Technologies' Application, Rules, and Challenges of Information Security on Information and Communication Technologies | IEEE Conference Publication | IEEE Xplore