Open Access Open Access  Restricted Access Subscription or Fee Access

A Survey on Evolution in Information Security

(*) Corresponding author

Authors' affiliations



Information Security is relentlessly progressing and staging steadfast growth in many fields. This survey bolsters the belief that security will remain zestful and tumultuous. The Daily News asserts that cyber-attacks are not just a seasonal threat or dependent on specific industry environmental traits, but are constant and should remain forefront in every enterprise executive board work. Information Security is becoming popular by providing services like Cloud Security, Systems Security, Network Security, IOT Security, Automobile Security, Web-Application Security, Wireless Security, GSM Security etc. This survey paper focuses on the briefing of Information Security, on the fields in which Information Security is exponentially emerging and on new research trends in this area.
Copyright © 2017 Praise Worthy Prize - All rights reserved.


Information Security; Anonymity; Banking Security; Cyber-Terrorism; AI Security

Full Text:



M. E. Whitman, “Enemy at The Gate: Threats to Information Security”, Communications of the ACM, Vol. 46, n. 8, pp. 91-95, 2003.

L. Corrons, “The Business of Rogueware”, Communications in Computer and Information Science, Springer, Vol. 72, pp. 7-7, 2010.

L. Gordon, M. Loeb, “The Economics of Information Security Investment”, ACM Transactions on Information and System Security, Vol. 5, n. 4, pp. 438-457, 2002.

G. Dhillon, J. Backhouse,” Information System Security Management in the New Millennium”, Communications of The ACM, Vol. 43, n. 7, pp. 125-128, 2000.

R. Anderson, T. Moore, “The Economics of Information Security”, Sciencemag, Vol. 314, n. 5799, pp. 610-613.

B. V. Solmsa, R. V. Solms, “The 10 deadly sins of information security management”, Computers & Security, Elsevier, Vol. 23, n. 5, pp. 371-376, 2004.

Alkhatib, M., Alsalem, A., Efficient Hardware Implementations for Tripling Oriented Elliptic Curve Crypto-System, (2014) International Review on Computers and Software (IRECOS), 9 (4), pp. 609-617.

Wainakh, A., Wabbi, A., Alkhatib, B., Design and Develop Misconfiguration Vulnerabilities Scanner for Web Applications, (2014) International Review on Computers and Software (IRECOS), 9 (10), pp. 1682-1691.

Geetha, R., Kannan, E., Secure Communication Against Framing Attack in Wireless Sensor Network, (2015) International Review on Computers and Software (IRECOS), 10 (4), pp. 393-398.

R. K. Jassal, R. K. Sehgal, “Online Banking Security Flaws: A Study”, International Journal of Advanced Research in Computer Science and Software Engineering, Vol. 3, n. 8, pp. 1016-1021, 2013.

T. S. Brar, D. Sharma, S. S. Khurmi, “Vulnerabilities in e-banking: A study of various security aspects in e-banking”, International Journal of Computing and Business Research, pp 1-14, 2012.

J. S. Kumar, D. R. Patel, “A Survey on Internet of Things: Security and Privacy Issues”, International Journal of Computer Applications, Vol. 90, n. 11, pp. 20-26, 2014.

F. A. Alaba, M. Othman, I. A. Hashem, F. Alotaibi “Internet of Things security: A survey”, Journal of Network and Computer Applications, Vol. 88, pp. 10-28, 2017.

S. Dilek, H. Çakır, M. Aydın “Applications Of Artificial Intelligence Techniques To Combating Cyber Crimes: A Review”, International Journal of Artificial Intelligence & Applications (IJAIA), Vol. 6, n. 1, pp. 21-39, 2015.

E. Bertino, N. Islam “Botnets and Internet of Things Security”, Cybertrust IEEE Computer Society, Vol. 50, n. 2, pp. 76-79, 2017.

D. Froomkin, J. McLaughlin “FBI vs. Apple Establishes a New Phase of the Crypto Wars” The Intercept, 2016.

S. Mohurle, M. Patil, “A brief study of WannaCry Threat: Ransomware Attack 2017”, International Journal of Advanced Research in Computer Science, Vol. 8, n. 5, pp. 1938-1940, 2017.

S–Connect, “WCRY or WannaCry Ransomware Technical Analysis”, 2017.

Microsoft, “Microsoft Update catalogue for “kb4012598”, Microsoft Update Catalog, 2017.

Enshaei, M., Mohd Hanapi, Z., Othman, M., A Review: Mobile Ad Hoc Networks Challenges, Attacks, Security, Vulnerability and Routing Protocols, (2014) International Journal on Communications Antenna and Propagation (IRECAP), 4 (5), pp. 168-179.

Adnan, A., Hanapi, Z., Geographic Routing Protocols for Wireless Sensor Networks: Design and Security Perspectives, (2015) International Journal on Communications Antenna and Propagation (IRECAP), 5 (4), pp. 197-211.

Bafandehkar, M., Yasin, S., Mahmod, R., A Literature Review on Scalar Recoding Algorithms in Elliptic Curve Cryptography, (2015) International Journal on Communications Antenna and Propagation (IRECAP), 5 (4), pp. 183-189.

Bani Yassein, M., Abuein, Q., Bani Amer, A., Energy Saving in Constrained Application Protocol of Internet of Things, (2016) International Journal on Communications Antenna and Propagation (IRECAP), 6 (3), pp. 160-168.


  • There are currently no refbacks.

Please send any question about this web site to
Copyright © 2005-2024 Praise Worthy Prize