Browse > Article
http://dx.doi.org/10.22156/CS4SMB.2018.8.6.117

Concern and Prediction for Future Information Security expected by IT Executives  

Kim, Tae-Yang (Division of Software Security, Korea University)
Publication Information
Journal of Convergence for Information Technology / v.8, no.6, 2018 , pp. 117-122 More about this Journal
Abstract
In this paper, we review the security issues reported by the organizations every year and analyze the similarities and differences with the concerns that the practitioners engaged in the IT environment are concerned about the necessary security matters. Interviews and questionnaires were collected for practitioners working in various IT work environments such as government agencies, financial companies, general companies, airlines, etc. to gather their opinions on the concerns of future information security. We analyzed the collected opinions and derived key keywords. The results should be compared with the security issue keywords or statistical data reported by the security companies or related organizations in the first half and the second half of each year to find common security trends and to analyze the differences and supplement them I checked whether there was any danger. We will comprehensively analyze key security issues reported by security companies and information security related organizations and future security concerns predicted by IT practitioners to prepare for the security threats of the current era of the fourth industrial revolution.
Keywords
Information Security; Security; IT; Fourth Industrial Revolution; Security Accident; Security Issue;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Financial Security Institute. (2017). The Forecast of the Top 10 Financial IT Security Issues in 2017. http://www.fsec.or.kr/user/bbs/fsec/42/312/bbsDataView/696.do?page=1&column=bbsDataTitle&search=2017&searchSDate=&searchEDate=&bbsDataCategory=
2 KISA. (2018). Prospects for Top 10 Internet Issues in 2018. Korea Internet & Security Agency. http://www.kisa.or.kr/public/library/etc_View.jsp?regno=0011859&searchType=&searchKeyword=&pageIndex=1
3 S. Sagiroglu & D. Sinanc. (2013, May). Big data: A review. In Collaboration Technologies and Systems (CTS). 2013 International Conference on. (pp. 42-47). IEEE.
4 I. A. T. Hashem, I. Yaqoob, N. B. Anuar, S. Mokhtar, A. Gani, & S. U. Khan. (2015). The rise of "big data" on cloud computing: Review and open research issues. Information Systems, 47, 98-115.   DOI
5 D. Puthal, S. Nepal, R. Ranjan & J. Chen. (2016). Threats to networking cloud and edge datacenters in the internet of things. IEEE Cloud Computing, 3(3), 64-71.   DOI
6 L. Xu, C. Jiang, J. Wang, J. Yuan & Y. Ren. (2014). Information security in big data: privacy and data mining. IEEE Access, 2, 1149-1176.   DOI
7 Nick Carr. (2017). Cyber Espionage is Alive and Well: APT32 and the Threat to Global Corporations. FireEye. https://www.fireeye.com/blog/threat-research/2017/05/cyber-espionage-apt32.html
8 E. David. (2017). IT threat evolution Q1. Kasperskylab. https://securelist.com/it-threat-evolution-q1-2017/78452/
9 D. Gray. (2018). IBreaking Down the Rapidly Evolving GandCrab Ransomware. McAfeelab. https://securingtomorrow.mcafee.com/consumer/consumer-threat-notices/gandcrab-ransomware/
10 E. David. (2017). IT threat evolution Q2. Kasperskylab. https://securelist.com/it-threat-evolution-q2-2017/79354/
11 A. Rehman & T. Saba. (2014). Evaluation of artificial intelligent techniques to secure information in enterprises. Artificial Intelligence Review, 42(4), 1029-1044.   DOI
12 D. Gary. (2018). Breaking Down the Rapidly Evolving GandCrab Ransomware. McAfeelab. https://securingtomorrow.mcafee.com/consumer/consumer-threat-notices/gandcrab-ransomware/
13 R. Richardson & M. North. (2017). Ransomware: Evolution, mitigation and prevention. International Management Review, 13(1), 10-21.
14 R. Roman, J. Lopez, & M. Mambo. (2018). Mobile edge computing, fog et al.: A survey and analysis of security threats and challenges. Future Generation Computer Systems, 78, 680-698.   DOI
15 J. L. Tsai & N. W. Lo. (2015). A privacy-aware authentication scheme for distributed mobile cloud computing services. IEEE systems journal, 9(3), 805-815.   DOI
16 KISA. (2017). Prospects for Top 10 Information Protection Issues in 2017. Korea Internet & Security Agency. http://www.kisa.or.kr/public/library/etc_View.jsp?regno=022280&searchType=&searchKeyword=&pageIndex=1
17 Financial Security Institute. (2018). The Forecast of the Top 10 Financial IT Security Issues in 2018. Financial Security Institute. http://www.fsec.or.kr/user/bbs/fsec/42/312/bbsDataView/968.do?page=1&column=bbsDataTitle&search=2018&searchSDate=&searchEDate=&bbsDataCategory=