female cadet did not know that they were being filmed (Welch, 2018 p.1).  The sex footage between the two cadets was streamed to a separate room where other cadets watched which resulted in two cadets being charged with the offensive use of a carrier service (Roberts-smit...

Read More arrow

MGT302A: Strategic Management

Download : 0 | Pages : 6

Answer: Introduction In the current economic world competition is very high. As a result, industries in the economic field have to find ways to ensure survival and to keep up with the competition. The survival of any business relies on opportunity creation that enables the business to explore new ventures and to equally compete with other businesses in the field. The opportunities created also ensures the growth of the business. The developme...

Read More arrow

BSBMGT608 Manage Innovation And Continuous Improvement 1

Download : 0 | Pages : 12

Answers: Question 1 Management by Objectives refers to a management approach where managers set objectives to improve performance in the future (Thomson, 1998). As an approach, it encourages managers and employees to continuously ask what needs to be done to improve the current situation and thus supporting innovation and continuous improvement. Question 2 The supply chain and service delivery systems include the following: Radio Freq...

Read More arrow
Next
watch

Save Time & improve Grades

Just share your requirements and get customized solutions on time.

question
We will use e-mail only for:

arrow Communication regarding your orders

arrow To send you invoices, and other billing info

arrow To provide you with information of offers and other benefits

1,164,507

Orders

4.9/5

Overall Rating

5,051

Experts

Our Amazing Features

delivery

On Time Delivery

Our writers make sure that all orders are submitted, prior to the deadline.

work

Plagiarism Free Work

Using reliable plagiarism detection software, Turnitin.com.We only provide customized 100 percent original papers.

time

24 X 7 Live Help

Feel free to contact our assignment writing services any time via phone, email or live chat.

subject

Services For All Subjects

Our writers can provide you professional writing assistance on any subject at any level.

price

Best Price Guarantee

Our best price guarantee ensures that the features we offer cannot be matched by any of the competitors.

Our Experts

Assignment writing guide
student rating student rating student rating student rating student rating 5/5

453 Order Completed

98% Response Time

Howard Asuncion

LLM in Criminal Law

London, United Kingdom

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

798 Order Completed

97% Response Time

Benjamin Blakeman

MSc in Medical Technology

London, United Kingdom

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

752 Order Completed

100% Response Time

Hugh Cleave

Masters in Human Resource Management (MMgt, HRM)

Wellington, New Zealand

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

134 Order Completed

95% Response Time

Thomas Nelson

MS in Information Systems Technology with Specialization in Database Administration

New Jersey, United States

Hire Me

FREE Tools

plagiarism

Plagiarism Checker

Get all your documents checked for plagiarism or duplicacy with us.

essay

Essay Typer

Get different kinds of essays typed in minutes with clicks.

edit

GPA Calculator

Calculate your semester grades and cumulative GPa with our GPA Calculator.

referencing

Chemical Equation Balancer

Balance any chemical equation in minutes just by entering the formula.

calculator

Word Counter & Page Calculator

Calculate the number of words and number of pages of all your academic documents.

Refer Just 5 Friends to Earn More than $2000

Check your estimated earning as per your ability

1

1

1

Your Approx Earning

Live Review

Our Mission Client Satisfaction

My assignment was completed on time and i got complete marks. IT WAS EXACTLY THE WAY I WANTED IT.

flag

User Id: 299002 - 15 Dec 2019

Australia

student rating student rating student rating student rating student rating

This was amazingly put together, I could not have asked for a better company to do my assignment. Delivered earlier than expected. Absolutely amazing.

flag

User Id: 260056 - 15 Dec 2019

Australia

student rating student rating student rating student rating student rating

thank you again, it is a good work, everything is perfect. I am very happy. It is not the first time and I know that I can count on you.

flag

User Id: 265909 - 14 Dec 2019

Australia

student rating student rating student rating student rating student rating

Love using this company they are very useful always on time . I absolutely would recommend them

flag

User Id: 334177 - 14 Dec 2019

Australia

student rating student rating student rating student rating student rating
Have any Query?