Milk or Wine: Are Critical Infrastructure Protection Architectures Improving with Age?
نویسندگان
چکیده
منابع مشابه
Critical Infrastructure Protection in the Information Age
Introduction A new theme emerging in the information age is critical infrastructure and, in particular, information infrastructure. Infrastructures are indispensable for human welfare, not only because of the important economic, social and other benefits they provide, but also because of the consequences for society-at-large when they fail to meet expected service requirements. Critical infrast...
متن کاملMilk or Wine: Does Software Security Improve with Age?
We examine the code base of the OpenBSD operating system to determine whether its security is increasing over time. We measure the rate at which new code has been introduced and the rate at which vulnerabilities have been reported over the last 7.5 years and fifteen versions. We learn that 61% of the lines of code in today’s OpenBSD are foundational: they were introduced prior to the release of...
متن کاملCritical infrastructure protection
The protection of Critical Infrastructures (CIs) has become one of the most cutting-edge research areas in recent years. There has been considerable effort and expenditure since 9/11 on the protection of ‘Critical National Infrastructure’ against different attacks. This is because information is out of control of the owner. The traditional device – centric security systems are not efficient eno...
متن کاملImproving Critical Infrastructure Cybersecurity
VeriSign, Inc. operates several of the world’s largest and most important DNS Registries (.com, .net, .gov, and more). Because of this operational role that we fulfill, we continually strive to foster and ensure the security and stability of the global Internet [10]. In this vein, we applaud the National Institute of Standards and Technology’s (NIST’s) request for information: NIST Docket Numbe...
متن کاملCybersecurity and Critical Infrastructure Protection
Cybersecurity entails the safeguarding of computer networks and the information they contain from penetration and from malicious damage or disruption. Since the use of computer networks has become a major element in governmental and business activities, tampering with these networks can have serious consequences for agencies, firms and individuals. The question is to what degree these individua...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Challenges
سال: 2015
ISSN: 2412-3471,2410-6569
DOI: 10.18488/journal.85/2015.2.2/85.2.43.57