The History of Information Security

2020 ◽  
pp. 48-57
Author(s):  
Aytakin Nazim Ibrahimova

Taking into consideration its historical evolvement, it is evident that information security is not a new concept. Starting from the very moment of writing down the information, it presents by itself a data that can be protected, stolen, or destroyed. Throughout the whole history, without even perceiving it people had to take steps to guarantee the security of important information that they have been able to maintain. The concept of information security is quite dynamic. A behaviour that is generally accepted today can be a peril to an entity that we will work with tomorrow. Developing technology brings along the continuous innovation. Everyone handles personal information when it comes to technology development or service provision. Besides already existing services, it includes banking and other activities. Therefore, we should bear in mind that personal security cannot be ensured without guaranteeing security within each organization.


Author(s):  
Bruno Garcia ◽  

This article provides a brief history of information security, with emphasis on cybersecurity threats and how these are influenced by globalization. A comparative analysis of three different sources is conducted to capture some patterns about this relationship: 1) ENISA reports on cyberthreats, 2) The Global Risks Report, on global threats and the 3) DHLGlobal Connectedness report for globalization indicators. To avoid dispersion, the analysis is circumscribed roughly to the last decade. This report points to an intensification of cyber threats in the last few years, while the globalization indicators suggest a slowdown in global interconnections. A number of hypotheses to explain these patterns are recommended for further research.


2016 ◽  
Vol 25 (1) ◽  
pp. 11-36
Author(s):  
MARC FLANDREAU ◽  
FRÉDÉRIC ZUMER

AbstractThis article shows how one can read political history from evidence on corporate corruption. The study exploits newly discovered archival material from Banque de Paris et des Pays-Bas, a politically connected investment bank. We contribute to current research by replacing existing conjectures with precise qualitative and quantitative evidence. After reviewing previous works and providing a sketch of information repression and media control in France during the interwar period, we argue that the study of patterns of ‘informational criminality’ provides an original entry to the writing of political history and the history of information.


Author(s):  
N.M. Kurbatov

The concept of critical information infrastructure is analyzed. The history of its formation and consolidation in the legal space of Russian legislation is considered. The article studies the experience of foreign countries in the field of ensuring information security in general and protecting critical infrastructure in particular. The relevance of the chosen topic is due to the course taken by the Russian Federation for the development of the information society in the country, as well as the need to protect significant information systems and resources of state authorities. The author of the article reveals the terms included in the definition of critical information infrastructure, enshrined in the legislation of the Russian Federation. In conclusion, the main problems of the considered regulatory legal acts are highlighted, recommendations are given on the further development of the information security system of critical infrastructure.


2020 ◽  
Author(s):  
Nils Braun-Dubler ◽  
Hans-Peter Gier ◽  
Tetiana Bulatnikova ◽  
Manuel Langhart ◽  
Manuela Merki ◽  
...  

Blockchain is widely considered a new key technology. The Foundation for Technology Assessment (TA-SWISS) has proposed a comprehensive assessment of blockchain technologies. With this publication, TA-SWISS provides the much-needed social contextualisation of blockchain. The first, more technical part of the study takes an in-depth look at how blockchain functions and examines the economic potential of this technology. By analysing multiple real-world applications, the study sheds light on where the blockchain has advantages over traditional applications and where existing technologies continue to be the better solution. The second part of the study examines how blockchain became mainstream. It explores the origins of blockchain in the early history of information technology and computer networks. The study also reveals the impact blockchain has on industrial and public spaces. Finally, it discusses the social implications and challenges of blockchain against the background of a new socio-technical environment.


Sign in / Sign up

Export Citation Format

Share Document