Information Security and the use of Ontologies during the process of Document Recovery

Proceedings of The 4th International Conference on Applied Research in Science, Technology and Knowledge

Year: 2019

DOI: https://www.doi.org/10.33422/4th.stk.2019.11.677

[Fulltext PDF]

Information Security and the use of Ontologies during the process of Document Recovery

Jonida Shehu, Endri Xhina and Diana Shehu

 

 

ABSTRACT: 

Information security is considered a matter of particular importance for information systems. Public administration, but also other e-government institutions possess essential documents related to their internal functioning or sensitive information about citizens. Attacks on information systems are diverse and use different methods of stealing, altering or destroying data. After the attack, the IT personnel responsible for the security of the systems should have some action plans on the reassessment of information, and the use of ontologies at this point could facilitate this process. If the data of an institution is structured using semantic web technologies, it is possible to analyze the missing information by performing several queries on the relevant ontology. Performing this search on the ontology provides the ability to reason on the content of information and logical connections that may exist between the changed or lost documents. In this paper, we identify and define the risks that threaten the information systems and discuss some of the attacks correlated to these risks. We focus on the risks that result in altering or losing information. Besides, we discuss semantic web technologies, their use in different application domains, especially the advantages of their use in the case of information security. Finally, we model an ontology in the domain of auditing, which includes information of document structure, auditors, and audits. With the semantic search on the ontology, we tend to discover corrupted documents by comparing them with the original information already stored in the ontology.

Keywords: information security, ontologies, semantic web technologies.