Securing an Information Systems from Threats: A Critical Review

Grace Samson, Mistura Usman

Research output: Contribution to journalArticle

Abstract

The technology behind information systems in today's world has been embedded in nearly every aspect of our lives. Thus, the idea of securing our information systems and/or computer networks has become very paramount. Owing to the significance of computer networks in transporting the information and knowledge generated by the increased diversity and sophistication of computational machinery, it would be very imperative to engage the services of network security professionals to manage the resources that are passed through the various terminals (end points) of the these network, so as to achieve a maximum reliability of the information passed, making sure that this is achieved without creating a discrepancy between the security and usability of such network. This paper examines the various techniques involved in securely maintaining the safe states of an active computer network, its resources and the information it carries. We examined techniques of compromising an information system by breaking into the system without authorised access (Hacking), we also looked at the various phases of digital analysis of an already compromised system, and then we investigated the tools and techniques for digitally analysing a compromised system in other to bring it back to a safe state.
LanguageEnglish
Pages425-434
Number of pages10
Journalinternational journal of Computer Applications Technology and Research
Volume4
Issue number6
DOIs
Publication statusPublished - Jun 2015
Externally publishedYes

Fingerprint

Computer networks
Information systems
Network security
Machinery

Cite this

@article{42084cb26aee49dba6c0f02020b83413,
title = "Securing an Information Systems from Threats: A Critical Review",
abstract = "The technology behind information systems in today's world has been embedded in nearly every aspect of our lives. Thus, the idea of securing our information systems and/or computer networks has become very paramount. Owing to the significance of computer networks in transporting the information and knowledge generated by the increased diversity and sophistication of computational machinery, it would be very imperative to engage the services of network security professionals to manage the resources that are passed through the various terminals (end points) of the these network, so as to achieve a maximum reliability of the information passed, making sure that this is achieved without creating a discrepancy between the security and usability of such network. This paper examines the various techniques involved in securely maintaining the safe states of an active computer network, its resources and the information it carries. We examined techniques of compromising an information system by breaking into the system without authorised access (Hacking), we also looked at the various phases of digital analysis of an already compromised system, and then we investigated the tools and techniques for digitally analysing a compromised system in other to bring it back to a safe state.",
keywords = "Computer Security, Hacking, Digital Analysis, Computer Networks, Risk and Vulnerability",
author = "Grace Samson and Mistura Usman",
year = "2015",
month = "6",
doi = "10.7753/IJCATR0406.1002",
language = "English",
volume = "4",
pages = "425--434",
journal = "international journal of Computer Applications Technology and Research",
number = "6",

}

Securing an Information Systems from Threats : A Critical Review. / Samson, Grace; Usman, Mistura.

In: international journal of Computer Applications Technology and Research, Vol. 4, No. 6, 06.2015, p. 425-434.

Research output: Contribution to journalArticle

TY - JOUR

T1 - Securing an Information Systems from Threats

T2 - international journal of Computer Applications Technology and Research

AU - Samson, Grace

AU - Usman, Mistura

PY - 2015/6

Y1 - 2015/6

N2 - The technology behind information systems in today's world has been embedded in nearly every aspect of our lives. Thus, the idea of securing our information systems and/or computer networks has become very paramount. Owing to the significance of computer networks in transporting the information and knowledge generated by the increased diversity and sophistication of computational machinery, it would be very imperative to engage the services of network security professionals to manage the resources that are passed through the various terminals (end points) of the these network, so as to achieve a maximum reliability of the information passed, making sure that this is achieved without creating a discrepancy between the security and usability of such network. This paper examines the various techniques involved in securely maintaining the safe states of an active computer network, its resources and the information it carries. We examined techniques of compromising an information system by breaking into the system without authorised access (Hacking), we also looked at the various phases of digital analysis of an already compromised system, and then we investigated the tools and techniques for digitally analysing a compromised system in other to bring it back to a safe state.

AB - The technology behind information systems in today's world has been embedded in nearly every aspect of our lives. Thus, the idea of securing our information systems and/or computer networks has become very paramount. Owing to the significance of computer networks in transporting the information and knowledge generated by the increased diversity and sophistication of computational machinery, it would be very imperative to engage the services of network security professionals to manage the resources that are passed through the various terminals (end points) of the these network, so as to achieve a maximum reliability of the information passed, making sure that this is achieved without creating a discrepancy between the security and usability of such network. This paper examines the various techniques involved in securely maintaining the safe states of an active computer network, its resources and the information it carries. We examined techniques of compromising an information system by breaking into the system without authorised access (Hacking), we also looked at the various phases of digital analysis of an already compromised system, and then we investigated the tools and techniques for digitally analysing a compromised system in other to bring it back to a safe state.

KW - Computer Security

KW - Hacking

KW - Digital Analysis

KW - Computer Networks

KW - Risk and Vulnerability

UR - http://ijcat.com/volume4/issue6

U2 - 10.7753/IJCATR0406.1002

DO - 10.7753/IJCATR0406.1002

M3 - Article

VL - 4

SP - 425

EP - 434

JO - international journal of Computer Applications Technology and Research

JF - international journal of Computer Applications Technology and Research

IS - 6

ER -