Treść książki

Przejdź do opcji czytnikaPrzejdź do nawigacjiPrzejdź do informacjiPrzejdź do stopki
INTRODUCTION1
Weliveintheeraofinformationandnetworks.Vastvolumesofdataarestored
oncomputersandotherdevicesconnectedtotheinternet.Peoplearebecomingin-
creasinglymoredependentoninformationandcommunicationtechnologyinboth
professionalandpersonalactivitiesandthereisnosignthatthistrendwillslow
down.Preservingpeoplewell-beingrequiresspecialmeasurestoprotectthem
againstactivitiesthreateningthesecurityofthecyberspace.Heretheconceptof
cybersecurity,orinformationsecurity,comesintoplay.
Thereisnogloballyacceptedandstandardiseddefinitionofcybersecurity(Nai
Fovino2019).IntheUKNationalCyberSecurityStrategy(HMGovernment
2016),thefollowingdescriptivedefinitionispresented:
Cybersecurityreferstotheprotectionofinformationsystems(hardware,
softwareandassociatedinfrastructure),thedataonthem,andtheservic-
estheyprovide,fromunauthorisedaccess,harmormisuse.Thisincludes
harmcausedintentionallybytheoperatorofthesystem,oraccidentally,as
aresultoffailingtofollowsecurityprocedures.
Manyotherdefinitionsarealsoused;severalofthemarepresentedanddis-
cussed(ENISA2015).
Anessentialcomponentofcybersecurity,oftenviewedasasynonymforit,is
informationsecurity,definedinISO27000as(Rashid2019):
Informationsecurity:preservationofconfidentiality,integrityandavail-
abilityofinformation.
Securityexpertsoftentalkaboutthisasthe“CIAtriad”(Chapman2019):
confidentiality-preventingpeoplewhoshouldnotseedatafromhavingac-
cesstoit,
integrity-ensuringdataisnotchangedandremainsaccurate,
availability-beingabletoaccessdatathatyouareauthorisedtosee.
7