Skip to main content
  • 4460 Accesses

Abstract

The Subject of Communication and Information Security (CIS) [38.1, 2], the transfer of accurate and uncompromised information as well as the secure transfer of information has become an international issue ever since 31 December 1999. The year 2000 scare, which has been coded as the Y2K scare, refers to what prominent scientists and business people feared that all computer networks and the systems that are controlled or operated by them could break down with the turn of the millennium since their synchronizing clocks could lose synchronization by not recognizing a number (instruction) with three zeros. A positive outcome of this scare was the creation of the various CERTS (Computer Emergency Response Teams) around the world which now work cooperatively to exchange expertise, information and are coordinated in case of major problems arise in the modern IT environment. The nucleus of this effort, initially, was the collaboration of the USA, UK and Australia by forming the first international CERT in order to cooperatively solve this type of problems. The terrorist attack in New York on 11 September 2001 caused this scare to become a permanent international nightmare. The international community responded quickly to face both fronts using sophisticated technology. One front being the transfer of reliable information via secure networks and the other being the collection of information about potential terrorists even via sophisticated surveillance and information collecting mechanisms. Now all people around the word live more or less under the impression that the whole world is nothing but a “Big Brother” living space and thus the need of the legal framework to protect them.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 349.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 449.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 599.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. P. Stavroulakis (Ed.): Communication and information security, special issue, China Communication (February 2007)

    Google Scholar 

  2. P. Stavroulakis: Terrestrial Trunked Radio – TETRA. A Global Security Tool (Springer, Berlin 2007)

    Google Scholar 

  3. D. Reed: Applying the OSI seven layer network model to information security, Sans Institute (November 2003)

    Google Scholar 

  4. M.G. Kuhn, R.J. Anderson: Soft tempest: hidden data transmission using electromagnetic emanations. In: Proceedings of the 2nd Workshop on Information Hiding, Lecture Notes in Computer Science, Vol. 1525, ed. by D. Aucsmith (Springer, Berlin Heidelberg 1998) pp. 124–142

    Chapter  Google Scholar 

  5. N.G. Bardis, A.P. Markovskyy: Utilization of avalanche transformation for increasing of echoplex and checksum data transmission control reliability, ISITA 2004 – Int. Symposium on Information Theory and its Applications, Parma, Italy, 10–13 October 2004 (2004)

    Google Scholar 

  6. S. Rouiller: Virtual LAN security: weaknesses and countermeasures, Technical Report (SANS Institute, 2003)

    Google Scholar 

  7. N. Doukas, N.V. Karadimas: A blind source separation based cryptography scheme for mobile military communication applications, WSEAS Trans. Commun. 7(12), 1235–1245 (2008)

    Google Scholar 

  8. N.G. Bardis, A. Polymenopoulos, E.G. Bardis, A.P. Markovskyy: Methods for increasing the efficiency of the remote user authentication in integrated systems, Trends Comput. Sci. 12(1), 99–107 (2004)

    Google Scholar 

  9. C. Ellison, B. Schneier: Ten risks of PKI: what you’re not being told about public key infrastructure, Comput. Secur. J. 16(1), 1–7 (2000)

    Article  Google Scholar 

  10. N. Doukas, N.G. Bardis: Effectiveness data transmission error detection using check sum control for military applications, 10th WSEAS Int. Conference on Mathematical Methods, Computational Techniques and Intelligent Systems (MAMECTIS’08), Corfu Island, Greece, 26–28 October 2008 (2008)

    Google Scholar 

  11. N.G. Bardis, E.G. Bardis, A.P. Markovskyy, C. Economou: Hardware implementation of data transmission control based on boolean transformation, WSEAS Trans. Commun. 4(7), 363–371 (2005)

    Google Scholar 

  12. N.G. Bardis, N. Doukas, K. Ntaikos: A new approach of secret key management lifecycle for military applications, WSEAS Trans. Comp. Res. 3, 294–304 (2008)

    Google Scholar 

  13. N.G. Bardis: Coding of checksum components for increasing the control reliability of data transmission for military applications, WSEAS Trans. Inf. Sci. Appl. 5(12), 1741–1750 (2008)

    Google Scholar 

  14. T. Karygiannis, L. Owens: Wireless network security, Special Publication 800-48 (National Institute of Standards and Technology, November 2002)

    Google Scholar 

  15. An introduction to computer security, the NIST Handbook, Special Publication 800-12 (National Institute of Standards and Technology, October 1995)

    Google Scholar 

  16. A. Perrig, J. Stankovic, D. Wagner: Security in wireless sensor networks, Commun. ACM 47(6), 53–57 (2004)

    Article  Google Scholar 

  17. A.C. Brainos: Secure communications in space, Technical Report (University of East Carolina, 2007)

    Google Scholar 

  18. D. Wolter: Common security in outer space and international law, UNIDIR 29 2006 (United Nations, 2005)

    Google Scholar 

  19. A. Burns: Legal aspects of open public networks, Network Commons

    Google Scholar 

  20. J.M. Oberding, T. Norderhaug: A separate jurisdiction for cyberspace?, J. Computer-Mediat. Commun. 2(1) (1996), available at http://jcmc.indiana.edu/vol2/issue1/juris.html

  21. L.E. Gillies: Targeting the jurisdiction of an electronic consumer contract, Int. J. Law Inf. Technol. 16(3), 242–269 (2008)

    Article  MathSciNet  Google Scholar 

  22. B.D. Boone: Bullseye! Why a “targeting” approach to personal jurisdiction in the e-commerce context makes sense internationally, Emory Int. Law Rev. 20, 241–289 (2006)

    Google Scholar 

  23. L.A. Bygrave: Determining applicable law pursuant to european data protection legislation, Comput. Law Secur. Rep. 16, 252–257 (2000)

    Article  Google Scholar 

  24. P.P. McDonald: National strategy to combat identity theft, NCJ No. 214,621 (May 2006)

    Google Scholar 

  25. L. Kun: Homeland security: the possible, probable, and perils of information technology, IEEE Eng. Med. Biol. Mag. 21, 28–33 (2002)

    Article  Google Scholar 

  26. L. Kun: Information infrastructure tools for bioterrorism preparedness, IEEE Eng. Med. Biol. Mag. 21, 69–85 (2002)

    Article  Google Scholar 

  27. M. Kikuchi: Biomedical engineering’s contribution to defending the homeland, IEEE Eng. Med. Biol. Mag. 23, 75–186 (2004)

    Article  MathSciNet  Google Scholar 

  28. E. Kyriacou et al.: Multi-purpose healthcare telemedicine system with mobile communication link support, available at http://www.biomedical-engineering-online.com/content/2/1/7

  29. A. Elizabeth Bretz: 9/11 one year later, Spectrum Mag. 39, 38 (2002)

    Google Scholar 

  30. A. Georgoulis: RESHEN, a best practice approach for secure healthcare networks in Europe. In: Advanced Health Telematics and Telemedicine, Studies in Health Technology and Informatics, Vol. 96, ed. by B. Blobel, P. Pharow (IOS, Amsterdam 2003)

    Google Scholar 

  31. S. Luxminarayan: Combating bioterrorism with bioengineering, IEEE Eng. Med. Biol. Mag. 21, 21–27 (2002)

    Article  Google Scholar 

  32. E. Lamprinos: A low power medium access control protocol for wireless medical sensor networks, Proc. 26th IEEE EMBS Conference, San Francisco, USA (2004)

    Google Scholar 

  33. T. Berg: State criminal jurisdiction in cyberspace: is there a sheriff on the electronic frontier? available at http://www.michbar.org/journal/article.cfm?articleID=94&volumeID=8 (25 November 2007)

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Stavroulakis, P. (2010). Technological and Legal Aspects of CIS. In: Stavroulakis, P., Stamp, M. (eds) Handbook of Information and Communication Security. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-04117-4_38

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-04117-4_38

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-04116-7

  • Online ISBN: 978-3-642-04117-4

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics