Cargando…

Reasons in Support of Data Security and Data Security Management as Two Independent Concepts: A New Model

INTRODUCTION: Any information which is generated and saved needs to be protected against accidental or intentional losses and manipulations if it is to be used by the intended users in due time. As such, information managers have adopted numerous measures to achieve data security within data storage...

Descripción completa

Detalles Bibliográficos
Autores principales: Moghaddasi, Hamid, Sajjadi, Samad, Kamkarhaghighi, Mehran
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Bentham Open 2016
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5090776/
https://www.ncbi.nlm.nih.gov/pubmed/27857823
http://dx.doi.org/10.2174/1874431101610010004
_version_ 1782464447806177280
author Moghaddasi, Hamid
Sajjadi, Samad
Kamkarhaghighi, Mehran
author_facet Moghaddasi, Hamid
Sajjadi, Samad
Kamkarhaghighi, Mehran
author_sort Moghaddasi, Hamid
collection PubMed
description INTRODUCTION: Any information which is generated and saved needs to be protected against accidental or intentional losses and manipulations if it is to be used by the intended users in due time. As such, information managers have adopted numerous measures to achieve data security within data storage systems, along with the spread of information technology. BACKGROUND: The “data security models” presented thus far have unanimously highlighted the significance of data security management. For further clarification, the current study first introduces the “needs and improvement” cycle; the study will then present some independent definitions, together with a support umbrella, in an attempt to shed light on the data security management. FINDINGS: Data security focuses on three features or attributes known as integrity, identity of sender(s) and identity of receiver(s). Management in data security follows an endless evolutionary process, to keep up with new developments in information technology and communication. In this process management develops new characteristics with greater capabilities to achieve better data security. The characteristics, continuously increasing in number, with a special focus on control, are as follows: private zone, confidentiality, availability, non-repudiation, possession, accountability, authenticity, authentication and auditability. CONCLUSION: Data security management steadily progresses, resulting in more sophisticated features. The developments are in line with new developments in information and communication technology and novel advances in intrusion detection systems (IDS). Attention to differences between data security and data security management by international organizations such as the International Standard Organization (ISO), and International Telecommunication Union (ITU) is necessary if information quality is to be enhanced.
format Online
Article
Text
id pubmed-5090776
institution National Center for Biotechnology Information
language English
publishDate 2016
publisher Bentham Open
record_format MEDLINE/PubMed
spelling pubmed-50907762016-11-17 Reasons in Support of Data Security and Data Security Management as Two Independent Concepts: A New Model Moghaddasi, Hamid Sajjadi, Samad Kamkarhaghighi, Mehran Open Med Inform J Article INTRODUCTION: Any information which is generated and saved needs to be protected against accidental or intentional losses and manipulations if it is to be used by the intended users in due time. As such, information managers have adopted numerous measures to achieve data security within data storage systems, along with the spread of information technology. BACKGROUND: The “data security models” presented thus far have unanimously highlighted the significance of data security management. For further clarification, the current study first introduces the “needs and improvement” cycle; the study will then present some independent definitions, together with a support umbrella, in an attempt to shed light on the data security management. FINDINGS: Data security focuses on three features or attributes known as integrity, identity of sender(s) and identity of receiver(s). Management in data security follows an endless evolutionary process, to keep up with new developments in information technology and communication. In this process management develops new characteristics with greater capabilities to achieve better data security. The characteristics, continuously increasing in number, with a special focus on control, are as follows: private zone, confidentiality, availability, non-repudiation, possession, accountability, authenticity, authentication and auditability. CONCLUSION: Data security management steadily progresses, resulting in more sophisticated features. The developments are in line with new developments in information and communication technology and novel advances in intrusion detection systems (IDS). Attention to differences between data security and data security management by international organizations such as the International Standard Organization (ISO), and International Telecommunication Union (ITU) is necessary if information quality is to be enhanced. Bentham Open 2016-10-28 /pmc/articles/PMC5090776/ /pubmed/27857823 http://dx.doi.org/10.2174/1874431101610010004 Text en © Moghaddasi et al.; Licensee Bentham Open https://creativecommons.org/licenses/by/4.0/legalcode This is an open access article licensed under the terms of the Creative Commons Attribution-Non-Commercial 4.0 International Public License (CC BY-NC 4.0) (https://creativecommons.org/licenses/by-nc/4.0/legalcode), which permits unrestricted, non-commercial use, distribution and reproduction in any medium, provided the work is properly cited.
spellingShingle Article
Moghaddasi, Hamid
Sajjadi, Samad
Kamkarhaghighi, Mehran
Reasons in Support of Data Security and Data Security Management as Two Independent Concepts: A New Model
title Reasons in Support of Data Security and Data Security Management as Two Independent Concepts: A New Model
title_full Reasons in Support of Data Security and Data Security Management as Two Independent Concepts: A New Model
title_fullStr Reasons in Support of Data Security and Data Security Management as Two Independent Concepts: A New Model
title_full_unstemmed Reasons in Support of Data Security and Data Security Management as Two Independent Concepts: A New Model
title_short Reasons in Support of Data Security and Data Security Management as Two Independent Concepts: A New Model
title_sort reasons in support of data security and data security management as two independent concepts: a new model
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5090776/
https://www.ncbi.nlm.nih.gov/pubmed/27857823
http://dx.doi.org/10.2174/1874431101610010004
work_keys_str_mv AT moghaddasihamid reasonsinsupportofdatasecurityanddatasecuritymanagementastwoindependentconceptsanewmodel
AT sajjadisamad reasonsinsupportofdatasecurityanddatasecuritymanagementastwoindependentconceptsanewmodel
AT kamkarhaghighimehran reasonsinsupportofdatasecurityanddatasecuritymanagementastwoindependentconceptsanewmodel