Can Critical Information Infrastructure Protection be Achieved With Untested Software?

نویسنده

  • J. Voas
چکیده

Citizens of modern societies need access to information infrastructures that are reliable, secure, non-interruptible, and fault-tolerant. In October of 1997, President Clinton’s Commission on Critical Infrastructure Protection (PCCIP) announced that the United States’s infrastructure, which is responsible for relaying information and communications, is vulnerable to information warfare attacks [2]. The commission found that while the resources needed to conduct a physical attack against the infrastructure have not changed dramatically, the resources necessary to launch a comparable scale attack via information warfare are commonplace. They simply consist of a personal computer and Internet connection. Furthermore, the ubiquity of Internet access and the plethora of “hacker” tools and recipe attacks on “underground” Internet sites have significantly reduced the barriers to launching effective attacks against critical systems. With roughly 95% of Defense Department communications relying on commercial infrastructure, the US government finds itself as a major stakeholder in the security of commercial systems [1]. Financial organizations are also heavily dependent. Wholesale payment systems such as the Federal Reserve’s FedWire and automated clearing houses move trillions of dollars over electronic networks daily [3]. Further, as societies transition to paper-less commerce, individual privacy is threatened with each transaction. Software is at the heart of modern information and communication infrastructures. Trust in the integrity of the infrastructure requires a high degree of trust in the underlying software. Software trust, however, has increasingly become a disappearing commodity. We are bombarded daily with news stories of incidents that can be tied directly to defective software. Software trust is a “quality” issue. Software users must trust that the software meets their requirements, is available, reliable, secure, and robust. When a particular software system has these properties, most would agree that the software is of “high quality.” But honestly, how many systems in use today have all of these charactistics? In this column, I will argue that a research initiative focused on testing “systems of systems” must occur if we expect to achieve a comfortable level of infrastructure protection. In fact, in 1992, Clarke and Osterweil called for a similar initiative (except that their reasoning at that time was different than infrastructure protection and did not focus on “systems of systems”). They

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Critical Information Infrastructure Protection (CIIP) Policies in Selected Countries: Findings of the CIIP Handbook

The International Critical Information Infrastructure Protection Handbook addresses the subject of critical information infrastructure protection (CIIP), a growingly important topic on the security policy agenda. The CIIP Handbook focuses on aspects of CIIP related to security policy and methodology. The security policy perspective evaluates policy efforts for the protection of critical informa...

متن کامل

Information Security Standards in Critical Infrastructure Protection

The standards applicable to Information Security are legion, from the purely technical, low-level specification of crypto protocols to the high-level organisational management frameworks. Industrial Control Systems among them the Information Systems in Critical Infrastructure still present their own set of challenges and quirks, despite the convergence trend towards mainstream information techn...

متن کامل

Relevance of Information Warfare Models to Critical Infrastructure Protection

This article illustrates the relevance of information warfare models to critical infrastructure protection. Analogies of information warfare models to those of information security and information systems were used to deconstruct the models into their fundamental components and this will be discussed. The models were applied to critical infrastructures to illustrate the relevance to critical in...

متن کامل

Application Potential of Selected Tools in Context of Critical Infrastructure Protection and Risk Analysis

Risk analysis is considered as a fundamental aspect relevant for ensuring the level of critical infrastructure protection, where the critical infrastructure is seen as system, asset or its part which is important for maintaining the vital societal functions. Article actually discusses and analyzes the potential application of selected tools of information support for the implementation and with...

متن کامل

Policy Based Management for Critical Infrastructure Protection

Our current societies are fully dependent on large complex critical infrastructures (LCCIs). These LCCIs are large scale distributed systems that are highly interdependent, both physically and in their greater reliance on the information infrastructure, which logically introduce vulnerabilities. Failures, accidents, physical or cyber attacks can provoke major damages which can proliferate by ca...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1999