Loading

An Intangible Information Security Frame Work Against Attacks in Business Environment
Vinod. D1, Sivanesh Kumar. A2, Parthipan.V3, Rajesh. M4

1Vinod. D Saveetha School of Engineering, Saveetha Institute of Medical and Technical Sciences, Chennai, India.

2Kumar. A, Saveetha School of Engineering, Saveetha Institute of Medical and Technical Sciences Chennai, Tamil Nadu India.

3Parthipan.V, Saveetha School of Engineering, Saveetha Institute of Medical and Technical Sciences, Chennai, Tamil Nadu India.

4Rajesh. M, KRS College of Engineering, Vandavasi, India, Raga Academic Solutions, India.

Manuscript received on 16 September 2019 | Revised Manuscript received on 24 September 2019 | Manuscript Published on 11 October 2019 | PP: 1303-1307 | Volume-8 Issue-11S September 2019 | Retrieval Number: K126309811S19/2019©BEIESP | DOI: 10.35940/ijitee.K1263.09811S19

Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open-access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: The objective of the research work is to propose a strategic reasoning for information security Frame work against various attacks in business organization. The earlier information security research works and incidents include the activation of appropriate safeguards; the prevention and reduction of risks and recovery from impacts were considered for various security needs. The information security requirements that are well aligned with the business needs are essential for a secured design that may enhance product viability and return on investment (RoI) factor. Hence the strategic reasoning for information security models are implemented to unravel the issues of information security requirements based on the environments and development of business applications. The sensitive information in any business organization could be leaked by a poor planning system with various vulnerable policies to ensure that planned actions occur. A Systematic information approaches are implemented with evidences of the security breaches of an organization to enhance the overall security.

Keywords: Business Environment, Information Security
Scope of the Article: e-business