Serveur d'exploration sur la recherche en informatique en Lorraine

Attention, ce site est en cours de développement !
Attention, site généré par des moyens informatiques à partir de corpus bruts.
Les informations ne sont donc pas validées.

Cyberspace security: How to develop a security strategy

Identifieur interne : 003748 ( Hal/Checkpoint ); précédent : 003747; suivant : 003749

Cyberspace security: How to develop a security strategy

Auteurs : Bel Raggad [États-Unis] ; Sahbi Sidhom [France]

Source :

RBID : Hal:inria-00201212

English descriptors

Abstract

Despite all visible dividers, the Internet is getting us closer and closer, but with a great price. Our security is the price. The international community is fully aware of the urgent need to secure the cyberspace as you see the multiplication of security standards and national schemes interpreting them beyond borders: ISO 15408, ISO 17799, and ISO 27001. Even though some countries, including the Security Big Six (SB6), are equipped with their security books and may feel relatively safe; this remains a wrong sense of security as long as they share their networks with entities of less security. The standards impose security best practices and system specifications for the development of information security management systems. Partners beyond borders have to be secure as this is only possible if all entities connected to the partnership remain secure. Unfortunately, there is no way to verify the continuous security of partners without periodic security auditing and certification, and members who do not comply should be barred from the partnership. This concept also applies to the cyber space or the electronic society. In order to clean our society from cyber crimes and cyber terrorism we need to impose strict security policies and enforce them in a cooperative manner. The paper discusses a country's effort in the development of a national security strategy given its security economic intelligence position, its security readiness, and its adverse exposure.

Url:

Links toward previous steps (curation, corpus...)


Links to Exploration step

Hal:inria-00201212

Le document en format XML

<record>
<TEI>
<teiHeader>
<fileDesc>
<titleStmt>
<title xml:lang="en">Cyberspace security: How to develop a security strategy</title>
<author>
<name sortKey="Raggad, Bel" sort="Raggad, Bel" uniqKey="Raggad B" first="Bel" last="Raggad">Bel Raggad</name>
<affiliation wicri:level="1">
<hal:affiliation type="laboratory" xml:id="struct-51207" status="INCOMING">
<orgName>Seidenberg School of Computer Science and Information Systems (CS & IS)</orgName>
<orgName type="acronym">PU - Seidenberg School of CS & IS</orgName>
<desc>
<address>
<addrLine>Pace University, Pleasantville, NY-USA 10570</addrLine>
<country key="US"></country>
</address>
<ref type="url">http://appserv.pace.edu/execute/page.cfm?doc_id=16399</ref>
</desc>
<listRelation>
<relation active="#struct-366009" type="direct"></relation>
</listRelation>
<tutelles>
<tutelle active="#struct-366009" type="direct">
<org type="institution" xml:id="struct-366009" status="INCOMING">
<orgName>Pace University</orgName>
<desc>
<address>
<country key="FR"></country>
</address>
</desc>
</org>
</tutelle>
</tutelles>
</hal:affiliation>
<country>États-Unis</country>
</affiliation>
</author>
<author>
<name sortKey="Sidhom, Sahbi" sort="Sidhom, Sahbi" uniqKey="Sidhom S" first="Sahbi" last="Sidhom">Sahbi Sidhom</name>
<affiliation wicri:level="1">
<hal:affiliation type="researchteam" xml:id="struct-2493" status="OLD">
<orgName>SITE</orgName>
<orgName type="acronym">SITE</orgName>
<desc>
<address>
<country key="FR"></country>
</address>
</desc>
<listRelation>
<relation active="#struct-160" type="direct"></relation>
<relation name="UMR7503" active="#struct-441569" type="indirect"></relation>
<relation active="#struct-300009" type="indirect"></relation>
<relation active="#struct-300291" type="indirect"></relation>
<relation active="#struct-300292" type="indirect"></relation>
<relation active="#struct-300293" type="indirect"></relation>
</listRelation>
<tutelles>
<tutelle active="#struct-160" type="direct">
<org type="laboratory" xml:id="struct-160" status="OLD">
<orgName>Laboratoire Lorrain de Recherche en Informatique et ses Applications</orgName>
<orgName type="acronym">LORIA</orgName>
<desc>
<address>
<addrLine>Campus Scientifique BP 239 54506 Vandoeuvre-lès-Nancy Cedex</addrLine>
<country key="FR"></country>
</address>
<ref type="url">http://www.loria.fr</ref>
</desc>
<listRelation>
<relation name="UMR7503" active="#struct-441569" type="direct"></relation>
<relation active="#struct-300009" type="direct"></relation>
<relation active="#struct-300291" type="direct"></relation>
<relation active="#struct-300292" type="direct"></relation>
<relation active="#struct-300293" type="direct"></relation>
</listRelation>
</org>
</tutelle>
<tutelle name="UMR7503" active="#struct-441569" type="indirect">
<org type="institution" xml:id="struct-441569" status="VALID">
<idno type="ISNI">0000000122597504</idno>
<idno type="IdRef">02636817X</idno>
<orgName>Centre National de la Recherche Scientifique</orgName>
<orgName type="acronym">CNRS</orgName>
<date type="start">1939-10-19</date>
<desc>
<address>
<country key="FR"></country>
</address>
<ref type="url">http://www.cnrs.fr/</ref>
</desc>
</org>
</tutelle>
<tutelle active="#struct-300009" type="indirect">
<org type="institution" xml:id="struct-300009" status="VALID">
<orgName>Institut National de Recherche en Informatique et en Automatique</orgName>
<orgName type="acronym">Inria</orgName>
<desc>
<address>
<addrLine>Domaine de VoluceauRocquencourt - BP 10578153 Le Chesnay Cedex</addrLine>
<country key="FR"></country>
</address>
<ref type="url">http://www.inria.fr/en/</ref>
</desc>
</org>
</tutelle>
<tutelle active="#struct-300291" type="indirect">
<org type="institution" xml:id="struct-300291" status="OLD">
<orgName>Université Henri Poincaré - Nancy 1</orgName>
<orgName type="acronym">UHP</orgName>
<date type="end">2011-12-31</date>
<desc>
<address>
<addrLine>24-30 rue Lionnois, BP 60120, 54 003 NANCY cedex, France</addrLine>
<country key="FR"></country>
</address>
</desc>
</org>
</tutelle>
<tutelle active="#struct-300292" type="indirect">
<org type="institution" xml:id="struct-300292" status="OLD">
<orgName>Université Nancy 2</orgName>
<date type="end">2011-12-31</date>
<desc>
<address>
<addrLine>91 avenue de la Libération, BP 454, 54001 Nancy cedex</addrLine>
<country key="FR"></country>
</address>
</desc>
</org>
</tutelle>
<tutelle active="#struct-300293" type="indirect">
<org type="institution" xml:id="struct-300293" status="OLD">
<orgName>Institut National Polytechnique de Lorraine</orgName>
<orgName type="acronym">INPL</orgName>
<date type="end">2011-12-31</date>
<desc>
<address>
<country key="FR"></country>
</address>
</desc>
</org>
</tutelle>
</tutelles>
</hal:affiliation>
<country>France</country>
<placeName>
<settlement type="city">Nancy</settlement>
<region type="region" nuts="2">Grand Est</region>
<region type="old region" nuts="2">Lorraine (région)</region>
</placeName>
<orgName type="university">Université Nancy 2</orgName>
<orgName type="institution" wicri:auto="newGroup">Université de Lorraine</orgName>
<placeName>
<settlement type="city">Nancy</settlement>
<region type="region" nuts="2">Grand Est</region>
<region type="old region" nuts="2">Lorraine (région)</region>
</placeName>
<orgName type="university">Institut national polytechnique de Lorraine</orgName>
<orgName type="institution" wicri:auto="newGroup">Université de Lorraine</orgName>
</affiliation>
</author>
</titleStmt>
<publicationStmt>
<idno type="wicri:source">HAL</idno>
<idno type="RBID">Hal:inria-00201212</idno>
<idno type="halId">inria-00201212</idno>
<idno type="halUri">https://hal.inria.fr/inria-00201212</idno>
<idno type="url">https://hal.inria.fr/inria-00201212</idno>
<date when="2007-11-30">2007-11-30</date>
<idno type="wicri:Area/Hal/Corpus">001A21</idno>
<idno type="wicri:Area/Hal/Curation">001A21</idno>
<idno type="wicri:Area/Hal/Checkpoint">003748</idno>
<idno type="wicri:explorRef" wicri:stream="Hal" wicri:step="Checkpoint">003748</idno>
</publicationStmt>
<sourceDesc>
<biblStruct>
<analytic>
<title xml:lang="en">Cyberspace security: How to develop a security strategy</title>
<author>
<name sortKey="Raggad, Bel" sort="Raggad, Bel" uniqKey="Raggad B" first="Bel" last="Raggad">Bel Raggad</name>
<affiliation wicri:level="1">
<hal:affiliation type="laboratory" xml:id="struct-51207" status="INCOMING">
<orgName>Seidenberg School of Computer Science and Information Systems (CS & IS)</orgName>
<orgName type="acronym">PU - Seidenberg School of CS & IS</orgName>
<desc>
<address>
<addrLine>Pace University, Pleasantville, NY-USA 10570</addrLine>
<country key="US"></country>
</address>
<ref type="url">http://appserv.pace.edu/execute/page.cfm?doc_id=16399</ref>
</desc>
<listRelation>
<relation active="#struct-366009" type="direct"></relation>
</listRelation>
<tutelles>
<tutelle active="#struct-366009" type="direct">
<org type="institution" xml:id="struct-366009" status="INCOMING">
<orgName>Pace University</orgName>
<desc>
<address>
<country key="FR"></country>
</address>
</desc>
</org>
</tutelle>
</tutelles>
</hal:affiliation>
<country>États-Unis</country>
</affiliation>
</author>
<author>
<name sortKey="Sidhom, Sahbi" sort="Sidhom, Sahbi" uniqKey="Sidhom S" first="Sahbi" last="Sidhom">Sahbi Sidhom</name>
<affiliation wicri:level="1">
<hal:affiliation type="researchteam" xml:id="struct-2493" status="OLD">
<orgName>SITE</orgName>
<orgName type="acronym">SITE</orgName>
<desc>
<address>
<country key="FR"></country>
</address>
</desc>
<listRelation>
<relation active="#struct-160" type="direct"></relation>
<relation name="UMR7503" active="#struct-441569" type="indirect"></relation>
<relation active="#struct-300009" type="indirect"></relation>
<relation active="#struct-300291" type="indirect"></relation>
<relation active="#struct-300292" type="indirect"></relation>
<relation active="#struct-300293" type="indirect"></relation>
</listRelation>
<tutelles>
<tutelle active="#struct-160" type="direct">
<org type="laboratory" xml:id="struct-160" status="OLD">
<orgName>Laboratoire Lorrain de Recherche en Informatique et ses Applications</orgName>
<orgName type="acronym">LORIA</orgName>
<desc>
<address>
<addrLine>Campus Scientifique BP 239 54506 Vandoeuvre-lès-Nancy Cedex</addrLine>
<country key="FR"></country>
</address>
<ref type="url">http://www.loria.fr</ref>
</desc>
<listRelation>
<relation name="UMR7503" active="#struct-441569" type="direct"></relation>
<relation active="#struct-300009" type="direct"></relation>
<relation active="#struct-300291" type="direct"></relation>
<relation active="#struct-300292" type="direct"></relation>
<relation active="#struct-300293" type="direct"></relation>
</listRelation>
</org>
</tutelle>
<tutelle name="UMR7503" active="#struct-441569" type="indirect">
<org type="institution" xml:id="struct-441569" status="VALID">
<idno type="ISNI">0000000122597504</idno>
<idno type="IdRef">02636817X</idno>
<orgName>Centre National de la Recherche Scientifique</orgName>
<orgName type="acronym">CNRS</orgName>
<date type="start">1939-10-19</date>
<desc>
<address>
<country key="FR"></country>
</address>
<ref type="url">http://www.cnrs.fr/</ref>
</desc>
</org>
</tutelle>
<tutelle active="#struct-300009" type="indirect">
<org type="institution" xml:id="struct-300009" status="VALID">
<orgName>Institut National de Recherche en Informatique et en Automatique</orgName>
<orgName type="acronym">Inria</orgName>
<desc>
<address>
<addrLine>Domaine de VoluceauRocquencourt - BP 10578153 Le Chesnay Cedex</addrLine>
<country key="FR"></country>
</address>
<ref type="url">http://www.inria.fr/en/</ref>
</desc>
</org>
</tutelle>
<tutelle active="#struct-300291" type="indirect">
<org type="institution" xml:id="struct-300291" status="OLD">
<orgName>Université Henri Poincaré - Nancy 1</orgName>
<orgName type="acronym">UHP</orgName>
<date type="end">2011-12-31</date>
<desc>
<address>
<addrLine>24-30 rue Lionnois, BP 60120, 54 003 NANCY cedex, France</addrLine>
<country key="FR"></country>
</address>
</desc>
</org>
</tutelle>
<tutelle active="#struct-300292" type="indirect">
<org type="institution" xml:id="struct-300292" status="OLD">
<orgName>Université Nancy 2</orgName>
<date type="end">2011-12-31</date>
<desc>
<address>
<addrLine>91 avenue de la Libération, BP 454, 54001 Nancy cedex</addrLine>
<country key="FR"></country>
</address>
</desc>
</org>
</tutelle>
<tutelle active="#struct-300293" type="indirect">
<org type="institution" xml:id="struct-300293" status="OLD">
<orgName>Institut National Polytechnique de Lorraine</orgName>
<orgName type="acronym">INPL</orgName>
<date type="end">2011-12-31</date>
<desc>
<address>
<country key="FR"></country>
</address>
</desc>
</org>
</tutelle>
</tutelles>
</hal:affiliation>
<country>France</country>
<placeName>
<settlement type="city">Nancy</settlement>
<region type="region" nuts="2">Grand Est</region>
<region type="old region" nuts="2">Lorraine (région)</region>
</placeName>
<orgName type="university">Université Nancy 2</orgName>
<orgName type="institution" wicri:auto="newGroup">Université de Lorraine</orgName>
<placeName>
<settlement type="city">Nancy</settlement>
<region type="region" nuts="2">Grand Est</region>
<region type="old region" nuts="2">Lorraine (région)</region>
</placeName>
<orgName type="university">Institut national polytechnique de Lorraine</orgName>
<orgName type="institution" wicri:auto="newGroup">Université de Lorraine</orgName>
</affiliation>
</author>
</analytic>
</biblStruct>
</sourceDesc>
</fileDesc>
<profileDesc>
<textClass>
<keywords scheme="mix" xml:lang="en">
<term>Security Big Six (SB6)</term>
<term>Security economic intelligence</term>
<term>Security strategy</term>
<term>certification</term>
<term>cyberspace</term>
<term>information security management</term>
<term>security auditing</term>
<term>security metric</term>
<term>system specifications</term>
</keywords>
</textClass>
</profileDesc>
</teiHeader>
<front>
<div type="abstract" xml:lang="en">Despite all visible dividers, the Internet is getting us closer and closer, but with a great price. Our security is the price. The international community is fully aware of the urgent need to secure the cyberspace as you see the multiplication of security standards and national schemes interpreting them beyond borders: ISO 15408, ISO 17799, and ISO 27001. Even though some countries, including the Security Big Six (SB6), are equipped with their security books and may feel relatively safe; this remains a wrong sense of security as long as they share their networks with entities of less security. The standards impose security best practices and system specifications for the development of information security management systems. Partners beyond borders have to be secure as this is only possible if all entities connected to the partnership remain secure. Unfortunately, there is no way to verify the continuous security of partners without periodic security auditing and certification, and members who do not comply should be barred from the partnership. This concept also applies to the cyber space or the electronic society. In order to clean our society from cyber crimes and cyber terrorism we need to impose strict security policies and enforce them in a cooperative manner. The paper discusses a country's effort in the development of a national security strategy given its security economic intelligence position, its security readiness, and its adverse exposure.</div>
</front>
</TEI>
<hal api="V3">
<titleStmt>
<title xml:lang="en">Cyberspace security: How to develop a security strategy</title>
<author role="aut">
<persName>
<forename type="first">Bel</forename>
<forename type="middle">G.</forename>
<surname>Raggad</surname>
</persName>
<email>braggad@pace.edu</email>
<idno type="halauthor">238591</idno>
<orgName ref="#struct-366009"></orgName>
<affiliation ref="#struct-51207"></affiliation>
</author>
<author role="aut">
<persName>
<forename type="first">Sahbi</forename>
<surname>Sidhom</surname>
</persName>
<email>Sahbi.Sidhom@loria.fr</email>
<idno type="halauthor">172881</idno>
<orgName ref="#struct-300292"></orgName>
<affiliation ref="#struct-2493"></affiliation>
</author>
<editor role="depositor">
<persName>
<forename>Sahbi</forename>
<surname>Sidhom</surname>
</persName>
<email>Sahbi.Sidhom@loria.fr</email>
</editor>
</titleStmt>
<editionStmt>
<edition n="v1" type="current">
<date type="whenSubmitted">2007-12-27 09:26:18</date>
<date type="whenWritten">2007-11-01</date>
<date type="whenModified">2016-05-19 01:05:34</date>
<date type="whenReleased">2007-12-27 12:06:19</date>
<date type="whenProduced">2007-11-30</date>
<date type="whenEndEmbargoed">2007-12-27</date>
<ref type="file" target="https://hal.inria.fr/inria-00201212/document">
<date notBefore="2007-12-27"></date>
</ref>
<ref type="file" subtype="author" n="1" target="https://hal.inria.fr/inria-00201212/file/Cyberspace_2007-Raggad_Sidhom.pdf">
<date notBefore="2007-12-27"></date>
</ref>
</edition>
<respStmt>
<resp>contributor</resp>
<name key="103177">
<persName>
<forename>Sahbi</forename>
<surname>Sidhom</surname>
</persName>
<email>Sahbi.Sidhom@loria.fr</email>
</name>
</respStmt>
</editionStmt>
<publicationStmt>
<distributor>CCSD</distributor>
<idno type="halId">inria-00201212</idno>
<idno type="halUri">https://hal.inria.fr/inria-00201212</idno>
<idno type="halBibtex">raggad:inria-00201212</idno>
<idno type="halRefHtml">Cyberspace. V. International conference Cyberspace 2007, Nov 2007, Brno, Czech Republic. Cyberspace, 2007</idno>
<idno type="halRef">Cyberspace. V. International conference Cyberspace 2007, Nov 2007, Brno, Czech Republic. Cyberspace, 2007</idno>
</publicationStmt>
<seriesStmt>
<idno type="stamp" n="CNRS">CNRS - Centre national de la recherche scientifique</idno>
<idno type="stamp" n="INRIA">INRIA - Institut National de Recherche en Informatique et en Automatique</idno>
<idno type="stamp" n="INSMI">CNRS-INSMI - INstitut des Sciences Mathématiques et de leurs Interactions</idno>
<idno type="stamp" n="LORIA2">Publications du LORIA</idno>
<idno type="stamp" n="LABO-LORIA-SET" p="LORIA">LABO-LORIA-SET</idno>
<idno type="stamp" n="LORIA">LORIA - Laboratoire Lorrain de Recherche en Informatique et ses Applications</idno>
<idno type="stamp" n="UNIV-LORRAINE">Université de Lorraine</idno>
<idno type="stamp" n="INPL">Institut National Polytechnique de Lorraine</idno>
</seriesStmt>
<notesStmt>
<note type="audience" n="2">International</note>
<note type="invited" n="0">No</note>
<note type="popular" n="0">No</note>
<note type="peer" n="1">Yes</note>
<note type="proceedings" n="1">Yes</note>
</notesStmt>
<sourceDesc>
<biblStruct>
<analytic>
<title xml:lang="en">Cyberspace security: How to develop a security strategy</title>
<author role="aut">
<persName>
<forename type="first">Bel</forename>
<forename type="middle">G.</forename>
<surname>Raggad</surname>
</persName>
<email>braggad@pace.edu</email>
<idno type="halAuthorId">238591</idno>
<orgName ref="#struct-366009"></orgName>
<affiliation ref="#struct-51207"></affiliation>
</author>
<author role="aut">
<persName>
<forename type="first">Sahbi</forename>
<surname>Sidhom</surname>
</persName>
<email>Sahbi.Sidhom@loria.fr</email>
<idno type="halAuthorId">172881</idno>
<orgName ref="#struct-300292"></orgName>
<affiliation ref="#struct-2493"></affiliation>
</author>
</analytic>
<monogr>
<meeting>
<title>V. International conference Cyberspace 2007</title>
<date type="start">2007-11-30</date>
<settlement>Brno</settlement>
<country key="CZ">Czech Republic</country>
</meeting>
<respStmt>
<resp>conferenceOrganizer</resp>
<name>Faculty of Law, Veveri 70, Brno, Czech republic 61180</name>
</respStmt>
<editor>Cyberspace</editor>
<imprint>
<publisher>Cyberspace</publisher>
<date type="datePub">2007</date>
</imprint>
</monogr>
<idno type="arxiv">0712.4215</idno>
</biblStruct>
</sourceDesc>
<profileDesc>
<langUsage>
<language ident="en">English</language>
</langUsage>
<textClass>
<keywords scheme="author">
<term xml:lang="en">Security strategy</term>
<term xml:lang="en">security auditing</term>
<term xml:lang="en">Security economic intelligence</term>
<term xml:lang="en">Security Big Six (SB6)</term>
<term xml:lang="en">security metric</term>
<term xml:lang="en">cyberspace</term>
<term xml:lang="en">information security management</term>
<term xml:lang="en">system specifications</term>
<term xml:lang="en">certification</term>
</keywords>
<classCode scheme="halDomain" n="info.info-ir">Computer Science [cs]/Information Retrieval [cs.IR]</classCode>
<classCode scheme="halDomain" n="info.info-it">Computer Science [cs]/Information Theory [cs.IT]</classCode>
<classCode scheme="halDomain" n="math.math-it">Mathematics [math]/Information Theory [math.IT]</classCode>
<classCode scheme="halDomain" n="info.info-pf">Computer Science [cs]/Performance [cs.PF]</classCode>
<classCode scheme="halTypology" n="COMM">Conference papers</classCode>
</textClass>
<abstract xml:lang="en">Despite all visible dividers, the Internet is getting us closer and closer, but with a great price. Our security is the price. The international community is fully aware of the urgent need to secure the cyberspace as you see the multiplication of security standards and national schemes interpreting them beyond borders: ISO 15408, ISO 17799, and ISO 27001. Even though some countries, including the Security Big Six (SB6), are equipped with their security books and may feel relatively safe; this remains a wrong sense of security as long as they share their networks with entities of less security. The standards impose security best practices and system specifications for the development of information security management systems. Partners beyond borders have to be secure as this is only possible if all entities connected to the partnership remain secure. Unfortunately, there is no way to verify the continuous security of partners without periodic security auditing and certification, and members who do not comply should be barred from the partnership. This concept also applies to the cyber space or the electronic society. In order to clean our society from cyber crimes and cyber terrorism we need to impose strict security policies and enforce them in a cooperative manner. The paper discusses a country's effort in the development of a national security strategy given its security economic intelligence position, its security readiness, and its adverse exposure.</abstract>
<particDesc>
<org type="consortium">Pace University</org>
<org type="consortium">Pleasantville</org>
<org type="consortium">NY USA</org>
</particDesc>
</profileDesc>
</hal>
</record>

Pour manipuler ce document sous Unix (Dilib)

EXPLOR_STEP=$WICRI_ROOT/Wicri/Lorraine/explor/InforLorV4/Data/Hal/Checkpoint
HfdSelect -h $EXPLOR_STEP/biblio.hfd -nk 003748 | SxmlIndent | more

Ou

HfdSelect -h $EXPLOR_AREA/Data/Hal/Checkpoint/biblio.hfd -nk 003748 | SxmlIndent | more

Pour mettre un lien sur cette page dans le réseau Wicri

{{Explor lien
   |wiki=    Wicri/Lorraine
   |area=    InforLorV4
   |flux=    Hal
   |étape=   Checkpoint
   |type=    RBID
   |clé=     Hal:inria-00201212
   |texte=   Cyberspace security: How to develop a security strategy
}}

Wicri

This area was generated with Dilib version V0.6.33.
Data generation: Mon Jun 10 21:56:28 2019. Site generation: Fri Feb 25 15:29:27 2022