Today, the word “cyberspace” is used in many contexts, but it is not always clear what exactly that term describes and what it means. In this post we will compare the definitions of cyberspace from several sources with the purpose of establishing a range of notions as to what cyberspace is and to derive its ontology. Sources are relevant entities like national or regional government, standardization bodies, and dictionary.
The reason why the term “cyberspace” is chosen is that all other terms (e.g., cyber security, cybercrime, cyberwar, cyberterrorism, etc.) are based on, or derived from, cyberspace itself. Therefore, cyber security is security of cyberspace. Cybercrime is crime committed within cyberspace or where elements from/of cyberspace are used as a vehicle to commit a crime, and so on for other derived terms.
Read More »
Tags: cyber security, security
Each new innovative technology ups the ante for the next along with our expectations for performance. In fact, I’m reminded of a Louis CK piece from a couple years ago that captures this sentiment exactly. Because of these raised expectations, Hollywood has pushed to up the ante for special effects in movies—to leave any sense of the mundane in the dust. However, when taking a look at this summer’s biggest blockbusters, it seems that reality is quickly catching up to the silver screen’s science fiction and fantasy.
Read More »
Tags: Intelligent Network, internet of things, security
Do you have an iPhone, Android, Samsung , or any other mobile phone? Not surprising since there will be 15 billion networked devices by 20151. With employees (yes, even IT themselves) bringing their mobile phones to work, businesses are seeing at least a doubling of mobile devices per employee; from laptop-only to laptop + mobile phone (+ tablet)2.
The IT department is faced with an increased burden on their existing wireless network, while securing email access from any platform and simultaneously ensuring an optimal, reliable user mobile experience. Offering a reliable, consistent user mobile experience used to be a luxury ask; today, it impacts employee productivity. Mobile employee productivity can range from wireless laptop access from conference rooms to roaming the within the building accessing corporate email from any mobile device. This is true for me (working at a large enterprise) and my husband (working at a medium-sized business).
Read More »
Tags: 802.11n, access point, Aironet, AP, byod, controller, Ironport, midmarket, midsize, mobile, mobility, network, networking, security, wi-fi, wireless
On June 6-7, the National Institute of Standards and Technology (NIST) co-hosted a conference focused on HIPAA, the foundational U.S. health care information law. I attended the conference and came away with the sense that a) health care entities have begun to see clarity in the things they must do from an IT perspective to abide by the law’s requirement to protect patient information and b) they are motivated to do so through Federal moves to enforce the law.
The links between vague laws and concrete technical requirements to support them are usually ambiguous because the laws are written by non-technical lawyers and they often turn over implementation details to government departments.
Read More »
Tags: compliance, HIPAA, security
This month marks the 63rd anniversary of the publishing of the novel Nineteen Eighty-Four, it might be interesting to take a look at what is currently the primary method used for tracking on the Internet, the Browser Cookie. Browser cookies are a subject with almost as much misinformation floating around as there is correct information.
Tags: cookies, privacy, security