Security in the components of information systems

Authors

  • Fatmir Basholli
  • Rezar Mezini
  • Armand Basholli

Keywords:

Systems, Technology, Integrity, Security, Information

Abstract

The security aspects of information systems in the public and private sector are very important, because these are often part of critical national security infrastructures. Although the size of the public sector varies in different countries, it usually includes all government infrastructure and various levels of local government, which consist of many smaller organizations scattered throughout the country. Today, even in the private sector, is being invested in the use of technology and security aspects. The purpose of this paper is about the processes, policies, procedures, and other documents that public and private sector organizations possess and use in the field of security and information systems. Through this paper, I think we contribute to understanding how these institutions or private companies stand against national and international standards and best practices in the field of security of components in information systems.

References

Fred, B., Schneider, G., Mark, K., Hill, D., & David J. F. (2019). Challenges and Opportunities in Cybersecurity Research.

Dawson, J., & Thomson, R. (2018). The future cybersecurity workforce: Going beyond technical skills for successful cyber performance. Frontiers in psychology, 9, 744. https://doi.org/10.3389/fpsyg.2018.00744

Basholli, F. (2022). Cyber warfare, a new aspect of modern warfare. International Scientific Journal Security & Future, 5(2), 72-75

Perwej, Y. (2019). The hadoop security in big data: a technological viewpoint and analysis. International Journal of Scientific Research in Computer Science and Engineering (IJSRCSE), 7(3), 1-14. https://doi.org/10.26438/ijsrcse/v7i3.114

Aslan, Ç. B., Sağlam, R. B., & Li, S. (2018, July). Automatic detection of cyber security related accounts on online social networks: Twitter as an example. In Proceedings of the 9th international conference on social media and society (pp. 236-240).

Škrjanc, I., Ozawa, S., Ban, T., & Dovžan, D. (2018). Large-scale cyber attacks monitoring using Evolving Cauchy Possibilistic Clustering. Applied Soft Computing, 62, 592-601.

Mittal, S., Das, P. K., Mulwad, V., Joshi, A., & Finin, T. (2016, August). Cybertwitter: Using twitter to generate alerts for cybersecurity threats and vulnerabilities. In 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM) (pp. 860-867). IEEE.

Foroughi, F., & Luksch, P. (2018). Data science methodology for cybersecurity projects. arXiv preprint arXiv:1803.04219.

Apruzzese, G., Colajanni, M., Ferretti, L., Guido, A., & Marchetti, M. (2018, May). On the effectiveness of machine and deep learning for cyber security. In 2018 10th international conference on cyber Conflict (CyCon) (pp. 371-390). IEEE.

Boussi, G. O., & Gupta, H. (2020, June). A proposed framework for controlling cyber-crime. In 2020 8th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions)(ICRITO) (pp. 1060-1063). IEEE.

Daberdini, A., Basholli, F., Metaj, N., & Skenderaj, E. (2022). Cyber security in mail with Fortiweb and Fortinet for companies and institutions. Advanced Engineering Days (AED), 5, 81-83.

Williams, C. M., Chaturvedi, R., & Chakravarthy, K. (2020). Cybersecurity risks in a pandemic. Journal of medical Internet research, 22(9), e23692.

Wu, S., Chen, Y., Li, M., Luo, X., Liu, Z., & Liu, L. (2020). Survive and thrive: A stochastic game for DDoS attacks in bitcoin mining pools. IEEE/ACM Transactions on Networking, 28(2), 874-887.

Downloads

Published

2023-07-30