Fuzzy security concepts for the Internet of the future
نویسندگان
چکیده
As the Internet and the services it provides reach more and more areas of our everyday lives, security aspects like confidentiality, trust and privacy become increasingly important. Security issues have to be solved at different levels software, operating systems, networks, and user interfaces by adopting a coherent approach in both modern broadband networks and future distributed application scenarios. Despite the large amount of technologies available today aimed at solving issues like secure communication or trustworthy information access, evidence shows that many of the existing technologies have weaknesses that lead to reduced security for the system as a whole. In this article we will provide an overview of current threats faced by information systems in modern broadband networks, demonstrating that achieving the highest security level for the system as a whole will require new security concepts and new technologies for each and every system component. First, we will analyze the cryptographic foundations of most of today’s security mechanisms on the Internet. We will show how they are applied in real word applications and offer examples of security problems that are related to them. Furthermore, we will provide insight into future technologies such as quantum cryptography and demonstrate how they might be able to guarantee unprecedented levels of security in future information systems. Introduction Modern communication technologies and the Internet have reached a critical mass: There is hardly a profession or personal activity that is not related to information and communication technologies. The wide spread of the Internet and its evolution in recent times have posed unprecedented challenges in terms of security. When the ARPANET, the predecessor of the Internet we know today, was first built back in 1969, only four computers were involved in the process, and the people participating in this project knew each other very well [1]. Thus, securing the system from malicious intentions was not such a big issue. Threats to the current Internet Times have changed dramatically: Internet users have currently exceeded the 1.7 billion mark [2] and there is a growing number of people among them pursuing malicious objectives. The typical threats that today’s Internet users have to face are manifold. According to recent reports on security threats on the Internet [3][4][5], the most important ones are the following: 1 Published in the e&i journal 05/2010 (pp. 121-126)
منابع مشابه
Computer security in the future
Until recently, computer security was an obscure discipline that seemed to have little relevance to everyday life. With the rapid growth of the Internet, e-commerce, and the widespread use of computers, computer security touches almost all aspects of daily life and all parts of society. Even those who do not use computers have information about them stored on computers. This paper reviews some ...
متن کاملIdentifying and Ranking Technology-Telecommunications Context of Information Security anagement System in E-Government Using Fuzzy AHP Approach
In recent years, many security threats have entered into the organizations’ information and changed the organizational performance resulting in their exorbitant costs. This question is of particular importanceabout government agencies that use information and Internet systems. This issue enabled the top managers of organizations to implement a security system and minimize these costs. Using In...
متن کاملIran and the future of security arrangements in the Gulf region
The purpose of this paper is to examine the Persian Gulf system of cybernetics and the possibility of Iran's role and influence on the future of security arrangements in the Persian Gulf region. In this regard, the author describes the cybernetic theory in regional studies as a conceptual framework of the research to implement the hegemonic security system of the Persian Gulf. Then, by showing ...
متن کاملAN INTEGRATED FIS-QFD MODEL FOR EVALUATION OF INTERNET SERVICE PROVIDER
<span style="color: #000000; font-family: Tahoma, sans-serif; font-size: 13px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: auto; text-align: -webkit-left; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px; display: inline !important; float: none; ba...
متن کاملAN INTEGRATED FIS-QFD MODEL FOR EVALUATION OF INTERNET SERVICE PROVIDER
<span style="color: #000000; font-family: Tahoma, sans-serif; font-size: 13px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: auto; text-align: -webkit-left; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px; display: inline !important; float: none; ba...
متن کاملA Security Effective Structure for National Defense in the 21st Century
In accordance with human necessities and deep attention into security, research studies have today became an irrefutable necessity in this area. It is noted that traditional concepts of this important issue have changed, as a result of occurring various events in the past, particularly in the 20th century; so that security is no more limited to protecting human beings against individual and col...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Elektrotechnik und Informationstechnik
دوره 127 شماره
صفحات -
تاریخ انتشار 2010