ANALYSIS OF POTENTIAL THREATS OF INFORMATION SYSTEMS AND COUNTERMEASURES
Abstract
The article presents results of an analysis of threats to safety of information in enterprises. How information is protected against publication, modification or being erased was also taken into account. The objective of the analysis is to raise awareness of value of information and the role of security in an IT system.
Keywords
Full Text:
PDFReferences
Forystek M., Audyt informatyczny, InfoAudit, Warszawa 2005.
Rozporządzenie Ministra Finansów z dnia 4 września 2015 r. w sprawie audytu wewnętrznego oraz informacji o pracy i wynikach tego audytu, Dz. U. 2015, poz. 1480.
Ustawa z dnia 30 czerwca 2005 o finansach publicznych, Dz.U. nr 249, poz. 2104, z późn. zm.
Common Criteria for Information Technology Security Evaluation Part 3: Security assurance components, Version 3.1, Revision 4, CCMB-2012-09-003, 2012.
Liderman K., Patkowski A. E., Metodyka LP-A – dziesięć lat później, "Przegląd Teleinformatyczny", (2013)/2, pp. 65-80.
http://www.ensi.net/bcp/metodyka.html
APMG International Cyber Security & Resilience: https://apmg-cyber.com/products/cobit5
Social-Engineer Newsletter, vol. 07 - https://www.social-engineer.org/newsletter/social-engineer-newsletter-vol-07-issue-97/
Soni N., Database Security: Threats and Security Techniques, "International Journal of Advanced Research in Computer Science and Software Engineering", 5 (2015)/5, pp. 621-624 - http://ijarcsse.com/Before_August_2017/docs/papers/Volume_5/5_May2015/V5I4-0780.pdf
Garcia-Alfaro J., Navarro-Arribas G., Hartenstein H., Herrera-Joancomartí J., Data Privacy Management, Cryptocurrencies and Blockchain Technology, ESORICS, Springer 2017.
Ben-Natan R., HOW TO Secure and Audit Oracle 10g and 11g?, Auerbach Publications, 2009.
Kulkarni S., Urolagin S., Review of Attacks on Databases and Database Security Techniques, "International Journal of Emerging Technology and Advanced Engineering", 2 (2012)/11, pp. 253-263 - http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.414.1729&rep=rep1&type=pdf
Clarke J., SQL Injection Attacks and Defense, Second Edition, 2012.
Oracle Database Online Documentation, 10g Release 2 (10.2) / Administration, Database Security Guide - https://docs.oracle.com/cd/B19306_01/network.102/b14266/authmeth.htm#i1007525
Yadav A., Shah R., Review on Database Access Control Mechanisms and Models, "International Journal of Computer Applications", 120 (2015)/18, pp. 21-24.
Basharat I., Azam F., Muzaffar A. W., Database Security and Encryption: A Survey Study, "International Journal of Computer Applications", 47 (2012)/12, pp. 28-34 - http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.258.8172&rep=rep1&type=pdf
An Oracle White Paper Oracle Label Security with Oracle Database 11g Release 2, 2009.
Refbacks
- There are currently no refbacks.