Securing Against Insider Attacks

نویسنده

  • David M. Lynch
چکیده

e are all creatures of habit; the way we think and the views we take are conditioned by our education, society as a whole, and, at a much deeper level, our cultural memories or instinct. It is sometimes surprising how much the past can unconsciously affect today’s thinking. George Santayana famously observed, “Those who cannot remember the past are condemned to repeat it.” But when it comes to IT security, a better way of thinking might be, “Those who fail to understand the impact of the past on their thinking may find themselves somewhat exposed.” The integration of the Internet — a public network — into the communication framework of most organizations has significantly changed the way IT security is implemented in virtually every business environment. And up until now, the primary basis for most security strategies to deal with this has been the “moat and castle” model: a strong perimeter is established that divides the environment into a trusted interior and untrusted exterior, with security focused on establishing the perimeter, enforcing access control strategies, and securing data as it flows from exterior to perimeter. This approach to security is hardly new. Tribal defense is a tried and trusted remedy for a hostile world and has at its base a survival trait that has served us well for millions of years, right back to the time when prehistoric man first started to walk upright and cluster together into groups for defense against a very hostile world.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Hoc Networks under Noise and Imperfect Monitoring

Title of Dissertation: SECURING WIRELESS AD HOC NETWORKS UNDER NOISE AND IMPERFECT MONITORING Wei Yu, Doctor of Philosophy, 2006 Dissertation directed by: Professor K. J. Ray Liu Department of Electrical and Computer Engineering While wireless communication has dramatically changed the way people work and interact, the wireless era continues to be plagued by insufficient security. Without neces...

متن کامل

Frontiers in Insider Threats and Data Leakage Prevention

Organizations continue to be plagued by information leaks caused by insiders with legitimate access to critical or proprietary information. Such unauthorized leaks may result in significant damage to competitiveness, reputation and finances, and organizations should consider proactive approaches to preventing, detecting, and responding to this threat. In this special issue, we have selected eig...

متن کامل

Five Basic Types of Insider DoS Attacks of Code Dissemination in Wireless Sensor Networks

Code dissemination is one of the important services of wireless sensor networks (WSNs). Securing the process of code dissemination is essential in some certain WSNs applications, state-of-the-art secure code dissemination protocols for WSNs aim for the efficient source authentication and integrity verification of code image, however, due to the resource constrains of WSNs and the epidemic behav...

متن کامل

Attacking and securing beacon-enabled 802.15.4 networks

The IEEE 802.15.4 has attracted time-critical applications in wireless sensor networks (WSNs) because of its beacon-enabled mode and guaranteed timeslots (GTSs). However, the GTS scheme's security still leave the 802.15.4 MAC vulnerable to attacks. Further, the existing techniques in the literature for securing 802.15.4 either focus on non beacon-enabled 802.15.4 or cannot defend against inside...

متن کامل

Enhanced Beta Trust Model for Identifying Insider Attacks in Wireless Sensor Networks

Wireless sensor networks (WSN) are more prone to insider and outsider attacks as the sensor nodes are deployed in open environment for collecting data. The traditional cryptography based security mechanisms such as authentication and authorization are able to sort out issues of outside attacker, but they are not effective against insider attacks. Trust based approaches are used to defend agains...

متن کامل

I. Mitigating Insider Threats to RSA Key Generation

RSA keys form the cornerstone for numerous security systems. They provide for confidentiality of communications as well as non-repudiability of digital signatures. However, there are several insider attacks against RSA key generation that can have devastating effects when carried out. In this paper we address such attacks by surveying measures that can be taken to mitigate insider attacks again...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Information Systems Security

دوره 15  شماره 

صفحات  -

تاریخ انتشار 2006