{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,15]],"date-time":"2024-09-15T22:39:36Z","timestamp":1726439976814},"reference-count":3,"publisher":"Association for Computing Machinery (ACM)","issue":"January","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Ubiquity"],"published-print":{"date-parts":[[2006,1]]},"abstract":"Nowadays, information is one of the very important assets in almost all organizations. Once the internal networks of those organizations are connected to the Internet, it becomes a potential target for cyber attacks. In order to secure the systems and information, each company or organization should conduct a self-hacking-audit, analyze the threats and eliminate it beforegetting any problem. This paper explains about the main goals of information security, its major threats and some suggestions to prevent the systems from major threats.<\/jats:p>","DOI":"10.1145\/1119621.1117695","type":"journal-article","created":{"date-parts":[[2009,10,6]],"date-time":"2009-10-06T18:18:59Z","timestamp":1254853139000},"page":"2-2","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Information security"],"prefix":"10.1145","volume":"2006","author":[{"given":"John Peter","family":"Jesan","sequence":"first","affiliation":[{"name":"Graduate School of Computer Information Sciences, Nova Southeastern University"}]}],"member":"320","published-online":{"date-parts":[[2006,1]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"McClure S. & Shah Saumil & Shah Shreeraj (2003). Web Hacking : Attacks and Defense. Boston: Pearson Education Inc McClure S. & Shah Saumil & Shah Shreeraj (2003). Web Hacking : Attacks and Defense. Boston: Pearson Education Inc"},{"key":"e_1_2_1_2_1","unstructured":"Jacobs J. & Clemmer L. & Dalton M. & Rogers R. & Posluns J (2003). SSCP: Systems Security Certification Practitioner: Rockland: Syngress Publishing Inc. Jacobs J. & Clemmer L. & Dalton M. & Rogers R. & Posluns J (2003). SSCP: Systems Security Certification Practitioner: Rockland: Syngress Publishing Inc."},{"key":"e_1_2_1_3_1","unstructured":"Bishop M. (2003). Computer Security Art and Science: Boston: Pearson Education Inc Bishop M. (2003). Computer Security Art and Science: Boston: Pearson Education Inc"}],"container-title":["Ubiquity"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/ft_gateway.cfm?id=1117695&ftid=711728&dwn=1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,28]],"date-time":"2022-12-28T19:50:06Z","timestamp":1672257006000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1119621.1117695"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,1]]},"references-count":3,"journal-issue":{"issue":"January","published-print":{"date-parts":[[2006,1]]}},"alternative-id":["10.1145\/1119621.1117695"],"URL":"https:\/\/doi.org\/10.1145\/1119621.1117695","relation":{},"ISSN":["1530-2180"],"issn-type":[{"type":"electronic","value":"1530-2180"}],"subject":[],"published":{"date-parts":[[2006,1]]},"assertion":[{"value":"2006-01-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}