Abstract
Information security and data security are the processes that are mainly based on preventing information from unauthorized access or in other words to secure information and data corruption throughout its lifecycle be it the information that is stored as physical format such as files which are subject to thefts or vandalism, etc. Since the very beginning of communication, everyone understood it was important to have a mechanism to preserve the private information. In the nineteenth century, more complex systems were made to let the government manage the information effectively. During the First World War, multi-tier systems were introduced to communicate info from one place to another. This study shows the details of different models of information and data security and also the management of risk and different challenges is possessed by security and different threats and also the importance of security.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
B. Hauer, Data and Information leakage prevention within the scope of in- formation security. IEEE Access 3, 2554–2565 (2015). https://doi.org/10.1109/access.2015.2506185
N. Smith, A history of first world war technology in 11 objects. Eng. Technol. 13(11), 34–37 (2018). https://doi.org/10.1049/et.2018.1102
A. Arora, A. Kaur, B. Bhushan, H. Saini, Security concerns and future trends of internet of things, in 2019 2nd International Conference on Intelligent Computing, Instrumentation and Control Technologies (ICICICT). https://doi.org/10.1109/icicict46008.2019.8993222
F.A. El-Moussa, N. Linge, M. Hope, Active router approach to defeating denial-of-service attacks in networks. IET Commun. 1(1),55 (2007). https://doi.org/10.1049/iet-com:20050441
D. Bradbury, Fighting ID theft. Eng. Technol. 10(12), 60–63 (2015). https://doi.org/10.1049/et.2016.1207
S.R. Chhetri, S. Faezi, M.A.A. Faruque, Information leakage-aware computer-aided cyber-physical manufacturing. IEEE Trans. Inf. Forensics Secur. 13(9), 2333–2344 (2018). https://doi.org/10.1109/tifs.2018.2818659
S.L.L. Correa, M.P. Mexas, Implementation of the service center accord-ing to best practices recommended by ITIL (the case of HU-UFJF). IEEE Latin Am. Trans. 16(6), 1809–1816 (2018). https://doi.org/10.1109/tla.2018.8444403
S. Ji, T. Chen, S. Zhong, Wormhole attack detection algorithms in wireless network coding systems. IEEE Trans. Mob. Comput. 14(3), 660–674 (2015). https://doi.org/10.1109/tmc.2014.2324572
I. Natgunanathan, A. Mehmood, Y. Xiang, G. Beliakov, J. Year-wood, Protection of privacy in biometric data. IEEE Access 4, 880–892 (2016). https://doi.org/10.1109/access.2016.2535120
T.P. Layton, Information Security. ISO/IEC17799 ISBN: 9780849370878 (2006)
M.A. Abbas, H. Song, J.-P. Hong, Secure wireless communications in broadcast channels with confidential messages. IEEE Access 7, 170525–170533 (2019). https://doi.org/10.1109/access.2019.2955603
L. Lopriore, Password capabilities revisited. Comput. J. 58(4), 782–791 (2013). https://doi.org/10.1093/comjnl/bxt131
A. John, “Spyware and Adware” the University of Calgary (Springer Science + Business Media, USA, 2011). ISBN: 978-0-387-77740-5
B. Bhushan, G. Sahoo, Recent advances in attacks, technical challenges, vulnerabilities and their countermeasures in wireless sensor networks. Wirel. Pers. Commun. 98(2), 2037–2077 (2017). https://doi.org/10.1007/s11277-017-4962-0
M.P.D. Silva, R.M. De Barros, Maturity model of information security for software developers. IEEE Latin Am. Trans. 15(10), 1994–1999 (2017).https://doi.org/10.1109/tla.2017.8071246
G. Kumar, R. Saha, M.K. Rai, T.-H. Kim, Multi-dimensional security provision for secure communication in vehicular ad hoc networks using hierarchical structure and end-to-end authentication. IEEE Access 6, 46558–46567 (2018). https://doi.org/10.1109/access.2018.2866759
P. Sinha, A.K. Rai, B. Bhushan, Information security threats and attacks with conceivable counteraction, in 2019 2nd International Conference on Intelligent Computing, Instrumentation and Control Technologies (ICICICT), 2019. https://doi.org/10.1109/icicict46008.2019.8993384
T. Varshney, N. Sharma, I. Kaushik, B. Bhushan, Architectural model of security threats and their countermeasures in IoT, in 2019 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS), 2019. https://doi.org/10.1109/icccis48478.2019.8974544
M. Evans, Y. He, C. Luo, I. Yevseyeva, H. Janicke, E. Zamani, L.A. Maglaras, Real-time information security incident management: a case study using the IS-CHEC technique. IEEE Access 7, 142147–142175 (2019). https://doi.org/10.1109/access.2019.2944615
H. Asgari, S. Haines, O. Rysavy, Identification of threats and security risk assessments for recursive internet architecture. IEEE Syst. J. 12(3), 2437–2448 (2018). https://doi.org/10.1109/jsyst.2017.2765178
J. Knight, The importance of security cases: proof is good, but not enough. IEEE Secur. Priv. 13(4), 73–75 (2015). https://doi.org/10.1109/msp.2015.68
X. Jing, Z. Yan, W. Pedrycz, Security data collection and da-ta analytics in the internet: a survey. IEEE Commun. Surv. Tutor. 21(1), 586–618 (2019). https://doi.org/10.1109/comst.2018.2863942
A. Gauci, S. Michelin, M. Salles, Addressing the challenge of cyber security maintenance through patch management. CIRED Open Access Proc. J. 2017(1), 2599–2601 (2017). https://doi.org/10.1049/oap-cired.2017.0252
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Taneja, B., Bhushan, B. (2021). Information and Data Security Model: Background, Risks, and Challenges. In: Tavares, J.M.R.S., Chakrabarti, S., Bhattacharya, A., Ghatak, S. (eds) Emerging Technologies in Data Mining and Information Security. Lecture Notes in Networks and Systems, vol 164. Springer, Singapore. https://doi.org/10.1007/978-981-15-9774-9_78
Download citation
DOI: https://doi.org/10.1007/978-981-15-9774-9_78
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-9773-2
Online ISBN: 978-981-15-9774-9
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)