Abstract
This paper gives an overview of the development of Information Security from the early 1980s up to the present time. The paper makes use of two papers by the author, Information Security – the Third Wave (von Solms, 2000) and Information Security – the Fourth Wave (von Solms, 2006), as well as a paper in preparation, Information Security – The Fifth Wave (von Solms, 2010). In the paper in 2000, the First Wave of Information Security was defined as lasting up to the early 1980s. In May 1983 the First International Conference on Information Security (IFIP/Sec 83) took place in Sweden, and was organized by Kristian Beckman. Kristian Beckman was subsequently elected as the first Chairperson of the newly created Technical Committee 11 of IFIP. He died in 1984. Kristian Beckman can therefore be seen to have lived during the First Wave of Information Security, which provides the motivation for the sub title of this paper.
Chapter PDF
Similar content being viewed by others
References
ACISP 2009, Proceedings of ACISP 2009, Brisbane, Australia (July 2009)
CISCO 2009, A Comprehensive Proactive Approach to Web based Threats (2009), http://www.ironport.com/pdf/ironport_web_reputation_whitepaper.pdf (accessed May 2010)
Sophos 2009, The Sophos Security Threat Report (2009), http://www.sophos.com/sophos/./sophos-security-threat-report-jan-2009-na.pdf (accessed May 2010)
Symantec 2010, The Wild, Wild West Web, Symantec (2010), http://www.computerworld.com/pdfs/Messagelabs_Wild_Wild_Web.pdf (accessed June 2010)
The Risk Digest 1(1) (1985), http://catless.ncl.ac.uk/Risks/1.01.html (accessed April 2009)
UK Cybercrime 2009, The UK Cybercrime Report (2009), https://www.garlik.com/cybercrime_report.php (accessed March 2010)
von Solms, B.: Information Security – The Third Wave? Computers and Security 9, 615–620 (2000)
von Solms, B.: Information Security – The Fourth Wave. Computers and Security 25, 165–168 (2006)
von Solms, B.: Information Security – The Fifth Wave. In preparation – to be submitted to Computers and Security (2010)
Washington Post, Cybercrime is winning the battle over Cyberlaw (2008), http://voices.washingtonpost.com/securityfix/2008/12/report_cybercrime_is_winning_t.html (accessed June 2010)
Wikipedia, http://en.wikipedia.org/wiki/Strategic_Defense_Initiative , (accessed April 2009)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 IFIP International Federation for Information Processing
About this paper
Cite this paper
von Solms, S.H.(. (2010). The 5 Waves of Information Security – From Kristian Beckman to the Present. In: Rannenberg, K., Varadharajan, V., Weber, C. (eds) Security and Privacy – Silver Linings in the Cloud. SEC 2010. IFIP Advances in Information and Communication Technology, vol 330. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-15257-3_1
Download citation
DOI: https://doi.org/10.1007/978-3-642-15257-3_1
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-15256-6
Online ISBN: 978-3-642-15257-3
eBook Packages: Computer ScienceComputer Science (R0)