The Impact of Information Security Processes on Providing Secure Digital Systems



  • Balsam A. Mustafa College of Engineering Technical, Uruk University, Baghdad, Iraq.
  • Fadhil. A. Al-Qirimli College of Engineering Technical, Uruk University, Baghdad, Iraq.

With the increasing use of the internet, a global network, Information security is a substantial issue in today's business. Information security has become one of the most important aspects of modern electronic society.  Security of information, networks, and systems is vital to make information systems work satisfactorily and enable people to safely get the information they need. Security is the practice of defending information from unauthorized access. This paper discusses the essential characteristics of secure communication and the important processes used by administrators to protect data and systems.


Security attributes, Authentication, Authorization, User identity, Access control

[1] National Security Telecommunications and Information Systems Security (1994). National Training Standard for Information Systems Security (Infosec) Professionals. File 4011

[2] The Importance of Information Security, information-security-nowadays accessed on 14/02/2023

[3] Dutta,N. , Jadav, N. , Tanwar, S., (2022). Cyber Security: Issues and Current Trends, Springer publisher

[4] Siponen, M. T., Kukkonen, H., (2007). A review of information security issues and respective research, The DATA BASE for Advances in Information Systems, 38(1)

[5] Nieles, M., Dempsey, K., Pillitteri, V., (2017). An Introduction to Information Security, NIST Special Publication 800-12 Revision1

[6] Talha, M., Abou El Kalam, A., Elmarzouqi, N., (2019). Big Data: Trade-off between Data Quality and Data Security. The 9th International Symposium on Frontiers in Ambient and Mobile Systems (FAMS2019), Leuven, Belgium

[7] Martin, A., Khazanchi, D., (2006). Information Availability and Security Policy, Proceedings of the 12th Americas Conference on Information Systems, Mexico, 2006

[8] Whitman, M.E. (2003). Enemy at the Gate: Threats to Information Security, Communications of the ACM, 46, 91-95

[9] Qadir, S. and Quadri, S.M.K, (2016). Information Availability: An Insight into the Most Important Attribute of Information Security. Journal of Information Security, 7, 185-194

[10] Alenius, F., (2010). Authentication and Authorization, Achieving Single Sign-on in an Erlang Environment, UPSALA UNIVERITET, Independent thesis Basic level

[11] Uliyan, Diaa M., Sadeghi, S., Jalab, H., (2020). Anti-spoofing method for fingerprint recognition using patch based deep learning machine. Journal of Engineering Science and Technology, 23(2), 264-273

[12] Kizza, J.M. (2020), Access control and authorization. Kizza, J.M. (Ed), Guide to Computer Network Security Texts in Computer Science, Springer Publishing, pp. 187-206, ISBN 978-3-030-38140-0

[13] Mohamed, A.K.Y.S., Auer, D., Hofer, D., Küng, J. (2022), A systematic literature review for authorization and access control: definitions, strategies and models, Journal of Web Information Systems, Vol. 18 No. 2/3, pp. 156-180

[14] B. Madhuravani, P. Bhaskara Reddy (2013). A Comprehensive Study on Different Authentication Factors, 2(10), ISSN: 2278-0181

[15] Matt, B. (2018), Computer Security: art and Science, Addison-Wesley Professional, ISBN 978-0-13-409714-5.

[16] Statista Report, accessed on 14/02/2023

Mustafa, B. A. ., & Al-Qirimli, F. A. . (2023). The Impact of Information Security Processes on Providing Secure Digital Systems. Journal Port Science Research, 6(4), 344–347.


Download data is not yet available.