A Discussion on Life Systems Security and the Systems Approach
نویسندگان
چکیده
The relationship between information technology and information security historically has been quite reactive. New innovations in information technology have often been accompanied by new security threats that create challenges to its reliability and overall integrity. In this paper, a historical perspective that outlines the evolution in the development of the security function is used as a starting base. Changes in the way security issues are viewed and how this view affects the design and development of secure systems are then postulated. It is proposed that these changes should be incorporated into the security functions of any waterfall development model, and especially during the initial and terminating stages.
منابع مشابه
Environment Security and Decrease of Crimes with CPTED Approach Critical and Analytical Discussion
Crime and the fear of crime are pervasive and endemic concerns in modern post-industrial society and criminal justice systems are clearly failing to tackle both issues. In this research after mentioning the abstract for motivation and the vital opinion in the security public, the role of city framework (programming the environmental design) in the decrease and prediction of crimes in the city...
متن کاملA Novel Hybrid Approach for Email Spam Detection based on Scatter Search Algorithm and K-Nearest Neighbors
Because cyberspace and Internet predominate in the life of users, in addition to business opportunities and time reductions, threats like information theft, penetration into systems, etc. are included in the field of hardware and software. Security is the top priority to prevent a cyber-attack that users should initially be detecting the type of attacks because virtual environments are not moni...
متن کاملامنیت اطلاعات سامانه های تحت وب نهاد کتابخانه های عمومی کشور
Purpose: This paper aims to evaluate the security of web-based information systems of Iran Public Libraries Foundation (IPLF). Methodology: Survey method was used as a method for implementation. The tool for data collection was a questionnaire, based on the standard ISO/IEC 27002, that has the eleven indicators and 79 sub-criteria, which examines security of web-based information systems of IP...
متن کاملDiscussion And Review In Vanet
VANET are becoming active area of research and devel- opment because it has potential to increase road safety, convenience and comfort to drivers & passengers. A Lot of research work on VANET have done in area of Quali- ty of Service (QoS), routing and security. These concepts relate the facing challenges for technology in VANET. We present a overview of challenges in VANET. Firstly ,we have di...
متن کاملDiscussion And Review In Vanet
VANET are becoming active area of research and devel- opment because it has potential to increase road safety, convenience and comfort to drivers & passengers. A Lot of research work on VANET have done in area of Quali- ty of Service (QoS), routing and security. These concepts relate the facing challenges for technology in VANET. We present a overview of challenges in VANET. Firstly ,we have di...
متن کاملA hybridization of evolutionary fuzzy systems and ant Colony optimization for intrusion detection
A hybrid approach for intrusion detection in computer networks is presented in this paper. The proposed approach combines an evolutionary-based fuzzy system with an Ant Colony Optimization procedure to generate high-quality fuzzy-classification rules. We applied our hybrid learning approach to network security and validated it using the DARPA KDD-Cup99 benchmark data set. The results indicate t...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2012