Information security

Author Identifier

Andrew Woodward

https://orcid.org/0000-0001-6322-4958

Document Type

Book Chapter

Publication Title

Authentication technologies for cloud computing, IoT and big data

First Page

13

Last Page

36

Publisher

The Institution of Engineering and Technology

School

School of Science / ECU Security Research Institute

RAS ID

45097

Comments

Baig, Z., Zeadally, S., & Woodward, A. (2019). Information Security. In Y. M. Alginahi & M. N. Kabir (Eds.), Authentication technologies for cloud computing, IoT and big data (pp. 13-36). The Institution of Engineering and Technology. https://digital-library.theiet.org/content/books/10.1049/pbse009e_ch2;jsessionid=27bf9nbf5f84c.x-iet-live-01

Abstract

Information security is a very important component of system and network security. The understanding and implementation of the five pillars of information security, namely, confidentiality, integrity, availability, authenticity, and nonrepudiation, is fundamental to the protection of information assets from the omnipotent adversarial cyber threat. The evolving adversary requires a counter active information security program for both small and large organizations. This chapter defines the fundamental elements of information security, and presents the core standards for information security, threat classes, and data classification standards. With the rapid adoption of the Internet of Things (IoT) paradigm, IoT device security has become an important topic, which is addressed in detail in this chapter. Standards associated with information security in health care, as well as the National Institute of Standards and Technology (NIST) framework for cyber security, are also described in detail. The chapter concludes with a discussion on the foreseeable challenges for information security in the IoT era.

Access Rights

subscription content

Share

 
COinS