CYBER SECURITY

被引:0
|
作者
Sonntag, Michael [1 ]
机构
[1] Johannes Kepler Univ Linz, Inst Networks & Secur, Linz, Austria
关键词
Cyber security; automating security; security configuration; security model metaphor;
D O I
暂无
中图分类号
F [经济];
学科分类号
02 ;
摘要
Many incidents in the last years, and their increasing prevalence and damage, showed that cyber security is important. One big problem, which is expected to increase even more in the future, is the large-scale deployment of devices with very little security or a wide default security configuration. Automatization of such configuration is therefore necessary. This paper proposes a security model based on the household metaphor, where every device is assigned a role similar to a person in a household. Default permissions are then assigned to these roles by the manufacturer. In this way configuration of new devices is reduced to assigning it an "owner" it may represent towards other devices. While this is definitely not high security, it allows introducing some restrictions to an area where currently the options are either no security at all, or extensive and complicated manual configuration of each element, which is additionally difficult to understand for end-users.
引用
收藏
页码:313 / 323
页数:11
相关论文
共 50 条
  • [1] Cyber security
    Boughton, Nick
    [J]. CHEMISTRY & INDUSTRY, 2019, 83 (04) : 38 - 38
  • [2] Cyber security
    Sandström, E
    Weiss, J
    [J]. 2005 CIGRE/IEEE PES International Symposium, 2005, : 282 - 289
  • [3] Cyber(in)security
    Szczypiorski, Krzysztof
    [J]. INTERNATIONAL JOURNAL OF ELECTRONICS AND TELECOMMUNICATIONS, 2020, 66 (01) : 243 - 248
  • [4] Cyber security
    Colias, M
    [J]. HOSPITALS & HEALTH NETWORKS, 2004, 78 (05): : 60 - +
  • [5] Cyber Security
    Welander, Peter
    [J]. CONTROL ENGINEERING, 2009, 56 (01) : 40 - 43
  • [6] Taxonomy of cyber security metrics to measure strength of cyber security
    Gupta Bhol, Seema
    Mohanty, J.R.
    Kumar Pattnaik, Prasant
    [J]. Materials Today: Proceedings, 2023, 80 : 2274 - 2279
  • [7] The Cyberspace Threats and Cyber Security Objectives in the Cyber Security Strategies
    Lehto, Martti
    [J]. INTERNATIONAL JOURNAL OF CYBER WARFARE AND TERRORISM, 2013, 3 (03) : 1 - 18
  • [8] Cyber Security Training A Survey of Serious Games in Cyber Security
    Tioh, Jin-Ning
    Mina, Mani
    Jacobson, Douglas W.
    [J]. 2017 IEEE FRONTIERS IN EDUCATION CONFERENCE (FIE), 2017,
  • [9] Cyber Mission Assurance for Cyber Security
    MacKay, Matthew
    [J]. ITNOW, 2020, 62 (01) : 32 - 33
  • [10] Cyber Security without Cyber War
    O'Connell, Mary Ellen
    [J]. JOURNAL OF CONFLICT & SECURITY LAW, 2012, 17 (02): : 187 - 209