PHYSICAL FACILITIES OF INFORMATION SECURITY

Authors

  • D. Musakhanov Turin Polytechnic University in Tashkent
  • A. Kudaibergenov Kazakh-British Technical University

Keywords:

security, information, data security, technologies.

Abstract

In the age of digitalization, where information has evolved into a critical asset, safeguarding data and preserving privacy have emerged as paramount concerns for both organizations and their personnel. The physical aspect of information protection assumes a pivotal role in thwarting unauthorized access to sensitive data and vital infrastructure. This paper endeavors to examine the current methodologies, technologies, and strategies employed to guarantee the physical security of information. 

References

NIST SP 800-59 under Information Security from 44 U.S.C., Sec. 3542 (b)(1), URL:

https://www.govinfo.gov/app/details/USCODE-2008-title44/USCODE-2008-title44-chap35-subchapII-sec3542

Torokin A.A., 2005. Engineering and technical protection of information. ISBN 5-85438-140-0., URL: https://search.rsl.ru/ru/record/01002805947

Dolgiy P.A., Kosterev M.S., Sushkov A.E., Pylinskaya Y.A., Gudkov V.V. Current issues of physical information protection, URL: https://cyberleninka.ru/article/n/aktualnye-voprosy-fizicheskoy-zaschity-informatsii/pdf

Burkova E.V., 2017, Physical protection of informatization objects, URL: http://elib.osu.ru/bitstream/123456789/13741/1/36384_20170503.pdf

Arunesh Sinha, Thanh H. Nguyen, Debarun Kar, Albert Xin Jiang, Milind Tambe, Matthew Brown. "From physical security to cybersecurity." November 2015. Journal of Cybersecurity 1(1). DOI: 10.1093/cybsec/tyv007. License: CC BY-NC-ND 4.0., URL: https://www.researchgate.net/publication/284161432_From_physical_security_to_cybersecurity

NIST SP 1800-2, NIST SP 1800-2b, NIST SP 1800-2c, NIST SP 800-161r1, NIST SP 800-73-4, Physical Access Control System, URL: https://csrc.nist.gov/glossary/term/physical_access_control_system

Abidarova A.A., Physical information security measures, URL: https://cyberleninka.ru/article/n/fizicheskie-sredstva-zaschity-informatsii/viewer

Wikipedia, Physical information security, URL: https://en.wikipedia.org/wiki/Physical_information_security

I. Begishev, A. Bokovnya., 2022, Architecture Of Information Security Threats in Cyber-Physical Systems. URL: https://www.researchgate.net/publication/366685586_Architecture_Of_Information_Security_Threats_in_Cyber-Physical_Systems

Al Omar, A., Basu, A., & El Khatib, K. (2020). Securing the Internet of Things using Blockchain technology. Computers & Security, 88, 101614.

Conti, M., Kumar, E., Lal, C., Ruj, S., & Sandhu, R. (2018). A survey on security and privacy issues of blockchain technology. IEEE Communications Surveys & Tutorials, 20(4), 3684-3715.

Easttom, C. (2018). System Forensics, Investigation, and Response. Nelson Education.

Hong, K., Kim, D., Kim, H., & Lee, S. G. (2018). A survey of the Internet of Things (IoT) in healthcare: Security and privacy issues. Journal of Information Processing Systems, 14(1), 101-112.

Jain, A. K., Dass, S. C., & Nandakumar, K. (2020). Biometric Authentication: A Machine Learning Approach. Springer.

Kizza, J. M. (2019). Guide to Computer Network Security. Springer.

Nellis, J. C., Meyer, J., & O'Daniel, M. (2016). Biometric and Surveillance Technology for Human and Activity Identification. IGI Global.

Peltier, T. R. (2013). Information Security Policies, Procedures, and Standards: Guidelines for Effective Information Security Management. CRC Press.

Vacca, J. R. (2013). Computer and Information Security Handbook. Morgan Kaufmann.

Whitman, M. E., & Mattord, H. J. (2018). Management of Information Security. Cengage Learning.

Zheng, Y., Capossele, A., Zheng, Y., & Shen, H. (2017). Cyber–physical attack and defense in the Internet of Things. IEEE Internet of Things Journal, 4(6), 1910-1920.

Downloads

Published

2023-11-20

How to Cite

Musakhanov, D., & Kudaibergenov, A. . (2023). PHYSICAL FACILITIES OF INFORMATION SECURITY. International Bulletin of Engineering and Technology, 3(11), 73–79. Retrieved from https://www.internationalbulletins.com/intjour/index.php/ibet/article/view/1182