StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Security of Information Systems - Essay Example

Cite this document
Summary
The paper "Security of Information Systems" tells us about the protection of information systems against unauthorized access to or modification of information, whether in storage, processing, or transit, and against the denial of service to authorized users…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER97.6% of users find it useful
Security of Information Systems
Read Text Preview

Extract of sample "Security of Information Systems"

Page Running Head: A research proposal on the formal verification and security Table of Contents ment of the problem 3 Purpose of the study 3 Objectives of the study 4 Significance of the Study 4 Literature review 5 Future research 5 Analysis of the study/ stages of the study 6 Abstract With the growth of distributed applications and internet, security requirements are becoming inherent to the software development process. Every time a person communicates with another, relevant security risks should be taken into account since it is more likely to take place. Security of information systems has greatly emerged as an important issue since most companies in the world depend on these systems. David (2004), states that a mistake in the security of an information technology may result to disastrous effects. It is therefore important that the chances of mistake occurrences are reduced at the beginning of a design process. The study will therefore focus on establishing various formal verification and security methods. The methods are expected to play a crucial role in the minimization of computer crimes and information wars. Background to the study Formal verification and security are of great importance in the growth of hard ware and software systems. In the past years, there has been a tremendous progress in both the speed and capacity of constraint technology. In the 19th century the percentage of computer crimes and information war were very low. This was greatly attributed to lack of industrialization hence low technology advancement. However, in the 21st century, technology has drastically emerged amongst many societies in the world. Brake and Johnson (2001), states that technology has greatly advanced leading to computerization of various homestead and commercial based systems such as mobile phones, washing machine, automated teller machines among others. The increase in technology has led to emergence of various computer crimes and information wars hence the need for formal verification and security methods. Original methods and approaches are now being developed in order to protect the systems involved against attackers, to identify the attackers and to collect sensitive information so as to eliminate the threats. Statement of the problem In the past, security protocols were designed and verified through informal techniques. The absence of formal verification led to security errors remaining undetected. Recently, emergence and presence of formal verification techniques have led to provision of a systematic way of discovering protocol flaws. Purpose of the study Due to the increase in computer crimes, information wars and computer intrusions, the study purports to establish effective formal verification and security methods. The methods are expected to reduce computer crime rates in the world. The study also focuses on exploring possible applications of information technology so as to strengthen the society’s security. The study is also expected to add to the knowledge of formal verification and security which is under the discipline of computer science. Objectives of the study 1. To determine the causes of computer crime in the communication and telecommunication industry 2. To establish various formal verification and security methods that can be used to curb computer crime in the world. 3. To provide a basic coherent theory for understanding in a unified framework the thousands of concepts, ideas, reasoning tools and methods on formal verification and program analysis. Hypotheses of the study H1: There will be no significant difference between the various causes of computer crime in different communication and telecommunication industry. H2: There will be no significant difference between various formal verification and security methods in different communication and telecommunication industry. Significance of the Study The study will play a role in the reduction of computer crime, computer intrusion as well as the information wars currently available in the world; hence increase the security level in the hardware and software of computers. In addition, the study will add to the knowledge of formal verification and security as well as provide a bases on which more studies will be carried out. A complex approach as a result of the study will continuously be developed and used in the design, installation, implementation and maintenance of secure information technology for objects, individuals, government, institutions and business companies. Literature review Formal verification and security are the most trustful type of validation for security. In other words, formal verification involves production of machine checkable proofs of mathematical systems. Shertliff (2006), defines formal verification as the application of mathematical techniques to ensure that a design is conventional to some precisely expressed notion of functional correctness. In most cases, formal verification is used for systems such as combinational circuits, cryptographic protocols, digital circuits with internal memory and software expressed as source code. According to a study carried out by Thomas in Oxford University, computer crime rates are high in e-learning and e-commerce, he therefore suggested a number of methods to overcome the problem. Despite the common problem of hacking in computers, Thomas suggested e-porting as a means to overcome it. In addition, Marylyn (2009), indicates that formal verification and security methods ensure appropriate security in computer systems. They also act as an alternative approach that is normally used both to look out for inputs sequences that go against the properties, and show that the properties always hold in even when stimuli does not exist. Future research Further work should be done in order to fill in the gap between formal analysis and specification of security requirements. The research study should also be explored by use of various techniques and also by use of a different subject group. Future research should also be carried out in the relevant area to determine the design and code of the verification system. Analysis of the study/ stages of the study 1. Research the obvious attacks on the security information systems and design appropriate countermeasures in the area of applied cryptography. 2. Propose, implement and verify techniques and methods applicable for security enhancement. 3. Specify, design and evaluate prototypes of application oriented architectures, protocols of computer networks and interconnection networks. 4. Design, investigate and specify grammatical and statistical models in order to use the models for detection. 5. Simulate, develop, verify and implement application specific circuit architectures 6. Propose and explore various tools and methods for formal verification and simulation that will detect a wide spectrum of design flaws and vulnerable areas in secure applications. References Brake, G. E., & Johnson, B. W. (2001) Technology advancement in the world. UK: McMillan Publishers Kemmerer, R. A. (1996). Computer insecurity in Verification Assessment Study. Oxford: Oxford University Press. Marylyn, G. A. “Security in Computer systems.” Journal of Computer science 22(2), 34- 40. Shertliff, W. B. (2006). Formal Verification in Computer systems. England: Avil Press Read More
Tags
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Research proposal Essay Example | Topics and Well Written Essays - 1000 words - 5”, n.d.)
Research proposal Essay Example | Topics and Well Written Essays - 1000 words - 5. Retrieved from https://studentshare.org/miscellaneous/1559218-research-proposal
(Research Proposal Essay Example | Topics and Well Written Essays - 1000 Words - 5)
Research Proposal Essay Example | Topics and Well Written Essays - 1000 Words - 5. https://studentshare.org/miscellaneous/1559218-research-proposal.
“Research Proposal Essay Example | Topics and Well Written Essays - 1000 Words - 5”, n.d. https://studentshare.org/miscellaneous/1559218-research-proposal.
  • Cited: 0 times

CHECK THESE SAMPLES OF Security of Information Systems

Detection of Attacks Executed by Multiple Users

Online systems are very important in the process of risks reduction.... The given scheme shows the main advantages in finding out fraudulent users, recovering challenging errors in the systems, and reducing attacks related to normal products, sites etc.... The main task of the modern researchers in this field is to apply advanced artificial intelligence and complex adaptive systems to stop, foresee and prevent distributed attacks of the network....
3 Pages (750 words) Dissertation

Applying a Cyber Policy to Law

From the paper "Applying a Cyber Policy to Law" it is clear that with huge respect to the Security of Information Systems of organizations, it is a fact that Cyber Law is playing a crucial part in ensuring a reduction of cyber-attacks in organizations.... Both the state and federal laws aim at improving the Security of Information Systems of organization.... Conclusion With respect to the Security of Information Systems of organization, it is a fact that the Cyber Law is playing a crucial part in ensuring a reduction of cyber-attacks in organizations....
6 Pages (1500 words) Essay

Why Information Assurance (IA) is Important to our Organization

?? An increasingly popular approach for ensuring information assurance is the Common Criteria & Methodology for Information Technology Security Evaluation, an international effort to standardize criteria for evaluating the Security of Information Systems outlined in the ISO 15408 standard.... ccording to Tulloch (2003), Information assurance is the process of protecting and defending information systems and infrastructures against attack.... Information assurance in general focuses on five elements of information security and they are authentication, availability, confidentiality, integrity and non-repudiation....
5 Pages (1250 words) Essay

Definition of security in info. sys

Increased interconnectivity amongst various information systems has raised new issues and threats for the Security of Information Systems.... This is called as security of information system.... With the advancement of Information technology, more corporations in the world today employ information systems to perform basic functions such as input, processing, storage and output of data to convert it into useful information.... The core components of such information systems....
2 Pages (500 words) Essay

Mergers and Acquisitions

Thus, the appropriate IT measures must be framed to secure the Security of Information Systems of the product organization formed (Howson, 2003).... information systems-merging process involves the integration of different information systems.... Different businesses have different information systems of varied nature that must be reviewed.... The author of the paper states that financial reporting systems-the financial positions give the value of the company at any given time....
1 Pages (250 words) Assignment

The Role of Information Security Policy

Attending security seminars is essential in acquiring of knowhow and other critical tips that could be of help in managing the Security of Information Systems.... The security policy of an organization relates to the different levels of information systems security depending on the type of information handled.... information systems security policies are the central repository that protects the assets of an organization by addressing threats....
4 Pages (1000 words) Essay

Policies and Procedures for Washington Posts Information System

s the Organization for Economic Co-operation and Development (OECD) emphasized in their Guidelines for the Security and Information Systems, the nature, volume and sensitivity of information that is exchanged has expanded substantially (Guidelines for the Security of Information Systems and Networks: Towards a Culture of Security, 2002).... he Pervasive Principles are founded on the Guidelines for Security of Information Systems, developed by the Information Computer and Communications Policy (ICCP) Committee and endorsed and published by the Organization for Economic Cooperation and Development (OECD)....
7 Pages (1750 words) Case Study

Information Technology Auditing and Assurance

he Need for Accomplishing the Security of Information Systems ... hreats and Methods of Accomplishing the Security of Information Systems ... The ultimate goal of information systems Security (ISS) is to try and protect our information systems and information from these attacks. ... This report "Information Technology Auditing and Assurance" discusses the system development life cycle which is also commonly referred to as the Software development process as a term that is frequently used in software engineering, systems engineering, and information systems....
8 Pages (2000 words) Report
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us