Shifting the Core
How emergent technology transforms information security challenges
Abstract
Ubiquitous and unconscious use of connected devices demand a fundamental shift in core assumptions about data security. Users cannot be expected to take responsibility for securing their devices and data when processes and data transfer are designed to take place without their active involvement or even awareness. Technological developments already in widespread use mean that privacy, encryption and national cyber security must all urgently be rethought.
Preview
Unable to display preview. Download preview PDF.
References
- [1]E. H. Spafford, “The Internet Worm Program: An Analysis,” Purdue Technical Report CSD-TR-823, West Lafayette, 1988.Google Scholar
- [2]C. Czosseck, “State Actors and their Proxies in Cyberspace,” in Peacetime Regime for State Activities in Cyberspace, K. Ziolkowski, Ed., NATO CCD COE Publications, 2013, pp. 1–24.Google Scholar
- [3]A. Hilts, C. Parsons and J. Knockel, “Every Step You Fake: A Comparative Analysis of Fitness Tracker Privacy and Security,” 2016. [Online]. Available: https://openeffect.ca/reports/Every_Step_You_Fake.pdf. [Accessed 24 February 2017].Google Scholar
- [4]J. Radcliffe, “Hacking Medical Devices for Fun and Insulin: Breaking the Human SCADA System,” in Black Hat 2011, Las Vegas, USA, 2011.Google Scholar
- [5]D. C. Klonoff, “Cybersecurity for Connected Diabetes Devices,” Journal of Diabetes Science & Technology, September 2015.Google Scholar
- [6]D. Halperin, T. S. Heydt-Benjamin, K. Fu, T. Kohno and W. H. Maisel, “Security and privacy for implantable medical devices,” IEEE Pervasive Computing, vol. 7, no. 1, 2008.CrossRefGoogle Scholar
- [7]P. Hustinx, “Opinion of the European Data Protection Supervisor on Promoting Trust in the Information Society by Fostering Data Protection and Privacy,” March 2010. [Online]. Available: https://secure.edps.europa. eu/EDPSWEB/webdav/shared/Documents/Consultation/Opinions/2010/10-03-19_Trust_Information_Society_EN.pdf. [Accessed 15 February 2017].Google Scholar
- [8]K. Auel, „Internet Security Days 2016: Cyber-Angriffe der Geheimdienste vor allem gegen den Mittelstand,“ September 2016. [Online]. Available: https://www.heise.de/security/meldung/Internet-Security-Days-2016-Cyber-Angriffe-der-Geheimdienste-vor-allem-gegen-den-Mittelstand-3329442.html. [Accessed 17 February 2017].Google Scholar
- [9]C. Perrin, “The CIA Triad,” June 2008. [Online]. Available: http://www.techrepublic.com/blog/it-security/the-cia-triad/. [Accessed 25 February 2017].Google Scholar
- [10]K. Hartmann and C. Steup, “On the security of international data exchange services for e-governance systems,” Datenschutz und Datensicherheit, no. 7, pp. 572–476, June 2015.CrossRefGoogle Scholar
- [11]OWASP Foundation, “Open Web Application Security Project (OWASP),” 8 December 2016. [Online]. Available: https://www.owasp.org/index.php/Main_Page. [Accessed 20 February 2017].Google Scholar
- [12]P. Schaar, “Privacy by Design,” Identity in the Information Society, vol. 3, no. 2, pp. 267–274, 2010.CrossRefGoogle Scholar
- [13]M. Langheinrich, “Privacy by design–principles of privacy-aware ubiquitous systems,” in International conference on Ubiquitous Computing, 2001.zbMATHGoogle Scholar
- [14]H.-P. Schüler, „Bequem und sicher in die Cloud–End-to-End-verschlüsselnde Speicherdienste im Test,“ c‘t, p. 106, 21 August 2015.Google Scholar
- [15]D. Schirrmacher, “Heise Security,” 17 February 2017. [Online]. Available: https://www.heise.de/security/meldung/MQTT-Protokoll-IoT-Kommunikation- von-Reaktoren-und-Gefaengnissen-oeffentlich-einsehbar- 3629650.html. [Accessed 20 February 2017].Google Scholar
- [16]K. Hartmann and K. Giles, Cyber Defense: An International View, U.S. Army War College (USAWC) Strategic Studies Institute, 2015.Google Scholar
- [17]A. Nguyen, M. Kamp and M. Smoltczyk, “Biometrische Gesichtserkennung–eine Technik ohne Zukunft,” Berliner Beauftragte für Datenschutz und Informationsfreiheit, Berlin, 2017.Google Scholar
Copyright information
© Springer Fachmedien Wiesbaden GmbH, ein Teil von Springer Nature 2017