Trust in Cyberspace: New Information Security Paradigm
- DOI
- 10.2991/iccsee.2013.40How to use a DOI?
- Keywords
- Information Security paradigm change, Cyber Weapons, non-functional specifications
- Abstract
This paper is about the differences between traditional and new Information Security paradigms, the conceptual difference between “known computer viruses” and sophisticated Cyber Weapons, the existence of a Cyber Weapons “black market”, the differences between Cyber War, Cyber Terrorism and Cyber Crime, the new Information Security paradigm characteristics and the author’s conclusion about the new Information Security paradigm to be faced. Authors remark that recently discovered Cyber Weapons can be easily described as one of the most complex IT threats ever discovered. They are big and incredibly sophisticated. They pretty much redefine the notion of Information Security. Considering the existence of a sort of Cyber Weapon black market, very sophisticated malware in terrorist and criminal hands changes the Information Security scenario and changes also the Information Security paradigm. Obtaining people’s trust in cyberspace is a new challenge which implies working on the improvement and reinforcement of information and communication security. Paper points it must be established that, Information System specifications must have a new balance between functional and non-functional specifications. Currently, and in actual terms, functional specifications have priority over the non-functional ones. Project budget and other resources must be allocated to obtain goals related to concepts like Confidentiality, Integrity, Availability and Authenticity in the context of non-functional specifications. In the new Information Security paradigm, Security must be the key issue in an Information System conceptual design, development, implantation, use and maintenance.
- Copyright
- © 2013, the Authors. Published by Atlantis Press.
- Open Access
- This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).
Cite this article
TY - CONF AU - R. Uzal AU - D. Riesco AU - G. Montejano AU - N. Debnath PY - 2013/03 DA - 2013/03 TI - Trust in Cyberspace: New Information Security Paradigm BT - Proceedings of the 2nd International Conference on Computer Science and Electronics Engineering (ICCSEE 2013) PB - Atlantis Press SP - 150 EP - 154 SN - 1951-6851 UR - https://doi.org/10.2991/iccsee.2013.40 DO - 10.2991/iccsee.2013.40 ID - Uzal2013/03 ER -