Communications of the ACM
Authentication: from passwords to public keys
Authentication: from passwords to public keys
``A piece of yourself'': Ethical issues in biometric identification
Ethics and Information Technology
The domino effect of password reuse
Communications of the ACM - Human-computer etiquette
Biometric Authentication for Web-Based Couse Examinations
HICSS '05 Proceedings of the Proceedings of the 38th Annual Hawaii International Conference on System Sciences - Volume 09
Biometric Systems: Technology, Design and Performance Evaluation
Biometric Systems: Technology, Design and Performance Evaluation
Information Security Illuminated
Information Security Illuminated
PassPoints: design and longitudinal evaluation of a graphical password system
International Journal of Human-Computer Studies - Special isssue: HCI research in privacy and security is critical now
Analysis of active intrusion prevention data for predicting hostile activity in computer networks
Communications of the ACM
Graphical dictionaries and the memorable space of graphical passwords
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
Security Engineering: A Guide to Building Dependable Distributed Systems
Security Engineering: A Guide to Building Dependable Distributed Systems
ARTIFICIAL IMMUNE SYSTEMS IN THE CONTEXT OF MISBEHAVIOR DETECTION
Cybernetics and Systems
Intrusion Prevention in Information Systems: Reactive and Proactive Responses
Journal of Management Information Systems
Automatic Fingerprint Recognition Systems
Automatic Fingerprint Recognition Systems
IEEE Transactions on Consumer Electronics
Securing Fingerprint Images Through PSO Based Robust Facial Watermarking
International Journal of Information Security and Privacy
Hi-index | 0.00 |
With the rapid growth of information systems and networks, security is a major concern of organizations. The main goals of information systems security are confidentially, integrity, and availability. The cornerstone of an organization's security lies in designing, developing and implementing proper information systems' security policy that balances security goals with the organization's needs. In this paper, the authors discuss the goals of information systems security and the techniques to achieve them. Specifically, the paper focuses on access control and the various authentication approaches, as well as intrusion detection and prevention systems. As attacks become more frequent and devastating, ongoing research is required to adapt and improve security technologies and policies to reflect new modes of attack to keep information systems secure.