Information security best practices

3Citations
Citations of this article
16Readers
Mendeley users who have this article in their library.
Get full text

Abstract

We are increasingly reliant on the use of IT systems in our normal day- to-day business and personal activities. It is of paramount importance that these systems are sufficiently secure to protect sensitive, valuable and private data, and associated storage, communications and transactions. Therefore, the design and use of such systems should be in accordance with best practices for information security that have been developed by industry, government and the worldwide expert community. This chapter emphasises the need for system security and goes on to explain technical choices such as algorithms, key size and trust management, and concludes with a real-world case study.

Cite

CITATION STYLE

APA

Mayes, K., & Markantonakis, K. (2014). Information security best practices. In Secure Smart Embedded Devices, Platforms and Applications (Vol. 9781461479154, pp. 119–144). Springer New York. https://doi.org/10.1007/978-1-4614-7915-4_6

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free