The Nature of the Problem
نویسنده
چکیده
Computer T he rash of viruses, intrusions, and other attacks on computer systems during the past two years has focused considerable attention on network security in the US. At the same time, experts say the US is not spending enough on networksecurity research and universities are not producing enough graduates with advanced degrees in the field to conduct the necessary future research. This situation troubles many security experts, who note that much of the US’s national infrastructure—affecting government agencies, corporations, utilities, transportation operations, the armed forces, and so on—runs on potentially vulnerable computer networks. “We are so dependent on the cyberinfrastructure now,” said William A. Wulf, University of Virginia professor and National Academy of Engineering (NAE) president. “We can’t do financial transactions without it. Even the larger infrastructure—the power grid, gas pipelines—depends on [it].” A lack of adequate research eventually could cause the US to face an “electronic Pearl Harbor,” in which a cyberattack cripples or damages the network running an important publicinfrastructure element and harms many people, said Terry Benzel, vice president of advanced security research at Network Associates. Also, poor security could let hackers obtain Internet users’ Social Security and credit card numbers and otherwise compromise their privacy. This lack of security could promote identity theft, fraud, and other crimes, noted Daniel A. Reed, director of the National Center for Supercomputing Applications at the University of Illinois at UrbanaChampaign, and director of the National Computational Science Alliance. According to Timothy J. Shimeall, a senior member of the technical staff with the Software Engineering Institute’s (SEI’s) Networked Systems Survivability Program, security has become a growing concern now partly because the number of cyberattacks has increased dramatically in recent years, as Figure 1 shows. “And the vulnerabilities being described are not trivial,” he noted. Network threats are increasing in complexity, as demonstrated by the destructive distributed denial-of-service (DDoS) attacks on major Web sites in 2000 and dangerous worms such as last year’s CodeRed. Malicious-code authors work with an open source model in which they freely share successive code improvements, thereby making their attacks increasingly sophisticated. Computer-security issues were the subject of a recent hearing by the US House of Representatives’ Science Committee in which panelists said the federal government must provide more funding and support to address the problem.
منابع مشابه
Multi-choice stochastic bi-level programming problem in cooperative nature via fuzzy programming approach
In this paper, a Multi-Choice Stochastic Bi-Level Programming Problem (MCSBLPP) is considered where all the parameters of constraints are followed by normal distribution. The cost coefficients of the objective functions are multi-choice types. At first, all the probabilistic constraints are transformed into deterministic constraints using stochastic programming approach. Further, a general tran...
متن کاملAddressing a Coordinated Quay Crane Scheduling and Assignment Problem by Red Deer Algorithm
Nowadays, there is much attention for planning of container terminals in the global trade centers. The high cost of quay cranes motivates both scholars and industrial practitioners especially in the last decade to develop novel optimization models to address this dilemma. This study proposes a coordinated optimization model to cover both Quay Crane Scheduling Problem (QCSP) and Quay Crane Assig...
متن کاملA Fuzzy Multi Objective Programming Model for Power Generation and Transmission Expansion Planning Problem
The increasing consumption of electricity over time forces different countries to establishnew power plants and transmission lines. There are various crisp single-objective mathematicalmodels in the literature for the long-term power generation and transmission expansion planning tohelp the decision makers to make more reasonable decisions. But, in practice, most of the parametersassociated wit...
متن کاملEnvironmental ethics and Corona Virus
Environmental ethics and Corona Virus Abstract Corona Virus pandemic outbreak is the counter act and warning of the natural environment for the destructive activities of man in the nature. Many researchers and specialists believe that a risk free and sustainable life is possible if we correct our behavior toward the nature. This research was carried out to substantiate this hypothesis and...
متن کاملA multi-objective resource-constrained project scheduling problem with time lags and fuzzy activity durations
The resource-constrained project scheduling problem is to find a schedule that minimizes the project duration subject to precedence relations and resource constraints. To further account for economic aspects of the project, one may add an objective of cash nature to the problem. In addition, dynamic nature and variations in real world are known to introduce uncertainties into data. Therefore, t...
متن کاملHierarchy Style Application in Line Extension with Responsive Loads Evaluating the Dynamic Nature of Solar Units
This paper presents a model for line extension scheduled to participate in responsive loads in the power system aiming the improvement of techno-economical parameters. The model is studied with the presence of photovoltaic generators that produce variable power depending on the geographical condition. The investment cost of the transmission expansion plan, demand response operation cost, genera...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2001