The Journal of Information Science and Technology Association
We introduce the featuring topics of new technologies related to information science, information technology, and information management as review articles. We also publish serializations or lectures related to searcher's practical affairs (e.g. how to search necessary information, comparing databases) and translated papers, book reviews, forum reports for providing free remarks of each member. It is also a place to present original papers on the theory and applications of information science technology and its peripheral fields. We make the articles open access after 6 months of embargo.
Each organization has a network infrastructure construction department and a security response team so that we can always use the Internet safely. They work together to prevent external attacks and malware infections. Their goal is to prevent incidents such as malfunction of personal computers and various servers, leakage of personal and confidential information, and falsification of Web sites. In this paper, after explaining security technology and cyber attacks, we will introduce various methods, attempts and daily battles to secure information security performed by a special organization such as a university.
Information security and related technology has increasingly became important as use of the Internet and Info-communication technology rapidly grew in late 1990's. In the early stage of the Internet has developed with mutual trusts of participating organizations then when it became to be used for various important purpose variety of security incidents occurred and various efforts have been taken to solve such security problems. In this paper by introducing various security incident cases, standardized security frameworks and current and future technical approach on information security are explained.
NISC is the center of national Information security policy in Japan. It settles on fundamental strategies, plans measures for governmental agencies and critical infrastructure industries, enlightens the public and conducts international issues. This article introduces to recent measures the following, for governmental agencies. - Establishing the government-wide framework for information security. - Publishing the annual report. - Development of "Security by Design". - Installing sender authentication technology. - Enforcement of IT security inoculation and penetration test. - Forming ministerial CSIRTs.
The remarkable growth of the Internet and the World Wide Web has accelerates the growth of Digital Library. University libraries have faced to the issue to provide an attractive Digital Library to the users. On the other hand, it is coming more and more important to design a firm security system. I want to show you a general idea of our new library system and it's security system.
Firewalls are used when security-conscious networks such as corporate local area networks are connected to the Internet. To set up firewalls, such technologies as packet filtering and application gateway can be utilized. Recently commercial packages which provide firewall functionality began to appear in the market. In order to fight against ever improving invasion techniques, Internet users must have a solid knowledge on security and firewalls and be sensitive to the new information.