2011 ISECON Proceedings
Texas State University-San Marcos
A global economy has developed. Information is now distributed and communicated all over the world. A moved from local security to global security issues has occurred. What are new challenges that must be meet in order to assure the confidentiality, integrity, and availability of information on a global scale?
Because of the Internet, information is no longer confined to a local physical area like a locked computer room and accessed by only computer professionals. There is no longer a perimeter to protect. Today information is distributed throughout the globe. It can be accessed by anyone, anywhere, anytime. Malicious code, cyber attacks, Denial of Service attacks, and spam are originating worldwide. What is now needed is global assurance. Global assurance is defined as “the global collaboration of governments, ISP’s, search engines, and businesses to ensure the integrity and confidence in the use of the Internet” (White, G. (2010). The Evolution and Implementation of Global Assurance. Issues in Information Systems, 9 (1), 35-40). Today, there is no perimeter to protect. The identity and location of the enemy are unknown. The leaf objects (data files, programs, databases, hosts) of networks now need to provide their own security. Firewalls and Intrusion Prevention Systems alone can no longer provide assurance. This is the next step for information security. Along with the new challenges for confidentiality, integrity, and availability; there are now needs for accountability, authentication, non-repudiation, confidence, functionality, and resistance to intentional by-pass.
Recommended Citation: White, G., (2011). The Proceedings of the Information Systems Education Conference, v.28 n.1772, Wilmington NC.