Privacy and security Cyber Defense Triad for Where Security Matters

被引:2
|
作者
Schell, Roger R. [1 ,2 ,3 ]
机构
[1] Aesec Corp, Palo Alto, CA 94301 USA
[2] Univ San Diego, Ctr Cyber Secur Engn & Technol, San Diego, CA 92110 USA
[3] Univ Southern Calif, Engn Practice, Los Angeles, CA USA
关键词
D O I
10.1145/3000606
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Cyber defense triad components are critical for defense of both confidentiality and integrity of information, whether the sensitive information is personally identifiable information, financial transactions, industrial control systems in the critical infrastructure, or something else that matters. The reference monitor is fundamentally about access control. All access control policies fall into two classes: Discretionary Access Control (DAC) and MAC. Only a label-based MAC policy can, with high assurance, enforce secure information flow. The Reference Monitor implementation defined as a security kernel is the only proven technology for reliably achieving verifiable protection. It does not depend on unproven elegant technical solutions, such as open source for source code inspection' or gratuitous formal methods. A necessary step is to identify where high-assurance security matters for a system.
引用
收藏
页码:20 / 23
页数:4
相关论文
共 50 条
  • [31] Privacy and Security Gaps in mitigating Cyber crime: The Review
    Saad, Amna
    Amran, Ahmad Roshidi
    Afif, Ijlal Ibrahim
    Zolkeple, Ahmad Hariri
    Said, Aidy Izzuddin Ahmad
    Hamzah, Muhammad Fiqri
    Salim, Wan Nor Salwani Wan
    2016 2ND INTERNATIONAL SYMPOSIUM ON AGENT, MULTI-AGENT SYSTEMS AND ROBOTICS (ISAMSR), 2016, : 92 - 99
  • [32] A Practical Framework and Guidelines to Enhance Cyber Security and Privacy
    Choras, Michal
    Kozik, Rafal
    Renk, Rafal
    Holubowicz, Witold
    INTERNATIONAL JOINT CONFERENCE: CISIS'15 AND ICEUTE'15, 2015, 369 : 485 - 495
  • [33] Cyber Security and Privacy Experiments: A Design and Reporting Toolkit
    Coopamootoo, Kovila P. L.
    Gross, Thomas
    PRIVACY AND IDENTITY MANAGEMENT: THE SMART REVOLUTION, 2018, 526 : 243 - 262
  • [34] An integrated framework for innovation management in cyber security and privacy
    Security and Cloud Lab, Hewlett-Packard Laboratories, Long Down Avenue, Bristol
    BS34 8QZ, United Kingdom
    Kapletia, Dharm (dharmendra.kapletia@hp.com), 1600, Springer Verlag (470):
  • [35] Survey on security and privacy issues in cyber physical systems
    Nazarenko A.A.
    Safdar G.A.
    AIMS Electronics and Electrical Engineering, 2019, 3 (02): : 111 - 143
  • [36] Special Issue on Cyber Security and Privacy in Communication Networks
    Gupta, C. P.
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2019, 13 (01) : V - VI
  • [37] Security and Privacy for Smart Cyber-Physical Systems
    Ma, Liran
    Huo, Yan
    Hu, Chunqiang
    Li, Wei
    SECURITY AND COMMUNICATION NETWORKS, 2019, 2019
  • [38] Cyber Security and Privacy Issues in Industrial Internet of Things
    Jhanjhi, N. Z.
    Humayun, Mamoona
    Almuayqil, Saleh N.
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2021, 37 (03): : 361 - 380
  • [39] Achieving data security and privacy across healthcare applications using cyber security mechanisms
    Zhu, Shanying
    Saravanan, Vijayalakshmi
    Muthu, BalaAnand
    ELECTRONIC LIBRARY, 2020, 38 (5-6): : 979 - 995
  • [40] Between privacy and security: the factors that drive intentions to use cyber-security applications
    Chassidim, Hadas
    Perentis, Christos
    Toch, Eran
    Lepri, Bruno
    BEHAVIOUR & INFORMATION TECHNOLOGY, 2021, 40 (16) : 1769 - 1783