فصلنامه تخصصی فناوری اطلاعات و ارتباطات

نوع مقاله : مقاله پژوهشی

نویسنده

پژوهشکده علوم کامپیوتر، دانشگاه شهید باهنر، کرمان، ایران

چکیده

امروزه سیستم های اطلاعاتی به عنوان قطب پردازش داده و مدیریت دانش، در جوامع دیجیتالی نقش حیاتی و گسترده ای دارند. با توسعه روز افزون فناوری‌ها و افزایش حجم اطلاعات مرتبط با کاربران و سازمان‌ها، مساله امنیت سیستم های اطلاعاتی به یک چالش پیچیده و چند بعدی تبدیل شده است. در حوزه مدیریت امنیت در سیستم های اطلاعاتی ما نیازمند شناخت جامع انواع تهدیدات و چالش ها و ارائه رویکردها، سیاستها، رویه‌ها و منابعی که برای پیشگیری از شکافهای امنیتی مورد استفاده قرار می‌گیرند و همچنین محافظت سیستم از انواع حملات تاثیرگزار بر داده و اطلاعات، می باشیم. لازمة اتخاذ یک روش منسجم و هماهنگ برای دستیابی به فرآیندهای امنیت داده‌ها و سیستم‌ها، نیازمند درک پیچیدگی این مقوله و ارائه رویکردهای جامع مبتنی بر اصول بنیادین آن است. حفاظت از سیستم های اطلاعاتی در برابر دسترسی یا تغییر غیرمجاز به اطلاعات، اعم از ذخیره، پردازش یا انتقال، و در برابر انکار سرویس به کاربران مجاز، از جمله اقدامات لازم برای شناسایی، مستندسازی و مقابله با تهدیدات امنیتی در این حوزه است. بنا به اهمیت موضوع در این مقاله، به بررسی مشخصه ها سرویس ‌های امنیتی سیستم های اطلاعاتی در محیط شبکه های توزیعی، اهمیت آن‌ها و چالش‌های موجود می پردازیم و سیاست ها و رویه های موثر در جهت افزایش امنیت در این حوزه را بیان می نمائیم.

کلیدواژه‌ها

عنوان مقاله [English]

Security Threats, Challenges, Procedures and Policies in Information Systems

نویسنده [English]

  • mohammad Azadi

Institute of Computer science, Shahid bahonar University, Kerman, Iran

چکیده [English]

Nowadays, information systems as the hub of data processing and knowledge management play a vital and extensive role in digital societies. With the increasing development of technologies and the increase in the amount of information related to users and organizations, the security of information systems has become a complex and multi-dimensional challenge. In the field of security management in our information systems, we need a comprehensive understanding of all types of threats and challenges and providing approaches, policies, procedures and resources that are used to prevent security gaps, as well as protecting the system from all types of attacks affecting data and information. to be It is necessary to adopt a coherent and coordinated method to achieve the security processes of data and systems and it is necessary to understand the complexity of this category and provide comprehensive approaches based on its basic principles. Protection of information systems against unauthorized access or change to information, including storage, processing or transmission, and against denial of service to authorized users, is among the necessary measures to identify, document and deal with security threats in this area. According to the importance of the subject in this article, we will investigate the characteristics of security services of information systems in the environment of distributed networks, their importance and existing challenges and we will express effective policies and procedures to increase security in this area.

کلیدواژه‌ها [English]

  • Security
  • Privacy
  • Information System
[1] Hernes M, Rot A, Jelonek D, editors. Towards Industry 4.0: Current Challenges in Information Systems. Cham, Switzerland: Springer; 2020 Mar 10.
[2] Wolf W, White GB, Fisch EA, Crago SP, Pooch UW, McMahon JO, Yeung D, Nguyen H, Arakawa M, MacDonald T, Akgul BE. Computer system and network security. CRC press; 2017 Dec 14.
[3] Usmonov M. BASIC CONCEPTS OF INFORMATION SECURITY IN INFORMATION SYSTEMS. WIDE THREATS AND THEIR CONSEQUENCES. Scienceweb academic papers collection. 2021 Jan 1.
[4] Carroll JM. Computer security. Butterworth-Heinemann; 2014 May 20.
[5] Jouini M, Rabai LB, Aissa AB. Classification of security threats in information systems. Procedia Computer Science. 2014 Jan 1;32:489-96.
[6] Stallings W. Computer security principles and practice. 2015.
[7] Ruiz Ben E, Scholl M. The Concept of Usable Privacy and Information Security. InUsable Privacy and Security in Online Public Services 2023 Nov 4 (pp. 1-12). Cham: Springer Nature Switzerland.
[8] Awan JH, Memon S, Khan RA, Noonari AQ, Hussain Z, Usman M. Security strategies to overcome cyber measures, factors and barriers. Eng. Sci. Technol. Int. Res. J. 2017;1(1):51-8.
[9] Elmaghraby AS, Losavio MM. Cyber security challenges in Smart Cities: Safety, security and privacy. Journal of advanced research. 2014 Jul 1;5(4):491-7.
[10] Serpanos DN, Voyiatzis AG. Security challenges in embedded systems. ACM Transactions on embedded computing systems (TECS). 2013 Mar 29;12(1s):1-0.
[11] Levitin G, Hausken K, Taboada HA, Coit DW. Data survivability vs. security in information systems. Reliability Engineering & System Safety. 2012 Apr 1;100:19-27.
[12] Buccafurri F, Holzinger A, Kieseberg P, Tjoa M, Weippl E. Availability, Reliability, and Security in Information Systems. Springer International Publishing; 2016.
[13] Teufel S, Min T, You I, Weippl E. Availability, reliability, and security in information systems. Springer; 2014.
[14] Jürjens J, Rosado DG, Sánchez LE, Fernández-Medina E. Security in information systems: New challenges and opportunities.
[15] Chen F. An investigation and evaluation of risk assessment methods in Information systems.
[16] Rosado DG, Sánchez LE, Fernández-Medina E, Jürjens J. Security in Information Systems: New Challenges and Opportunities J. UCS Special Issue. Journal of Universal Computer Science. 2012 Jan 1;18(6):728-31.
[17] Hnatiienko H, Babenko T, Kovalova Y, Myrutenko L. Method of Early Detection of Information Security Anomalies and Incidents in Information Systems.
[18] Arogundade OT, Abayomi-Alli A, Misra S. An ontology-based security risk management model for information systems. Arabian Journal for Science and Engineering. 2020 Aug;45:6183-98.
[19] Gunduz MZ, Das R. Cyber-security on smart grid: Threats and potential solutions. Computer networks. 2020 Mar 14;169:107094.
[20] Berdik D, Otoum S, Schmidt N, Porter D, Jararweh Y. A survey on blockchain for information systems management and security. Information Processing & Management. 2021 Jan 1;58(1):102397.
[21] Vangala A, Das AK, Chamola V, Korotaev V, Rodrigues JJ. Security in IoT-enabled smart agriculture: Architecture, security solutions and challenges. Cluster Computing. 2023 Apr;26(2):879-902.
[22] Liang X, Kim Y. A survey on security attacks and solutions in the IoT network. In2021 IEEE 11th annual computing and communication workshop and conference (CCWC) 2021 Jan 27 (pp. 0853-0859). IEEE.
[23] Breda G, Kiss M. Overview of information security standards in the field of special protected industry 4.0 areas & industrial security. Procedia Manufacturing. 2020 Jan 1;46:580-90.