Open Access Open Access  Restricted Access Subscription Access

Root Causes of Information Systems Vulnerabilities


Affiliations
1 Novosibirsk State University of Economics and Management, Novosibirsk State University, Novosibirsk – 630090, Russian Federation
 

Background/Objectives: The article analyzes the information security from the standpoint of causes triggering the vulnerabilities of information technologies and systems. Methods/Statistical Analysis: Information technologies are based on three interdependent components, namely, hardware, software and human resource (Figure 1). The susceptibility of final technologies to a number of threats challenging the information security takes ischolar_mains in each of the abovementioned aspects both taken separately and in their complex combination. Findings: Data processing centers constitute a way to centralize the resources of the organizations' information infrastructure. Implementing such centers increases the system reliability and information availability in the whole and reduces the loading of the data transmission network at the organization. Meanwhile, data processing centers are an expensive option, and not every company can afford it. In addition to it, efficient foundation and functioning of such centers require highly qualified personnel. Modern information systems suffer from security imperfections. The main cause of their vulnerabilities ischolar_mains in their complexity connected to the fact that information systems consist of a number of interrelated components which are designed and produced separately by different working teams. With the development of the civilization, the complexity increases steadily, therefore there is a burning need in working out measures. Applications/Improvements: May be used as guidance in order to improve the quality of testing the components of information systems and their compatibility.

Keywords

Human Factor, Information Systems, Security, Vulnerabilities, Vulnerability Risks.
User

Abstract Views: 146

PDF Views: 0




  • Root Causes of Information Systems Vulnerabilities

Abstract Views: 146  |  PDF Views: 0

Authors

A. V. Revnivykh
Novosibirsk State University of Economics and Management, Novosibirsk State University, Novosibirsk – 630090, Russian Federation
A. M. Fedotov
Novosibirsk State University of Economics and Management, Novosibirsk State University, Novosibirsk – 630090, Russian Federation

Abstract


Background/Objectives: The article analyzes the information security from the standpoint of causes triggering the vulnerabilities of information technologies and systems. Methods/Statistical Analysis: Information technologies are based on three interdependent components, namely, hardware, software and human resource (Figure 1). The susceptibility of final technologies to a number of threats challenging the information security takes ischolar_mains in each of the abovementioned aspects both taken separately and in their complex combination. Findings: Data processing centers constitute a way to centralize the resources of the organizations' information infrastructure. Implementing such centers increases the system reliability and information availability in the whole and reduces the loading of the data transmission network at the organization. Meanwhile, data processing centers are an expensive option, and not every company can afford it. In addition to it, efficient foundation and functioning of such centers require highly qualified personnel. Modern information systems suffer from security imperfections. The main cause of their vulnerabilities ischolar_mains in their complexity connected to the fact that information systems consist of a number of interrelated components which are designed and produced separately by different working teams. With the development of the civilization, the complexity increases steadily, therefore there is a burning need in working out measures. Applications/Improvements: May be used as guidance in order to improve the quality of testing the components of information systems and their compatibility.

Keywords


Human Factor, Information Systems, Security, Vulnerabilities, Vulnerability Risks.



DOI: https://doi.org/10.17485/ijst%2F2015%2Fv8i36%2F130077