From information security to cyber security

The term cyber security is often used interchangeably with the term information security. This paper argues that, although there is a substantial overlap between cyber security and information security, these two concepts are not totally analogous. Moreover, the paper posits that cyber security goes...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Computers & security 2013-10, Vol.38, p.97-102
Hauptverfasser: von Solms, Rossouw, van Niekerk, Johan
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 102
container_issue
container_start_page 97
container_title Computers & security
container_volume 38
creator von Solms, Rossouw
van Niekerk, Johan
description The term cyber security is often used interchangeably with the term information security. This paper argues that, although there is a substantial overlap between cyber security and information security, these two concepts are not totally analogous. Moreover, the paper posits that cyber security goes beyond the boundaries of traditional information security to include not only the protection of information resources, but also that of other assets, including the person him/herself. In information security, reference to the human factor usually relates to the role(s) of humans in the security process. In cyber security this factor has an additional dimension, namely, the humans as potential targets of cyber attacks or even unknowingly participating in a cyber attack. This additional dimension has ethical implications for society as a whole, since the protection of certain vulnerable groups, for example children, could be seen as a societal responsibility.
doi_str_mv 10.1016/j.cose.2013.04.004
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_miscellaneous_1513447660</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><els_id>S0167404813000801</els_id><sourcerecordid>3062536061</sourcerecordid><originalsourceid>FETCH-LOGICAL-c424t-e213401b7f1fa412a5fcdf56244a8e7406258d00eb8b9331aef7449d9a255de23</originalsourceid><addsrcrecordid>eNqFkMFKAzEQhoMoWKsv4KkggiC7TrLJJgtepFgVCl70HNLsBFLaTU12hb69KS09eNDLDAzfzM98hFxTKCnQ-mFZ2pCwZECrEngJwE_IiCrJipqBOiWjDMmCA1fn5CKlJQCVtVIjcj-LYT3xnQtxbXofuklCO0Tfbyd9mNjtAuNxcknOnFklvDr0MfmcPX9MX4v5-8vb9GleWM54XyCjFQe6kI46wykzwtnWiZpxbhRKDjUTqgXAhVo0VUUNOsl50zaGCdEiq8bkbn93E8PXgKnXa58srlamwzAkTUUO4LKu4X-USyEYk1Jm9OYXugxD7PIjmWKNlEpUu2y2p2wMKUV0ehP92sStpqB3qvVS71TrnWoNXGfVeen2cNoka1Yums76dNxkUlVVk8uYPO45zPa-PUadrMfOYusj2l63wf8V8wMYRpHA</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1429778532</pqid></control><display><type>article</type><title>From information security to cyber security</title><source>Elsevier ScienceDirect Journals</source><creator>von Solms, Rossouw ; van Niekerk, Johan</creator><creatorcontrib>von Solms, Rossouw ; van Niekerk, Johan</creatorcontrib><description>The term cyber security is often used interchangeably with the term information security. This paper argues that, although there is a substantial overlap between cyber security and information security, these two concepts are not totally analogous. Moreover, the paper posits that cyber security goes beyond the boundaries of traditional information security to include not only the protection of information resources, but also that of other assets, including the person him/herself. In information security, reference to the human factor usually relates to the role(s) of humans in the security process. In cyber security this factor has an additional dimension, namely, the humans as potential targets of cyber attacks or even unknowingly participating in a cyber attack. This additional dimension has ethical implications for society as a whole, since the protection of certain vulnerable groups, for example children, could be seen as a societal responsibility.</description><identifier>ISSN: 0167-4048</identifier><identifier>EISSN: 1872-6208</identifier><identifier>DOI: 10.1016/j.cose.2013.04.004</identifier><identifier>CODEN: CPSEDU</identifier><language>eng</language><publisher>Amsterdam: Elsevier Ltd</publisher><subject>Applied sciences ; Boundaries ; Children ; Computer information security ; Computer science; control theory; systems ; Computer security ; Cyber security ; Cybercrime ; Cybersecurity ; Ethics ; Exact sciences and technology ; Human ; Human factors ; Information resources ; Information security ; Memory and file management (including protection and security) ; Memory organisation. Data processing ; Network security ; Risk ; Security management ; Security programs ; Software ; Studies ; Threat ; Vulnerability</subject><ispartof>Computers &amp; security, 2013-10, Vol.38, p.97-102</ispartof><rights>2013 Elsevier Ltd</rights><rights>2014 INIST-CNRS</rights><rights>Copyright Elsevier Sequoia S.A. Oct 2013</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c424t-e213401b7f1fa412a5fcdf56244a8e7406258d00eb8b9331aef7449d9a255de23</citedby><cites>FETCH-LOGICAL-c424t-e213401b7f1fa412a5fcdf56244a8e7406258d00eb8b9331aef7449d9a255de23</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://www.sciencedirect.com/science/article/pii/S0167404813000801$$EHTML$$P50$$Gelsevier$$H</linktohtml><link.rule.ids>314,776,780,3537,27901,27902,65534</link.rule.ids><backlink>$$Uhttp://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&amp;idt=27833978$$DView record in Pascal Francis$$Hfree_for_read</backlink></links><search><creatorcontrib>von Solms, Rossouw</creatorcontrib><creatorcontrib>van Niekerk, Johan</creatorcontrib><title>From information security to cyber security</title><title>Computers &amp; security</title><description>The term cyber security is often used interchangeably with the term information security. This paper argues that, although there is a substantial overlap between cyber security and information security, these two concepts are not totally analogous. Moreover, the paper posits that cyber security goes beyond the boundaries of traditional information security to include not only the protection of information resources, but also that of other assets, including the person him/herself. In information security, reference to the human factor usually relates to the role(s) of humans in the security process. In cyber security this factor has an additional dimension, namely, the humans as potential targets of cyber attacks or even unknowingly participating in a cyber attack. This additional dimension has ethical implications for society as a whole, since the protection of certain vulnerable groups, for example children, could be seen as a societal responsibility.</description><subject>Applied sciences</subject><subject>Boundaries</subject><subject>Children</subject><subject>Computer information security</subject><subject>Computer science; control theory; systems</subject><subject>Computer security</subject><subject>Cyber security</subject><subject>Cybercrime</subject><subject>Cybersecurity</subject><subject>Ethics</subject><subject>Exact sciences and technology</subject><subject>Human</subject><subject>Human factors</subject><subject>Information resources</subject><subject>Information security</subject><subject>Memory and file management (including protection and security)</subject><subject>Memory organisation. Data processing</subject><subject>Network security</subject><subject>Risk</subject><subject>Security management</subject><subject>Security programs</subject><subject>Software</subject><subject>Studies</subject><subject>Threat</subject><subject>Vulnerability</subject><issn>0167-4048</issn><issn>1872-6208</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2013</creationdate><recordtype>article</recordtype><recordid>eNqFkMFKAzEQhoMoWKsv4KkggiC7TrLJJgtepFgVCl70HNLsBFLaTU12hb69KS09eNDLDAzfzM98hFxTKCnQ-mFZ2pCwZECrEngJwE_IiCrJipqBOiWjDMmCA1fn5CKlJQCVtVIjcj-LYT3xnQtxbXofuklCO0Tfbyd9mNjtAuNxcknOnFklvDr0MfmcPX9MX4v5-8vb9GleWM54XyCjFQe6kI46wykzwtnWiZpxbhRKDjUTqgXAhVo0VUUNOsl50zaGCdEiq8bkbn93E8PXgKnXa58srlamwzAkTUUO4LKu4X-USyEYk1Jm9OYXugxD7PIjmWKNlEpUu2y2p2wMKUV0ehP92sStpqB3qvVS71TrnWoNXGfVeen2cNoka1Yums76dNxkUlVVk8uYPO45zPa-PUadrMfOYusj2l63wf8V8wMYRpHA</recordid><startdate>20131001</startdate><enddate>20131001</enddate><creator>von Solms, Rossouw</creator><creator>van Niekerk, Johan</creator><general>Elsevier Ltd</general><general>Elsevier</general><general>Elsevier Sequoia S.A</general><scope>IQODW</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>K7.</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>20131001</creationdate><title>From information security to cyber security</title><author>von Solms, Rossouw ; van Niekerk, Johan</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c424t-e213401b7f1fa412a5fcdf56244a8e7406258d00eb8b9331aef7449d9a255de23</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2013</creationdate><topic>Applied sciences</topic><topic>Boundaries</topic><topic>Children</topic><topic>Computer information security</topic><topic>Computer science; control theory; systems</topic><topic>Computer security</topic><topic>Cyber security</topic><topic>Cybercrime</topic><topic>Cybersecurity</topic><topic>Ethics</topic><topic>Exact sciences and technology</topic><topic>Human</topic><topic>Human factors</topic><topic>Information resources</topic><topic>Information security</topic><topic>Memory and file management (including protection and security)</topic><topic>Memory organisation. Data processing</topic><topic>Network security</topic><topic>Risk</topic><topic>Security management</topic><topic>Security programs</topic><topic>Software</topic><topic>Studies</topic><topic>Threat</topic><topic>Vulnerability</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>von Solms, Rossouw</creatorcontrib><creatorcontrib>van Niekerk, Johan</creatorcontrib><collection>Pascal-Francis</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>ProQuest Criminal Justice (Alumni)</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>Computers &amp; security</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>von Solms, Rossouw</au><au>van Niekerk, Johan</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>From information security to cyber security</atitle><jtitle>Computers &amp; security</jtitle><date>2013-10-01</date><risdate>2013</risdate><volume>38</volume><spage>97</spage><epage>102</epage><pages>97-102</pages><issn>0167-4048</issn><eissn>1872-6208</eissn><coden>CPSEDU</coden><abstract>The term cyber security is often used interchangeably with the term information security. This paper argues that, although there is a substantial overlap between cyber security and information security, these two concepts are not totally analogous. Moreover, the paper posits that cyber security goes beyond the boundaries of traditional information security to include not only the protection of information resources, but also that of other assets, including the person him/herself. In information security, reference to the human factor usually relates to the role(s) of humans in the security process. In cyber security this factor has an additional dimension, namely, the humans as potential targets of cyber attacks or even unknowingly participating in a cyber attack. This additional dimension has ethical implications for society as a whole, since the protection of certain vulnerable groups, for example children, could be seen as a societal responsibility.</abstract><cop>Amsterdam</cop><pub>Elsevier Ltd</pub><doi>10.1016/j.cose.2013.04.004</doi><tpages>6</tpages></addata></record>
fulltext fulltext
identifier ISSN: 0167-4048
ispartof Computers & security, 2013-10, Vol.38, p.97-102
issn 0167-4048
1872-6208
language eng
recordid cdi_proquest_miscellaneous_1513447660
source Elsevier ScienceDirect Journals
subjects Applied sciences
Boundaries
Children
Computer information security
Computer science
control theory
systems
Computer security
Cyber security
Cybercrime
Cybersecurity
Ethics
Exact sciences and technology
Human
Human factors
Information resources
Information security
Memory and file management (including protection and security)
Memory organisation. Data processing
Network security
Risk
Security management
Security programs
Software
Studies
Threat
Vulnerability
title From information security to cyber security
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-16T01%3A13%3A06IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=From%20information%20security%20to%20cyber%20security&rft.jtitle=Computers%20&%20security&rft.au=von%20Solms,%20Rossouw&rft.date=2013-10-01&rft.volume=38&rft.spage=97&rft.epage=102&rft.pages=97-102&rft.issn=0167-4048&rft.eissn=1872-6208&rft.coden=CPSEDU&rft_id=info:doi/10.1016/j.cose.2013.04.004&rft_dat=%3Cproquest_cross%3E3062536061%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1429778532&rft_id=info:pmid/&rft_els_id=S0167404813000801&rfr_iscdi=true