From information security to cyber security
The term cyber security is often used interchangeably with the term information security. This paper argues that, although there is a substantial overlap between cyber security and information security, these two concepts are not totally analogous. Moreover, the paper posits that cyber security goes...
Gespeichert in:
Veröffentlicht in: | Computers & security 2013-10, Vol.38, p.97-102 |
---|---|
Hauptverfasser: | , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 102 |
---|---|
container_issue | |
container_start_page | 97 |
container_title | Computers & security |
container_volume | 38 |
creator | von Solms, Rossouw van Niekerk, Johan |
description | The term cyber security is often used interchangeably with the term information security. This paper argues that, although there is a substantial overlap between cyber security and information security, these two concepts are not totally analogous. Moreover, the paper posits that cyber security goes beyond the boundaries of traditional information security to include not only the protection of information resources, but also that of other assets, including the person him/herself. In information security, reference to the human factor usually relates to the role(s) of humans in the security process. In cyber security this factor has an additional dimension, namely, the humans as potential targets of cyber attacks or even unknowingly participating in a cyber attack. This additional dimension has ethical implications for society as a whole, since the protection of certain vulnerable groups, for example children, could be seen as a societal responsibility. |
doi_str_mv | 10.1016/j.cose.2013.04.004 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_miscellaneous_1513447660</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><els_id>S0167404813000801</els_id><sourcerecordid>3062536061</sourcerecordid><originalsourceid>FETCH-LOGICAL-c424t-e213401b7f1fa412a5fcdf56244a8e7406258d00eb8b9331aef7449d9a255de23</originalsourceid><addsrcrecordid>eNqFkMFKAzEQhoMoWKsv4KkggiC7TrLJJgtepFgVCl70HNLsBFLaTU12hb69KS09eNDLDAzfzM98hFxTKCnQ-mFZ2pCwZECrEngJwE_IiCrJipqBOiWjDMmCA1fn5CKlJQCVtVIjcj-LYT3xnQtxbXofuklCO0Tfbyd9mNjtAuNxcknOnFklvDr0MfmcPX9MX4v5-8vb9GleWM54XyCjFQe6kI46wykzwtnWiZpxbhRKDjUTqgXAhVo0VUUNOsl50zaGCdEiq8bkbn93E8PXgKnXa58srlamwzAkTUUO4LKu4X-USyEYk1Jm9OYXugxD7PIjmWKNlEpUu2y2p2wMKUV0ehP92sStpqB3qvVS71TrnWoNXGfVeen2cNoka1Yums76dNxkUlVVk8uYPO45zPa-PUadrMfOYusj2l63wf8V8wMYRpHA</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1429778532</pqid></control><display><type>article</type><title>From information security to cyber security</title><source>Elsevier ScienceDirect Journals</source><creator>von Solms, Rossouw ; van Niekerk, Johan</creator><creatorcontrib>von Solms, Rossouw ; van Niekerk, Johan</creatorcontrib><description>The term cyber security is often used interchangeably with the term information security. This paper argues that, although there is a substantial overlap between cyber security and information security, these two concepts are not totally analogous. Moreover, the paper posits that cyber security goes beyond the boundaries of traditional information security to include not only the protection of information resources, but also that of other assets, including the person him/herself. In information security, reference to the human factor usually relates to the role(s) of humans in the security process. In cyber security this factor has an additional dimension, namely, the humans as potential targets of cyber attacks or even unknowingly participating in a cyber attack. This additional dimension has ethical implications for society as a whole, since the protection of certain vulnerable groups, for example children, could be seen as a societal responsibility.</description><identifier>ISSN: 0167-4048</identifier><identifier>EISSN: 1872-6208</identifier><identifier>DOI: 10.1016/j.cose.2013.04.004</identifier><identifier>CODEN: CPSEDU</identifier><language>eng</language><publisher>Amsterdam: Elsevier Ltd</publisher><subject>Applied sciences ; Boundaries ; Children ; Computer information security ; Computer science; control theory; systems ; Computer security ; Cyber security ; Cybercrime ; Cybersecurity ; Ethics ; Exact sciences and technology ; Human ; Human factors ; Information resources ; Information security ; Memory and file management (including protection and security) ; Memory organisation. Data processing ; Network security ; Risk ; Security management ; Security programs ; Software ; Studies ; Threat ; Vulnerability</subject><ispartof>Computers & security, 2013-10, Vol.38, p.97-102</ispartof><rights>2013 Elsevier Ltd</rights><rights>2014 INIST-CNRS</rights><rights>Copyright Elsevier Sequoia S.A. Oct 2013</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c424t-e213401b7f1fa412a5fcdf56244a8e7406258d00eb8b9331aef7449d9a255de23</citedby><cites>FETCH-LOGICAL-c424t-e213401b7f1fa412a5fcdf56244a8e7406258d00eb8b9331aef7449d9a255de23</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://www.sciencedirect.com/science/article/pii/S0167404813000801$$EHTML$$P50$$Gelsevier$$H</linktohtml><link.rule.ids>314,776,780,3537,27901,27902,65534</link.rule.ids><backlink>$$Uhttp://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&idt=27833978$$DView record in Pascal Francis$$Hfree_for_read</backlink></links><search><creatorcontrib>von Solms, Rossouw</creatorcontrib><creatorcontrib>van Niekerk, Johan</creatorcontrib><title>From information security to cyber security</title><title>Computers & security</title><description>The term cyber security is often used interchangeably with the term information security. This paper argues that, although there is a substantial overlap between cyber security and information security, these two concepts are not totally analogous. Moreover, the paper posits that cyber security goes beyond the boundaries of traditional information security to include not only the protection of information resources, but also that of other assets, including the person him/herself. In information security, reference to the human factor usually relates to the role(s) of humans in the security process. In cyber security this factor has an additional dimension, namely, the humans as potential targets of cyber attacks or even unknowingly participating in a cyber attack. This additional dimension has ethical implications for society as a whole, since the protection of certain vulnerable groups, for example children, could be seen as a societal responsibility.</description><subject>Applied sciences</subject><subject>Boundaries</subject><subject>Children</subject><subject>Computer information security</subject><subject>Computer science; control theory; systems</subject><subject>Computer security</subject><subject>Cyber security</subject><subject>Cybercrime</subject><subject>Cybersecurity</subject><subject>Ethics</subject><subject>Exact sciences and technology</subject><subject>Human</subject><subject>Human factors</subject><subject>Information resources</subject><subject>Information security</subject><subject>Memory and file management (including protection and security)</subject><subject>Memory organisation. Data processing</subject><subject>Network security</subject><subject>Risk</subject><subject>Security management</subject><subject>Security programs</subject><subject>Software</subject><subject>Studies</subject><subject>Threat</subject><subject>Vulnerability</subject><issn>0167-4048</issn><issn>1872-6208</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2013</creationdate><recordtype>article</recordtype><recordid>eNqFkMFKAzEQhoMoWKsv4KkggiC7TrLJJgtepFgVCl70HNLsBFLaTU12hb69KS09eNDLDAzfzM98hFxTKCnQ-mFZ2pCwZECrEngJwE_IiCrJipqBOiWjDMmCA1fn5CKlJQCVtVIjcj-LYT3xnQtxbXofuklCO0Tfbyd9mNjtAuNxcknOnFklvDr0MfmcPX9MX4v5-8vb9GleWM54XyCjFQe6kI46wykzwtnWiZpxbhRKDjUTqgXAhVo0VUUNOsl50zaGCdEiq8bkbn93E8PXgKnXa58srlamwzAkTUUO4LKu4X-USyEYk1Jm9OYXugxD7PIjmWKNlEpUu2y2p2wMKUV0ehP92sStpqB3qvVS71TrnWoNXGfVeen2cNoka1Yums76dNxkUlVVk8uYPO45zPa-PUadrMfOYusj2l63wf8V8wMYRpHA</recordid><startdate>20131001</startdate><enddate>20131001</enddate><creator>von Solms, Rossouw</creator><creator>van Niekerk, Johan</creator><general>Elsevier Ltd</general><general>Elsevier</general><general>Elsevier Sequoia S.A</general><scope>IQODW</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>K7.</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>20131001</creationdate><title>From information security to cyber security</title><author>von Solms, Rossouw ; van Niekerk, Johan</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c424t-e213401b7f1fa412a5fcdf56244a8e7406258d00eb8b9331aef7449d9a255de23</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2013</creationdate><topic>Applied sciences</topic><topic>Boundaries</topic><topic>Children</topic><topic>Computer information security</topic><topic>Computer science; control theory; systems</topic><topic>Computer security</topic><topic>Cyber security</topic><topic>Cybercrime</topic><topic>Cybersecurity</topic><topic>Ethics</topic><topic>Exact sciences and technology</topic><topic>Human</topic><topic>Human factors</topic><topic>Information resources</topic><topic>Information security</topic><topic>Memory and file management (including protection and security)</topic><topic>Memory organisation. Data processing</topic><topic>Network security</topic><topic>Risk</topic><topic>Security management</topic><topic>Security programs</topic><topic>Software</topic><topic>Studies</topic><topic>Threat</topic><topic>Vulnerability</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>von Solms, Rossouw</creatorcontrib><creatorcontrib>van Niekerk, Johan</creatorcontrib><collection>Pascal-Francis</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>ProQuest Criminal Justice (Alumni)</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>Computers & security</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>von Solms, Rossouw</au><au>van Niekerk, Johan</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>From information security to cyber security</atitle><jtitle>Computers & security</jtitle><date>2013-10-01</date><risdate>2013</risdate><volume>38</volume><spage>97</spage><epage>102</epage><pages>97-102</pages><issn>0167-4048</issn><eissn>1872-6208</eissn><coden>CPSEDU</coden><abstract>The term cyber security is often used interchangeably with the term information security. This paper argues that, although there is a substantial overlap between cyber security and information security, these two concepts are not totally analogous. Moreover, the paper posits that cyber security goes beyond the boundaries of traditional information security to include not only the protection of information resources, but also that of other assets, including the person him/herself. In information security, reference to the human factor usually relates to the role(s) of humans in the security process. In cyber security this factor has an additional dimension, namely, the humans as potential targets of cyber attacks or even unknowingly participating in a cyber attack. This additional dimension has ethical implications for society as a whole, since the protection of certain vulnerable groups, for example children, could be seen as a societal responsibility.</abstract><cop>Amsterdam</cop><pub>Elsevier Ltd</pub><doi>10.1016/j.cose.2013.04.004</doi><tpages>6</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0167-4048 |
ispartof | Computers & security, 2013-10, Vol.38, p.97-102 |
issn | 0167-4048 1872-6208 |
language | eng |
recordid | cdi_proquest_miscellaneous_1513447660 |
source | Elsevier ScienceDirect Journals |
subjects | Applied sciences Boundaries Children Computer information security Computer science control theory systems Computer security Cyber security Cybercrime Cybersecurity Ethics Exact sciences and technology Human Human factors Information resources Information security Memory and file management (including protection and security) Memory organisation. Data processing Network security Risk Security management Security programs Software Studies Threat Vulnerability |
title | From information security to cyber security |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-16T01%3A13%3A06IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=From%20information%20security%20to%20cyber%20security&rft.jtitle=Computers%20&%20security&rft.au=von%20Solms,%20Rossouw&rft.date=2013-10-01&rft.volume=38&rft.spage=97&rft.epage=102&rft.pages=97-102&rft.issn=0167-4048&rft.eissn=1872-6208&rft.coden=CPSEDU&rft_id=info:doi/10.1016/j.cose.2013.04.004&rft_dat=%3Cproquest_cross%3E3062536061%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1429778532&rft_id=info:pmid/&rft_els_id=S0167404813000801&rfr_iscdi=true |