scispace - formally typeset
Book ChapterDOI

Information and Data Security Model: Background, Risks, and Challenges

Bhuvan Taneja, +1 more
- pp 859-869
Reads0
Chats0
TLDR
In this paper, the details of different models of information and data security and also the management of risk and different challenges is possessed by security and different threats and also importance of security.
Abstract
Information security and data security are the processes that are mainly based on preventing information from unauthorized access or in other words to secure information and data corruption throughout its lifecycle be it the information that is stored as physical format such as files which are subject to thefts or vandalism, etc. Since the very beginning of communication, everyone understood it was important to have a mechanism to preserve the private information. In the nineteenth century, more complex systems were made to let the government manage the information effectively. During the First World War, multi-tier systems were introduced to communicate info from one place to another. This study shows the details of different models of information and data security and also the management of risk and different challenges is possessed by security and different threats and also the importance of security.

read more

References
More filters
Journal ArticleDOI

Recent Advances in Attacks, Technical Challenges, Vulnerabilities and Their Countermeasures in Wireless Sensor Networks

TL;DR: The security threats and vulnerabilities imposed by the distinctive open nature of WSNs are examined and a comprehensive survey of various routing and middleware challenges for wireless networks is presented.
Journal ArticleDOI

Security Data Collection and Data Analytics in the Internet: A Survey

TL;DR: This paper surveys existing studies about security-related data collection and analytics for the purpose of measuring the Internet security and proposes several additional requirements for security- related data analytics in order to make the analytics flexible and scalable.
Journal ArticleDOI

Protection of Privacy in Biometric Data

TL;DR: The functional mechanisms of popular PPBSs are explained and the state-of-the-art privacy-preserving biometric methods based on these mechanisms are presented.
Journal ArticleDOI

Wormhole Attack Detection Algorithms in Wireless Network Coding Systems

TL;DR: This paper quantifies wormholes' devastating harmful impact on network coding system performance through experiments, and rigorously proves that DAWN guarantees a good lower bound of successful detection rate and performs analysis on the resistance of DAWn against collusion attacks.
Journal ArticleDOI

Data and Information Leakage Prevention Within the Scope of Information Security

TL;DR: The analyses of data breaches reported in 2014 reveal a significant number of data leakage incidents that are not within the focus of the DLP solutions, and indicate that the classification of the provided data breach records is not qualified for detailed investigations.