Abstract

Introduction:Any information which is generated and saved needs to be protected against accidental or intentional losses and manipulations if it is to be used by the intended users in due time. As such, information managers have adopted numerous measures to achieve data security within data storage systems, along with the spread of information technology.Background:The “data security models” presented thus far have unanimously highlighted the significance of data security management. For further clarification, the current study first introduces the “needs and improvement” cycle; the study will then present some independent definitions, together with a support umbrella, in an attempt to shed light on the data security management.Findings:Data security focuses on three features or attributes known as integrity, identity of sender(s) and identity of receiver(s). Management in data security follows an endless evolutionary process, to keep up with new developments in information technology and communication. In this process management develops new characteristics with greater capabilities to achieve better data security. The characteristics, continuously increasing in number, with a special focus on control, are as follows: private zone, confidentiality, availability, non-repudiation, possession, accountability, authenticity, authentication and auditability.Conclusion:Data security management steadily progresses, resulting in more sophisticated features. The developments are in line with new developments in information and communication technology and novel advances in intrusion detection systems (IDS). Attention to differences between data security and data security management by international organizations such as the International Standard Organization (ISO), and International Telecommunication Union (ITU) is necessary if information quality is to be enhanced.

Highlights

  • Any information which is generated and saved needs to be protected against accidental or intentional losses and manipulations if it is to be used by the intended users in due time

  • The developments are in line with new developments in information and communication technology and novel advances in intrusion detection systems (IDS)

  • Data security cannot be solely limited to information and communication technology (ICT) the technology has played a significant role in taking the information system to work places and commercial exchanges, resulting in the greater dependence of governments and other organizations on electronic information

Read more

Summary

Introduction

Any information which is generated and saved needs to be protected against accidental or intentional losses and manipulations if it is to be used by the intended users in due time. Saltzer and Schroeder (1975) referred to three types of invasion, from the perspectives of security specialists, known as (a) unauthorized information release (Confidentiality), (b) unauthorized information modification (Integrity) and (c) unauthorized denial of use (Availability) Before this era, data security was confined to military environments and was supported by the military men, but from 1980s computers entered the field of commerce. Commercial fields differed from military environments in numerous ways of which the most important were the costs incurred to achieve data security, lack of strict physical data support in commercial settings and attacks initiated by unprofessional users in such settings Such differences resulted in changes in priorities set up for data security in commercial settings [16, 17]

Results
Discussion
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call