Your browser does not support JavaScript!

Information security

Information security

For access to this article, please select a purchase option:

Buy chapter PDF
(plus tax if applicable)
Buy Knowledge Pack
10 chapters for $120.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Your details
Why are you recommending this title?
Select reason:
Authentication Technologies for Cloud Computing, IoT and Big Data — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

Information security is a very important component of system and network security. The understanding and implementation of the five pillars of information security, namely, confidentiality, integrity, availability, authenticity, and nonrepudiation, is fundamental to the protection of information assets from the omnipotent adversarial cyber threat. The evolving adversary requires a counter active information security program for both small and large organizations. This chapter defines the fundamental elements of information security, and presents the core standards for information security, threat classes, and data classification standards. With the rapid adoption of the Internet of Things (IoT) paradigm, IoT device security has become an important topic, which is addressed in detail in this chapter. Standards associated with information security in health care, as well as the National Institute of Standards and Technology (NIST) framework for cyber security, are also described in detail. The chapter concludes with a discussion on the foreseeable challenges for information security in the IoT era.

Chapter Contents:

  • 2.1 Introduction
  • 2.2 Confidentiality
  • 2.2.1 Symmetric key cryptography
  • 2.2.2 Public key cryptography
  • 2.3 Integrity
  • 2.4 Availability
  • 2.5 Authenticity
  • 2.6 Non-repudiation
  • 2.7 Standards
  • 2.7.1 X.509
  • 2.7.2 Transport layer security
  • 2.7.3 Hashes
  • 2.7.4 Digital signatures
  • 2.7.5 Public key infrastructure
  • 2.7.6 Public key cryptography
  • 2.7.7 OAuth
  • 2.7.8 Kerberos (RFC 4120)
  • 2.8 Threat classes
  • 2.9 Data classification
  • 2.10 Information security for the IoT
  • 2.11 Health-care information security standards
  • 2.12 National Institute of Standards and Technology (NIST)—framework for improving critical infrastructure cybersecurity
  • 2.13 Challenges for information security in the IoT era
  • 2.14 Conclusion
  • References

Inspec keywords: business data processing; organisational aspects; pattern classification; computer network security; Internet of Things

Other keywords: IoT device security; information assets; cyber security; system security; counter active information security program; omnipotent adversarial cyber threat; network security; large organizations; small organizations; threat classes; data classification standards; Internet of Things

Subjects: Computer communications; Business and administrative computing; Mobile, ubiquitous and pervasive computing; Data security; Computer networks and techniques

Preview this chapter:
Zoom in

Information security, Page 1 of 2

| /docserver/preview/fulltext/books/sc/pbse009e/PBSE009E_ch2-1.gif /docserver/preview/fulltext/books/sc/pbse009e/PBSE009E_ch2-2.gif

Related content

This is a required field
Please enter a valid email address