PHYSICAL FACILITIES OF INFORMATION SECURITY
Keywords:
security, information, data security, technologies.Abstract
In the age of digitalization, where information has evolved into a critical asset, safeguarding data and preserving privacy have emerged as paramount concerns for both organizations and their personnel. The physical aspect of information protection assumes a pivotal role in thwarting unauthorized access to sensitive data and vital infrastructure. This paper endeavors to examine the current methodologies, technologies, and strategies employed to guarantee the physical security of information.
References
NIST SP 800-59 under Information Security from 44 U.S.C., Sec. 3542 (b)(1), URL:
https://www.govinfo.gov/app/details/USCODE-2008-title44/USCODE-2008-title44-chap35-subchapII-sec3542
Torokin A.A., 2005. Engineering and technical protection of information. ISBN 5-85438-140-0., URL: https://search.rsl.ru/ru/record/01002805947
Dolgiy P.A., Kosterev M.S., Sushkov A.E., Pylinskaya Y.A., Gudkov V.V. Current issues of physical information protection, URL: https://cyberleninka.ru/article/n/aktualnye-voprosy-fizicheskoy-zaschity-informatsii/pdf
Burkova E.V., 2017, Physical protection of informatization objects, URL: http://elib.osu.ru/bitstream/123456789/13741/1/36384_20170503.pdf
Arunesh Sinha, Thanh H. Nguyen, Debarun Kar, Albert Xin Jiang, Milind Tambe, Matthew Brown. "From physical security to cybersecurity." November 2015. Journal of Cybersecurity 1(1). DOI: 10.1093/cybsec/tyv007. License: CC BY-NC-ND 4.0., URL: https://www.researchgate.net/publication/284161432_From_physical_security_to_cybersecurity
NIST SP 1800-2, NIST SP 1800-2b, NIST SP 1800-2c, NIST SP 800-161r1, NIST SP 800-73-4, Physical Access Control System, URL: https://csrc.nist.gov/glossary/term/physical_access_control_system
Abidarova A.A., Physical information security measures, URL: https://cyberleninka.ru/article/n/fizicheskie-sredstva-zaschity-informatsii/viewer
Wikipedia, Physical information security, URL: https://en.wikipedia.org/wiki/Physical_information_security
I. Begishev, A. Bokovnya., 2022, Architecture Of Information Security Threats in Cyber-Physical Systems. URL: https://www.researchgate.net/publication/366685586_Architecture_Of_Information_Security_Threats_in_Cyber-Physical_Systems
Al Omar, A., Basu, A., & El Khatib, K. (2020). Securing the Internet of Things using Blockchain technology. Computers & Security, 88, 101614.
Conti, M., Kumar, E., Lal, C., Ruj, S., & Sandhu, R. (2018). A survey on security and privacy issues of blockchain technology. IEEE Communications Surveys & Tutorials, 20(4), 3684-3715.
Easttom, C. (2018). System Forensics, Investigation, and Response. Nelson Education.
Hong, K., Kim, D., Kim, H., & Lee, S. G. (2018). A survey of the Internet of Things (IoT) in healthcare: Security and privacy issues. Journal of Information Processing Systems, 14(1), 101-112.
Jain, A. K., Dass, S. C., & Nandakumar, K. (2020). Biometric Authentication: A Machine Learning Approach. Springer.
Kizza, J. M. (2019). Guide to Computer Network Security. Springer.
Nellis, J. C., Meyer, J., & O'Daniel, M. (2016). Biometric and Surveillance Technology for Human and Activity Identification. IGI Global.
Peltier, T. R. (2013). Information Security Policies, Procedures, and Standards: Guidelines for Effective Information Security Management. CRC Press.
Vacca, J. R. (2013). Computer and Information Security Handbook. Morgan Kaufmann.
Whitman, M. E., & Mattord, H. J. (2018). Management of Information Security. Cengage Learning.
Zheng, Y., Capossele, A., Zheng, Y., & Shen, H. (2017). Cyber–physical attack and defense in the Internet of Things. IEEE Internet of Things Journal, 4(6), 1910-1920.
