Science, Technology, Engineering and Mathematics.
Open Access

ENHANCING THE SECURITY LEVELS IN INFORMATION SYSTEMS

Download as PDF

Volume 2, Issue 1, Pp 7-16, 2025

DOI: https://doi.org/10.61784/its3006

Author(s)

Jouma Ali Al-Mohamad

Affiliation(s)

Faculty member at Al-Shahbaa Private University, Faculty of Information Engineering, Department of Computer and Mobile Communication Engineering, Aleppo, Syria.

Corresponding Author

Jouma Ali Al-Mohamad

ABSTRACT

This document provides a comprehensive guide to enhancing information security systems within organizations. It emphasizes strategies across physical, digital, and human domains to ensure the safety, reliability, and continuity of operations. Key topics include physical security measures, data protection practices, access control, employee awareness, and advanced surveillance technologies. These measures aim to mitigate risks from cyber threats, natural disasters, and internal vulnerabilities, fostering a robust security framework.

KEYWORDS

Information security; Cybersecurity; Data protection; Access control; Physical security; Employee training; Firewalls; Encryption; Surveillance systems

CITE THIS PAPER

Jouma Ali Al-Mohamad. Enhancing the security levels in information systems. Innovation and Technology Studies. 2025, 2(1): 7-16. DOI: https://doi.org/10.61784/its3006.

REFERENCES

[1] Stallings, W. Network Security Essentials: Applications and Standards. Pearson Education. 2018.

[2] Schneier, B. Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World. W.W. Norton & Company. 2015.

[3] Whitman, M E, Mattord, H J. Principles of Information Security. Cengage Learning. 2021.

[4] National Institute of Standards and Technology (NIST). Cybersecurity Framework. 2023. Retrieved from https://www.nist.gov/cyberframework.

[5] Microsoft Security Team.  "Best Practices for Enterprise Security". 2024. Retrieved from https://security.microsoft.com.

[6] Symantec Corporation. "The State of Cybersecurity: Annual Report". 2024. Retrieved from https://symantec.com/reports.

All published work is licensed under a Creative Commons Attribution 4.0 International License. sitemap
Copyright © 2017 - 2025 Science, Technology, Engineering and Mathematics.   All Rights Reserved.