Critical Infrastructures You Can Trust: Where Telecommunications Fits
نویسندگان
چکیده
3 INTRODUCTION The security of our nation, the viability of our economy, and the health and well being of our citizens rely today on infrastructures for communication, finance, energy distribution, and transportation. All of these infrastructures depend increasingly on networked information systems. That dependence, with its new levels and kinds of vulnerabilities, is attracting growing attention from government and industry. Within the last two years, the White House Office of Science Board, and the General Accounting Office have each issued reports on the vulnerabilities of networked information systems. 4 Congressional hearings, 5 articles in the popular press, and concern about the impending year 2000 problem have further heightened public awareness. Most recently, Presidential Decision Directive 63 6 has called for a national effort to assure the security of our increasingly vulnerable critical infrastructures. Networked information systems (NISs) integrate computing systems, communications systems, and people (both as users and operators). The defining elements are interfaces to other systems along with algorithms to coordinate those systems. Economics dictates the use of commercial off the shelf (COTS) components wherever possible, which means that developers of an NIS have neither control nor detailed information about many system components.
منابع مشابه
COMPSAC Panel Session on Trustworthy Computing
We, as individuals, as well as governments, corporations, and institutions, form a networked society and we are increasingly dependent on that network. The very fabric of our everyday life and business utilizes this networked connectivity, particularly critical infrastructures such as the electric power grid, oil and gas pipeline and distribution systems, telecommunications, transportation, and...
متن کاملA Taxonomy to Express Open Challenges in Trust and Reputation Systems
During the past decade, online trust and reputation systems have provided cogent answers to emerging challenges in the global computing infrastructures relating to computer and network security, electronic commerce, virtual enterprises, social networks and cloud computing. The goal of these systems in such global computing infrastructures is to allow entities to reason about the trustworthiness...
متن کاملA view of trust and information system security under the perspective of critical infrastructure protection
Although trust is recognized as important in security issues of computer networking environments, few studies on information systems deal with both trust and security, and those existing tend to remain within the short perimeter of two-agent interactions. We propose to rethink trust research on information system security by considering the holistic approach of critical infrastructure protectio...
متن کاملModelling the Role of Software in the Propagation of Failures Across National Critical Infrastructures
Previous terrorist attacks, system failures and natural disasters have revealed the problems that many States face in preparing for national civil contingencies. The diversity of critical infrastructures and the interconnections between different systems makes it difficult for planners to ‘think of everything’. For example, the loss of power distribution networks can disrupt rail and road trans...
متن کاملCritical infrastructure protection
The protection of Critical Infrastructures (CIs) has become one of the most cutting-edge research areas in recent years. There has been considerable effort and expenditure since 9/11 on the protection of ‘Critical National Infrastructure’ against different attacks. This is because information is out of control of the owner. The traditional device – centric security systems are not efficient eno...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 1998