Indian Journal of Science and Technology
Year: 2015, Volume: 8, Issue: 36, Pages: 1-6
A. V. Revnivykh and A. M. Fedotov
Background/Objectives: The article analyzes the information security from the standpoint of causes triggering the vulnerabilities of information technologies and systems. Methods/Statistical analysis: Information technologies are based on three interdependent components, namely, hardware, software and human resource (Figure 1). The susceptibility of final technologies to a number of threats challenging the information security takes roots in each of the abovementioned aspects both taken separately and in their complex combination. Findings: Data processing centers constitute a way to centralize the resources of the organizations’ information infrastructure. Implementing such centers increases the system reliability and information availability in the whole and reduces the loading of the data transmission network at the organization. Meanwhile, data processing centers are an expensive option, and not every company can afford it. In addition to it, efficient foundation and functioning of such centers require highly qualified personnel. Modern information systems suffer from security imperfections. The main cause of their vulnerabilities roots in their complexity connected to the fact that information systems consist of a number of interrelated components which are designed and produced separately by different working teams. With the development of the civilization, the complexity increases steadily, therefore there is a burning need in working out measures. Applications/Improvements: May be used as guidance in order to improve the quality of testing the components of information systems and their compatibility.
Keywords: Human Factor, Information Systems, Security, Vulnerabilities, Vulnerability Risks
Subscribe now for latest articles and news.