Skip to main content

Information and Data Security Model: Background, Risks, and Challenges

  • Conference paper
  • First Online:
Emerging Technologies in Data Mining and Information Security

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 164))

  • 654 Accesses

Abstract

Information security and data security are the processes that are mainly based on preventing information from unauthorized access or in other words to secure information and data corruption throughout its lifecycle be it the information that is stored as physical format such as files which are subject to thefts or vandalism, etc. Since the very beginning of communication, everyone understood it was important to have a mechanism to preserve the private information. In the nineteenth century, more complex systems were made to let the government manage the information effectively. During the First World War, multi-tier systems were introduced to communicate info from one place to another. This study shows the details of different models of information and data security and also the management of risk and different challenges is possessed by security and different threats and also the importance of security.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. B. Hauer, Data and Information leakage prevention within the scope of in- formation security. IEEE Access 3, 2554–2565 (2015). https://doi.org/10.1109/access.2015.2506185

    Article  Google Scholar 

  2. N. Smith, A history of first world war technology in 11 objects. Eng. Technol. 13(11), 34–37 (2018). https://doi.org/10.1049/et.2018.1102

    Article  Google Scholar 

  3. A. Arora, A. Kaur, B. Bhushan, H. Saini, Security concerns and future trends of internet of things, in 2019 2nd International Conference on Intelligent Computing, Instrumentation and Control Technologies (ICICICT). https://doi.org/10.1109/icicict46008.2019.8993222

  4. F.A. El-Moussa, N. Linge, M. Hope, Active router approach to defeating denial-of-service attacks in networks. IET Commun. 1(1),55 (2007). https://doi.org/10.1049/iet-com:20050441

  5. D. Bradbury, Fighting ID theft. Eng. Technol. 10(12), 60–63 (2015). https://doi.org/10.1049/et.2016.1207

    Article  Google Scholar 

  6. S.R. Chhetri, S. Faezi, M.A.A. Faruque, Information leakage-aware computer-aided cyber-physical manufacturing. IEEE Trans. Inf. Forensics Secur. 13(9), 2333–2344 (2018). https://doi.org/10.1109/tifs.2018.2818659

    Article  Google Scholar 

  7. S.L.L. Correa, M.P. Mexas, Implementation of the service center accord-ing to best practices recommended by ITIL (the case of HU-UFJF). IEEE Latin Am. Trans. 16(6), 1809–1816 (2018). https://doi.org/10.1109/tla.2018.8444403

    Article  Google Scholar 

  8. S. Ji, T. Chen, S. Zhong, Wormhole attack detection algorithms in wireless network coding systems. IEEE Trans. Mob. Comput. 14(3), 660–674 (2015). https://doi.org/10.1109/tmc.2014.2324572

    Article  Google Scholar 

  9. I. Natgunanathan, A. Mehmood, Y. Xiang, G. Beliakov, J. Year-wood, Protection of privacy in biometric data. IEEE Access 4, 880–892 (2016). https://doi.org/10.1109/access.2016.2535120

    Article  Google Scholar 

  10. T.P. Layton, Information Security. ISO/IEC17799 ISBN: 9780849370878 (2006)

    Google Scholar 

  11. M.A. Abbas, H. Song, J.-P. Hong, Secure wireless communications in broadcast channels with confidential messages. IEEE Access 7, 170525–170533 (2019). https://doi.org/10.1109/access.2019.2955603

    Article  Google Scholar 

  12. L. Lopriore, Password capabilities revisited. Comput. J. 58(4), 782–791 (2013). https://doi.org/10.1093/comjnl/bxt131

    Article  Google Scholar 

  13. A. John, “Spyware and Adware” the University of Calgary (Springer Science + Business Media, USA, 2011). ISBN: 978-0-387-77740-5

    Google Scholar 

  14. B. Bhushan, G. Sahoo, Recent advances in attacks, technical challenges, vulnerabilities and their countermeasures in wireless sensor networks. Wirel. Pers. Commun. 98(2), 2037–2077 (2017). https://doi.org/10.1007/s11277-017-4962-0

    Article  Google Scholar 

  15. M.P.D. Silva, R.M. De Barros, Maturity model of information security for software developers. IEEE Latin Am. Trans. 15(10), 1994–1999 (2017).https://doi.org/10.1109/tla.2017.8071246

  16. G. Kumar, R. Saha, M.K. Rai, T.-H. Kim, Multi-dimensional security provision for secure communication in vehicular ad hoc networks using hierarchical structure and end-to-end authentication. IEEE Access 6, 46558–46567 (2018). https://doi.org/10.1109/access.2018.2866759

    Article  Google Scholar 

  17. P. Sinha, A.K. Rai, B. Bhushan, Information security threats and attacks with conceivable counteraction, in 2019 2nd International Conference on Intelligent Computing, Instrumentation and Control Technologies (ICICICT), 2019. https://doi.org/10.1109/icicict46008.2019.8993384

  18. T. Varshney, N. Sharma, I. Kaushik, B. Bhushan, Architectural model of security threats and their countermeasures in IoT, in 2019 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS), 2019. https://doi.org/10.1109/icccis48478.2019.8974544

  19. M. Evans, Y. He, C. Luo, I. Yevseyeva, H. Janicke, E. Zamani, L.A. Maglaras, Real-time information security incident management: a case study using the IS-CHEC technique. IEEE Access 7, 142147–142175 (2019). https://doi.org/10.1109/access.2019.2944615

    Article  Google Scholar 

  20. H. Asgari, S. Haines, O. Rysavy, Identification of threats and security risk assessments for recursive internet architecture. IEEE Syst. J. 12(3), 2437–2448 (2018). https://doi.org/10.1109/jsyst.2017.2765178

    Article  Google Scholar 

  21. J. Knight, The importance of security cases: proof is good, but not enough. IEEE Secur. Priv. 13(4), 73–75 (2015). https://doi.org/10.1109/msp.2015.68

    Article  Google Scholar 

  22. X. Jing, Z. Yan, W. Pedrycz, Security data collection and da-ta analytics in the internet: a survey. IEEE Commun. Surv. Tutor. 21(1), 586–618 (2019). https://doi.org/10.1109/comst.2018.2863942

    Article  Google Scholar 

  23. A. Gauci, S. Michelin, M. Salles, Addressing the challenge of cyber security maintenance through patch management. CIRED Open Access Proc. J. 2017(1), 2599–2601 (2017). https://doi.org/10.1049/oap-cired.2017.0252

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Bhuvan Taneja .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Taneja, B., Bhushan, B. (2021). Information and Data Security Model: Background, Risks, and Challenges. In: Tavares, J.M.R.S., Chakrabarti, S., Bhattacharya, A., Ghatak, S. (eds) Emerging Technologies in Data Mining and Information Security. Lecture Notes in Networks and Systems, vol 164. Springer, Singapore. https://doi.org/10.1007/978-981-15-9774-9_78

Download citation

Publish with us

Policies and ethics