Authentication technologies for cloud computing, IoT and big data
The Institution of Engineering and Technology
School of Science / ECU Security Research Institute
Information security is a very important component of system and network security. The understanding and implementation of the five pillars of information security, namely, confidentiality, integrity, availability, authenticity, and nonrepudiation, is fundamental to the protection of information assets from the omnipotent adversarial cyber threat. The evolving adversary requires a counter active information security program for both small and large organizations. This chapter defines the fundamental elements of information security, and presents the core standards for information security, threat classes, and data classification standards. With the rapid adoption of the Internet of Things (IoT) paradigm, IoT device security has become an important topic, which is addressed in detail in this chapter. Standards associated with information security in health care, as well as the National Institute of Standards and Technology (NIST) framework for cyber security, are also described in detail. The chapter concludes with a discussion on the foreseeable challenges for information security in the IoT era.