Privacy and security Cyber Defense Triad for Where Security Matters

被引:2
|
作者
Schell, Roger R. [1 ,2 ,3 ]
机构
[1] Aesec Corp, Palo Alto, CA 94301 USA
[2] Univ San Diego, Ctr Cyber Secur Engn & Technol, San Diego, CA 92110 USA
[3] Univ Southern Calif, Engn Practice, Los Angeles, CA USA
关键词
D O I
10.1145/3000606
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Cyber defense triad components are critical for defense of both confidentiality and integrity of information, whether the sensitive information is personally identifiable information, financial transactions, industrial control systems in the critical infrastructure, or something else that matters. The reference monitor is fundamentally about access control. All access control policies fall into two classes: Discretionary Access Control (DAC) and MAC. Only a label-based MAC policy can, with high assurance, enforce secure information flow. The Reference Monitor implementation defined as a security kernel is the only proven technology for reliably achieving verifiable protection. It does not depend on unproven elegant technical solutions, such as open source for source code inspection' or gratuitous formal methods. A necessary step is to identify where high-assurance security matters for a system.
引用
收藏
页码:20 / 23
页数:4
相关论文
共 50 条
  • [1] Security and Privacy: Why Privacy Matters
    Bird, Stephanie J.
    SCIENCE AND ENGINEERING ETHICS, 2013, 19 (03) : 669 - 671
  • [2] Security and Privacy: Why Privacy Matters
    Stephanie J. Bird
    Science and Engineering Ethics, 2013, 19 : 669 - 671
  • [3] Cyber-Security and Privacy
    Lopez, Javier
    Martinelli, Fabio
    Samarati, Pierangela
    ERCIM NEWS, 2015, (100): : 10 - 11
  • [4] Cyber security and privacy third cyber security and privacy EU forum, CSP forum 2014
    Cleary, Frances
    Felici, Massimo
    Communications in Computer and Information Science, 2014, 470
  • [5] The Dark Triad and Insider Threats in Cyber Security
    Maasberg, Michele
    Van Slyke, Craig
    Ellis, Selwyn
    Beebe, Nicole
    COMMUNICATIONS OF THE ACM, 2020, 63 (12) : 64 - 70
  • [6] Cyber security challenges in Smart Cities: Safety, security and privacy
    Elmaghraby, Adel S.
    Losavio, Michael M.
    JOURNAL OF ADVANCED RESEARCH, 2014, 5 (04) : 491 - 497
  • [7] Balancing Cyber-Security and Privacy
    Patakyova, Maria T.
    BRATISLAVA LAW REVIEW, 2020, 4 (01): : 181 - 183
  • [8] Game Theory for Cyber Security and Privacy
    Do, Cuong T.
    Tran, Nguyen H.
    Hong, Choongseon
    Kamhoua, Charles A.
    Kwiat, Kevin A.
    Blasch, Erik
    Ren, Shaolei
    Pissinou, Niki
    Iyengar, Sundaraja Sitharama
    ACM COMPUTING SURVEYS, 2017, 50 (02) : 30 - 37
  • [9] Hardware Security Kernel for Cyber Defense
    Jungwirth, Patrick
    Ross, James
    Secrest, Barry
    Barnett, Thomas
    Chan, Philip
    DISRUPTIVE TECHNOLOGIES IN INFORMATION SCIENCES II, 2019, 11013
  • [10] Cyber Defense Through Hardware Security
    Jungwirth, Patrick
    Chan, Philip
    Barnett, Thomas, Jr.
    Badawy, Abdel-Hameed
    DISRUPTIVE TECHNOLOGIES IN INFORMATION SCIENCES, 2018, 10652