A Philosophy of Security Architecture Design

被引:3
|
作者
Koien, Geir M. [1 ]
机构
[1] Univ South Eastern Norway USN, Campus Vestfold, Horten, Norway
关键词
Security architectures; Vulnerability; Exposure; Scalability; Intruder; Threats; Threat model; Risk; Robustness; Resilience; Antifragile;
D O I
10.1007/s11277-020-07310-5
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Digital systems are almost always vulnerable, yet we increasingly depend on these systems. There will be many threats towards these system. In a fully networked system, the vulnerabilities will literally be exposed to the whole world. The exposed vulnerabilities may be transformed into attacks. To counter this state of "vulnerability", the standard remedy is to conduct security requirements analysis and security threat modeling. Threats are assessed, and various countermeasures are devised. The totality of these measures may be described as a security architecture. The goal of a security architecture will largely be to make the system robust and resilient in the face of an adversary. However, we shall argue that this is not enough. Security architecture designs should go one step further, and actually improve the defenses when faced with hostile actions. That is, the security architectures must become antifragile.
引用
收藏
页码:1615 / 1639
页数:25
相关论文
共 50 条
  • [1] A Philosophy of Security Architecture Design
    Geir M. Køien
    [J]. Wireless Personal Communications, 2020, 113 : 1615 - 1639
  • [2] The design of a cryptographic security architecture
    Gutmann, P
    [J]. USENIX ASSOCIATION PROCEEDINGS OF THE EIGHTH USENIX SECURITY SYMPOSIUM (SECURITY '99), 1999, : 153 - 168
  • [3] DESIGN PHILOSOPHY AND PERSONAL STYLE IN ARCHITECTURE
    DUDEK, SZ
    HALL, WB
    [J]. JOURNAL OF ALTERED STATES OF CONSCIOUSNESS, 1978, 4 (01): : 83 - 92
  • [4] Supporting security sensitive architecture design
    Babar, MA
    Wang, XW
    Gorton, I
    [J]. QUALITY OF SOFTWARE ARCHITECTURES AND SOFTWARE QUALITY, PROCEEDINGS, 2005, 3712 : 140 - 154
  • [5] Research on MANET Security Architecture Design
    Li Shi-Chang
    Yang Hao-Lan
    Zhu Qing-Sheng
    [J]. 2010 INTERNATIONAL CONFERENCE ON SIGNAL ACQUISITION AND PROCESSING: ICSAP 2010, PROCEEDINGS, 2010, : 90 - 93
  • [6] Design and Modeling of Collaboration Architecture for Security
    Bye, Rainer
    Camtepe, Seyit A.
    Albayrak, Sahin
    [J]. PROCEEDINGS OF THE 2009 INTERNATIONAL SYMPOSIUM ON COLLABORATIVE TECHNOLOGIES AND SYSTEMS, 2009, : 330 - 341
  • [7] Design and Architecture of an Industrial IT Security Lab
    Pfrang, Steffen
    Kippe, Joerg
    Meier, David
    Haas, Christian
    [J]. TESTBEDS AND RESEARCH INFRASTRUCTURES FOR THE DEVELOPMENT OF NETWORKS AND COMMUNITIES, TRIDENTCOM 2016, 2017, 177 : 114 - 123
  • [8] LETTERS TO EDITOR + DESIGN PHILOSOPHY IN CONTEMPORARY ARCHITECTURE
    RADO, LL
    [J]. ARCHITECTURAL RECORD, 1978, 164 (04) : 4 - 4
  • [9] Security architecture-based system design
    Schneider, EA
    [J]. NEW SECURITY PARADIGM WORKSHOP, PROCEEDINGS, 2000, : 25 - 31
  • [10] An operating system design for the security architecture for microprocessors
    Platte, Joerg
    Diaz, Raul Duran
    Naroska, Edwin
    [J]. INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2006, 4307 : 174 - +