scholarly journals Specifying Information Security Needs for the Delivery of High Quality Security Services

Author(s):  
Xiaomeng Su ◽  
Damiano Bolzoni ◽  
Pascal van Eck
Author(s):  
Jan H. P. Eloff ◽  
Mariki M. Eloff ◽  
Madeleine A. Bihina Bella ◽  
Donovan Isherwood ◽  
Moses T. Dlamini ◽  
...  

The increasing demand for online and real-time interaction with IT infrastructures by end users is facilitated by the proliferation of user-centric devices such as laptops, iPods, iPads, and smartphones. This trend is furthermore propounded by the plethora of apps downloadable to end user devices mostly within mobile-cum-cloud environments. It is clear that there are many evidences of innovation with regard to end user devices and apps. Unfortunately, little, if any, information security innovation took place over the past number of years with regard to the consumption of security services by end users. This creates the need for innovative security solutions that are human-centric and flexible. This chapter presents a framework for consuming loosely coupled (but interoperable) cloud-based security services by a variety of end users in an efficient and flexible manner using their mobile devices.


2019 ◽  
pp. 264-277
Author(s):  
Jan H. P. Eloff ◽  
Mariki M. Eloff ◽  
Madeleine A. Bihina Bella ◽  
Donovan Isherwood ◽  
Moses T. Dlamini ◽  
...  

The increasing demand for online and real-time interaction with IT infrastructures by end users is facilitated by the proliferation of user-centric devices such as laptops, iPods, iPads, and smartphones. This trend is furthermore propounded by the plethora of apps downloadable to end user devices mostly within mobile-cum-cloud environments. It is clear that there are many evidences of innovation with regard to end user devices and apps. Unfortunately, little, if any, information security innovation took place over the past number of years with regard to the consumption of security services by end users. This creates the need for innovative security solutions that are human-centric and flexible. This chapter presents a framework for consuming loosely coupled (but interoperable) cloud-based security services by a variety of end users in an efficient and flexible manner using their mobile devices.


2017 ◽  
Vol 14 (8) ◽  
pp. 439-450
Author(s):  
Marc Sanchez Net ◽  
Iñigo del Portillo ◽  
Bruce Cameron ◽  
Edward F. Crawley

2021 ◽  
pp. 31-38
Author(s):  
I Made Sunia Raharja ◽  
Ahmad Ashari

SMS banking still becomes a popular way to make transaction inquiry in Indonesia. The technology protocol used by the service provider is still not secure. The majority of local banks in Indonesia still use non-secure SMS protocols standard. Therefore, an SMS Banking protocol, providing information security service in the transactional message, is urgently in need. Information security can be achieved through some security mechanisms, i.e., encipherment, digital signature, data integrity, and key exchange. These mechanisms are applicable through the implementation of cryptography. SMS Banking security protocol in this research runs through two steps. The first step is the transmission of the transaction request, and the second step is the transaction process. The encipherment is conducted using 3DES symmetric cryptography. Digital signature and data integrity are conducted using ECDSA asymmetric cryptography. The key exchange is conducted using ECDH. The test result showed that the implementation of the protocol could conduct an SMS Banking service and provide protection over the PIN. In general, this protocol has fulfilled X.800 security services.


2016 ◽  
Vol 92 ◽  
pp. 57-67 ◽  
Author(s):  
Yu “Andy” Wu ◽  
Carol S. Saunders

2019 ◽  
Vol 3 (III) ◽  
pp. 1-13
Author(s):  
Adan Moro Guracha ◽  
Felix Kiruthu

Security service delivery in public sector is crucial as it entails protecting government personnel as well as property. Therefore, security is increasingly viewed as a key condition for economic growth and development. Lack or ineffective security service delivery weakens the performance of any organization. This study sought to determine if service delivery improves as a result of outsourcing of security services to commercial state owned enterprises in Kenya. Specifically, this research aimed at determining the effects of outsourcing cash protection, body guarding, property protection and information/data protection services on security service delivery of selected commercial state owned enterprises in Nairobi City County in Kenya. The study was guided by two theories; the Functionalist model and securitization theory. A descriptive research design was adopted. The target population for this study was a census of all the 29 selected commercial state owned enterprises. The study targeted security managers, assistant security managers and security staff, hence total target population was 958 respondents. The sample size was selected through purposive and random sampling techniques. The research used questionnaires to collect data. Descriptive statistics including frequencies, percentages, means and standard deviations were used. Further, inferential statistics including correlation and regression analysis were used to illustrate the relationship between the independent and the dependent variables. The study used a multiple regression model. The regression results indicated that, there is a positive and significant relationship between outsourcing cash protection security services and security service delivery of commercial state owned enterprises in Kenya (β=0.247, p=0.001); a positive and significant relationship between outsourcing bodyguard security services and security service delivery of commercial state owned enterprises in Kenya (β=0.271, p=0.000); a positive and significant relationship between outsourcing property guarding security services and security service delivery of commercial state owned enterprises in Kenya (β=0.289, p=0.033); and a positive and significant relationship between outsourcing information security services and security service delivery of commercial state owned enterprises in Kenya(β=0.389, p=0.015). From the findings, the study concluded that outsourcing security services has a significant influence on security service delivery of commercial state owned enterprises in Nairobi City County, Kenya. In particular, the study concluded that outsourcing cash protection, body guarding services, property guarding and information security services, had a positive and significant effect on security service delivery of commercial state owned enterprises in Kenya. The study recommended that commercial state owned enterprises should strengthen their cash protection security services, security officers should be trained on how to protect human life especially, the personnel that they are supposed to protect, private security companies should keep data on any property that enters and leaves the company’s premises, and that private data security officers should have access to IT skills. This is an open-access article, access, citation and distribution of this article is allowed with full recognition of the authors and the source.  This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.


2021 ◽  
Vol 6 (2) ◽  
pp. 94-102
Author(s):  
Muslih Muslih ◽  
Abdussalam Abdussalam ◽  
Elkaf Rahmawan Pramudya

The main purpose of using cryptography is to provide the following four basic information security services. One of the purposes of cryptography is secrecy. Confidentiality is the fundamental security service provided by cryptography. This is a security service that stores information from unauthorized persons. Confidentiality can be achieved through a variety of ways ranging from physical security to the use of mathematical algorithms for data encryption. Vernam cipher is a stream cipher where the original data or plain with 8x8 block operation. Experimental results prove that RC4 can perform encryption and decryption with a fast execution process. In this study used a processor with 8GB of RAM. The encryption result of the text used yields the average encryption time and decryption average of 2 second.


Sign in / Sign up

Export Citation Format

Share Document