Agile Security For Information Warfare: A Call For Research
نویسنده
چکیده
The context of information security is changing dramatically. Networking technologies have driven the global expansion of electronic commerce. Electronic commerce is increasingly engaging sophisticated advances like digital agents and web services. As a result of such advances, the information systems architectures that must be secured are becoming dynamic: shifting landscapes of changing vulnerabilities. At the same time, the threats in these landscapes are also becoming more sophisticated and dynamic. Information warfare is raising the stakes in information security by leveling intensive and highly novel threats against civilian systems. Information security researchers need to develop organizational approaches and methodologies that respond to this new context. The conflation of information warfare and short cycle development theories promises new information security practices. These approaches and methodologies would effectively lead to agile information security development. Agile information security development anticipates threats and rapidly deploys necessary safeguards in the context of shifting systems landscapes amid pervasive systems threats.
منابع مشابه
Literature Survey on Network Concepts and Measures to Support Research in Network-centric Operations
The United States Navy and its joint partners continually seek to maintain a responsive, agile, and effective fighting force well suited to combat present-day threats to national security. As a result, U.S. forces are currently undergoing force transformation to adopt an organizational structure capable of supporting this mission. This new organizational structure is known as Network-Centric Wa...
متن کاملDeveloping Secure Software in a Agile environment
Software developers can use agile software development methods to build secure information systems. Current agile methods have few explicit security features. While several discrete security methods can supplement agile methods, few of these integrate seamlessly into other software development methods. Because of the severe constraints imposed by agile methods, these discrete security technique...
متن کاملA Survey of Game Theoretic Approaches to Modelling Decision-Making in Information Warfare Scenarios
Our increasing dependence on information technologies and autonomous systems has escalated international concern for informationand cyber-security in the face of politically, socially and religiously motivated cyber-attacks. Information warfare tactics that interfere with the flow of information can challenge the survival of individuals and groups. It is increasingly important that both humans ...
متن کاملRethinking Security Incident Response: The Integration of Agile Principles
1 In today‟s globally networked environment, information security incidents can inflict staggering financial losses on organizations. Industry reports indicate that fundamental problems exist with the application of current linear plan-driven security incident response approaches being applied in many organizations. Researchers argue that traditional approaches value containment and eradication...
متن کاملSupply chain network design problem for a new market opportunity in an agile manufacturing system
The characteristics of today's competitive environment, such as the speed with which products are designed, manufactured, and distributed, and the need for higher responsiveness and lower operational cost, are forcing companies to search for innovative ways to do business. The concept of agile manufacturing has been proposed in response to these challenges for companies. This ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2004