Sketch of a generic security framework based on the paradigms of systemic-holistic approach and the immune system
نویسندگان
چکیده
Everything that we see can be changed. Internet is vulnerable because it was not designed as a whole system. This can be changed by changing the way we think and approach the development of Internet. Initial development of the Internet and other systems focused only on computer technology and communication’s protocols. Many systems are not secure today because most research has concentrated on securing parts of the systems. Hence, we can change this by viewing security of Internet and other systems holistically, by focusing not just on technology and protocols but by considering system’s environments, people using the systems, future of systems and other factors. In this paper we view and approach security of systems holistically. We discuss and suggest a methodology of securing systems based on the paradigms of the Immune system and the Systemic-Holistic approach. The Immune system is used to protect human bodies from for instance different types of viruses. The Systemic-holistic approach views and studies a system as a whole or in details at the theoretical, design, or the implementation level. It takes into considerations technical and non-technical aspects and the system’s environment. The generic security framework has been created for using functions inspired by the immune system and the systemic-holistic approach paradigms to secure systems. The framework contains the deterrence, protection, detection, response and recovery sub-systems. These sub-systems will be generically protecting both at the border and internally in the system. This methodology will improve the way we design security systems by generically considering different factors and people using the system.
منابع مشابه
Data Clustring Using A New CGA(Chaotic-Generic Algorithm) Approach
Clustering is the process of dividing a set of input data into a number of subgroups. The members of each subgroup are similar to each other but different from members of other subgroups. The genetic algorithm has enjoyed many applications in clustering data. One of these applications is the clustering of images. The problem with the earlier methods used in clustering images was in selecting in...
متن کاملA New Framework for Reactive Power Market Considering Power System Security
This paper presents a new framework for the day-ahead reactive power market based on the uniform auction price. Voltage stability and security have been considered in the proposed framework. Total Payment Function (TPF) is suggested as the objective function of the Optimal Power Flow (OPF) used to clear the reactive power market. Overload, voltage drop and voltage stability margin (VSM) are inc...
متن کاملSystematic & Structural Analysis of Innovation System of Iran’s Oil Industr
In this descriptive qualitative research with case study research strategy, the Iranian oil industry innovation system in the form of adopting a structural and functional approach (systemic approach) in depth and in its natural context from the perspective of the participants studied. Based on theoretical framework that includes five systemic components of innovation system, actors and relation...
متن کاملA Methodology for Paradigm Shift to Explain Sustainable University
The sustainable university concept is rooted in prevalent paradigms pertained to economic, social and environmental development, which all focus on systemic thought and rationality; besides, they tend to discover and solve problems by applying an interdisciplinary approach. However, the epistemic component is what these paradigms have ignored. The purpose of this study is to explain a methodo...
متن کاملFormal approach on modeling and predicting of software system security: Stochastic petri net
To evaluate and predict component-based software security, a two-dimensional model of software security is proposed by Stochastic Petri Net in this paper. In this approach, the software security is modeled by graphical presentation ability of Petri nets, and the quantitative prediction is provided by the evaluation capability of Stochastic Petri Net and the computing power of Markov chain. Each...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2005