Abstract
The Subject of Communication and Information Security (CIS) [38.1, 2], the transfer of accurate and uncompromised information as well as the secure transfer of information has become an international issue ever since 31 December 1999. The year 2000 scare, which has been coded as the Y2K scare, refers to what prominent scientists and business people feared that all computer networks and the systems that are controlled or operated by them could break down with the turn of the millennium since their synchronizing clocks could lose synchronization by not recognizing a number (instruction) with three zeros. A positive outcome of this scare was the creation of the various CERTS (Computer Emergency Response Teams) around the world which now work cooperatively to exchange expertise, information and are coordinated in case of major problems arise in the modern IT environment. The nucleus of this effort, initially, was the collaboration of the USA, UK and Australia by forming the first international CERT in order to cooperatively solve this type of problems. The terrorist attack in New York on 11 September 2001 caused this scare to become a permanent international nightmare. The international community responded quickly to face both fronts using sophisticated technology. One front being the transfer of reliable information via secure networks and the other being the collection of information about potential terrorists even via sophisticated surveillance and information collecting mechanisms. Now all people around the word live more or less under the impression that the whole world is nothing but a “Big Brother” living space and thus the need of the legal framework to protect them.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
P. Stavroulakis (Ed.): Communication and information security, special issue, China Communication (February 2007)
P. Stavroulakis: Terrestrial Trunked Radio – TETRA. A Global Security Tool (Springer, Berlin 2007)
D. Reed: Applying the OSI seven layer network model to information security, Sans Institute (November 2003)
M.G. Kuhn, R.J. Anderson: Soft tempest: hidden data transmission using electromagnetic emanations. In: Proceedings of the 2nd Workshop on Information Hiding, Lecture Notes in Computer Science, Vol. 1525, ed. by D. Aucsmith (Springer, Berlin Heidelberg 1998) pp. 124–142
N.G. Bardis, A.P. Markovskyy: Utilization of avalanche transformation for increasing of echoplex and checksum data transmission control reliability, ISITA 2004 – Int. Symposium on Information Theory and its Applications, Parma, Italy, 10–13 October 2004 (2004)
S. Rouiller: Virtual LAN security: weaknesses and countermeasures, Technical Report (SANS Institute, 2003)
N. Doukas, N.V. Karadimas: A blind source separation based cryptography scheme for mobile military communication applications, WSEAS Trans. Commun. 7(12), 1235–1245 (2008)
N.G. Bardis, A. Polymenopoulos, E.G. Bardis, A.P. Markovskyy: Methods for increasing the efficiency of the remote user authentication in integrated systems, Trends Comput. Sci. 12(1), 99–107 (2004)
C. Ellison, B. Schneier: Ten risks of PKI: what you’re not being told about public key infrastructure, Comput. Secur. J. 16(1), 1–7 (2000)
N. Doukas, N.G. Bardis: Effectiveness data transmission error detection using check sum control for military applications, 10th WSEAS Int. Conference on Mathematical Methods, Computational Techniques and Intelligent Systems (MAMECTIS’08), Corfu Island, Greece, 26–28 October 2008 (2008)
N.G. Bardis, E.G. Bardis, A.P. Markovskyy, C. Economou: Hardware implementation of data transmission control based on boolean transformation, WSEAS Trans. Commun. 4(7), 363–371 (2005)
N.G. Bardis, N. Doukas, K. Ntaikos: A new approach of secret key management lifecycle for military applications, WSEAS Trans. Comp. Res. 3, 294–304 (2008)
N.G. Bardis: Coding of checksum components for increasing the control reliability of data transmission for military applications, WSEAS Trans. Inf. Sci. Appl. 5(12), 1741–1750 (2008)
T. Karygiannis, L. Owens: Wireless network security, Special Publication 800-48 (National Institute of Standards and Technology, November 2002)
An introduction to computer security, the NIST Handbook, Special Publication 800-12 (National Institute of Standards and Technology, October 1995)
A. Perrig, J. Stankovic, D. Wagner: Security in wireless sensor networks, Commun. ACM 47(6), 53–57 (2004)
A.C. Brainos: Secure communications in space, Technical Report (University of East Carolina, 2007)
D. Wolter: Common security in outer space and international law, UNIDIR 29 2006 (United Nations, 2005)
A. Burns: Legal aspects of open public networks, Network Commons
J.M. Oberding, T. Norderhaug: A separate jurisdiction for cyberspace?, J. Computer-Mediat. Commun. 2(1) (1996), available at http://jcmc.indiana.edu/vol2/issue1/juris.html
L.E. Gillies: Targeting the jurisdiction of an electronic consumer contract, Int. J. Law Inf. Technol. 16(3), 242–269 (2008)
B.D. Boone: Bullseye! Why a “targeting” approach to personal jurisdiction in the e-commerce context makes sense internationally, Emory Int. Law Rev. 20, 241–289 (2006)
L.A. Bygrave: Determining applicable law pursuant to european data protection legislation, Comput. Law Secur. Rep. 16, 252–257 (2000)
P.P. McDonald: National strategy to combat identity theft, NCJ No. 214,621 (May 2006)
L. Kun: Homeland security: the possible, probable, and perils of information technology, IEEE Eng. Med. Biol. Mag. 21, 28–33 (2002)
L. Kun: Information infrastructure tools for bioterrorism preparedness, IEEE Eng. Med. Biol. Mag. 21, 69–85 (2002)
M. Kikuchi: Biomedical engineering’s contribution to defending the homeland, IEEE Eng. Med. Biol. Mag. 23, 75–186 (2004)
E. Kyriacou et al.: Multi-purpose healthcare telemedicine system with mobile communication link support, available at http://www.biomedical-engineering-online.com/content/2/1/7
A. Elizabeth Bretz: 9/11 one year later, Spectrum Mag. 39, 38 (2002)
A. Georgoulis: RESHEN, a best practice approach for secure healthcare networks in Europe. In: Advanced Health Telematics and Telemedicine, Studies in Health Technology and Informatics, Vol. 96, ed. by B. Blobel, P. Pharow (IOS, Amsterdam 2003)
S. Luxminarayan: Combating bioterrorism with bioengineering, IEEE Eng. Med. Biol. Mag. 21, 21–27 (2002)
E. Lamprinos: A low power medium access control protocol for wireless medical sensor networks, Proc. 26th IEEE EMBS Conference, San Francisco, USA (2004)
T. Berg: State criminal jurisdiction in cyberspace: is there a sheriff on the electronic frontier? available at http://www.michbar.org/journal/article.cfm?articleID=94&volumeID=8 (25 November 2007)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Stavroulakis, P. (2010). Technological and Legal Aspects of CIS. In: Stavroulakis, P., Stamp, M. (eds) Handbook of Information and Communication Security. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-04117-4_38
Download citation
DOI: https://doi.org/10.1007/978-3-642-04117-4_38
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-04116-7
Online ISBN: 978-3-642-04117-4
eBook Packages: EngineeringEngineering (R0)