Vulnerability in Information Technology and Computing—A Study in Technological Information Assurance

International Journal of Management, Technology, and Social Sciences (IJMTS), 4(2), 87-94. ISSN: 2581-6012.

8 Pages Posted: 19 Dec 2019

See all articles by Prantosh Paul

Prantosh Paul

Raiganj University

A. Bhimali

Raiganj University

P. S. Aithal

Srinivas University, Institute of Management and Commerce

R. Rajesh

Rohini College of Engineering & Technology

Date Written: November 15, 2019

Abstract

Information Assurance is the prime name for the security and privacy related affairs. It is responsible for the secure design, development and building of healthy sophisticated information systems. The technologies have become crucial for the development of content and information systems. Information Assurance is a new name in respect of Computing and IT Security; however, it has important significance as the area deals with both traditional and technological security related affairs. The IT Security primarily responsible for the computational secure systems whereas Information Assurance focuses not only on the design and development of secure systems but also policies, framework and regulations leading to secure information systems preparation. Among the technological space few common names are include vulnerabilities, virus, denial of services etc. Moreover, the vulnerabilities include the affairs of hardware, software, network, personal and physical site, organizational security systems etc. This paper talks about the basics of Information Assurance and allied affairs. Moreover, it talks about the vulnerabilities and affairs leading to computer access control, application security, authentication, authorization, aspects of data centric security, encryption, firewall etc. The paper also highlights the basic overview of the technologies and solution as well.

Keywords: IT Systems, Information, Information Assurance, IT Management, Vulnerabilities, Informatics, Secure Policies

Suggested Citation

Paul, Prantosh and Bhimali, A. and Aithal, P. S. and Rajesh, R., Vulnerability in Information Technology and Computing—A Study in Technological Information Assurance (November 15, 2019). International Journal of Management, Technology, and Social Sciences (IJMTS), 4(2), 87-94. ISSN: 2581-6012. , Available at SSRN: https://ssrn.com/abstract=3497772

Prantosh Paul

Raiganj University ( email )

Yogesh Bhawan; S/O Santi Ranjan Biswas; Ashok Pall
Near Asha Cinema Hall; P.O.+ P.S. Raiganj
Raiganj, West Bengal 733134
India

A. Bhimali

Raiganj University ( email )

Yogesh Bhawan; S/O Santi Ranjan Biswas; Ashok Pall
Near Asha Cinema Hall; P.O.+ P.S. Raiganj
Raiganj, West Bengal 733134
India

P. S. Aithal (Contact Author)

Srinivas University, Institute of Management and Commerce ( email )

R. Rajesh

Rohini College of Engineering & Technology

Near Anjugramam JN, Kanyakumari Main Road Palkulam
Anjugramam, Tamil Nadu 629401
India

Do you have negative results from your research you’d like to share?

Paper statistics

Downloads
120
Abstract Views
546
Rank
419,528
PlumX Metrics