Electronic information security in a digital environment

Author(s):  
R.M. Davis
Author(s):  
Sadiq Shehu ◽  
Abdullahi Hussaini ◽  
Zahriya Lawal

Cryptography is fundamental to the provision of a wider notion of information security. Electronic information can easily be transmitted and stored in relatively insecure environments. This research was present to factor the prime power modulus \(N = p^r q\) for \(r \geq 2\) using the RSA key equation, if \(\frac{y}{x}\) is a convergents of the continued fractions expansions of \(\frac{e}{N - \left(2^{\frac{2r+1}{r+1}} N^{\frac{r}{r+1}} - 2^{\frac{r-1}{r+1}} N^{\frac{r-1}{r+1}}\right)}\). We furthered our analysis on \(n\) prime power moduli \(N_i = p_i^r q_i\) by transforming the generalized key equations into Simultaneous Diophantine approximations and using the LLL algorithm on \(n\) prime power public keys \((N_i,e_i)\) we were able to factorize the \(n\) prime power moduli \(N_i = p_i^r q_i\), for \(i = 1,....,n\) simultaneously in polynomial time.


2016 ◽  
Vol 12 (3) ◽  
pp. 1-20
Author(s):  
Eunjung Shin ◽  
Eric W. Welch

Concerns about electronic information security in government have increased alongside increased use of online media. However, to date, few studies have examined the social mechanisms influencing electronic information security. This article applies a socio-technical framework to model how technical, organizational and environmental complexities limit electronic information security perceived by local government managers. Furthermore, it examines to what extent organizational design buffers security risks. Using data from a 2010 national survey of local government managers, this article empirically tests the proposed model in the context of U.S. local government's online media use. Findings show that, in addition to technical complexity, organizational and environmental complexities are negatively associated with local managers' awareness of and confidence in electronic information security. On the other hand, internal security policy and decentralized decision-making appear to buffer security risks and enhance perceived information security.


2014 ◽  
Vol 519-520 ◽  
pp. 32-35
Author(s):  
Hai Ning An ◽  
Zi Yu Cheng

Electronic archive files have its advantage on speedy Operation relative to the archive file, however, it is hard to prevent tampering and safe for the file. The E-archives digital signature technology is very important for the Electronic information security. We analysis needs for the system, and design system solutions after the comparing various Signature and Encryption Technology, and propose function and design for the main module. Besides, there is the detailed design on the User registration, DEA file structure.


2016 ◽  
Vol 07 (1) ◽  
pp. 41-49
Author(s):  
Bikas Aghayev ◽  
◽  
Shakir Mehdiyev ◽  
Tarlan Aliyev ◽  
◽  
...  

2021 ◽  
Vol 93 ◽  
pp. 73-87
Author(s):  
P. A. Mitroshin ◽  

Introduction. When training specialists, both in integrated security and in other areas, an important element of training is an electronic information and educational environment. Ensuring reliable operation while data integrity is important task. The development of systems with a well-thought-out functionality to support the educational process and a set of measures to ensure information security can reduce the risks of reducing the quality of training specialists. Goals and objectives. Organization of the process of support for management and training of specialists in integrated security within the framework of the electronic information and educational environment. Ensuring monitoring of the learning process. Ensuring the continuous operation of the electronic environment of the educational institution to ensure the integrity of the process of educating complex security specialists. Methods. The research used scientific methods of analysis and synthesis, methods of mathematical statistics. Methods of structural and system analysis were used to design a model of an electronic information and educational environment. Results and its discussion. In accordance with the requirements of law and the requirements of a modern approach to the management of the educational process, a model of a fault-tolerant electronic information and educational environment for educating of specialists in integrated security has been developed and tested. In addition to the standard functions of supporting the educational process, which are defined in the law, the proposed approach to organizing an electronic learning environment allows monitoring indicators of the development of competencies. Conclusion. The main regulatory documents governing the functioning of the electronic information and educational environment of an educational institution for educating of specialists in integrated security are considered. Models of the implementation of the electronic environment are presented, which allow to provide support for the educational process and fault-tolerant functioning of the system. The data that was gotten about functioning of electronic systems under conditions of increased load makes it possible to design the software and hardware in more detail. Keywords: electronic information and educational environment, fault-tolerant systems, educating of specialists in integrated security, monitoring of the development of competencies


2020 ◽  
Vol 14 ◽  
Author(s):  
Ambika Annavarapu ◽  
Surekha Borra ◽  
Rohit Thanki

: The security of information is the major problem faced in today’s digital environment. Biometric Systems helps in achieving high–end security at precise performance requirements for various applications. This paper surveys the present multimodal and unimodal biometric based authentication systems which are in use, and their future possibilities. The authentication techniques that can identify the individual using unique features of the human such as face, fingerprint, DNA, speech and iris are discussed. Different recognition systems for new biometric traits such as voice, gait, and lip moment are also focused. This paper also focuses on information security of biometric systems and their performance requirements.


Sign in / Sign up

Export Citation Format

Share Document