A Model for When Disclosure Helps Security: What Is Different About Computer and Network Security?
نویسنده
چکیده
INTRODUCTION ...................................................................................164 I. A MODEL FOR WHEN DISCLOSURE HELPS SECURITY ...........167 A. Case A: The Open Source Paradigm....................................167 B. Case B: The Military Paradigm............................................169 C. Case C: The Information Sharing Paradigm........................171 D. Case D: The Public Domain ................................................172 E. The 2x2 Matrix for When Disclosure Improves Security.....174 II. THE KEY REASONS COMPUTER AND NETWORK SECURITY MAY VARY FROM OTHER SECURITY PROBLEMS .....................175 A. Hiddenness and the First-Time Attack................................176 B. Uniqueness of the Defense....................................................178 C. Why Low Uniqueness May Be Common for Computer and Network Security ...........................................................179 1. Firewalls.........................................................................179 2. Mass-market software and computer games .................181 3. Encryption.....................................................................182
منابع مشابه
Analyzing Tools and Algorithms for Privacy Protection and Data Security in Social Networks
The purpose of this research, is to study factors influencing privacy concerns about data security and protection on social network sites and its’ influence on self-disclosure. 100 articles about privacy protection, data security, information disclosure and Information leakage on social networks were studied. Models and algorithms types and their repetition in articles have been distinguished a...
متن کاملA New Method for Intrusion Detection Using Genetic Algorithm and Neural network
Abstract— In order to provide complete security in a computer system and to prevent intrusion, intrusion detection systems (IDS) are required to detect if an attacker crosses the firewall, antivirus, and other security devices. Data and options to deal with it. In this paper, we are trying to provide a model for combining types of attacks on public data using combined methods of genetic algorit...
متن کاملAlert correlation and prediction using data mining and HMM
Intrusion Detection Systems (IDSs) are security tools widely used in computer networks. While they seem to be promising technologies, they pose some serious drawbacks: When utilized in large and high traffic networks, IDSs generate high volumes of low-level alerts which are hardly manageable. Accordingly, there emerged a recent track of security research, focused on alert correlation, which ext...
متن کاملMHIDCA: Multi Level Hybrid Intrusion Detection and Continuous Authentication for MANET Security
Mobile ad-hoc networks have attracted a great deal of attentions over the past few years. Considering their applications, the security issue has a great significance in them. Security scheme utilization that includes prevention and detection has the worth of consideration. In this paper, a method is presented that includes a multi-level security scheme to identify intrusion by sensors and authe...
متن کاملAn Effective Method for Utility Preserving Social Network Graph Anonymization Based on Mathematical Modeling
In recent years, privacy concerns about social network graph data publishing has increased due to the widespread use of such data for research purposes. This paper addresses the problem of identity disclosure risk of a node assuming that the adversary identifies one of its immediate neighbors in the published data. The related anonymity level of a graph is formulated and a mathematical model is...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- JTHTL
دوره 3 شماره
صفحات -
تاریخ انتشار 2004