Crying for the Moon? - Current Challenges in Corporate Information Security Management

Ulrike Hugl

Abstract

The ability to respond to the evolving challenges in corporate information security management is not a destination but rather a journey. To contest the race means to accept the dare, but being aware of the fact that offenders are normally one step ahead. Understanding threats and attackers’ methods and strategies is a crucial issue towards protecting corporate assets. This work aims on presenting an overview of current information security-related trends, it explains possible internal and external motivated offenders and reveals related organisational weak spots. Moreover, it highlights some starting points for organisational prevention measures.

References

  1. Applegate, S. D. 2009. Social Engineering: Hacking The Wetware! Information Security Journal: A Global Perspective, 18, 40-46.
  2. Biermann, K. Feb. 24, 2011. Was Vorratsdaten Über Uns Verraten. Hamburg: Die Zeit Online.
  3. Boyd, D. & Crawford, K. 2012. Critical Questions For Big Data. Information, Communication & Society, 15, 662-679.
  4. Chen, H., Chiang, R. H. L. & Storey, V. C. 2012. Business Intelligence And Analytics: From Big Data To Big Impact. Mis Quarterly, 36, 1165-1188.
  5. Deloitte 2013. Blurring The Lines. 2013 Tmt Global Security Study. New York: Deloitte Touche Tohmatsu Limited.
  6. Emc 2012. Sbic Special Report: Information Security Shake-Up: Disruptive Innovations To Test Security's Mettle In 2013. Hopkinton (Ma): Security For Business Innovation Council (Sbic)/Emc (Rsa).
  7. Enisa Sep. 2012. Enisa Threat Landscape. In: Marinos, L. & Sfakianakis, A. (Eds.). Heraklion: European Network And Information Security Agency (Enisa).
  8. Eu 15 March 2006. Directive 2006/24/Ec Of The European Parliament And Of The Council Of 15 March 2006 On The Retention Of Data Generated Or Processed In Connection With The Provision Of Publicly Available Electronic Communications Services Or Of Public Communications Networks And Amending Directive 2002/58/Ec.
  9. Eu 2012. Ethical And Regulatory Challenges To Science And Research. Policy At The Global Level. Luxembourg: European Union.
  10. Gonzalez, M. C., Hidalgo, C. A. & Barabasi, A.-L. 2009. Understanding Individual Human Mobility Patterns. Nature, 458, 238-238.
  11. Hashizume, K., Rosado, D. G., Fernández-Medina, E. & Fernandez, E. B. 2013. An Analysis Of Security Issues For Cloud Computing. Journal Of Internet Services And Applications, 4, 1-13.
  12. Idc Apr. 2013. Idc-Studie: Deutsche Unternehmen Verlassen Sich Auf It Service Management Für Die Cloud. Frankfurt: IDC Central Europe.
  13. Idc Sep. 2012. IDC-Studie Managing Mobile Enterprises In Deutschland 2012: Byod Hat Zenit Erreicht. Frankfurt: Idc Central Europe.
  14. Pwc Oct. 2012. Changing The Game. Key Findings From The Global State Of Information Security®. Survey 2013. New York City: Pricewaterhousecoopers LLP.
  15. Schwartz, M. J. Dec. 27, 2012. 7 Top Information Security Trends For 2013. Informationweek.
  16. Schwartz, M. J. Nov. 27, 2012. Bank Ddos Strikes Could Presage Armageddon Attacks. Informationweek.
  17. Skok, M. J. 2012. 2012 Future Of Cloud Computing - 2nd Annual Survey Results.
  18. Snijders, C., Matzat, U. & Reips, U.-D. 2012. “Big Data”: Big Gaps Of Knowledge In The Field Of Internet Science. International Journal Of Internet Science, 7, 1-5.
  19. Sullivan, F. 2011. The 2011 (Isc)2 Global Information Security Workforce Study. Mountain View (Ca).
  20. Sullivan, F. Feb. 2013. The 2013 (Isc) Global Information Security Workforce Study. Mountain View (Ca).
  21. Tsolkas, A. & Wimmer, F. 2013. Wirtschaftsspionage Und Intelligence Gathering. Neue Trends Der Wirtschaftlichen Vorteilsbeschaffung, Wiesbaden, Springer.
  22. Weiße, G. 2011. Totale Überwachung. Staats, Wirtschaft Und Geheimdienste Im Informationskrieg Des 21. Jahrhunderts, Graz, Ares.
  23. Wurzer, A. J. 2011. 1. Know-How-Risiken - Definition Und Systematik. In: Wurzer, A. J. & Kaiser, L. (Eds.) Handbuch Internationaler Know-How-Schutz. Köln: Bundesanzeiger.
  24. iECHELON is based on the UKUSA Agreement (1946) of intelligence agencies of the USA, Great Britain, Canada, Australia, New Zealand and others (so-called Third Parties). In 2004, concerns regarding economic espionage of European companies resulted in the closing-down of the facility in Bad Aibling (Germany).
Download


Paper Citation


in Harvard Style

Hugl U. (2013). Crying for the Moon? - Current Challenges in Corporate Information Security Management . In Proceedings of the International Conference on Knowledge Discovery and Information Retrieval and the International Conference on Knowledge Management and Information Sharing - Volume 1: ISI–BDM, (IC3K 2013) ISBN 978-989-8565-75-4, pages 579-586. DOI: 10.5220/0004700605790586


in Bibtex Style

@conference{isi–bdm13,
author={Ulrike Hugl},
title={Crying for the Moon? - Current Challenges in Corporate Information Security Management},
booktitle={Proceedings of the International Conference on Knowledge Discovery and Information Retrieval and the International Conference on Knowledge Management and Information Sharing - Volume 1: ISI–BDM, (IC3K 2013)},
year={2013},
pages={579-586},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0004700605790586},
isbn={978-989-8565-75-4},
}


in EndNote Style

TY - CONF
JO - Proceedings of the International Conference on Knowledge Discovery and Information Retrieval and the International Conference on Knowledge Management and Information Sharing - Volume 1: ISI–BDM, (IC3K 2013)
TI - Crying for the Moon? - Current Challenges in Corporate Information Security Management
SN - 978-989-8565-75-4
AU - Hugl U.
PY - 2013
SP - 579
EP - 586
DO - 10.5220/0004700605790586