Information security

Author Identifier

Andrew Woodward

Document Type

Book Chapter

Publication Title

Authentication technologies for cloud computing, IoT and big data

First Page


Last Page



The Institution of Engineering and Technology


School of Science / ECU Security Research Institute




Baig, Z., Zeadally, S., & Woodward, A. (2019). Information Security. In Y. M. Alginahi & M. N. Kabir (Eds.), Authentication technologies for cloud computing, IoT and big data (pp. 13-36). The Institution of Engineering and Technology.;jsessionid=27bf9nbf5f84c.x-iet-live-01


Information security is a very important component of system and network security. The understanding and implementation of the five pillars of information security, namely, confidentiality, integrity, availability, authenticity, and nonrepudiation, is fundamental to the protection of information assets from the omnipotent adversarial cyber threat. The evolving adversary requires a counter active information security program for both small and large organizations. This chapter defines the fundamental elements of information security, and presents the core standards for information security, threat classes, and data classification standards. With the rapid adoption of the Internet of Things (IoT) paradigm, IoT device security has become an important topic, which is addressed in detail in this chapter. Standards associated with information security in health care, as well as the National Institute of Standards and Technology (NIST) framework for cyber security, are also described in detail. The chapter concludes with a discussion on the foreseeable challenges for information security in the IoT era.

Access Rights

subscription content