Privacy and security Cyber Defense Triad for Where Security Matters

被引:2
|
作者
Schell, Roger R. [1 ,2 ,3 ]
机构
[1] Aesec Corp, Palo Alto, CA 94301 USA
[2] Univ San Diego, Ctr Cyber Secur Engn & Technol, San Diego, CA 92110 USA
[3] Univ Southern Calif, Engn Practice, Los Angeles, CA USA
关键词
D O I
10.1145/3000606
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Cyber defense triad components are critical for defense of both confidentiality and integrity of information, whether the sensitive information is personally identifiable information, financial transactions, industrial control systems in the critical infrastructure, or something else that matters. The reference monitor is fundamentally about access control. All access control policies fall into two classes: Discretionary Access Control (DAC) and MAC. Only a label-based MAC policy can, with high assurance, enforce secure information flow. The Reference Monitor implementation defined as a security kernel is the only proven technology for reliably achieving verifiable protection. It does not depend on unproven elegant technical solutions, such as open source for source code inspection' or gratuitous formal methods. A necessary step is to identify where high-assurance security matters for a system.
引用
收藏
页码:20 / 23
页数:4
相关论文
共 50 条
  • [41] APPLIED CRYPTOGRAPHY AND PRACTICAL SCENARIOS FOR CYBER SECURITY DEFENSE
    Simion, Emil
    Patrascu, Alecsandru
    UNIVERSITY POLITEHNICA OF BUCHAREST SCIENTIFIC BULLETIN SERIES C-ELECTRICAL ENGINEERING AND COMPUTER SCIENCE, 2013, 75 (04): : 131 - 142
  • [42] Security Control Grid for Optimized Cyber Defense Planning
    Dutta, Ashutosh
    Al-Shaer, Ehab
    Aghaei, Ehsan
    Duan, Qi
    Yasar, Hasan
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2025, 22 (01): : 913 - 929
  • [43] Edge Intelligence Assisted Gateway Defense in Cyber Security
    Xu, Shengjie
    Qian, Yi
    Hu, Rose Qingyang
    IEEE NETWORK, 2020, 34 (04): : 14 - 19
  • [45] Leveraging Information Security Continuous Monitoring for Cyber Defense
    AlSadhan, Tina
    Park, Joon
    PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS-2015), 2015, : 401 - 408
  • [46] Private active cyber defense and (international) cyber security-pushing the line?
    Broeders, Dennis
    JOURNAL OF CYBERSECURITY, 2021, 7 (01):
  • [47] TRAINING OF CYBER SECURITY AND CYBER DEFENSE FOR SPECIALISTS OF FINANCE, ECONOMIC AND BUSINESS MANAGEMENT
    Bykov, Valeriy Yu
    Romanovsky, Alexander A.
    Romanovskaya, Julia Yu
    INFORMATION TECHNOLOGIES AND LEARNING TOOLS, 2020, 80 (06) : 386 - 413
  • [48] Where is the Digital Divide? A Survey of Security, Privacy, and Socioeconomics
    Redmiles, Elissa M.
    Kross, Sean
    Mazurek, Michelle L.
    PROCEEDINGS OF THE 2017 ACM SIGCHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS (CHI'17), 2017, : 931 - 936
  • [49] Cyber security and cyber defense for Venezuela: an approach from the Soft Systems Methodology
    Torres, Douglas
    COMPLEX & INTELLIGENT SYSTEMS, 2018, 4 (03) : 213 - 226
  • [50] Cyber security and cyber defense for Venezuela: an approach from the Soft Systems Methodology
    Douglas Torres
    Complex & Intelligent Systems, 2018, 4 : 213 - 226