Abstract
This descriptive chapter aims to impress the readers on various latest technologies that relate to critical information security. It is based on my analysis, observation and experience whilst dealing with this. The demanding technology’s offerings, deployment and its usage have had pushed Internet users like us to be more cautious and considerable whilst managing personal data. Each section of this chapter highlights some practical guidance for readers and proffers useful explanations that could be potentially considered in our daily life and business.
The concern is over what will happen as strong encryption becomes commonplace with all digital communications and stored data. Right now the use of encryption isn’t all that widespread, but that state of affairs is expected to change rapidly (Dorothy E. Denning, Distinguished Professor, Department of Defense Analysis, Naval Postgraduate School & Fellow of the Association for Computing Machinery)
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
Agencies (2012).
- 2.
Arthur (Arthur 2011).
- 3.
Wikipedia (2012a).
- 4.
(Amazon 2012a).
- 5.
(Haikes & Murchinson 2012).
- 6.
(Grance & Mell 2011).
- 7.
(Ried & Kisker 2012).
- 8.
(Ingthorsson 2011).
- 9.
See Ingthorsson’s analysis.
- 10.
(Nisvold 2012).
- 11.
Amazon (Amazon 2012b).
- 12.
(Reed 2011).
- 13.
(Hardy 2012).
- 14.
(Bergstein 2012).
- 15.
(Chen et al. 2012)
- 16.
(Pederson 2012).
- 17.
(Silveira 2012).
- 18.
(Cox 2012).
- 19.
(Laczynski 2011).
- 20.
(Business 2012).
- 21.
(Datainspektionen 2012).
- 22.
(Moos 2012).
- 23.
Data Guidance (2012).
- 24.
Wikipedia (2012b).
- 25.
Wikipedia (2012c).
- 26.
Christey et al. (2011).
- 27.
Security Obscurity (2012).
- 28.
(Felten & Zeller 2012).
- 29.
(Reahard 2012).
- 30.
(Zetter 2010).
- 31.
(Mills 2012).
- 32.
(Armerding 2012).
- 33.
Symantec (2012).
- 34.
(NIST 2012).
- 35.
TechJournal (2012).
- 36.
(Mershon 2011).
- 37.
(Bruich et al. 2011).
- 38.
(Hon & Millard 2012).
- 39.
(PerspecSys 2012).
- 40.
(Forrester 2012).
References
Agencies (2012) LulzSec’s Ryan Cleary and Jake Davis plead guilty to hacking. The Guardian, 25 June 2012. http://www.guardian.co.uk/technology/2012/jun/25/lulzsecs-ryan-cleary-guilty-hacking. Accessed 30 June 2012
Amazon (2012a) Amazon Media Room: History & Timeline. http://phx.corporate-ir.net/phoenix.zhtml?c=176060&p=irol-corporateTimeline. Accessed 23 June 2012
Amazon (2012b) Amazon Simple Storage Service (Amazon S3). http://aws.amazon.com/s3. Accessed 1 July 2012
Armerding T (2012) The 15 worst data security breaches of the 21st Century. http://www.csoonline.com/article/700263/the-15-worst-data-security-breaches-of-the-21st-century. Accessed 4 July 2012
Arthur C (2011) The technology year in review. The Guardian, 29 December 2011. http://www.guardian.co.uk/technology/2011/dec/29/2011-year-review-technology?commentpage=last#privacy. Accessed 30 June 2012
Bergstein B (2012) IBM Faces the Perils of ‘Bring Your Own Device’. http://www.technologyreview.com/news/427790/ibm-faces-the-perils-of-bring-your-own-device/. Accessed 1 July 2012
Bruich S, Lipsman A, Mudd G, Rich M (2011) The power of like – how brands reach and influence fans through social media marketing. http://www.comscore.com/Press_Events/Presentations_Whitepapers/2011/The_Power_of_Like_How_Brands_Reach_and_Influence_Fans_Through_Social_Media_Marketing. Accessed 6 July 2012
Business Link (2012) Data protection and cloud computing. http://www.businesslink.gov.uk/bdotg/action/detail?itemId=1084689193&r.i=1084688657&r.l1=1073861197&r.l2=1075422920&r.l3=1084685982&r.s=m&r.t=RESOURCES&type=RESOURCES. Accessed 2 July 2012
Chen S, Wang R, Wang XF (2012) Signing me onto your accounts through Facebook and Google: a traffic-guided security study of commercially deployed single-sign-on web services, p.7 section 4.2. http://research.microsoft.com/pubs/160659/websso-final.pdf. Accessed 1 July 2012
Christey S, Brown M, Kirby D, Martin B, Paller A (2011) CWE/SANS Top 25 most dangerous software errors. http://cwe.mitre.org/top25. Accessed 4 July 2012
Cox P (2012) Intrusion detection in a cloud computing environment. http://searchcloudcomputing.techtarget.com/tip/Intrusion-detection-in-a-cloud-computing-environment. Accessed 1 July 2012
Data Guidance, Italy (2012) DPA issues cloud computing recommendations. 14 June 2012. http://dataguidance.com/news.asp?id=1801. Accessed 2 July 2012
Datainspektionen (2012) Cloud services and the Personal Data Act. http://www.datainspektionen.se/in-english/cloud-services/. Accessed 2 July 2012
Felten EW, Zeller W (2012) Cross-site request forgeries: exploitation and prevention. http://www.cs.utexas.edu/~shmat/courses/cs378/zeller.pdf. Accessed 4 July 2012
Forrester A (2012) Tidal wave of dynamic web content is coming – how will you respond? March 2012 (PDF document)
Grance T, Mell P (2011) The NIST definition of cloud computing. http://csrc.nist.gov/publications/nistpubs/800-145/SP800-145.pdf. Accessed 23 June 2012
Haikes C, Murchinson J (2012) Google and IBM Announce University Initiative to Address Internet-Scale Computing Challenges. http://www-03.ibm.com/press/us/en/pressrelease/22414.wss. Accessed 23 June 2012
Hardy M (2012) BYOD: Trend or trivia? http://fcw.com/articles/2012/04/30/buzz-byod-trend-buzzword.aspx. Accessed 1 July 2012
Hon WK, Millard C (2012) Data export in cloud computing – how can personal data be transferred outside the EEA? The cloud of unknowing, part 4. http://script-ed.org/?p=324. Accessed 7 July 2012
Ingthorsson O (2011) 5 Cloud computing statistics you may find surprising. http://cloudcomputingtopics.com/2011/11/5-cloud-computing-statistics-you-may-find-surprising. Accessed 30 June 2012
Laczynski E (2011) Managing cloud security: intrusion detection services in a public cloud (datapipe). http://www.rightscale.com/info_center/slide-decks/fall2011-managing-cloud-security.php. Accessed 2 July 2012
Mershon P (2011) 26 Promising social media stats for small businesses. http://www.socialmediaexaminer.com/26-promising-social-media-stats-for-small-businesses/. Accessed 6 July 2012
Mills E (2012) Global payments: consumer data may also have been stolen. http://news.cnet.com/8301-1009_3-57452047-83/global-payments-consumer-data-may-also-have-been-stolen. Accessed 4 July 2012
Moos F (2012) DPA guidance on cloud computing. http://www.nortonrose.com/news/63297/dpa-guidance-on-cloud-computing. Accessed 2 July 2012
NIST (2012) National Vulnerability Database. http://nvd.nist.gov/home.cfm. Accessed 4 Jul 2012
Nisvold (2012) Cloud basics – Deployment model. 12 March 2012. http://blog.visma.com/blog/cloud-basics-deployment-models. Accessed 1 July 2012
Pederson T (2012) Microsoft’s study on social single sign-on protocols. http://www.onelogin.com/microsofts-study-on-social-single-sign-on-protocols. Accessed 1 July 2012
PerspecSys (2012) Data residency – where is your cloud data physically located? http://www.perspecsys.com/how-we-help/data-residency/. Accessed 7 July 2012
Reahard J (2012) Wurm Online website down after SQL attack. http://massively.joystiq.com/2012/05/11/wurm-online-website-down-after-sql-attack. Accessed 4 July 2012
Reed B (2011) Q&A: Why consumerization won’t kill corporate IT. http://www.pcworld.com/businesscenter/article/241012/qanda_why_consumerization_wont_kill_corporate_it.html. Accessed 1 July 2012
Ried S, Kisker H (2012) Sizing the Cloud. http://www.forrester.com/Sizing+The+Cloud/fulltext/-/E-RES58161?objectid=RES58161. Accessed 30 June 2012
Security Obscurity (2012) From XSS to NT AUTHORITY. 30 May 2012. http://security-obscurity.blogspot.co.uk/2012/05/from-xss-to-nt-authority.html. Accessed 4 July 2012
Silveira V (2012) An update on LinkedIn member passwords compromised. http://blog.linkedin.com/2012/06/06/linkedin-member-passwords-compromised. Accessed 2 July 2012
Symantec (2012) Internet Security Trend Report: 2011 Trends, Volume 17. April 2012. http://www.symantec.com/about/news/release/article.jsp?prid=20120429_01. Accessed 4 July 2012
TechJournal (2012) Online behavioral tracking pervasive, Google privacy practices often violated. 28 June 2012. http://www.techjournal.org/2012/06/online-behavioral-tracking-pervasive-google-privacy-practices-often-violated. Accessed 6 July 2012
Wikipedia (2012a) Time-sharing. http://en.wikipedia.org/wiki/Time-sharing. Accessed 23 June 2012
Wikipedia (2012b) ECMAScript. http://en.wikipedia.org/wiki/ECMAScript. Accessed 30 June 2012
Wikipedia (2012c) Web 2.0. http://en.wikipedia.org/wiki/Web_2.0. Accessed 2 July 2012
Zetter K (2010) TJX hacker gets 20 years in prison. http://www.wired.com/threatlevel/2010/03/tjx-sentencing. Accessed 4 July 2012
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Rahim, E.R. (2013). Information Security in the Internet Age. In: Ismail, N., Yong Cieh, E. (eds) Beyond Data Protection. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-33081-0_9
Download citation
DOI: https://doi.org/10.1007/978-3-642-33081-0_9
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-33080-3
Online ISBN: 978-3-642-33081-0
eBook Packages: Humanities, Social Sciences and LawLaw and Criminology (R0)