Information security: The moving target

Information security has evolved from addressing minor and harmless security breaches to managing those with a huge impact on organisations' economic growth. This paper investigates the evolution of information security; where it came from, where it is today and the direction in which it is mov...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Computers & security 2009-05, Vol.28 (3), p.189-198
Hauptverfasser: Dlamini, M.T., Eloff, J.H.P., Eloff, M.M.
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 198
container_issue 3
container_start_page 189
container_title Computers & security
container_volume 28
creator Dlamini, M.T.
Eloff, J.H.P.
Eloff, M.M.
description Information security has evolved from addressing minor and harmless security breaches to managing those with a huge impact on organisations' economic growth. This paper investigates the evolution of information security; where it came from, where it is today and the direction in which it is moving. It is argued that information security is not about looking at the past in anger of an attack once faced; neither is it about looking at the present in fear of being attacked; nor about looking at the future with uncertainty about what might befall us. The message is that organisations and individuals must be alert at all times. Research conducted for this paper explored literature on past security issues to set the scene. This is followed by the assessment and analysis of information security publications in conjunction with surveys conducted in industry. Results obtained are compared and analysed, enabling the development of a comprehensive view regarding the current status of the information security landscape. Furthermore, this paper also highlights critical information security issues that are being overlooked or not being addressed by research efforts currently undertaken. New research efforts are required that minimise the gap between regulatory issues and technical implementations.
doi_str_mv 10.1016/j.cose.2008.11.007
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_miscellaneous_34442230</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><els_id>S0167404808001168</els_id><sourcerecordid>1671700511</sourcerecordid><originalsourceid>FETCH-LOGICAL-c464t-5d272b95dd3329aba816810fba2af44005262f15717a1134e16840f1c33ee5cc3</originalsourceid><addsrcrecordid>eNqNkT9PwzAQxS0EEqXwBZgqBpgS7mwncRELqvhTqRJLmS3XuRRXbVzsBKnfHldlYkC95Yb7vdO7e4xdI-QIWN6vcusj5RxA5Yg5QHXCBqgqnpUc1CkbJKjKJEh1zi5iXAFgVSo1YHfTtvFhYzrn21Ek2wfX7R5G808abfy3a5ejzoQldZfsrDHrSFe_fcg-Xp7nk7ds9v46nTzNMitL2WVFzSu-GBd1LQQfm4VRWCqEZmG4aaQEKHjJGywqrAyikJTGEhq0QhAV1oohuz3s3Qb_1VPs9MZFS-u1acn3UQspJecCjgCTk-IIkEMpeKoE3vwBV74Pbbo2MZVQIplOED9ANvgYAzV6G9zGhJ1G0Pso9Ervo9D7KDSiTlEk0eNBROlz346CjtZRa6l2gWyna-_-k_8Ax-KO5A</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>207383717</pqid></control><display><type>article</type><title>Information security: The moving target</title><source>Elsevier ScienceDirect Journals Complete</source><creator>Dlamini, M.T. ; Eloff, J.H.P. ; Eloff, M.M.</creator><creatorcontrib>Dlamini, M.T. ; Eloff, J.H.P. ; Eloff, M.M.</creatorcontrib><description>Information security has evolved from addressing minor and harmless security breaches to managing those with a huge impact on organisations' economic growth. This paper investigates the evolution of information security; where it came from, where it is today and the direction in which it is moving. It is argued that information security is not about looking at the past in anger of an attack once faced; neither is it about looking at the present in fear of being attacked; nor about looking at the future with uncertainty about what might befall us. The message is that organisations and individuals must be alert at all times. Research conducted for this paper explored literature on past security issues to set the scene. This is followed by the assessment and analysis of information security publications in conjunction with surveys conducted in industry. Results obtained are compared and analysed, enabling the development of a comprehensive view regarding the current status of the information security landscape. Furthermore, this paper also highlights critical information security issues that are being overlooked or not being addressed by research efforts currently undertaken. New research efforts are required that minimise the gap between regulatory issues and technical implementations.</description><identifier>ISSN: 0167-4048</identifier><identifier>EISSN: 1872-6208</identifier><identifier>DOI: 10.1016/j.cose.2008.11.007</identifier><identifier>CODEN: CPSEDU</identifier><language>eng</language><publisher>Amsterdam: Elsevier Ltd</publisher><subject>Comparative analysis ; Data integrity ; Information security ; Information security topics ; Information security trends ; Security breaches ; Security journals ; Security management ; Studies</subject><ispartof>Computers &amp; security, 2009-05, Vol.28 (3), p.189-198</ispartof><rights>2008 Elsevier Ltd</rights><rights>Copyright Elsevier Sequoia S.A. May/Jun 2009</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c464t-5d272b95dd3329aba816810fba2af44005262f15717a1134e16840f1c33ee5cc3</citedby><cites>FETCH-LOGICAL-c464t-5d272b95dd3329aba816810fba2af44005262f15717a1134e16840f1c33ee5cc3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://www.sciencedirect.com/science/article/pii/S0167404808001168$$EHTML$$P50$$Gelsevier$$H</linktohtml><link.rule.ids>314,776,780,3537,27901,27902,65534</link.rule.ids></links><search><creatorcontrib>Dlamini, M.T.</creatorcontrib><creatorcontrib>Eloff, J.H.P.</creatorcontrib><creatorcontrib>Eloff, M.M.</creatorcontrib><title>Information security: The moving target</title><title>Computers &amp; security</title><description>Information security has evolved from addressing minor and harmless security breaches to managing those with a huge impact on organisations' economic growth. This paper investigates the evolution of information security; where it came from, where it is today and the direction in which it is moving. It is argued that information security is not about looking at the past in anger of an attack once faced; neither is it about looking at the present in fear of being attacked; nor about looking at the future with uncertainty about what might befall us. The message is that organisations and individuals must be alert at all times. Research conducted for this paper explored literature on past security issues to set the scene. This is followed by the assessment and analysis of information security publications in conjunction with surveys conducted in industry. Results obtained are compared and analysed, enabling the development of a comprehensive view regarding the current status of the information security landscape. Furthermore, this paper also highlights critical information security issues that are being overlooked or not being addressed by research efforts currently undertaken. New research efforts are required that minimise the gap between regulatory issues and technical implementations.</description><subject>Comparative analysis</subject><subject>Data integrity</subject><subject>Information security</subject><subject>Information security topics</subject><subject>Information security trends</subject><subject>Security breaches</subject><subject>Security journals</subject><subject>Security management</subject><subject>Studies</subject><issn>0167-4048</issn><issn>1872-6208</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2009</creationdate><recordtype>article</recordtype><recordid>eNqNkT9PwzAQxS0EEqXwBZgqBpgS7mwncRELqvhTqRJLmS3XuRRXbVzsBKnfHldlYkC95Yb7vdO7e4xdI-QIWN6vcusj5RxA5Yg5QHXCBqgqnpUc1CkbJKjKJEh1zi5iXAFgVSo1YHfTtvFhYzrn21Ek2wfX7R5G808abfy3a5ejzoQldZfsrDHrSFe_fcg-Xp7nk7ds9v46nTzNMitL2WVFzSu-GBd1LQQfm4VRWCqEZmG4aaQEKHjJGywqrAyikJTGEhq0QhAV1oohuz3s3Qb_1VPs9MZFS-u1acn3UQspJecCjgCTk-IIkEMpeKoE3vwBV74Pbbo2MZVQIplOED9ANvgYAzV6G9zGhJ1G0Pso9Ervo9D7KDSiTlEk0eNBROlz346CjtZRa6l2gWyna-_-k_8Ax-KO5A</recordid><startdate>20090501</startdate><enddate>20090501</enddate><creator>Dlamini, M.T.</creator><creator>Eloff, J.H.P.</creator><creator>Eloff, M.M.</creator><general>Elsevier Ltd</general><general>Elsevier Sequoia S.A</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>K7.</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>7U1</scope><scope>7U2</scope><scope>C1K</scope></search><sort><creationdate>20090501</creationdate><title>Information security: The moving target</title><author>Dlamini, M.T. ; Eloff, J.H.P. ; Eloff, M.M.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c464t-5d272b95dd3329aba816810fba2af44005262f15717a1134e16840f1c33ee5cc3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2009</creationdate><topic>Comparative analysis</topic><topic>Data integrity</topic><topic>Information security</topic><topic>Information security topics</topic><topic>Information security trends</topic><topic>Security breaches</topic><topic>Security journals</topic><topic>Security management</topic><topic>Studies</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Dlamini, M.T.</creatorcontrib><creatorcontrib>Eloff, J.H.P.</creatorcontrib><creatorcontrib>Eloff, M.M.</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>ProQuest Criminal Justice (Alumni)</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Risk Abstracts</collection><collection>Safety Science and Risk</collection><collection>Environmental Sciences and Pollution Management</collection><jtitle>Computers &amp; security</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Dlamini, M.T.</au><au>Eloff, J.H.P.</au><au>Eloff, M.M.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Information security: The moving target</atitle><jtitle>Computers &amp; security</jtitle><date>2009-05-01</date><risdate>2009</risdate><volume>28</volume><issue>3</issue><spage>189</spage><epage>198</epage><pages>189-198</pages><issn>0167-4048</issn><eissn>1872-6208</eissn><coden>CPSEDU</coden><abstract>Information security has evolved from addressing minor and harmless security breaches to managing those with a huge impact on organisations' economic growth. This paper investigates the evolution of information security; where it came from, where it is today and the direction in which it is moving. It is argued that information security is not about looking at the past in anger of an attack once faced; neither is it about looking at the present in fear of being attacked; nor about looking at the future with uncertainty about what might befall us. The message is that organisations and individuals must be alert at all times. Research conducted for this paper explored literature on past security issues to set the scene. This is followed by the assessment and analysis of information security publications in conjunction with surveys conducted in industry. Results obtained are compared and analysed, enabling the development of a comprehensive view regarding the current status of the information security landscape. Furthermore, this paper also highlights critical information security issues that are being overlooked or not being addressed by research efforts currently undertaken. New research efforts are required that minimise the gap between regulatory issues and technical implementations.</abstract><cop>Amsterdam</cop><pub>Elsevier Ltd</pub><doi>10.1016/j.cose.2008.11.007</doi><tpages>10</tpages><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 0167-4048
ispartof Computers & security, 2009-05, Vol.28 (3), p.189-198
issn 0167-4048
1872-6208
language eng
recordid cdi_proquest_miscellaneous_34442230
source Elsevier ScienceDirect Journals Complete
subjects Comparative analysis
Data integrity
Information security
Information security topics
Information security trends
Security breaches
Security journals
Security management
Studies
title Information security: The moving target
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-21T19%3A38%3A35IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Information%20security:%20The%20moving%20target&rft.jtitle=Computers%20&%20security&rft.au=Dlamini,%20M.T.&rft.date=2009-05-01&rft.volume=28&rft.issue=3&rft.spage=189&rft.epage=198&rft.pages=189-198&rft.issn=0167-4048&rft.eissn=1872-6208&rft.coden=CPSEDU&rft_id=info:doi/10.1016/j.cose.2008.11.007&rft_dat=%3Cproquest_cross%3E1671700511%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=207383717&rft_id=info:pmid/&rft_els_id=S0167404808001168&rfr_iscdi=true