From information security to cyber security
Citations
286 citations
213 citations
210 citations
187 citations
140 citations
Cites background from "From information security to cyber ..."
...Other cyber security standards, which can be of interest, are: ISO/IEC 13335-1 [166], ISO/IEC 21827:2008 Systems Security Engineering—Capability Maturity Model (SSECMM), COBIT framework (Control Objectives for Information and related Technology) [167], IASME [168], etc....
[...]
References
911 citations
"From information security to cyber ..." refers background in this paper
...As mentioned earlier, the first three characteristics, confidentiality, integrity and availability, are commonly known as the CIA triangle model, which has been considered the industry standard for computer security since the development of the mainframe (Whitman and Mattord, 2009, p. 8)....
[...]
...Whitman and Mattord (2009) define information security as “the protection of information and its critical elements, including the systems and hardware that use, store, and transmit that information” (Whitman andMattord, 2009, p. 8)....
[...]
...Accordingly, Whitman and Mattord (2009) add accuracy, authenticity, utility and possession to the list of information characteristics that needs to be protected....
[...]
...This paper argues that, although there is a substantial overlap between cyber security and information security, these two concepts are not totally analogous....
[...]
...Already more than 50 nations have officially published some form of strategy document outlining their official stance on cyberspace, cyber crime, and/or cyber security (Klimburg, 2012)....
[...]
788 citations
"From information security to cyber ..." refers background in this paper
...Firstly, it should be clear that information security is not a product or a technology, but a process (Mitnick and Simon, 2002, p. 4)....
[...]
...The Whitehouse (2011) has outlined a cyber strategy that provides the stance of the United States of America (USA) on cyber-related issues and outlines a unified approach to the USA’s engagement with other countries on cyber issues....
[...]
249 citations
224 citations
"From information security to cyber ..." refers background in this paper
...Selfjustification of illegal activities, like copying media illegally, could even act as a catalyst that makes it easier to perform other illegal acts in future (Ariely, 2012)....
[...]