Open Access Open Access  Restricted Access Subscription or Fee Access

Need for Enhanced Standards in Information Security, Cryptography

K. Anupama

Abstract


This paper attempts at bringing out the importance of
standards in information and cyber security. This paper explains the importance of standards in certain areas where control measures are missing, for example, security metrics, and what tools can be developed to assist this area. This paper proceeds to explain otheareas of concern which needs to be focused so that information cannot be compromised.


Keywords


Object Point Accuracy Levels, Profile Packages, Threat Horizon, Supply Chain Security

Full Text:

PDF

References


Original paper –K. Anupama, “need for standards in information security,

cryptography”

William Stallings “Cryptography and Network Security, Principles and

Practices” Third Edition,pg 528-548,638-644.

Eric Maiwald “Fundamentals of Network Security”pg 128-132,143-169,

-254

Brijendra Singh, “Data Communications and Computer Networks”

Second Edition,,pg103-110

Network and Information Security Standards for E-Goverrnance

An Apprroach Paperr.Available: http://egovstandards.gov.in

Information Security Forum Available :

https://www.isfsecuritystandard.com/SOGP07/index.htm

Cyber security standards Available:

http://en.wikipedia.org/wiki/Cyber_security_standards#NERC

Corporate Information Security Working Group – Report of the best

practices and metrics teams – Nov 17, 2004 (Revised January 10, 2005)

Technical Report ISO/IEC TR 15446 Information technology- Security

techniques — Guide for the production of Protection Profiles and

Security Targets Reference No :ISO/IEC TR 15446:2009(E)

Common Criteria for Information Technology Security Evaluation Part 1:

Introduction and general model September 2006 Version 3.1 Revision

Pankaj Sharma (2004), ”Software Engineering”,pg88-91

Intelligence for the public services community Available:

www.kable.co.uk/isf-critical-national-infrastructure-threat-horizon-06oct

Continuity Forum Available :

http://www.continuityforum.org/content/news/press_release/139844/isfannounces-

-future-threat-scenarios-threat-horizon-2012-reportwise

GEEK : www.wisegeek.com

Strategy To Enhance International Supply Chain Security, July, 2007

Available:

http://www.dhs.gov/xlibrary/assets/plcy-internationalsupplychainsecurit

ystrategy.pdf

Network World Available

:http://www.networkworld.com/news/2010/092310-infosys-ceopeople-

trade-privacy.html

Ppt-on-Computer-Networking-and-Security Available:

http://www.scribd.com/doc/25966532/Ppt-on-Computer-Networking-an

d-Security


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.