Current Issue : July - September Volume : 2013 Issue Number : 3 Articles : 4 Articles
Network security and management policy in\r\ninformation communication is the desire to maintain the\r\nintegrity, validity and consistency of a system or network, its\r\ndata and its immediate environmental infrastructure .Well\r\nestablished and secured infrastructure would help in no means\r\nmaking the network safe from all kinds of intrusion .Protecting\r\nall these resources is another very important concept that is\r\nneeded of any computer system. Harnessing, accessing and\r\nconfiguring relevant security policies are very important roles\r\nto be played in safeguarding the complex network\r\ninfrastructure. The paper therefore analysis some of the\r\ndesired policies and assessment guidelines that should be\r\nfollowed by network administrators for effective and strong\r\nnetwork management, security facilities and data optimization....
Background: Availability of information in hospitals is an important prerequisite for good service. Significant resources have\r\nbeen invested to improve the availability of information, but it is also vital that the security of this information can be guaranteed.\r\nObjective: The goal of this study was to assess information security in hospitals through a questionnaire based on the International\r\nOrganization for Standardization (ISO) and the International Electrotechnical Commission (IEC) standard ISO/IEC 27002,\r\nevaluating Information technology ââ?¬â?? Security techniques ââ?¬â?? Code of practice for information-security management, with a special\r\nfocus on the effect of the hospitalsââ?¬â?¢ size and type.\r\nMethods: The survey, set up as a cross-sectional study, was conducted in January 2011. The chief information officers (CIOs)\r\nof 112 hospitals in German-speaking Switzerland were invited to participate. The online questionnaire was designed to be fast\r\nand easy to complete to maximize participation. To group the analyzed controls of the ISO/IEC standard 27002 in a meaningful\r\nway, a factor analysis was performed. A linear score from 0 (not implemented) to 3 (fully implemented) was introduced. The\r\nscores of the hospitals were then analyzed for significant differences in any of the factors with respect to size and type of hospital.\r\nThe participating hospitals were offered a benchmark report about their status.\r\nResults: The 51 participating hospitals had an average score of 51.1% (range 30.6% - 81.9%) out of a possible 100% where all\r\nitems in the questionnaire were fully implemented. Room for improvement could be identified, especially for the factors covering\r\nââ?¬Å?process and quality managementââ?¬Â (average score 1.3 Ã?± 0.8 out of a maximum of 3) and ââ?¬Å?organization and risk managementââ?¬Â\r\n(average score 1.3 Ã?± 0.7 out of a maximum of 3). Private hospitals scored significantly higher than university hospitals in the\r\nimplementation of ââ?¬Å?security zonesââ?¬Â and ââ?¬Å?backupââ?¬Â (P = .008).\r\nConclusions: Half (50.00%, 8588/17,177) of all assessed hospital beds in German-speaking Switzerland are in hospitals that\r\nhave a score of 49% or less of the maximum possible score in information security. Patient data need to be better protected because\r\nof the data protection laws and because sensitive, personal data should be guaranteed confidentiality, integrity, and availability....
Multimedia Information security becomes a\r\nimportant part for the organization�s intangible assets. Level of\r\nconfidence and stakeholder trusted are performance indicator as\r\nsuccesses organization, it is imperative for organizations to use\r\nInformation Security Management System (ISMS) to\r\neffectively manage their multimedia information assets. The\r\nmain objective of this paper is to Provide a novel practical\r\nframework approach to the development of ISMS, Called by\r\nthe I-SolFramework, implemented in multimedia information\r\nsecurity architecture (MISA), it divides a problem into six\r\nobject domains or six layers, namely organization,\r\nstakeholders, tool & technology, policy, knowledge, and\r\nculture. In addition, this framework also introduced novelty\r\nalgorithm and mathematic models as measurement and\r\nassessment tools of MISA parameters....
Leaking of confidential material is a major threat to information security within organizations and to society as a whole. This\r\ninsight has gained traction in the political realm since the activities of Wikileaks, which hopes to attack ââ?¬Ë?unjustââ?¬â?¢ systems or\r\nââ?¬Ë?conspiraciesââ?¬â?¢. Eventually, such threats to information security rely on a biologistic argument on the benefits and drawbacks\r\nthat uncontrolled leaking might pose for ââ?¬Ë?justââ?¬â?¢ and ââ?¬Ë?unjustââ?¬â?¢ entities. Such biological metaphors are almost exclusively based\r\non the economic advantage of participants. Here, I introduce a mathematical model of the complex dynamics implied by\r\nleaking. The complex interactions of adversaries are modeled by coupled logistic equations including network effects of\r\necono-communication networks. The modeling shows, that there might arise situations where the leaking envisioned and\r\nencouraged by Wikileaks and the like can strengthen the defending entity (the ââ?¬Ë?conspiracyââ?¬â?¢). In particular, the only severe\r\nimpact leaking can have on an organization seems to originate in the exploitation of leaks by another entity the\r\norganization competes with. Therefore, the model suggests that leaks can be used as atactical meanââ?¬â?¢ in direct adversary\r\nrelations, but do not necessarily increase public benefit and societal immunization to ââ?¬Ë?conspiraciesââ?¬â?¢. Furthermore, within the\r\nmodel the exploitation of the (open) competition between entities seems to be a more promising approach to control\r\nmalicious organizations : divide-et-impera policies triumph here....
Loading....