Information Security
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Views: 149 , Downloads: 115 | CTR: 77 % | Weekly Popularity: ⮙5

Research Paper | Information Technology | India | Volume 6 Issue 1, January 2017

Information Security

Asif Husain

According to one common view, information security comes down to technical measures. Given better access control policy models, formal proofs of crypto-graphic protocols, approved firewalls, better ways of detecting intrusions and malicious code, and better tools for system evaluation and assurance, the problems can be solved. In this note, we put forward a contrary view information insecurity is at least as much due to perverse incentives. Many of the problems can be explained more clearly and convincingly using the language of microeconomics network externalities, asymmetric information, moral hazard, adverse selection, liability dumping and the tragedy of the commons.

Keywords: INFORMATION SECURITY

Edition: Volume 6 Issue 1, January 2017

Pages: 2358 - 2361

Share this Article

How to Cite this Article?

Asif Husain, "Information Security", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=ART20163938, Volume 6 Issue 1, January 2017, 2358 - 2361

149 PDF Views | 115 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'INFORMATION SECURITY'

Views: 149 , Downloads: 107 | CTR: 72 % | Weekly Popularity: ⮙2

Informative Article, Information Technology, Malaysia, Volume 3 Issue 12, December 2014

Pages: 570 - 576

How Much Privacy We Still Have?

Ayn Nur Azhana Binti Azhar Amanullah, Nur Faizah Binti Ab Aziz, Maya Novia Sari, Jamaludin Bin Ibrahim

Share this Article

Views: 254 , Downloads: 110 | CTR: 43 % | Weekly Popularity: ⮙5

Survey Paper, Information Technology, Ghana, Volume 9 Issue 4, April 2020

Pages: 1643 - 1647

Analysis of the Security Threat and Vulnerability of Smartphone use among Tertiary Students in Ghana

Issah Bala Abdulai, Abu Sulemana

Share this Article

Views: 148 , Downloads: 112 | CTR: 76 % | Weekly Popularity: ⮙4

Review Papers, Information Technology, Malaysia, Volume 3 Issue 12, December 2014

Pages: 773 - 778

Information Security in ICT from an Islamic Perspective

Jamaludin Ibrahim, Fatima Ahmed Mohamed Nuhaabdulaziz Alyami Effra Altaf Haqani

Share this Article

Views: 142 , Downloads: 113 | CTR: 80 %

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 1241 - 1243

Addressing Security Issues of Small and Medium Enterprises through Enhanced SIEM Technology

Prateek Shivhare, Savaridassan.P

Share this Article

Views: 147 , Downloads: 113 | CTR: 77 % | Weekly Popularity: ⮙4

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 1576 - 1580

Intrusion Detection in Wireless Network Using Fuzzy Rules

Ketaki P. Bhusari, Swati G. Kale

Share this Article
Top