Nonsecurity Considerations in Security Decisions
نویسنده
چکیده
• You can have as much security as you want – What are you willing to give up to get it? • Security always involves trade-offs – If no airplanes flew, 9/11 couldn't have happened – Gated communities offer more security but less privacy • We make decisions every day about these trade-offs • To do it thoughtfully, we must understand: – How security works – The threats and risks – The costs
منابع مشابه
حدود صلاحیت دیوان عدالت اداری در انتصاب مدیران مؤسسات عمومی غیردولتی (مطالعه موردی مدیرعامل سازمان تأمین اجتماعی)
The Social Security Organization, according to The List of Non-governmental Organizations and Public Institutions Act, is a non-governmental public organization. It currently supports about 33 million workers, retirees and their families. Always there is alignment among the main objectives of social security and economic objectives of the country. All the factors that effect on econom...
متن کاملToward Non-security Failures as a Predictor of Security Faults and Failures
In the search for metrics that can predict the presence of vulnerabilities early in the software life cycle, there may be some benefit to choosing metrics from the non-security realm. We analyzed non-security and security failure data reported for the year 2007 of a Cisco software system. We used non-security failure reports as input variables into a classification and regression tree (CART) mo...
متن کاملAn Empirical Study of Security Requirements in Planning Bug Fixes for an Open Source Software Project
it is often difficult to estimate the resources needed to plan for bug fixing activities in software development projects. Security bug fixes are commonly implemented as patches in response to emergent common vulnerability and exposure (CVE) reports. In this paper we investigate how to plan for bug fixing, and whether security related bug fixes are different from other bugs. In a preprocessing ...
متن کاملInterdependent Security Game Design over Constrained Linear Influence Networks
In today's highly interconnected networks, security of the entities are often interdependent. This means security decisions of the agents are not only influenced by their own costs and constraints, but also are affected by their neighbors’ decisions. Game theory provides a rich set of tools to analyze such influence networks. In the game model, players try to maximize their utilities through se...
متن کاملReplication Based Job Scheduling in Grids with Security Assurance
Security assurance is a critical requirement for QoS or SLA satisfactions in risky grid environments because jobs may be scheduled to multiple machines across different distributed administrative domains. Unlike conventional methods using fixed-number job replications, in this paper, we propose a security-aware parallel and independent job scheduling algorithm based on adaptive job replications...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IEEE Security & Privacy
دوره 5 شماره
صفحات -
تاریخ انتشار 2007