IJISC
  • Indexed in

  • Latest News

    December 29, 2018
    Volume 7, Issue 2 of the International Journal of Information Security and Cybercrime was published
    June 29, 2018
    Volume 7, Issue 1 of the International Journal of Information Security and Cybercrime was published
    December 29, 2017
    Volume 6, Issue 2 of IJISC – International Journal of Information Security and Cybercrime was published
    December 4, 2017
    IJISC has been successfully evaluated for the ICI Journals Master List 2016 and received the ICV of 85.83 points
  • --- More News ---
  • Popular Articles

  • The Influence of Vulnerabilities on the Information Systems and Methods of Prevention


    Author(s): POPESCU, Irina

    Quick view | Full article | Citations | Views: 102


    Author(s) keywords: , ,


    Reference keywords: ,


    Abstract:

    Due to the constant increase of information in different areas and the evolving of applications and equipment, the number of vulnerabilities the systems encounter also rises exponentially. The information systems are known as an important part of every organization. As a result, they have to be secure and reliable to the users. There are ways for unauthorized people to access sensitive information. In this paper will discuss about the types of possible vulnerabilities and how they influence the security of information system. Also, methods to prevent attack due to the vulnerabilities will be presented.



    References:

    [1]. O.H. Alhazmi, Y.K. Malaiya, I. Ray, Measuring, analyzing and predicting security vulnerabilities in software systems, Computers & Security, 26, 3, Elsevier, 2006.

    [2]. Philip S. Anton, Robert H. Anderson, Richard Mesic, Michael Scheiern, Finding and Fixing Vulnerabilities in Information Systems, The Vulnerability Assessment and Mitigation Methodology, Rand Corporation, 2004.

    [3]. Ioan-Cosmin MIHAI, Security of the computer system, course notes.

    [4]. Information technology - Security techniques - Information security management systems - Requirements, ISO/IEC 27001:2013 (E), [Online], Available: https://trofisecurity.com/assets/img/iso27001-2013.pdf

    [5]. ISO/IEC 27002, [Online], Available: https://en.wikipedia.org/wiki/ISO/IEC_27002

    [6]. Information security, [Online], Available: https://en.wikipedia.org/wiki/Information_security

    [7]. Vulnerability (computing) [Online], Available: https://en.wikipedia.org/wiki/Vulnerability_(computing)

    [8]. Risk management, [Online], Available: https://en.wikipedia.org/wiki/Risk_management



    Additional Information

    Article Title: The Influence of Vulnerabilities on the Information Systems and Methods of Prevention
    Author(s): POPESCU, Irina
    Date of Publication: 2018-12-29
    Publication: International Journal of Information Security and Cybercrime
    ISSN: 2285-9225 e-ISSN: 2286-0096
    Digital Object Identifier: 10.19107/IJISC.2018.02.03
    Issue: Volume 7, Issue 2, Year 2018
    Section: Studies and Analysis of Cybercrime Phenomenon
    Page Range: 25-32 (8 pages)



    Copyright

    Copyright ©2012-2019 IJISC - International Journal of Information Security and Cybercrime

    All rights reserved: International Journal of Information Security and Cybercrime is a trademark of RAISA - Romanian Association for Information Security Assurance.
    No part of this publication may be reproduced, stored in a retrieval system, photocopied, recorded or archived, without the written permission from RAISA. When authors submit their papers for publication, they agree that the copyright for their article be transferred to Romanian Association for Information Security Assurance, if the articles are accepted for publication. The copyright covers the exclusive rights to reproduce and distribute the article, including reprints and translations.