Claim Missing Document
Check
Articles

Found 7 Documents
Search

A Comprehensive Review of Information Assurance in Cloud Computing Environments Neoaz, Nahid
BULLET : Jurnal Multidisiplin Ilmu Vol. 3 No. 6 (2024): BULLET : Jurnal Multidisiplin Ilmu
Publisher : CV. Multi Kreasi Media

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

IA is information that relates to the safety or insecurity of data and service that reside in the cloud computing spaces. Due to the benefits that are enshrined by cloud technologies organizations are using the cloud technologies as solutions to scalability, costs and flexibility while addressing issues of data privacy and security threats and compliance. It is for this reason that in this paper, the following aspects will be addressed; information assurance and cloud computing and other elements of information assurance such as CIA triad, authentication and non-repudiation. It also defines risk at the present time to mean data breach, insider threats, and Distributed Denial of Service (DDoS) attack among others; and how each of these organizations can pursue risk management strategies to such risks. In addition, this paper examines the data privacy aspect and the legal regulation of and concerns with cloud security in the shared responsibility model. By going through the organization information assurance plan, it is asserted that risk identification, assessment and monitoring, and information asset protection such us data encryption, and access should be acknowledged. Thus it becomes possible to implant sound security solution into the cloud computing solutions/ So by emulating on the best practices in support of the security/organizations gain all the benefits of Cloud computing. This paper gives a detailed insight of how Information assurance in cloud environment in a world that is going digital can be handled.
Role of Artificial Intelligence in Enhancing Information Assurance Neoaz, Nahid
BULLET : Jurnal Multidisiplin Ilmu Vol. 3 No. 5 (2024): BULLET : Jurnal Multidisiplin Ilmu
Publisher : CV. Multi Kreasi Media

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Abstract: The unveiling of AI in the supplement of Information assurance is revolutionizing practice of Cybersecurity in organization. Derived from AI enablers of ML and DL, NLP makes a significant contribution in the construction of threat perception, risk management, immediate response, and recovery to incidents than the conventional security. Executive Summary Machine Learning Employment A raw feed of a vast volume of data in advance technology can be fed in on a continuous basis, these data can be filtered, analyzed, verified, interpreted, patterns can be generated, threat identification and threat handling can be done on an automated basis and time loss to threats and time taken for rectifications can be minimized. The value of AI can consequently be justified on the basis of further details within the vulnerability management on the basis of risk prioritization, the analytical approach of patch metallization as well as the detection of new vulnerability, the so-called zero-day-vulnerability; for incident response, AI is of relevance because it uses the analytical potentials of AI in order to immediately contain the event, to drive the recovery process, and during findings analysis. That is why its constant supervision is one of the activities that make AI enhance one or another stabilization of the organizational systems, and provides the prognosis of dangers and the implementation of numerous rehearsing. Therefore, AI as the potential future solution in the sphere of cybersecurity needs to be discussed in connection with the data safety concerns, as well as ethical issues and roles of people. The principal concern of this paper is therefore, on how convenient on information assurance is, with point reference to the aspect of how it can be convenient in helping to elucidate threats, for the purpose of responding independently and in improving the recovery process; notwithstanding, like everything in this world, AI has both advantages and disadvantages that require reconsideration. Which is why AI is a strategic asset that needs to be used to protect organizations and their systems against today’s and tomorrow’s cyber threats.
Information Assurance in the Era of Mobility: Challenges and Solutions Amin, Mohammad Hasan; Neoaz, Nahid
BULLET : Jurnal Multidisiplin Ilmu Vol. 3 No. 5 (2024): BULLET : Jurnal Multidisiplin Ilmu
Publisher : CV. Multi Kreasi Media

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

With more family and organizational members using mobile devices within homes and workplaces, mobile device security particularly in regard to information security is an important question. The information assurance principles, secure mobile technologies, trends, threats, policies and compliance in mobile systems are presented in this article. These basic features including cryptos, MFA, MDM, and SC are part of the mobile security technologies explained in the paper. It also looks into how these latest trends, for instance 5G networks, IoT, mobile payment and AI app impact and offer opportunities as well as risks. Therefore, the article discusses policy regimes and compliance and the emergence of threats such as mobile malware, phishing, and ransom ware. However, it also proscribes comprehension of future opportunities and further evolutions in the sphere of mobile information assurance including the creation of Artificial Intelligence, quantum-safe encryption, and the international cooperation in order to overcome the new threats on the horizon. The mobile systems adopted by different systems and software may prone to several hacking attacks, although, through proper policies’ integration and up-to-date technologies, mobile systems security is feasible than in the advancing technology world.
Human Factors in Information Assurance: A Review of Behavioral and Cultural Aspects Neoaz, Nahid
International Journal of Multidisciplinary Sciences and Arts Vol. 3 No. 4 (2024): International Journal of Multidisciplinary Sciences and Arts, Article October 2
Publisher : Information Technology and Science (ITScience)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/ijmdsa.v3i4.5177

Abstract

IA is a critical field in shielding information and information structures from unapproved use, divulging, interference or demolition. Technical controls applied in IA provide ways of preventing such acts and managing the risk but since aspects of operational environment and people’s attitudes significantly influence IA as an exercise, it represents a critical factor. This paper on IA focuses on behavior and culture that affect human decision making process, Cognitive Bias, and emotions, security behaviors and structures. It addresses the aspect of how a user will prefer convenience to security, get to provide information to an unauthorized user and or will not follow most organizational policies due to ignorance of the detected securities put in place. The final factors that the paper analyses as the factors influencing security within an organization include leadership engagement, training, security awareness and security culture. Lastly, information is presented about social engineering as an attack approach as well as measures to prevent them, such as, for example, using multi-factor authentication. The paper insists that strategy for IA cannot do without including technical solutions as well as a consideration of regard human behavior and practice as a method of unfolding a security culture across organizations. In addition, by applying the evaluation framework in this paper, organizations enhance on technical and human IA approach, and reduce risk elements, familiarize people with new hostile forces emerging to threaten secret information.
Ensuring Information Integrity in a Mobile-Connected World Neoaz, Nahid; Amin, Mohammad Hasan
International Journal of Multidisciplinary Sciences and Arts Vol. 3 No. 4 (2024): International Journal of Multidisciplinary Sciences and Arts, Article October 2
Publisher : Information Technology and Science (ITScience)

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The sunlight adoption of portable devices in individual and business activity has made a higher urgency of appropriate mobile information assurance policies. This article explores key approaches to securing mobile devices and sensitive information, focusing on three major components: Mobile Device Management (MDM), mobile security best practices, mobile cloud computing. MDM solutions are ways through which organizations can gain control in mobile devices with secure policies, distant management, and compliance checks. In addition, best practices for the physical security of mobiles, which include the use of non-disclosed passwords, the enabling of the encrypt or and the use of virtual private networks or other such security tools go further in safeguarding mobile environments against elements like malware and intrusion. Besides, cloud computing supports portable information assurance by providing backup, recovery, and security measures like encryption, and ID confirmation. Solutions based on cloud technology allow to implement effective data sharing and processing, as well as to control data security and compliance with the requirements of existing legislation. Altogether, these measures constitute an integrated security strategy of mobile, it provides protection to sensitive data, makes them accessible, and help in managing or eradicating threats in the connected environment.
Human Factors in Information Assurance: A Review of Behavioral and Cultural Aspects Neoaz, Nahid
International Journal of Multidisciplinary Sciences and Arts Vol. 3 No. 4 (2024): International Journal of Multidisciplinary Sciences and Arts, Article October 2
Publisher : Information Technology and Science (ITScience)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/ijmdsa.v3i4.5177

Abstract

IA is a critical field in shielding information and information structures from unapproved use, divulging, interference or demolition. Technical controls applied in IA provide ways of preventing such acts and managing the risk but since aspects of operational environment and people’s attitudes significantly influence IA as an exercise, it represents a critical factor. This paper on IA focuses on behavior and culture that affect human decision making process, Cognitive Bias, and emotions, security behaviors and structures. It addresses the aspect of how a user will prefer convenience to security, get to provide information to an unauthorized user and or will not follow most organizational policies due to ignorance of the detected securities put in place. The final factors that the paper analyses as the factors influencing security within an organization include leadership engagement, training, security awareness and security culture. Lastly, information is presented about social engineering as an attack approach as well as measures to prevent them, such as, for example, using multi-factor authentication. The paper insists that strategy for IA cannot do without including technical solutions as well as a consideration of regard human behavior and practice as a method of unfolding a security culture across organizations. In addition, by applying the evaluation framework in this paper, organizations enhance on technical and human IA approach, and reduce risk elements, familiarize people with new hostile forces emerging to threaten secret information.
Ensuring Information Integrity in a Mobile-Connected World Neoaz, Nahid; Amin, Mohammad Hasan
International Journal of Multidisciplinary Sciences and Arts Vol. 3 No. 4 (2024): International Journal of Multidisciplinary Sciences and Arts, Article October 2
Publisher : Information Technology and Science (ITScience)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/ijmdsa.v3i4.5299

Abstract

The sunlight adoption of portable devices in individual and business activity has made a higher urgency of appropriate mobile information assurance policies. This article explores key approaches to securing mobile devices and sensitive information, focusing on three major components: Mobile Device Management (MDM), mobile security best practices, mobile cloud computing. MDM solutions are ways through which organizations can gain control in mobile devices with secure policies, distant management, and compliance checks. In addition, best practices for the physical security of mobiles, which include the use of non-disclosed passwords, the enabling of the encrypt or and the use of virtual private networks or other such security tools go further in safeguarding mobile environments against elements like malware and intrusion. Besides, cloud computing supports portable information assurance by providing backup, recovery, and security measures like encryption, and ID confirmation. Solutions based on cloud technology allow to implement effective data sharing and processing, as well as to control data security and compliance with the requirements of existing legislation. Altogether, these measures constitute an integrated security strategy of mobile, it provides protection to sensitive data, makes them accessible, and help in managing or eradicating threats in the connected environment.