PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

Simplifying security processes in large organizations while maintaining an appropriate level of security

Treść / Zawartość
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
This paper presents an approach to simplifying security in large organizations, ensuring that the work of ordinary employees is more accessible without negatively impacting the organization's security. Access to the Internet is becoming increasingly important in various aspects of human life, including interpersonal communication, professional work, and business operations. Enterprises have digitized information on their devices, which can be of interest to attackers. Incorrect security measures can expose companies to various losses, such as financial costs or image losses. As the number of enterprises connected to the Internet grows, IT system security is gaining importance. Cyberattacks are malicious actions by individuals or organized groups with motives such as financial gain, employee dissatisfaction, or government interference. Attackers aim to access financial data, customer lists, financial data, and customer databases. Cybersecurity should be the basis of every organization, regardless of its size. The number of attacks each year is related to increased investments in cybersecurity strategies and focusing on finding and stopping hackers. Information security protects information to prevent unauthorized access, use, and disclosure. It includes implementing policies and procedures to protect information and prevent data loss or theft. However, implementing security measures can be challenging for ordinary employees, leading to decreased security.
Rocznik
Tom
Strony
1--8
Opis fizyczny
Bibliogr. 16 poz., rys.
Twórcy
  • Department of Computer Science, Częstochowa University of Technology, Częstochowa, Poland
  • Department of Computer Science, Częstochowa University of Technology, Częstochowa, Poland
Bibliografia
  • 1. Ainslie, S., Thompson, D., Maynard, S., Ahmad, A. (2023). Cyber-Threat Intelligence for Security Decision-Making: A Review and Research Agenda for Practice. Computers & Security, 103352.
  • 2. Altaf, T., Wang, X., Ni, W., Yu, G., Liu, R.P., Braun, R. (2023). A new concatenated Multigraph Neural Network for IoT intrusion detection. Internet of Things, 100818.
  • 3. Cheval, V., Cortier, V., Debant, A. (2023). Election Verifiability with ProVerif. In: 2023 2023 IEEE 36th Computer Security Foundations Symposium (CSF)(CSF), pp. 488–503. IEEE Computer Society.
  • 4. Dina, A.S., Siddique, A., Manivannan, D. (2023). A deep learning approach for intrusion detection in Internet of Things using focal loss function. Internet of Things, 100699.
  • 5. Kamariotou, M., Kitsios, F. (2023). Information Systems Strategy and Security Policy: A Conceptual Framework. Electronics, 12(2), 382.
  • 6. Mishra, A., Alzoubi, Y.I., Anwar, M.J., Gill, A.Q. (2022). Attributes impacting cybersecurity policy development: An evidence from seven nations. Computers & Security, 120, 102820.
  • 7. Mishra, A., Jabar, T.S., Alzoubi, Y.I., Mishra, K.N. (2023). Enhancing privacy-preserving mechanisms in Cloud storage: A novel conceptual framework. Concurrency and Computation: Practice and Experience, 7831.
  • 8. Mishra, S. (2023). Exploring the Impact of AI-Based Cyber Security Financial Sector Management. Applied Sciences, 13(10), 5875.
  • 9. Saeed, S. (2023). Digital Workplaces and Information Security Behavior of Business Employees: An Empirical Study of Saudi Arabia. Sustainability, 15(7), 6019.
  • 10. Sarker, I.H., Furhad, M.H., Nowrozy, R. (2021). Ai-driven cybersecurity: an overview, security intelligence modeling and research directions. SN Computer Science, 2(3), 1–18.
  • 11. Steingartner, W., Galinec, D., Kozina, A. (2021). Threat Defense: Cyber Deception Approach and Education for Resilience in Hybrid Threats Model. Symmetry, 13(4).
  • 12. Steingartner, W., Možnik, D., Galinec, D. (2022). Disinformation Campaigns and Resilience in Hybrid Threats Conceptual Model. In: 2022 IEEE 16th International Scientific Conference on Informatics (Informatics), pp. 287–292. IEEE.
  • 13. Szymoniak, S. (2021). Amelia—A new security protocol for protection against false links. Computer Communications, 179, 73–81.
  • 14. Szymoniak, S., Kesar, S. (2023). Key Agreement and Authentication Protocols in the Internet of Things: A Survey. Applied Sciences, 13(1), 404.
  • 15. Szymoniak, S., Siedlecka-Lamch, O., Kurkowski, M. (2018). On some time aspects in security protocols analysis. In: Computer Networks: 25th International Conference, CN 2018, Gliwice, Poland, June 19-22, 2018, Proceedings 25, pp. 344–356. Springer.
  • 16. Szymoniak, S., Siedlecka-Lamch, O., Zbrzezny, A.M., Zbrzezny, A., Kurkowski, M. (2021). SAT and SMT-Based Verification of Security Protocols Including Time Aspects. Sensors, 21(9).
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-b1b053e4-aef1-4382-b738-6d6840dd2ca2
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.