Unusable Security for Attackers

被引:0
|
作者
Zurko, Mary Ellen
机构
关键词
Compendex;
D O I
10.1109/MSEC.2023.3308648
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
One of the things that makes security research different from other research is the presence of attackers, potentially or in actuality. The early research I was exposed to barely touched on the attacker. The Trusted Computer System Evaluation Criteria from the 1980s had hardly a whisper of functionality specifically for countering attacks, beyond auditing security relevant events. When we were researching and composing secure systems, most of us thought that antivirus, when it emerged, was a fool's game. Who could possibly catch all the different ways an attacker might go about breaching a system? The first question put to a presentation on intrusion detection system (IDS) research was predictably "How did you know that the system was free of attacks when you baselined it?"
引用
收藏
页码:4 / 7
页数:4
相关论文
共 50 条
  • [1] Evolving attackers against wireless sensor networks using genetic programming
    Mrugala K.
    Tuptuk N.
    Hailes S.
    Tuptuk, Nilufer (nilufer.tuptuk.13@ucl.ac.uk), 2017, Institution of Engineering and Technology, United States (07) : 113 - 122
  • [2] IT Security
    Chang, Morris
    Kuhn, Rick
    Weil, Tim
    IT PROFESSIONAL, 2015, 17 (01) : 14 - 15
  • [3] Cloud native security and the security posture of cloud resources
    Tejero, Hector
    Electronics World, 2023, 128 (2029):
  • [4] VDI and security
    Janssen R.
    Network Security, 2010, 2010 (03) : 8 - 11
  • [5] Secrecy and Security
    Feld, Bernard T.
    1600, Taylor and Francis Ltd. (32):
  • [6] SUICIDAL SECURITY
    FELD, BT
    BULLETIN OF THE ATOMIC SCIENTISTS, 1981, 37 (02) : 4 - 5
  • [7] NetSecu: A collaborative network security platform for in-network security
    Chen, Xinming
    Mu, Beipeng
    Chen, Zhen
    Proceedings - 2011 3rd International Conference on Communications and Mobile Computing, CMC 2011, 2011, : 59 - 64
  • [8] The security forces rewrite
    Grant, Rebecca
    Air Force Mag, 1 (54-58):
  • [9] Inclusive Privacy and Security
    Kapadia, Apu
    Wang, Yang
    IEEE SECURITY & PRIVACY, 2024, 22 (05) : 10 - 12
  • [10] Construction Engineering and Security
    Monahan, B., Sr.
    PRACTICE PERIODICAL ON STRUCTURAL DESIGN AND CONSTRUCTION, 2010, 15 (03) : 184 - 185