Derleme
BibTex RIS Kaynak Göster

IT Security Trends for E-government Threats

Yıl 2019, Cilt: 3 Sayı: 2, 105 - 110, 23.12.2019

Öz

Information Security is the
implementation of measures and systems designed to safeguard information using
various systems and algorithms on different attributes and behaviors of data
and information. Although many security products, projects and solutions have
been developed to ensure confidentiality, integrity and availability of the
information and systems in the e-government environment, there occurs many
errors and control weaknesses in applications that new threats began to exploit.
Because many other security problems have appeared in these applications, sometimes
inappropriate or insufficient measures caused a waste of resources, time and
money for e-services provided by local and central government organizations. Security
trends have to keep up with the threats that always tend to use new methods
according to latest innovative technology of both software and hardware. The
content of this paper is consisting of some IT Security trends for e-government
environment. We try to seek how security trends evolve over time according to
new threats and innovative technology.

Kaynakça

  • [1] Salah-ddine Krit and Elbachir Haimoud, ”Review on the IT security: Attack and defense”, IEEE, 2016
  • [2] Temiz Semanur, Yilmaz Bülent, “Awareness of Information Security in Information Centers: Sample of Academic Libraries in Ankara”, 2013
  • [3] Richardson R.,”CSI Computer Crime and Security Survey” 2008, http://www.kwell.net/doc/FBI2008.pdf
  • [4] Spiekermann S., Lorrie Faith Cranor, ”Engineering Privacy,” IEEE Transactions on Software Engineering, pp. 67-82, 2009
  • [5] Microsoft Security Lifecycle (SDL) Version 3.2
  • [6] Software Assurance Maturity Model, “A Guide to Building Security into Software Development Version. 1.0”,
  • [7] IBM Internet Security Systems, X-Force 2008 Trend and Risk Report, January 2009
  • [8] Christos G. Panayiotou, Georgios Ellinas, Elias Kyriakides, Marios M. Polycarpou, “Critical Information Infrastructures Security”, 9th International Conference, CRITIS 2014, Limassol, Cyprus, October 13-15, 2014.
  • [9] Igure V., Laughter S., Williams R., “Security Issues in SCADA Networks”, Computer and Security, p496-506, Elsevier, 2009
  • [10] Madhavi Dhingra, Manisha Jain, Rakesh Singh Jadon, ”Role of Artifical Intelligence in Enterprise Information Security: A Review ”, IEEE, 2016
  • [11] Organisation for Economic Co-operation and Development, Public Management Service, PUMA 16/ANN/Rev1 (2001). “E-Government: analysis framework and methodology” http://search.oecd.org/officialdocuments/publicdisplaydocumentpdf/?cote=PUMA(2001)16/ANN/REV1&docLanguage=En (Link at 21-October-2017)
  • [12] Brian M. Bowen, Ramaswamy Devarajan, Salvatore Stolf (2012). “Measuring the Human Factor of Cyber Security”. Homeland Security Affairs, Supplement 5, article 2.http://academiccommons.columbia.edu/catalog/ac%3A142664
  • [13] http://www.information-age.com/uber-hack-affects-2-7m-uk-customers-123469804/
Yıl 2019, Cilt: 3 Sayı: 2, 105 - 110, 23.12.2019

Öz

Kaynakça

  • [1] Salah-ddine Krit and Elbachir Haimoud, ”Review on the IT security: Attack and defense”, IEEE, 2016
  • [2] Temiz Semanur, Yilmaz Bülent, “Awareness of Information Security in Information Centers: Sample of Academic Libraries in Ankara”, 2013
  • [3] Richardson R.,”CSI Computer Crime and Security Survey” 2008, http://www.kwell.net/doc/FBI2008.pdf
  • [4] Spiekermann S., Lorrie Faith Cranor, ”Engineering Privacy,” IEEE Transactions on Software Engineering, pp. 67-82, 2009
  • [5] Microsoft Security Lifecycle (SDL) Version 3.2
  • [6] Software Assurance Maturity Model, “A Guide to Building Security into Software Development Version. 1.0”,
  • [7] IBM Internet Security Systems, X-Force 2008 Trend and Risk Report, January 2009
  • [8] Christos G. Panayiotou, Georgios Ellinas, Elias Kyriakides, Marios M. Polycarpou, “Critical Information Infrastructures Security”, 9th International Conference, CRITIS 2014, Limassol, Cyprus, October 13-15, 2014.
  • [9] Igure V., Laughter S., Williams R., “Security Issues in SCADA Networks”, Computer and Security, p496-506, Elsevier, 2009
  • [10] Madhavi Dhingra, Manisha Jain, Rakesh Singh Jadon, ”Role of Artifical Intelligence in Enterprise Information Security: A Review ”, IEEE, 2016
  • [11] Organisation for Economic Co-operation and Development, Public Management Service, PUMA 16/ANN/Rev1 (2001). “E-Government: analysis framework and methodology” http://search.oecd.org/officialdocuments/publicdisplaydocumentpdf/?cote=PUMA(2001)16/ANN/REV1&docLanguage=En (Link at 21-October-2017)
  • [12] Brian M. Bowen, Ramaswamy Devarajan, Salvatore Stolf (2012). “Measuring the Human Factor of Cyber Security”. Homeland Security Affairs, Supplement 5, article 2.http://academiccommons.columbia.edu/catalog/ac%3A142664
  • [13] http://www.information-age.com/uber-hack-affects-2-7m-uk-customers-123469804/
Toplam 13 adet kaynakça vardır.

Ayrıntılar

Birincil Dil İngilizce
Konular Mühendislik
Bölüm Makaleler
Yazarlar

Ahmet Efe

Hasan Kazdal Bu kişi benim

Yayımlanma Tarihi 23 Aralık 2019
Gönderilme Tarihi 7 Mart 2018
Yayımlandığı Sayı Yıl 2019 Cilt: 3 Sayı: 2

Kaynak Göster

IEEE A. Efe ve H. Kazdal, “IT Security Trends for E-government Threats”, IJMSIT, c. 3, sy. 2, ss. 105–110, 2019.