IT security techniques - Competence requirements for information security testers and evaluators

2018 ◽  
2011 ◽  
Vol 271-273 ◽  
pp. 1826-1829
Author(s):  
Yan He

To secure the information systems and safeguard the personal and social data, experts engaged in the IT security departments should be increasingly turned out. Many universities have incorporated information security courses at the undergraduate and graduate levels as part of information systems or computer science majors, and some high vocational colleges set the IT security specialty to train the information security operators. However, most graduates are lack of practical operations and they don't have the qualifications to do the job. To train the IT security experts, appropriate methods should be developed. We propose a training mode based on project_based learning team. In the team, students work together in small groups aiming at a project topic, which is pertinent to their real contexts. Through analyzing the quality of the ability improving of each individual in the project team, the professional skills and practical experiences of most students are greatly improved.


Author(s):  
Matthew Guah

One area that has scarcely received attention in the IT security literature, is the role that individual compliance plays in preventing cyber-attacks. Specifically, how individuals take precautions, how they are motivated to take precautions, and the impact of corporate security policies on individual precaution-taking behaviour have not been extensively researched. Existing literature has underdeveloped conceptualizations of how these control systems work in the realm of information security. This chapter adds to the body of knowledge concerning the socio-organizational perspective for understanding IT security management in the organization that implement VLITP. It examines the VLITP implementation process for achieving IT security management BS 7799 Part 2 certification. The author also gives regards to the role of individual perceptions of the compulsion of controls as a significant part of the IT security process. Focusing more on behavioural aspects of security during the implementation of VLITP, this book considers Information security is to be different from computer security—which is the encompassing of information security in addition to the other aspects of security such as technical aspects, physical security, system security, networking issues, and so forth.. IT security risk considerations cause are capable of causing particular concern on the interdependence of IT systems and inject another element of complexity in the application of the policies governing VLITPs.


Author(s):  
Andreas U. Schmidt ◽  
Andreas Leicher ◽  
Inhyok Cha

Enforcement and trust are opposite concepts in information security. This chapter reflects on the paradigm shift from traditional concepts of access control and policy enforcement toward de-centralised methods for establishing trust between loosely connected entities. By delegating parts of enforcement tasks to trusted elements dispersed in a system, the system can establish transitive trust relationships. This is the most advanced evolution of the organisational method of separation of duties within IT security. The technological basis for trust in systems – trusted computing platforms – is described on conceptual levels allowing comparison with other top-level security concepts and mapping to application domains. Important applications in modern information systems and networks are exhibited.


2017 ◽  
Vol 755 ◽  
pp. 322-327
Author(s):  
Zsolt Szabó

One of the most valuable assets of economic and social life is information. Information is a resource for organizations, the basis for efficient operation, an asset, and often also a product that is sold. Information security is rarely thought of as a problem, yet, actions taken to protect information are everywhere in our lives. There are processes that can be a critical problem in the operation of an organization if the operation of the organization is not controlled properly and the organization is not well-prepared to avert a possible disaster. This study summarizes the background of the theoretical planning of an IT security system and shows an example of its possible implementation through a case study.


2021 ◽  
pp. 36-38
Author(s):  
Ekaterina Ahler

The company's information security is not only compliance with a set of IT security measures, but also the correct choice of the appropriate standard. Let's look at what standards are aimed at ensuring the information security of the company.


Sign in / Sign up

Export Citation Format

Share Document