Cyberspace Endogenous Safety and Security

被引:20
|
作者
Wu, Jiangxing [1 ]
机构
[1] Natl Digital Switching Syst Engn Technol R Ctr, Zhengzhou 450002, Peoples R China
来源
ENGINEERING | 2022年 / 15卷
关键词
Cyberspace endogenous security problem; Uncertain threat; Cyberspace endogenous safety and security; Relative right axiom; Dynamic heterogeneous redundant; architecture;
D O I
10.1016/j.eng.2021.05.015
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Uncertain security threats caused by vulnerabilities and backdoors are the most serious and difficult problem in cyberspace. This paper analyzes the philosophical and technical causes of the existence of so-called "dark functions" such as system vulnerabilities and backdoors, and points out that endogenous security problems cannot be completely eliminated at the theoretical and engineering levels; rather, it is necessary to develop or utilize the endogenous security functions of the system architecture itself. In addition, this paper gives a definition for and lists the main technical characteristics of endogenous safety and security in cyberspace, introduces endogenous safety and security mechanisms and characteristics based on dynamic heterogeneous redundancy (DHR) architecture, and describes the theoretical implications of a coding channel based on DHR. (c) 2021 THE AUTHOR. Published by Elsevier LTD on behalf of Chinese Academy of Engineering and Higher Education Press Limited Company. This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/).
引用
收藏
页码:179 / 185
页数:7
相关论文
共 50 条
  • [31] Cyberspace Security : An Overview for Beginners
    Rai, Nitin
    Chansarkar, Shailesh R.
    DEFENCE SCIENCE JOURNAL, 2017, 67 (04) : 483 - 484
  • [32] Cyberspace security: Securing cyberspace - New laws and developing strategies
    Coleman, Claire
    Computer Law and Security Report, 2003, 19 (02): : 131 - 136
  • [33] Protection architecture of endogenous safety and security for industrial control systems
    Yaozhong Xin
    SecurityandSafety, 2023, 2 (03) : 20 - 28
  • [34] An analysis on the security perception of Italian cyberspace
    Chiappetta, Federica
    Fadlon, Leslie
    Pala, Arianna Norcini
    2017 5TH IEEE INTERNATIONAL CONFERENCE ON MODELS AND TECHNOLOGIES FOR INTELLIGENT TRANSPORTATION SYSTEMS (MT-ITS), 2017, : 212 - 218
  • [35] Statistical Techniques for Assessing Cyberspace Security
    Kammerdiner, Alla R.
    DYNAMICS OF INFORMATION SYSTEMS: COMPUTATIONAL AND MATHEMATICAL CHALLENGES, 2014, 105 : 161 - 177
  • [36] CYBERSPACE SECURITY: FOR A BETTER LIFE AND WORK
    Zhang, Huanguo
    CHINA COMMUNICATIONS, 2018, 15 (02) : III - III
  • [37] Security of Enterprise Information Resources in Cyberspace
    Deren, Aldona
    Seretna-Salamaj, Danuta
    Skonieczny, Jan
    Kondracka, Zofia
    INFORMATION SYSTEMS ARCHITECTURE AND TECHNOLOGY, ISAT 2019, PT III, 2020, 1052 : 262 - 275
  • [38] Cyberspace Security:a New Global Agenda
    Liang Ping
    和平, 2013, (04) : 26 - 34
  • [39] Offensive Cyberspace Operations for Cyber Security
    Huskaj, Gazmend
    PROCEEDINGS OF THE 18TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY ICCWS, 2023, : 476 - 479
  • [40] Modelling of Processes of Logistics in Cyberspace Security
    Konecny, Jiri
    Jankova, Martina
    Dvorak, Jiri
    18TH INTERNATIONAL SCIENTIFIC CONFERENCE-LOGI 2017, 2017, 134