Unusable Security for Attackers

被引:0
作者
Zurko, Mary Ellen
机构
关键词
Compendex;
D O I
10.1109/MSEC.2023.3308648
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
One of the things that makes security research different from other research is the presence of attackers, potentially or in actuality. The early research I was exposed to barely touched on the attacker. The Trusted Computer System Evaluation Criteria from the 1980s had hardly a whisper of functionality specifically for countering attacks, beyond auditing security relevant events. When we were researching and composing secure systems, most of us thought that antivirus, when it emerged, was a fool's game. Who could possibly catch all the different ways an attacker might go about breaching a system? The first question put to a presentation on intrusion detection system (IDS) research was predictably "How did you know that the system was free of attacks when you baselined it?"
引用
收藏
页码:4 / 7
页数:4
相关论文
共 50 条
  • [31] Bad for business and worse for security
    McCarthy, Daniel
    [J]. Photonics Spectra, 2022, 56 (04)
  • [32] Applying Agility for Sustainable Security
    Rosser, Larri Ann
    [J]. INSIGHT, 2023, 26 (02) : 45 - 52
  • [33] SDLC AND THE IMPORTANCE OF SOFTWARE SECURITY
    Concea-Prisăcaru, Andreea-Iulia
    Nițescu, Tudor-Alin
    Sgârciu, Valentin
    [J]. UPB Scientific Bulletin, Series C: Electrical Engineering and Computer Science, 2023, 85 (01): : 117 - 130
  • [34] Making security measurable and manageable
    Martin, Robert A.
    [J]. CrossTalk, 2009, 22 (9-10): : 26 - 32
  • [35] Coal mines security system
    Guhe, Ankita
    Deshmukh, Shruti
    Borekar, Bhagyashree
    Kailaswar, Apoorva
    Rane, Milind E.
    [J]. International Journal of Computer Science Issues, 2012, 9 (3 3-3): : 419 - 423
  • [36] New definition for national security
    Stanley, C. Maxwell
    [J]. Bulletin of the Atomic Scientists, 1981, 37 (03):
  • [37] Is cyber security too hard?
    Mansfield-Devine S.
    [J]. Computer Fraud and Security, 2023, 2023 (06)
  • [38] Symbiotic autonomous systems and security
    Flammini, Francesco
    [J]. Mondo Digitale, 2019, 18 (80):
  • [39] SECURITY CONSTRAINED DISPATCH.
    Lugtu, Rnato
    [J]. 1978,
  • [40] A security model for an operating system for security-critical applications in small office and home environment
    Janacek, Jaroslav
    [J]. Communications - Scientific Letters of the University of Žilina, 2009, 11 (03):