Here Be Dragons

نویسنده

  • Fred B. Schneider
چکیده

held, dragons awaited them. As further support for the flat-Earth hypothesis , anyone who ever cared to experiment either saw an obstruction in the distance or a never-ending flat expanse no matter which direction they looked. What else could the world be but flat? The 21st century " flat world " craze, like its predecessor, also involves India and China, but it's now the transportation of bits and not atoms that hold promise of riches. Communications networks enable the outsourcing of any task that can be conveyed and discharged by transmitting bits. For example, telephone conversations, medical images such as x-rays, and software artifacts can all be encoded using bits. Therefore, telephone customer-help centers, x-ray analysis, and software construction become candidates for outsourcing, effectively exporting jobs from one country to another and reducing costs if the new workforce is less expensive but equally expert. Today's " flat world " is actually as spherical as ever—it's just better connected electronically and thus metaphorically lacks obstructions. So what does all this hold for cyber-security? One consequence is obvi-ous—to the extent that bits from one place aren't obstructed from reaching any other place, attackers have an easier time launching their attacks and attacks spread more easily between machines. The modern " flat world " comprises sovereign countries, with their separate laws, values, and cultures. Differences in laws means that an illegal act in one country might be legal in another; differences in values and cultures means that those differences in law are unlikely to change. The multiplicity of jurisdictions with different laws, with the attendant uncertainty about which laws apply and how they will be enforced, becomes an obstruction in our " flat world " because bits that leave a jurisdiction you trust for one you don't might be subject to abuses that are costly to prevent or remediate. Uniform civil law, that great leveler for commerce, is absent on the international scale. Business relationships between partners only sometimes substitute. Finally, most security in the physical world is based on accountability of action. Perpetrators of offensive acts fear being caught, convicted, and punished. It's hard to argue with success, so we might contemplate the use of accountability in cyber-space. However, to do so, today's systems and networks would need to be substantially changed because they currently don't provide trustworthy attribution of action. Even if they did, the existence of multiple jurisdictions becomes problematic. …

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Here be monsters.

It seems that my knowledge of old maps is not as good as I believed. I had thought that in the past when there were lands or seas still to be mapped the explorers often created myths and legends by writing 'here be monsters' on the charts of the time. This would warn other adventurers away from these areas as they were full of unknown dangers and remained uncharted. It appears that the term act...

متن کامل

Induction to inhalation anaesthesia in agamid lizards with alfaxalone

The aim of this study was to evaluate intravenous anaesthesia with alfaxalone for tracheal tube insertion in three species of agamid lizards. Alfaxalone, at a dose rate of 5 mg/kg, was administered intravenously to 80 inland bearded dragons (Pogona vitticeps), 10 Rankin’s dragons (Pogona henrylawsoni) and 10 Chinese water dragons (Physignathus cocincinus) following 24 h of fasting. The righting...

متن کامل

A Conversation with Stosh Kozimor

I f the periodic table is an atlas for chemistry, then the actinides should surely be labeled “Here be dragons”. All are radioactive, only thorium and uranium are found in appreciable quantities, and most of the rest are produced by the sort of modern-day alchemy that relies on nuclear reactors or particle accelerators. Stosh Kozimor, a staff scientist at Los Alamos National Laboratory, is one ...

متن کامل

Here be dragons? The perils and promises of inter-resource lexical-semantic mapping

Lexical-semantic knowledges sources are a stock item in the language technologist’s toolbox, having proved their practical worth in many and diverse natural language processing (NLP) applications. In linguistics, lexical semantics comes in many flavors, but in the NLP world, wordnets reign more or less supreme. There has been some promising work utilizing Roget-style thesauruses instead, but wi...

متن کامل

Characterizing the Hematologic and Plasma Chemistry Profiles of Captive Chinese Water Dragons, Physignathus oncincinus

Twenty-six (one to six years of age) Chinese water dragons, Physignathus cocincinus, from two different captive populations, Massachusetts (MA) and Mississippi (MS), were selected for this study. The lizards were given a thorough examination, and a blood sample was collected for a complete blood count (CBC) and plasma biochemistry. Whole blood was stored in both lithium heparin and CaEDTA; Ca-E...

متن کامل

An In Situ Measurement System for Characterizing Orbital Debris

This paper presents the development of an in situ measurement system known as the Debris Resistive Acoustic Grid Orbital Navy/NASA Sensor (DRAGONS). The DRAGONS system is designed to detect impacts caused by particles ranging from 50 μm to 1 mm at both low-earth and geostationary orbits. DRAGONS utilizes a combination of low-cost sensor technologies to facilitate accurate measurements and appro...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IEEE Security & Privacy

دوره 4  شماره 

صفحات  -

تاریخ انتشار 2006