Skip to main content

2018 | OriginalPaper | Buchkapitel

116. Cyber Security Policies for Hyperconnectivity and Internet of Things: A Process for Managing Connectivity

verfasst von : Maurice Dawson

Erschienen in: Information Technology - New Generations

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Hyperconnectivity and Internet of Things are changing the landscape of Information Technology (IT). Architectures are becoming more sophisticated while cyber security is slowing adapting to this shift of Internet-enabled technologies in automotive, industrial, consumer, and networking. This slow adoption of proper security controls, defenses, and aggressive measures is leaving individuals vulnerable. This submission explores how policies can be created that automate the process of device connectivity, and how current frameworks can be used to minimize system risks.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat NIST, S (2004). 800–37. Guide for the security certification and accreditation of federal information systems. NIST, S (2004). 800–37. Guide for the security certification and accreditation of federal information systems.
2.
Zurück zum Zitat Ashton, K. (2009). That ‘internet of things’ thing. RFiD Journal, 22(7), 97–114. Ashton, K. (2009). That ‘internet of things’ thing. RFiD Journal, 22(7), 97–114.
3.
Zurück zum Zitat Dawson, M., Eltayeb, M., & Omar, M. (2016). Security solutions for hyperconnectivity and the internet of things (pp. 1–347). IGI Global: Hershey. Dawson, M., Eltayeb, M., & Omar, M. (2016). Security solutions for hyperconnectivity and the internet of things (pp. 1–347). IGI Global: Hershey.
4.
Zurück zum Zitat Dawson, M. (2016). Exploring secure computing for the internet of things, internet of wverything, web of things, and hyperconnectivity. In M. Dawson, M. Eltayeb, & M. Omar (Eds.), Security solutions for hyperconnectivity and the internet of things (pp. 1–12). IGI Global: Hershey. Dawson, M. (2016). Exploring secure computing for the internet of things, internet of wverything, web of things, and hyperconnectivity. In M. Dawson, M. Eltayeb, & M. Omar (Eds.), Security solutions for hyperconnectivity and the internet of things (pp. 1–12). IGI Global: Hershey.
5.
Zurück zum Zitat Bojanova, I., Hurlburt, G., & Voas, J. (2013). Today, the Internet of Things. Tomorrow, the Internet of Everything. Beyond that, perhaps, the Internet of Anything—a radically super-connected ecosystem where questions about security, trust, and control assume entirely new dimensions. information-development, 04. Bojanova, I., Hurlburt, G., & Voas, J. (2013). Today, the Internet of Things. Tomorrow, the Internet of Everything. Beyond that, perhaps, the Internet of Anything—a radically super-connected ecosystem where questions about security, trust, and control assume entirely new dimensions. information-development, 04.
6.
Zurück zum Zitat Commanders, C., Defense, U. S. O., & Defense, A. S. O. (2003). Subject: DoD information system certification and accreditation reciprocity. System. Commanders, C., Defense, U. S. O., & Defense, A. S. O. (2003). Subject: DoD information system certification and accreditation reciprocity. System.
7.
Zurück zum Zitat Diem, J. W., Smith, J. S., & Butler, L. A. (2009). United States Army Operational Test Command (USAOTC) Integrated Technologies Evolving to Meet New Challenges-A Study in Cross Command Collaboration. ARMY OPERATIONAL TEST COMMAND FORT HOOD TX. Diem, J. W., Smith, J. S., & Butler, L. A. (2009). United States Army Operational Test Command (USAOTC) Integrated Technologies Evolving to Meet New Challenges-A Study in Cross Command Collaboration. ARMY OPERATIONAL TEST COMMAND FORT HOOD TX.
8.
Zurück zum Zitat Gordon, L. A., Loeb, M. P., & Sohail, T. (2003). A framework for using insurance for cyber-risk management. Communications of the ACM, 46(3), 81–85.CrossRef Gordon, L. A., Loeb, M. P., & Sohail, T. (2003). A framework for using insurance for cyber-risk management. Communications of the ACM, 46(3), 81–85.CrossRef
9.
Zurück zum Zitat Tohidi, H. (2011). The Role of Risk Management in IT systems of organizations. Procedia Computer Science, 3, 881–887.CrossRef Tohidi, H. (2011). The Role of Risk Management in IT systems of organizations. Procedia Computer Science, 3, 881–887.CrossRef
10.
Zurück zum Zitat Saleh, M. S., & Alfantookh, A. (2011). A new comprehensive framework for enterprise information security risk management. Applied computing and informatics, 9(2), 107–118.CrossRef Saleh, M. S., & Alfantookh, A. (2011). A new comprehensive framework for enterprise information security risk management. Applied computing and informatics, 9(2), 107–118.CrossRef
11.
Zurück zum Zitat Wood, C. C. (2008). Information security policies made easy, Version 10. Information Shield, Inc. Wood, C. C. (2008). Information security policies made easy, Version 10. Information Shield, Inc.
12.
Zurück zum Zitat Whitman, M. E., Mattord, H. J. (2011). Principles of information security. Cengage Learning. Whitman, M. E., Mattord, H. J. (2011). Principles of information security. Cengage Learning.
13.
Zurück zum Zitat Fredette, J., Marom, Revital., Steiner, K., Witters, L. (2012). The promise and peril of hyperconnectivity for organizations and societies. The global information technology report, 113–119. Fredette, J., Marom, Revital., Steiner, K., Witters, L. (2012). The promise and peril of hyperconnectivity for organizations and societies. The global information technology report, 113–119.
14.
Zurück zum Zitat Mercado, S. C. (2009). Sailing the sea of OSINT in the information age. Secret Intelligence: A Reader, 78. Mercado, S. C. (2009). Sailing the sea of OSINT in the information age. Secret Intelligence: A Reader, 78.
15.
Zurück zum Zitat Glassman, M., & Kang, M. J. (2012). Intelligence in the internet age: The emergence and evolution of Open Source Intelligence (OSINT). Computers in Human Behavior, 28(2), 673–682.CrossRef Glassman, M., & Kang, M. J. (2012). Intelligence in the internet age: The emergence and evolution of Open Source Intelligence (OSINT). Computers in Human Behavior, 28(2), 673–682.CrossRef
16.
Zurück zum Zitat Scarfone, K. A., Souppaya, M. P., Cody, A., Orebaugh, A. D. (2008). SP 800–115. Technical guide to information security testing and assessment. Scarfone, K. A., Souppaya, M. P., Cody, A., Orebaugh, A. D. (2008). SP 800–115. Technical guide to information security testing and assessment.
Metadaten
Titel
Cyber Security Policies for Hyperconnectivity and Internet of Things: A Process for Managing Connectivity
verfasst von
Maurice Dawson
Copyright-Jahr
2018
DOI
https://doi.org/10.1007/978-3-319-54978-1_116