Information security
Document Type
Book Chapter
Publication Title
Authentication technologies for cloud computing, IoT and big data
First Page
13
Last Page
36
Publisher
The Institution of Engineering and Technology
School
School of Science / ECU Security Research Institute
RAS ID
45097
Abstract
Information security is a very important component of system and network security. The understanding and implementation of the five pillars of information security, namely, confidentiality, integrity, availability, authenticity, and nonrepudiation, is fundamental to the protection of information assets from the omnipotent adversarial cyber threat. The evolving adversary requires a counter active information security program for both small and large organizations. This chapter defines the fundamental elements of information security, and presents the core standards for information security, threat classes, and data classification standards. With the rapid adoption of the Internet of Things (IoT) paradigm, IoT device security has become an important topic, which is addressed in detail in this chapter. Standards associated with information security in health care, as well as the National Institute of Standards and Technology (NIST) framework for cyber security, are also described in detail. The chapter concludes with a discussion on the foreseeable challenges for information security in the IoT era.
Access Rights
subscription content
Comments
Baig, Z., Zeadally, S., & Woodward, A. (2019). Information Security. In Y. M. Alginahi & M. N. Kabir (Eds.), Authentication technologies for cloud computing, IoT and big data (pp. 13-36). The Institution of Engineering and Technology. https://digital-library.theiet.org/content/books/10.1049/pbse009e_ch2;jsessionid=27bf9nbf5f84c.x-iet-live-01