Trusting Infrastructure The Emergence of Computer Security Incident Response, 1989-2005

被引:7
|
作者
Slayton, Rebecca [1 ,2 ]
Clarke, Brian [3 ]
机构
[1] Cornell Univ, Dept Sci & Technol Studies, Ithaca, NY 14853 USA
[2] Cornell Univ, Judith Reppy Inst Peace & Conflict Studies, Ithaca, NY 14853 USA
[3] Lib & Arch Canada, Ottawa, ON, Canada
基金
美国国家科学基金会;
关键词
INTERNET; HISTORY;
D O I
10.1353/tech.2020.0036
中图分类号
N09 [自然科学史]; B [哲学、宗教];
学科分类号
01 ; 0101 ; 010108 ; 060207 ; 060305 ; 0712 ;
摘要
Historians have tended to analyze maintenance as an intrinsically local activity, something very unlike the development of large technological systems. This article challenges this historiographic dichotomy by examining efforts to construct a global infrastructure for maintaining computer security. In the mid-1990s, as the internet rapidly grew, commercialized, and internationalized, a small community of computer security incident responders sought to scale up their system of coordination, which had been based on interpersonal trust, by developing trusted infrastructure that could facilitate the worldwide coordination of incident response work. This entailed developing not only professional standards, but also institutions for embodying and maintaining those standards in working infrastructure. While some elements of this infrastructure became truly global, others remained regionally bounded. We argue that this boundedness resulted not from the intrinsically local nature of maintenance, but from the historical process of infrastructure development, which was shaped by regionally based trust networks, institutions, and needs.
引用
收藏
页码:173 / 206
页数:34
相关论文
共 15 条
  • [1] On Computer Security Incident Response Teams
    Horne, Bill
    IEEE SECURITY & PRIVACY, 2014, 12 (05) : 13 - 15
  • [2] Testing your computer security incident response plan
    Markey, Steve
    ISACA Journal, 2012, 2
  • [3] Computer Security Incident Response Team Development and Evolution
    Ruefl, Robin
    Dorofee, Audrey
    Mundie, David
    Householder, Allen D.
    Murray, Michael
    Perl, Samuel J.
    IEEE SECURITY & PRIVACY, 2014, 12 (05) : 16 - 26
  • [4] Prerequisites for building a computer security incident response capability
    Mooi, Roderick
    Botha, Reinhardt A.
    2015 INFORMATION SECURITY FOR SOUTH AFRICA - PROCEEDINGS OF THE ISSA 2015 CONFERENCE, 2015,
  • [5] DSS for computer security incident response applying CBR and collaborative response
    Kim, Huy Kang
    Im, Kwang Hyuk
    Park, Sang Chan
    EXPERT SYSTEMS WITH APPLICATIONS, 2010, 37 (01) : 852 - 870
  • [6] Context for the SA NREN Computer Security Incident Response Team
    Mooi, Roderick
    Botha, Reinhardt A.
    2016 IST-AFRICA WEEK CONFERENCE, 2016,
  • [7] Computer Security Incident Response Team Effectiveness: A Needs Assessment
    Van der Kleij, Rick
    Kleinhuis, Geert
    Young, Heather
    FRONTIERS IN PSYCHOLOGY, 2017, 8
  • [8] A MANAGEMENT MODEL FOR BUILDING A COMPUTER SECURITY INCIDENT RESPONSE CAPABILITY
    Mooi, Roderick D.
    Botha, Reinhardt A.
    SAIEE AFRICA RESEARCH JOURNAL, 2016, 107 (02): : 78 - 91
  • [9] Methodology for Computer Security Incident Response Teams into IoT Strategy
    Enciso Bernal, Alejandro
    Martinez Monterrubio, Sergio Mauricio
    Parra Puente, Javier
    Gonzalez Crespo, Ruben
    Verdu, Elena
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2021, 15 (05): : 1909 - 1928
  • [10] An Organizational Psychology Perspective to Examining Computer Security Incident Response Teams
    Chen, Tiffani R.
    Shore, Daniel B.
    Zaccaro, Stephen J.
    Dalal, Reeshad S.
    Tetrick, Lois E.
    Gorab, Aiva K.
    IEEE SECURITY & PRIVACY, 2014, 12 (05) : 61 - 67