You are here: Home Contents V8 N1 V8N1_Whitman.html
Personal tools

Threats to Information Security Revisited

 

 

Full text
View
Purchase

Source
Journal of Information Systems Security
Volume 8, Number 1 (2012)
Pages 2141
ISSN 1551-0123 (Print)
ISSN 1551-0808 (Online)
Authors
Michael E. Whitman — Kennesaw State University, USA
Herbert J. Mattord — Kennesaw State University, USA
Publisher
Information Institute Publishing, Washington DC, USA

 

 

Abstract

The battle for the protection of information assets continues to rage at all organizations, big and small.  In the ever-changing world of information security, new threats emerge, and old threats remain potent risks to poorly prepared organizations.  It is critical to the ongoing protection of valuable information assets to understand these threats, new and old.  This study seeks to inform organizations and researchers about the characteristics of specific threat categories and the relative dangers they pose. In addition, the study provides updated findings of a study conducted in 2002. New findings reveal the more things change, the more they stay the same.

 

 

 

Keywords

Information Security Administration, Information Security, Risk Management, Information Security Governance, Information Security Planning

 

 

References

Ayoub, R. (2010), ‘The 2011 (ISC) 2 Global Information Security Workforce Study,’ isc2.org, 8 February 2011.

Barrett, L. (2010), ‘Malicious Spam Traffic Hits Record High in 3Q,’ www.esecurityplanet.com, 15 November 2011.

CIO Magazine Online (2007), ‘The Fifth Annual Global State of Information Security,’ www.cio.com, 28 August, 2007.

Arbogast, B. (2002), ‘Microsoft Exec: Industry Should Follow Our Lead,’ Computerworld, 36 (9): 26.

Daniel, D. (2008), ‘Human error tops the list of security threats,’ www.cio.com, 5 February 2008.

Frost & Sullivan (2008), ‘The 2008 (ISC) 2 Global Information Security Workforce Study,’ isc2.org, 14 February 2008.

Gillies, A. (2011), “Improving the Quality of Information Security Management Systems with ISO 27000,” The TQM Journal, 23 (4): 367-376.

IC3 (2010), Table compiled from The Internet Crime Complaint Center’s Annual Computer Crime Reports from 2006 to 2010, ic3report.nw3c.org, 24 February 2011.

Long, S. A. (2006), “US copyright law: The Challenge of Protection in the Digital Age,” New Library World, 107 (9-10): 450-452.

McMillian, R. (2008), ‘Up to Three Percent of Internet Traffic is Malicious,’ www.csoonline.com, 1 April 2008.

Miniwatts Marketing Group (2011), ‘Internet usage statistics: The Internet big picture,’ www.internetworldstats.com, 20 August 2011.

PriceWaterhouseCoopers Online (2011), ‘The PriceWaterhouseCoopers 2011 Global State of Information Security Survey,’ pwc.com, 14 September 2010.

Raz, T. and Michael, E. (2001), “Use and Benefits of Tools for Project Risk Management,” International Journal of Project Management, 19 (1): 9-17.

Rees, J. and Allen, J. (2008), “The state of risk assessment practices in information security: An exploratory investigation,” Journal of Organizational Computing and Electronic Commerce, 18 (4): 255-277.

Richardson, R. (2009), Table compiled from CSI and CSI/FBI studies from 2000 to 2009. www.gocsi.com, 25 February, 2010.

Richtell, M. and Kopytoff, V. (2011), ‘E-mail fraud hides behind friendly face,’ The New York Times, June 2, 2011.

RSA (2011), ‘RSA Online Fraud Report – Phishing Reports,’ www.rsa.com, 15 July 2011.

RSA (2010), ‘RSA’s Online Fraud Report for November 2010,’ www.rsa.com, 15 December 2010.

Spafford, E. (2009). “Answering the wrong questions is no answer,” Communications of the ACM, 52 (6): 22.

Whitman, M. E. (2003), “Enemy At the Gates: Threats to information security,” Communications of the ACM, 46 (8): 91-95.

Whitman, M. and Mattord, H. (2010), Management of Information Security, 3rd ed. Delmar/Cengage/Course Technology, Boston, MA.

Wu, S. and Griffith, S. (1971), The Art of War, Oxford University Press, Oxford, England.