Professional Documents
Culture Documents
INFORMATION SECURITY
What is Confidentiality,
integrity, availability
triad
Structure made to
guide policies for
information security
within an
organization.
Are considered to be
crucial elements
components of
society.
INFORMATION SECURITY
Diagrammatical representation of
Dropbox, Google Drive
INFORMATION SECURITY
INFORMATION SECURITY
Cloud Providers
Problems Faced
Data integrity
Data theft
Privacy issue
Data loss
Data location
INFORMATION SECURITY
Mitigation
Conduct post-run
Privacy
Security
Data breaches
Data protection
INFORMATION SECURITY
Mitigation
Long-term viability
Regulatory Compliance
Data Location
Demonstrable customer care
Data Segregation
Recovery
Investigative support/Search
ability
7
References
Peltier, T. R. (2013).Information security fundamentals. CRC Press.
Whitman, M., & Mattord, H. (2011).Principles of information security. Cengage Learning.
Mell, P., & Grance, T. (2011). The NIST definition of cloud computing.
Whitman, M., & Mattord, H. (2013).Management of information security. Cengage Learning.
Feng, D. G., Zhang, M., Zhang, Y., & Xu, Z. (2011). Study on cloud computing
security.Journal of software,22(1), 71-83.
Stamp, M. (2011).Information security: principles and practice. John Wiley & Sons.
Conti, M., Nguyen, V. T. N., & Crispo, B. (2011). CRePE: Context-related policy enforcement
for Android. InInformation Security(pp. 331-345). Springer Berlin Heidelberg.
Vacca, J. R. (2012).Computer and information security handbook. Newnes.
Ifinedo, P. (2012). Understanding information systems security policy compliance: An
integration of the theory of planned behavior and the protection motivation
theory.Computers & Security,31(1), 83-95.
Hu, Q., Dinev, T., Hart, P., & Cooke, D. (2012). Managing Employee Compliance with
Information Security Policies: The Critical Role of Top Management and Organizational
Culture*.Decision Sciences,43(4), 615-660.
Taylor, R. W., Fritsch, E. J., & Liederbach, J. (2014).Digital crime and digital terrorism.
Prentice Hall Press.
Thompson, S. T. (2013). Helping the hacker? Library information, security, and social
engineering. Information Technology and Libraries, 25(4), 222-225.
INFORMATION SECURITY
THANK YOU !!
INFORMATION SECURITY