Book ChapterDOI
Information and Data Security Model: Background, Risks, and Challenges
Bhuvan Taneja,Bharat Bhushan +1 more
- pp 859-869
Reads0
Chats0
TLDR
In this paper, the details of different models of information and data security and also the management of risk and different challenges is possessed by security and different threats and also importance of security.Abstract:
Information security and data security are the processes that are mainly based on preventing information from unauthorized access or in other words to secure information and data corruption throughout its lifecycle be it the information that is stored as physical format such as files which are subject to thefts or vandalism, etc. Since the very beginning of communication, everyone understood it was important to have a mechanism to preserve the private information. In the nineteenth century, more complex systems were made to let the government manage the information effectively. During the First World War, multi-tier systems were introduced to communicate info from one place to another. This study shows the details of different models of information and data security and also the management of risk and different challenges is possessed by security and different threats and also the importance of security.read more
References
More filters
Journal ArticleDOI
Recent Advances in Attacks, Technical Challenges, Vulnerabilities and Their Countermeasures in Wireless Sensor Networks
Bharat Bhushan,Gadadhar Sahoo +1 more
TL;DR: The security threats and vulnerabilities imposed by the distinctive open nature of WSNs are examined and a comprehensive survey of various routing and middleware challenges for wireless networks is presented.
Journal ArticleDOI
Security Data Collection and Data Analytics in the Internet: A Survey
TL;DR: This paper surveys existing studies about security-related data collection and analytics for the purpose of measuring the Internet security and proposes several additional requirements for security- related data analytics in order to make the analytics flexible and scalable.
Journal ArticleDOI
Protection of Privacy in Biometric Data
TL;DR: The functional mechanisms of popular PPBSs are explained and the state-of-the-art privacy-preserving biometric methods based on these mechanisms are presented.
Journal ArticleDOI
Wormhole Attack Detection Algorithms in Wireless Network Coding Systems
TL;DR: This paper quantifies wormholes' devastating harmful impact on network coding system performance through experiments, and rigorously proves that DAWN guarantees a good lower bound of successful detection rate and performs analysis on the resistance of DAWn against collusion attacks.
Journal ArticleDOI
Data and Information Leakage Prevention Within the Scope of Information Security
TL;DR: The analyses of data breaches reported in 2014 reveal a significant number of data leakage incidents that are not within the focus of the DLP solutions, and indicate that the classification of the provided data breach records is not qualified for detailed investigations.