A Process for Developing a Common Vocabulary in the Information Security Area
Jan V. Knop, Alexey A. Salʹnikov, V. V. I︠A︡shchenko
IOS Press, 2007 - Computers - 107 pages
"For the last years there are tendencies of growing numbers of cyber attacks and the scale of casualties has been growing as well. Cyber attacks against critically important segments of informational infrastructure including the systems of control of transport and dangerous industry are becoming more real. Since the attacks are made with the use of global informational infrastructure they could be organized from every part of the planet, which means that we can only resist them with the help of international cooperation. The scientific part of such strategies must have the adjustable terminology and the conception apparatus. Every scientific investigation - when it accompanies specialists from different countries - has to start with agreement upon the terminology. There is a need to harmonize different languages in which specialists speak in order to guarantee the information security. These are the languages of the lawyers, insurers, brokers, creators, technicians, law-enforcement structures and standardizations."
What people are saying - Write a review
We haven't found any reviews in the usual places.
Legal Groundwork for Information Security and Conceptual Framework
Basic Concepts and Taxonomy of Dependable and Secure Computing
A Common Language for Creating International Security Policies
Towards the Creation of Security Ontologism for Information Technology Communications Information Systems Information and Knowledge in Or...
The Human Factor
About Information Concept Its Essence and Role in Social and Technical Systems
Terms for the Glossary on Counter Cyberterrorism
DECLARATION of the NATORussia Advanced Research Workshop A Process for Developing a Common Vocabulary in the Information Security A...
2007 IOS Press act of cyberterrorism actions activity approach attributes cause Common Vocabulary communication communication protocols complex computer crime computer systems concepts confidentiality context cooperation correct service counteraction coverage create creation critical cyber Cybercrime cyberterrorism cyberterrorist act defined definition dependability and security development failure development faults entities environment evaluation external fault fault classes fault forecasting fault handling fault injection fault prevention fault removal fault tolerance fault-tolerant systems function goals hacktivism hardware human impact implementation individual’s information infrastructure Information Security Area Information Security Institute information society information systems information warfare integrity interaction interests Internet Knop knowledge ontology Lomonosov University maintenance means mechanisms money laundering Moscow nonmalicious objects ontology operational organizations performed Proc providing Russia Russian Federation scientific Section security glossary security policies social specification taxonomy technical terminology terrorist testing threats understanding users verification