The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Organizations profoundly rely on contemporary information systems as they store essential business and resources data. Security of these information systems is critically handled by applying both technical and behavioral controls. However, security culture in certain organizations such as Higher Education Institutions (HEI) is questionable due to the lax attitude of employees towards the institutional...
Cybersecurity is currently one of the hottest topics for millions of organizations around the world. They depend on information technology to conduct their business processes that are exposed to wide range of security threats, and Portuguese organizations are no exception. How are these organizations taking a holistic approach to allow them to face and handle those threats with confidence? Are the...
The purpose of this paper is to examine information security culture critical success factors. The current existing literature analyses have not clearly identified factors that have significant influence on information security culture adoption. This paper has examined current influential factors that could have influence information security culture creation within the organization setting. We found...
Organizational success in the digital age is largely dependent upon the ability to collect, manage, and transfer proprietary information. Given this knowledge economy, it is no exaggeration to say that the protection of sensitive information is a top priority for most firms. However, achieving information security is complicated by the increased access to organizationally relevant information afforded...
Today's increased reliance on Information and Communications Technology (ICT) has raised the expectations for service quality, reliability and availability. Such expectations have introduced BCM as a crucial requirement for organizations. BCM is a management process that helps in improving the organization's resilience to interruptions caused by information security threats. The implementation of...
This paper reports on an interview study on information security incident management that has been conducted in organizations operating industrial control systems that are highly dependent on conventional IT systems. Six distribution service operators from the power industry have participated in the study. We have investigated current practice regarding planning and preparation activities for incident...
In activities to assure security of IT/NT systems and Data, where there is increasing number of attacks and where are more and more sophisticated cyber criminals, with all modern technical protection solutions in place, people are still the weakest link in the chain. And unless policy, education and training, awareness, and technology are properly employed to prevent people from accidentally or intentionally...
Educated and trained people are critical success factor in any IT work environment to minimize threats or misuse of the organizational assets that may damage the growth, excellence, and efficiency of any business. However, humans are always the weakest point in any security plan. Awareness is by far the most successful technique that does not cost much when compared with training and education and...
Information Systems are ‘The Lifeline’ of every organization, but they have become very large-scale and complex, thereby making it difficult to secure them against ever evolving cyber threats. Despite heavy expenses on deployment of cyber security products, organizations fail to protect themselves against cyber-attacks. Cyber Security Exercises have been identified as an effective mechanism to impart...
Use of the Internet has become our second nature. With each passing day computers and mobile devices are becoming ubiquitous in our society. In this backdrop the confidentiality of information is now a question of paramount importance. It is understood fact now that merely technical security solutions cannot guarantee security. End users are required to have solid understanding of the security issues...
User-initiated security breaches are common and can be very costly to organizations. Information security training can be used as an effective tool to improve users' secure behavior and thus alleviate security breaches. Via the lens of learning, media richness, and cognitive load theories, this research examines how to improve the effectiveness of security training. We conduct a realistic laboratory...
In order to secure communication, in the year 55 BC, Julius Caesar developed the Caesar cipher to ensure his generals on the battle field received critical information in the most secure manner possible. Today, the protection of critical information and communication is just as vital. Police officers, fire marshals and emergency medical units require critical information to make decisions that could...
Information security is the most important element in an organization including the High Learning Institution (HLIs). Apart from technological aspect, HLIs must enforce proper policies, procedures, and standards in compliance with laws and regulations to ensure safe and secured environment. This research has two main objectives. First is to identify the major component of information security framework...
As technology such as the Internet, computers and mobile devices become ubiquitous throughout society, the need to ensure our information remains secure is imperative. Unfortunately, it has long been understood that good security cannot be achieved through technical means alone and a solid understanding of the issues and how to protect yourself is required from users. Whilst many initiatives, programs...
Most organizations underestimate the demand for digital evidence [1]. Often, when evidence is required to prove fraudulent transactions, not enough or trustworthy evidence is available to link the attacker to the incident. It is essential for organizations to prepare themselves for digital Forensic (DF) investigations and ensure that entire organizational operating environment is prepared for example...
In this era of globalization, information security is becoming more important because the world is becoming highly interconnected with the Internet. At present customers can do banking online which is easy and time saving and at the same time they are vulnerable to threats. This paper seeks to investigate the current debate regarding the threats and vulnerabilities of the information security of online...
Increasing number of enterprises consider information security (InfoSec) as a key success factor whereas threats can originate from any part of the world over internet. Incidents such as 11th September of 2001, and hacker horror stories, awaken enterprises they should reshape their InfoSec policies. Traditionally InfoSec relies heavily on technology, investing large amount of money on software and...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.