Proceedings of the 2nd International Conference on Computer Science and Electronics Engineering (ICCSEE 2013)

Trust in Cyberspace: New Information Security Paradigm

Authors
R. Uzal, D. Riesco, G. Montejano, N. Debnath
Corresponding Author
R. Uzal
Available Online March 2013.
DOI
10.2991/iccsee.2013.40How to use a DOI?
Keywords
Information Security paradigm change, Cyber Weapons, non-functional specifications
Abstract

This paper is about the differences between traditional and new Information Security paradigms, the conceptual difference between “known computer viruses” and sophisticated Cyber Weapons, the existence of a Cyber Weapons “black market”, the differences between Cyber War, Cyber Terrorism and Cyber Crime, the new Information Security paradigm characteristics and the author’s conclusion about the new Information Security paradigm to be faced. Authors remark that recently discovered Cyber Weapons can be easily described as one of the most complex IT threats ever discovered. They are big and incredibly sophisticated. They pretty much redefine the notion of Information Security. Considering the existence of a sort of Cyber Weapon black market, very sophisticated malware in terrorist and criminal hands changes the Information Security scenario and changes also the Information Security paradigm. Obtaining people’s trust in cyberspace is a new challenge which implies working on the improvement and reinforcement of information and communication security. Paper points it must be established that, Information System specifications must have a new balance between functional and non-functional specifications. Currently, and in actual terms, functional specifications have priority over the non-functional ones. Project budget and other resources must be allocated to obtain goals related to concepts like Confidentiality, Integrity, Availability and Authenticity in the context of non-functional specifications. In the new Information Security paradigm, Security must be the key issue in an Information System conceptual design, development, implantation, use and maintenance.

Copyright
© 2013, the Authors. Published by Atlantis Press.
Open Access
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).

Download article (PDF)

Volume Title
Proceedings of the 2nd International Conference on Computer Science and Electronics Engineering (ICCSEE 2013)
Series
Advances in Intelligent Systems Research
Publication Date
March 2013
ISBN
10.2991/iccsee.2013.40
ISSN
1951-6851
DOI
10.2991/iccsee.2013.40How to use a DOI?
Copyright
© 2013, the Authors. Published by Atlantis Press.
Open Access
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).

Cite this article

TY  - CONF
AU  - R. Uzal
AU  - D. Riesco
AU  - G. Montejano
AU  - N. Debnath
PY  - 2013/03
DA  - 2013/03
TI  - Trust in Cyberspace: New Information Security Paradigm
BT  - Proceedings of the 2nd International Conference on Computer Science and Electronics Engineering (ICCSEE 2013)
PB  - Atlantis Press
SP  - 150
EP  - 154
SN  - 1951-6851
UR  - https://doi.org/10.2991/iccsee.2013.40
DO  - 10.2991/iccsee.2013.40
ID  - Uzal2013/03
ER  -