Security Risks in the Computer-Communication Infrastructure
نویسنده
چکیده
Thank you for the invitation to appear before you today. It is a very special privilege for me. (For the record, I have included some of my personal background at the end of this testimony.) My written statement addresses some of the fundamental risks facing us in our present uses of computer-communications technology, and assess how those risks might change as we depend increasingly on that technology. These written comments address issues that I understand to be at the heart of the intended scope of these hearings: an assessment of security vulnerabilities and risks in computer-communication systems within the Department of Defense, non-DoD U.S. Government, and private sector (including the NII and its future evolution). I include a few recommendations that might contribute to improved security. In the present context, security implies techniques for the prevention of intentional and { to some extent { accidental misuse in computer-communication systems. Brief Summary To give an idea of the scope of this testimony, here are a few talking points. We are becoming massively interconnected. Whether we like it or not, we must coexist with people and systems of unknown and unidentiiable trustworthiness (including unidentiiable hostile parties), within the U.S. and elsewhere. Our problems have become international as well as national. There are fundamental vulnerabilities in the existing computer-communication infrastructure, and serious risks that those vulnerabilities will be exploited { with possibly very severe eeects. Our national infrastructure depends not only on our interconnected information systems and networks, but also the public switched network, the air-traac control systems, the power grids, and many associated control systems { which themselves depend heavily on computers and communications. There are many past cases of security misuse worthy of your attention, such as the 1988 Internet Worm, the Citibank penetration, and the Rome Lab case (Reference 8). (See the attached Reference 3 for a summary of other cases as well.) However, there are many serious security vulnerabilities that have been discovered by friendly parties and xed before they could exploited. In addition, there have been various cases of misuse of government databases,
منابع مشابه
An ECC-Based Mutual Authentication Scheme with One Time Signature (OTS) in Advanced Metering Infrastructure
Advanced metering infrastructure (AMI) is a key part of the smart grid; thus, one of the most important concerns is to offer a secure mutual authentication. This study focuses on communication between a smart meter and a server on the utility side. Hence, a mutual authentication mechanism in AMI is presented based on the elliptic curve cryptography (ECC) and one time signature (OTS) consists o...
متن کاملA Study on Factors Affecting Operational Electronic Banking Risks in Iran Banking Industry (Case Study: Kermanshah Melli Bank)
Nowadays, advances in information and communication technologies, has provided an opportunity for banks to provide their electronic services to their customers in remote areas. This technological innovation by E–banking systems has brought about many benefits to customers while it has been accompanied by a number of risks including the operational ones. This risks need to be identified and mana...
متن کاملA survey on impact of cloud computing security challenges on NFV infrastructure and risks mitigation solutions
Increased broadband data rate for end users and the cost of resource provisioning to an agreed SLA in telecom service providers, are forcing operators in order to adhere to employment Virtual Network Functions (VNF) in an NFV solution. The newly 5G mobile telecom technology is also based on NFV and Software Define Network (SDN) which inherit opportunities and threats of such constructs. Thus a ...
متن کاملComputer security in the future
Until recently, computer security was an obscure discipline that seemed to have little relevance to everyday life. With the rapid growth of the Internet, e-commerce, and the widespread use of computers, computer security touches almost all aspects of daily life and all parts of society. Even those who do not use computers have information about them stored on computers. This paper reviews some ...
متن کاملTowards an Evolvable Cyber Security Protection Profile for Electronic Medical Records to Ensure Privacy and Security
Electronic Medical Records (EMR) provide increased productivity and convenience for patients, doctors, nurses, pharmacists, lab technicians and other medical professionals. The added accessibility to patient information introduces a multitude of security risks at various levels. The communication infrastructure may be breached by intruders from disparate countries. Loosely protected data entry ...
متن کامل