Abstract
The ongoing demand for new and faster technologies continues to leave consumers and business users to face the constant challenge of updating systems and software. This unrelenting pace of technological evolution has not always been matched with a commensurate focus on security and privacy matters. In particular, the obligatory move to embrace cloud and IoT - that frequently result in the collection and analysis of large data lakes has raised challenges for sovereign data protection and privacy legislation where data at rest can change overnight with mergers and acquisitions of service providers. This chapter examines the role of IFIP Technical Committee 11 (and its 14 underlying Working Groups) in this ever-changing and evolving domain. The discussion provides an outline of key issues in information security when viewed from technical, organisational and human perspectives, which collectively represent the breadth of areas within which TC-11 and its Working Groups are seeking to make contributions. The chapter as a whole gives a clear sense of the challenges involved in achieving and maintaining security and privacy, alongside insights into the ways that they are being tackled within IFIP activities.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
OECD: The OECD Privacy Framework (2013). https://www.oecd.org/sti/ieconomy/oecd_privacy_framework.pdf. Accessed 16 Dec 2020
IFIP TC11: Aims and Scope (n.d.). https://www.ifiptc11.org/aims-and-scope. Accessed 16 Dec 2020
IFIP TC11: Working Groups (n.d.). https://www.ifiptc11.org/working-groups. Accessed 16 Dec 2020
Connolly, L., Lang, M., Tygar, D.: Managing employee security behaviour in organisations: the role of cultural factors and individual values. In: Cuppens-Boulahia, N., Cuppens, F., Jajodia, S., Abou El Kalam, A., Sans, T. (eds.) SEC 2014. IAICT, vol. 428, pp. 417–430. Springer, Heidelberg (2014). https://doi.org/10.1007/978-3-642-55415-5_35
Wiefling, S., Lo Iacono, L., Dürmuth, M.: Is this really you? An empirical study on risk-based authentication applied in the wild. In: Dhillon, G., Karlsson, F., Hedström, K., Zúquete, A. (eds.) SEC 2019. IAICT, vol. 562, pp. 134–148. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-22312-0_10
Giorgi, G., Martinelli, F., Saracino, A., Sheikhalishahi, M.: Walking through the deep: gait analysis for user authentication through deep learning. In: Janczewski, L.J., Kutyłowski, M. (eds.) SEC 2018. IAICT, vol. 529, pp. 62–76. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-99828-2_5
Diaz-Tellez, Y.H., Bodanese, E.L., Dimitrakos, T., Turner, M.: Context-aware multifactor authentication based on dynamic pin. In: Cuppens-Boulahia, N., Cuppens, F., Jajodia, S., Abou El Kalam, A., Sans, T. (eds.) SEC 2014. IAICT, vol. 428, pp. 330–338. Springer, Heidelberg (2014). https://doi.org/10.1007/978-3-642-55415-5_27
Damopoulos, D., Wetzel, S.: Introducing research into the undergraduate curriculum in cybersecurity. In: Drevin, L., Theocharidou, M. (eds.) WISE 2019. IAICT, vol. 557, pp. 30–42. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-23451-5_3
von Solms, S., Marnewick, A.: Identifying security requirements body of knowledge for the security systems engineer. In: Drevin, L., Theocharidou, M. (eds.) WISE 2019. IAICT, vol. 557, pp. 59–71. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-23451-5_5
Thing, V.L.L., Chua, Z.-L.: Smartphone volatile memory acquisition for security analysis and forensics investigation. In: Janczewski, L.J., Wolfe, H.B., Shenoi, S. (eds.) SEC 2013. IAICT, vol. 405, pp. 217–230. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-39218-4_17
Agarwal, M., Puzis, R., Haj-Yahya, J., Zilberman, P., Elovici, Y.: Anti-forensic = suspicious: detection of stealthy malware that hides its network traffic. In: Janczewski, L.J., Kutyłowski, M. (eds.) SEC 2018. IAICT, vol. 529, pp. 216–230. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-99828-2_16
Dupont, G., dos Santos, D.R., Costante, E., den Hartog, J., Etalle, S.: A matter of life and death: analyzing the security of healthcare networks. In: Hölbl, M., Rannenberg, K., Welzer, T. (eds.) SEC 2020. IAICT, vol. 580, pp. 355–369. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-58201-2_24
Yoo, H., Ahmed, I.: Control logic injection attacks on industrial control systems. In: Dhillon, G., Karlsson, F., Hedström, K., Zúquete, A. (eds.) SEC 2019. IAICT, vol. 562, pp. 33–48. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-22312-0_3
Vossaert, J., Lapon, J., De Decker, B., Naessens, V.: Trusted computing to increase security and privacy in eID authentication. In: Cuppens-Boulahia, N., Cuppens, F., Jajodia, S., Abou El Kalam, A., Sans, T. (eds.) SEC 2014. IAICT, vol. 428, pp. 485–492. Springer, Heidelberg (2014). https://doi.org/10.1007/978-3-642-55415-5_41
Eckel, M., Fuchs, A., Repp, J., Springer, M.: Secure attestation of virtualized environments. In: Hölbl, M., Rannenberg, K., Welzer, T. (eds.) SEC 2020. IAICT, vol. 580, pp. 203–216. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-58201-2_14
Kitkowska, A., Shulman, Y., Martucci, L.A., Wästlund, E.: Facilitating privacy attitudes and behaviors with affective visual design. In: Hölbl, M., Rannenberg, K., Welzer, T. (eds.) SEC 2020. IAICT, vol. 580, pp. 109–123. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-58201-2_8
Simonet, J., Teufel, S.: The influence of organizational, social and personal factors on cybersecurity awareness and behaviour of home computer users. In: Dhillon, G., Karlsson, F., Hedström, K., Zúquete, A. (eds.) SEC 2019. IAICT, vol. 562, pp. 194–208. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-22312-0_14
Rios, R., Nuñez, D., Lopez, J.: Query privacy in sensing-as-a-service platforms. In: De Capitani di Vimercati, S., Martinelli, F. (eds.) SEC 2017. IAICT, vol. 502, pp. 141–154. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-58469-0_10
Chen, W., Lin, Y., Galpin, V., Nigam, V., Lee, M., Aspinall, D.: Formal analysis of sneak-peek: a data centre attack and its mitigations. In: Janczewski, L.J., Kutyłowski, M. (eds.) SEC 2018. IAICT, vol. 529, pp. 307–322. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-99828-2_22
Adepu, S., Mathur, A.: Using process invariants to detect cyber attacks on a water treatment system. In: Hoepman, J.-H., Katzenbeisser, S. (eds.) SEC 2016. IAICT, vol. 471, pp. 91–104. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-33630-5_7
Drozd, O., Kirrane, S.: Privacy CURE: consent comprehension made easy. In: Hölbl, M., Rannenberg, K., Welzer, T. (eds.) SEC 2020. IAICT, vol. 580, pp. 124–139. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-58201-2_9
Paul, N., Tesfay, W.B., Kipker, D.-K., Stelter, M., Pape, S.: Assessing privacy policies of Internet of Things services. In: Janczewski, L.J., Kutyłowski, M. (eds.) SEC 2018. IAICT, vol. 529, pp. 156–169. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-99828-2_12
Caelli, W.J., Kwok, L.-F., Longley, D.: Evolving a secure internet. In: Janczewski, L.J., Wolfe, H.B., Shenoi, S. (eds.) SEC 2013. IAICT, vol. 405, pp. 42–54. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-39218-4_4
Wheeler J.A.: Top 10 factors for integrated risk management success, Gartner, Inc. (2017). https://www.gartner.com/en/documents/3645368/top-10-factors-for-integrated-risk-management-success. Accessed 16 Dec 2020
World Economic Forum (WEF): Digital transformation of industries: digital enterprise. World Economic Forum White Paper (2016). http://reports.weforum.org/digital-transformation/wp-content/blogs.dir/94/mp/files/pages/files/digital-enterprise-narrative-final-january-2016.pdf. Accessed 16 Dec 2020
Connolly, L., Lang, M., Tygar, J.D.: Investigation of employee security behaviour: a grounded theory approach. In: Federrath, H., Gollmann, D. (eds.) SEC 2015. IAICT, vol. 455, pp. 283–296. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-18467-8_19
Tolah, A., Furnell, S.M., Papadaki, M.: A comprehensive framework for understanding security culture in organizations. In: Drevin, L., Theocharidou, M. (eds.) WISE 2019. IAICT, vol. 557, pp. 143–156. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-23451-5_11
Cybersecurity Ventures: Cybersecurity Talent Crunch to Create 3.5 Million Unfilled Jobs Globally By 2021. https://cybersecurityventures.com/jobs/. Accessed 16 Dec 2020
CSEC: Cybersecurity Curricula 2017 – Curriculum Guidelines for Post-Secondary Degree Programs in Cybersecurity. Version 1.0 Report 31 December 2017. CSEC2017 Joint Task Force - Association for Computing Machinery (ACM), IEEE Computer Society (IEEE-CS), Association for Information Systems Special Interest Group on Information Security and Privacy (AIS SIGSEC) and International Federation for Information Processing Technical Committee on Information Security Education (IFIP WG 11.8). https://cybered.hosting.acm.org/wp-content/uploads/2018/02/newcover_csec2017.pdf. Accessed 16 Dec 2020
Hui, K.L., Vance, A., Zhdanov, D.: Securing Digital Assets. In: Bush, A., Rai, A. (eds.) MIS Quarterly Research Curations (2016). https://doi.org/10.25300/05272016. http://misq.org/research-curations
Acknowledgments
We would like to acknowledge the contributions from working group officers and members in addition to the named authors of this chapter. Specifically: Raja Naeem Akram, Kam-Pui Chow, Richard George, Konstantinos Markantonakis, Gilbert Peterson, Damien Sauveron and Sujeet Shenoi.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 IFIP International Federation for Information Processing
About this chapter
Cite this chapter
Furnell, S. et al. (2021). Information Security and Privacy – Challenges and Outlook. In: Goedicke, M., Neuhold, E., Rannenberg, K. (eds) Advancing Research in Information and Communication Technology. IFIP Advances in Information and Communication Technology(), vol 600. Springer, Cham. https://doi.org/10.1007/978-3-030-81701-5_16
Download citation
DOI: https://doi.org/10.1007/978-3-030-81701-5_16
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-81700-8
Online ISBN: 978-3-030-81701-5
eBook Packages: Computer ScienceComputer Science (R0)