SEEDS-2017 – TRACK 3: Information Security

With the advent of digital storage and communication technologies, the entire spectrum of storage and communication system has been revolutionised as digital information can be easily stored, copied, changed, and transported. More and more people and organisations are using digital documents instead of paper documents to conduct day-to-day transactions. These desirable properties of digital information are very useful but owing to easy and almost undetected modification of digital data, they have raised several security concerns. Therefore, digital data is regarded as unreliable in areas where privacy, authentication, and integrity of data are of concern unless some security procedure is attached to it. These are areas like contracts, receipts, approvals and others where users have severe and genuine concerns of unauthorised modification or disclosure of data. The risk of data misuse has increased many folds with the advent of networking and wireless communication as many users can gain access to the data if not secured. In recent years, the scope and dimensions of information security has evolved significantly. The area of information security besides covering security of data and information extends to security of networks and allied infrastructure. It has emerged as a profession across hardware, software and communication technologies for securing applications, apps, databases and websites; security testing; information systems auditing; business continuity planning; digital forensics and crime investigations; network, and web penetration testing; incident responding; security architecture designing; security analysis; intrusion analysis; vulnerability research; disaster recovery; etc.

Mitigating information security threats is an ongoing battle, as unique threats get prevalent swiftly, therefore, security administrators must begin with an understanding of the threats facing the information, and then must examine the vulnerabilities inherent in the systems that store, process, and transmit the information possibly subjected to those threats. Continuous identification of most serious vulnerabilities, possible threats to information and their rapid mitigation can prevent an organisation from falling prey to any such threat. Information security has been the focus of research since decades; however, with the advent of Internet and its vast growth, online information security research has become recurrent. Novel methods, techniques, protocols, and procedures are continuously developed to secure information from growing threats.