Unusable Security for Attackers

被引:0
作者
Zurko, Mary Ellen
机构
关键词
Compendex;
D O I
10.1109/MSEC.2023.3308648
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
One of the things that makes security research different from other research is the presence of attackers, potentially or in actuality. The early research I was exposed to barely touched on the attacker. The Trusted Computer System Evaluation Criteria from the 1980s had hardly a whisper of functionality specifically for countering attacks, beyond auditing security relevant events. When we were researching and composing secure systems, most of us thought that antivirus, when it emerged, was a fool's game. Who could possibly catch all the different ways an attacker might go about breaching a system? The first question put to a presentation on intrusion detection system (IDS) research was predictably "How did you know that the system was free of attacks when you baselined it?"
引用
收藏
页码:4 / 7
页数:4
相关论文
共 50 条
  • [21] Research on software security testing
    Gu, Tian-yang
    Shi, Yin-sheng
    Fang, You-yuan
    World Academy of Science, Engineering and Technology, 2010, 45 : 647 - 651
  • [22] Security Requirements for Multimedia Archives
    Park, Sang Bae
    ADVANCES IN MULTIMEDIA, 2015, 2015
  • [23] Implementation and verification of programmable security
    Magill, Stephen
    Skaggs, Bradley
    Papa, Mauricio
    Hale, John
    IFIP Advances in Information and Communication Technology, (285-299):
  • [24] Security maturity is a journey, not a destination
    Madou M.
    Computer Fraud and Security, 2023, 2023 (06)
  • [25] Security of microcomputers for railway signaling
    Lohmann, H.-J.
    IT - Information Technology, 1980, 22 (01): : 229 - 236
  • [26] Security in Cognitive Radio Networks
    Ren, Kui
    Zhu, Haojin
    Han, Zhu
    Poovendran, Radha
    IEEE NETWORK, 2013, 27 (03): : 2 - 3
  • [27] Bad for business and worse for security
    McCarthy, Daniel
    Photonics Spectra, 2022, 56 (04)
  • [28] Computer Fraud and Security: Editorial
    Bradbury, Danny
    Computer Fraud and Security, 2010, 2010 (01)
  • [29] Nuclear security for a sustainable future
    Buglova, Elena
    IAEA Bulletin, 2024, 651 : 8 - 13
  • [30] Symbiotic autonomous systems and security
    Flammini, Francesco
    Mondo Digitale, 2019, 18 (80):