From Information Security To Cyber Security: Rossouw Von Solms, Johan Van Niekerk
From Information Security To Cyber Security: Rossouw Von Solms, Johan Van Niekerk
From Information Security To Cyber Security: Rossouw Von Solms, Johan Van Niekerk
Article history: The term cyber security is often used interchangeably with the term information security. This
Received 26 November 2012 paper argues that, although there is a substantial overlap between cyber security and in-
Received in revised form formation security, these two concepts are not totally analogous. Moreover, the paper
10 April 2013 posits that cyber security goes beyond the boundaries of traditional information security to
Accepted 11 April 2013 include not only the protection of information resources, but also that of other assets,
including the person him/herself. In information security, reference to the human factor
Keywords: usually relates to the role(s) of humans in the security process. In cyber security this factor
Information security has an additional dimension, namely, the humans as potential targets of cyber attacks or
Cyber security even unknowingly participating in a cyber attack. This additional dimension has ethical
Cybersecurity implications for society as a whole, since the protection of certain vulnerable groups, for
Cyber-Security example children, could be seen as a societal responsibility.
Computer security ª 2013 Elsevier Ltd. All rights reserved.
Risk
Threat
Vulnerability
* Corresponding author. Tel.: þ27 41 504 3604; fax: þ27 41 504 9604.
E-mail addresses: [email protected], [email protected] (R. von Solms), [email protected] (J. van
Niekerk).
0167-4048/$ e see front matter ª 2013 Elsevier Ltd. All rights reserved.
http://dx.doi.org/10.1016/j.cose.2013.04.004
Please cite this article in press as: von Solms R, van Niekerk J, From information security to cyber security, Computers & Security
(2013), http://dx.doi.org/10.1016/j.cose.2013.04.004
2 c o m p u t e r s & s e c u r i t y x x x ( 2 0 1 3 ) 1 e6
maintenance of the security properties of the organization characteristics include the confidentiality, integrity and
and user’s assets against relevant security risks in the cyber availability of information, as mentioned in the definition
environment. The general security objectives comprise the provided in ISO/IEC 27002 (2005), but are not limited to these
following: three characteristics only. According to Whitman and Mattord
(2009, p. 8), ensuring the confidentiality, integrity and avail-
Availability ability of information, also known in information security as
the CIA triangle, has traditionally been the industry standard.
Integrity, which may include authenticity and non- “The security of these three characteristics of information is
repudiation as important today as it has always been, but the CIA triangle
model no longer adequately addresses the constantly chang-
Confidentiality ITU, 2008. ing environment of the computer industry” (Whitman and
Mattord, 2009, p. 8). Accordingly, Whitman and Mattord
These definitions are very similar to that of information (2009) add accuracy, authenticity, utility and possession to
security. This paper will explore the definition of information the list of information characteristics that needs to be
security in depth and then argue that the boundaries of cyber protected.
security as a concept are wider than those of information A few concepts in the above definitions need closer ex-
security in terms of how it is formally defined. This view- amination. Firstly, it should be clear that information security
point is supported by the international standard ISO/IEC is not a product or a technology, but a process (Mitnick and
27032:2012(E). Simon, 2002, p. 4). According to Wood (2004) information se-
This paper will specifically focus on the underlying nature curity used to be a strictly technical issue. However, as the use
of security in general and will attempt to show, by means of of computers and networks evolved, the process of securing
examples, that the assets cyber security aims to protect these computers and networks also had to evolve to extend
include an additional dimension which extends beyond the beyond only the technical. The process of information secu-
formal boundaries of information security. Further, this paper rity may require the use of certain products, but is not
asserts that both humans in their personal capacity and so- something that can be bought off the shelf.
ciety at large can be directly harmed or affected by cyber se- The second important factor to note about the above defi-
curity attacks, whereas this is not necessarily the case with nitions is that information security is commonly defined in
information security where harm is always indirect. The au- terms of the properties or characteristics that secure infor-
thors view such a disambiguation as an important contribu- mation should have. These usually include the confidentiality,
tion to the common body of knowledge for the field of integrity and availability of information, but can include
information and cyber security. Such a body of knowledge additional characteristics.
provides a “basis for understanding terms and concepts” in It is important to note that there is a difference between
the subject area and thus acts as a “taxonomy of topics rele- information security and information technology (or infor-
vant to professionals around the world” (Theoharidou and mation and communication technology) security.
Gritzalis, 2007).
2.2. Information and communication technology
security defined
2. Information security
Information and communication technology (ICT) security
The aim of information security is to ensure business conti- deals with the protection of the actual technology-based
nuity and minimise business damage by limiting the impact of systems on which information is commonly stored and/or
security incidents (Von Solms, 1998). Information security can transmitted. The international standard ISO/IEC 13335-1
be defined in a number of ways, as highlighted below. (2004) defines ICT security as all aspects relating to defining,
achieving and maintaining the confidentiality, integrity,
2.1. Information security defined availability, non-repudiation, accountability, authenticity,
and reliability of information resources (ISO/IEC 13335-1, 2004,
The international standard, ISO/IEC 27002 (2005), defines in- p. 3). Since information security includes the protection of the
formation security as the preservation of the confidentiality, underlying information resources, it can be argued that ICT
integrity and availability of information (ISO/IEC 27002, 2005, security is a sub-component of information security.
p. 1). In the context of ISO/IEC 27002 (2005), information can The definition of ICT security is thus very similar to that of
take on many forms. It can be printed or written on paper, information security. However, additional characteristics,
stored electronically, transmitted by post or electronic means, which in this context could be better described as services that
shown on films, conveyed in conversation, and so forth (ISO/ should be provided by secure information resources, are
IEC 27002, 2005, p. 1). added to the definition. These include non-repudiation,
Whitman and Mattord (2009) define information security accountability, authenticity and reliability. Dhillon (2007, p.
as “the protection of information and its critical elements, 19) also refers to the concept of data security as denoting the
including the systems and hardware that use, store, and protection of the actual data in an information system. Since
transmit that information” (Whitman and Mattord, 2009, p. 8). the definition given in Dhillon (2007, p. 19) includes most of
These authors (2009) also identify several critical character- the characteristics in the definition for information technol-
istics of information that give it value in organisations. These ogy security, and because the security of underlying data is to
Please cite this article in press as: von Solms R, van Niekerk J, From information security to cyber security, Computers & Security
(2013), http://dx.doi.org/10.1016/j.cose.2013.04.004
c o m p u t e r s & s e c u r i t y x x x ( 2 0 1 3 ) 1 e6 3
Please cite this article in press as: von Solms R, van Niekerk J, From information security to cyber security, Computers & Security
(2013), http://dx.doi.org/10.1016/j.cose.2013.04.004
4 c o m p u t e r s & s e c u r i t y x x x ( 2 0 1 3 ) 1 e6
3.2. Scenario 2 e home automation the case of attacks against such critical infrastructure, the loss
entails not only of that of the integrity or availability of in-
Advances in ICT, as well as advances in the field of electronics, formation resources, but also that of access to such critical
have given rise to a multitude of home automation applica- services. In this case, it is neither the information itself nor the
tions (Jiménez et al., 2011). Many of these allow home owners individual information user that is at risk, but rather the
to integrate home security systems, hot water geysers, fridges, wellbeing of society as a whole. A good example of such at-
stoves, televisions and other appliances with web-based tacks is the attacks on Estonia in April/May of 2007.
management systems. Unfortunately, the increased conve- These scenarios deal with a specific aspect of cyber secu-
nience of managing one’s home via the web is accompanied rity where the interests of a person, society or nation,
by the increased risk that someone might gain unauthorised including their non-information based assets, need to be
access to such systems and cause harm. This harm could protected from risks stemming from interaction with cyber-
range from “pranks” like turning off the hot water, to serious space. This serves to highlight the difference between infor-
crimes like turning off the security system in order to burgle mation security and cyber security.
the home.
Once again, in this case one can argue that the victim’s
information is not necessarily negatively affected. Instead, 4. From information security to cyber
other assets of the victim are the target of the cybercrime. security
3.3. Scenario 3 e digital media All security is about the protection of assets from the various
threats posed by certain inherent vulnerabilities. Security
One of the industries that have been directly affected by the processes usually deal with the selection and implementation
improved sharing of information is the entertainment in- of security controls (also called countermeasures) which help
dustry. Every year enormous amounts of potential revenue to reduce the risk posed by these vulnerabilities (ISO/IEC
are lost to the sharing of illegal movies, music and other forms 27002, 2005; Farn et al., 2004; Gerber and Von Solms, 2005).
of digital media. This illegal sharing does not necessarily In the case of ICT security, the asset(s) that need to be
affect the confidentiality, integrity or availability of the shared protected are the underlying information technology infra-
media; however, it does directly affect the financial wellbeing structure (see Fig. 1). Information security, on the other hand,
of the legal owner of the rights to the specific media. Self- extends this definition of the assets to be protected to include
justification of illegal activities, like copying media illegally, all aspects of the information itself. It thus includes the pro-
could even act as a catalyst that makes it easier to perform tection of the underlying ICT assets, and then goes beyond
other illegal acts in future (Ariely, 2012). just the technology to include information that is not stored or
In this case it could be argued that the victim of the communicated directly using ICT (see Fig. 2).
cybercrime is more than just the party whose intellectual However, as demonstrated in the scenarios above, in cyber
property is being compromised. It even extends to an attack security the assets that need to be protected can range from
on the value system (both ownerships rights and the under- the person him/herself to common household appliances, to
pinning ethics of the perpetrators) that is being negatively the interests of society at large, including critical national
affected. infrastructure. In fact, such assets include absolutely anyone
or anything that can be reached via cyberspace.
3.4. Scenario 4 e cyber terrorism It is thus the assertion of this paper that the term cyber
security is related, but not analogous, to the term information
In the USA critical infrastructure is defined as “the assets, security. In cyber security, information and ICT are the un-
systems, and networks, whether physical or virtual, so vital to derlying cause of the vulnerability. It is still possible for the
the United States that their incapacitation or destruction assets dealt with in security to include information itself, or
would have a debilitating effect on security, national eco- even information and communication infrastructure. How-
nomic security, public health or safety, or any combination ever, the single most defining characteristic of cyber security
thereof” (Department of Homeland Security, 2011). Infra- is the fact that all assets that should be protected need to be
structure that delivers electricity and water, controls air protected because of the vulnerabilities that exist as a result of
traffic, or supports financial transactions is seen as “critical the use of the ICT that forms the basis of cyberspace.
life sustaining infrastructures” and all directly depend on These vulnerabilities can even affect intangible assets. For
underlying communications and network infrastructure (The example, cyber security adds an important ethical dimension,
Whitehouse, 2011, p. 3). The protection of such critical infra- because problems such as cyber bullying extend beyond the
structure forms an important part of cyber security and is law and present an ethical issue that society, in general, needs
included as an important national imperative in national to deal with. This ethical dimension extends to problems like
cyber security strategies (Minister for the Cabinet Office and botnets. Being part of a botnet does not always mean that the
Paymaster General, 2011, p. 39; The Whitehouse, 2011, p. 13). confidentiality, integrity, availability or other characteristics
Cyber terrorists or enemy specialists may target a coun- of one’s information resources have been directly affected; it
try’s critical infrastructure via cyberspace. This could either be is quite possible that a botnet may only “steal” clock cycles on
indirectly, for example by influencing the availability of in- a computer while it would otherwise be inactive. However, if
formation services using denial-of-service attacks or, more such a botnet is used to commit a crime, the owner of the
directly, through an attack on the national electricity grid. In computer in question might be an unknowing accomplice.
Please cite this article in press as: von Solms R, van Niekerk J, From information security to cyber security, Computers & Security
(2013), http://dx.doi.org/10.1016/j.cose.2013.04.004
c o m p u t e r s & s e c u r i t y x x x ( 2 0 1 3 ) 1 e6 5
Assets references
Threats Vulnerabilities _______
_______ _______
Various ICT, Information, etc. Humans and their
interests
Ariely D. The (honest) truth about dishonesty: how we lie to
Fig. 3 e Cyber security. everyone e especially ourselves. HarperCollins; 2012.
Please cite this article in press as: von Solms R, van Niekerk J, From information security to cyber security, Computers & Security
(2013), http://dx.doi.org/10.1016/j.cose.2013.04.004
6 c o m p u t e r s & s e c u r i t y x x x ( 2 0 1 3 ) 1 e6
Please cite this article in press as: von Solms R, van Niekerk J, From information security to cyber security, Computers & Security
(2013), http://dx.doi.org/10.1016/j.cose.2013.04.004