

Need for Enhanced Standards in Information Security, Cryptography
Abstract
This paper attempts at bringing out the importance of
standards in information and cyber security. This paper explains the importance of standards in certain areas where control measures are missing, for example, security metrics, and what tools can be developed to assist this area. This paper proceeds to explain otheareas of concern which needs to be focused so that information cannot be compromised.
Keywords
References
Original paper –K. Anupama, “need for standards in information security,
cryptography”
William Stallings “Cryptography and Network Security, Principles and
Practices” Third Edition,pg 528-548,638-644.
Eric Maiwald “Fundamentals of Network Security”pg 128-132,143-169,
-254
Brijendra Singh, “Data Communications and Computer Networks”
Second Edition,,pg103-110
Network and Information Security Standards for E-Goverrnance
An Apprroach Paperr.Available: http://egovstandards.gov.in
Information Security Forum Available :
https://www.isfsecuritystandard.com/SOGP07/index.htm
Cyber security standards Available:
http://en.wikipedia.org/wiki/Cyber_security_standards#NERC
Corporate Information Security Working Group – Report of the best
practices and metrics teams – Nov 17, 2004 (Revised January 10, 2005)
Technical Report ISO/IEC TR 15446 Information technology- Security
techniques — Guide for the production of Protection Profiles and
Security Targets Reference No :ISO/IEC TR 15446:2009(E)
Common Criteria for Information Technology Security Evaluation Part 1:
Introduction and general model September 2006 Version 3.1 Revision
Pankaj Sharma (2004), ”Software Engineering”,pg88-91
Intelligence for the public services community Available:
www.kable.co.uk/isf-critical-national-infrastructure-threat-horizon-06oct
Continuity Forum Available :
http://www.continuityforum.org/content/news/press_release/139844/isfannounces-
-future-threat-scenarios-threat-horizon-2012-reportwise
GEEK : www.wisegeek.com
Strategy To Enhance International Supply Chain Security, July, 2007
Available:
http://www.dhs.gov/xlibrary/assets/plcy-internationalsupplychainsecurit
ystrategy.pdf
Network World Available
:http://www.networkworld.com/news/2010/092310-infosys-ceopeople-
trade-privacy.html
Ppt-on-Computer-Networking-and-Security Available:
http://www.scribd.com/doc/25966532/Ppt-on-Computer-Networking-an
d-Security
Refbacks
- There are currently no refbacks.

This work is licensed under a Creative Commons Attribution 3.0 License.