A Philosophy of Security Architecture Design

Digital systems are almost always vulnerable, yet we increasingly depend on these systems. There will be many threats towards these system. In a fully networked system, the vulnerabilities will literally be exposed to the whole world. The exposed vulnerabilities may be transformed into attacks. To c...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Wireless personal communications 2020-08, Vol.113 (3), p.1615-1639
1. Verfasser: Køien, Geir M.
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 1639
container_issue 3
container_start_page 1615
container_title Wireless personal communications
container_volume 113
creator Køien, Geir M.
description Digital systems are almost always vulnerable, yet we increasingly depend on these systems. There will be many threats towards these system. In a fully networked system, the vulnerabilities will literally be exposed to the whole world. The exposed vulnerabilities may be transformed into attacks. To counter this state of “vulnerability”, the standard remedy is to conduct security requirements analysis and security threat modeling. Threats are assessed, and various countermeasures are devised. The totality of these measures may be described as a security architecture. The goal of a security architecture will largely be to make the system robust and resilient in the face of an adversary. However, we shall argue that this is not enough. Security architecture designs should go one step further, and actually improve the defenses when faced with hostile actions. That is, the security architectures must become antifragile.
doi_str_mv 10.1007/s11277-020-07310-5
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2424121323</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2424121323</sourcerecordid><originalsourceid>FETCH-LOGICAL-c363t-8c276ac970d7bf0213ec77c189944c581ddbd80af386513778908fb5ff8f7a893</originalsourceid><addsrcrecordid>eNp9kE9LxDAQR4MouK5-AU8Fr0ZnkraTHJf1LywoqOAtdNNkt8u6rUl72G9vtII3T3P5vTfwGDtHuEIAuo6IgoiDAA4kEXhxwCZYkOBK5u-HbAJaaF4KFMfsJMYNQMK0mLDLWfa8brZtbLv1Pmt99uLsEJp-n82CXTe9s_0QXHbjYrPanbIjX22jO_u9U_Z2d_s6f-CLp_vH-WzBrSxlz5UVVFZWE9S09CBQOktkUWmd57ZQWNfLWkHlpSoLlERKg_LLwnvlqVJaTtnF6O1C-zm42JtNO4RdemlELnJMRiHTSowrG9oYg_OmC81HFfYGwXxXMWMVk6qYnyqmSJAcoZjGu5ULf-p_qC-ix2MD</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2424121323</pqid></control><display><type>article</type><title>A Philosophy of Security Architecture Design</title><source>Springer Nature - Complete Springer Journals</source><creator>Køien, Geir M.</creator><creatorcontrib>Køien, Geir M.</creatorcontrib><description>Digital systems are almost always vulnerable, yet we increasingly depend on these systems. There will be many threats towards these system. In a fully networked system, the vulnerabilities will literally be exposed to the whole world. The exposed vulnerabilities may be transformed into attacks. To counter this state of “vulnerability”, the standard remedy is to conduct security requirements analysis and security threat modeling. Threats are assessed, and various countermeasures are devised. The totality of these measures may be described as a security architecture. The goal of a security architecture will largely be to make the system robust and resilient in the face of an adversary. However, we shall argue that this is not enough. Security architecture designs should go one step further, and actually improve the defenses when faced with hostile actions. That is, the security architectures must become antifragile.</description><identifier>ISSN: 0929-6212</identifier><identifier>EISSN: 1572-834X</identifier><identifier>DOI: 10.1007/s11277-020-07310-5</identifier><language>eng</language><publisher>New York: Springer US</publisher><subject>Communications Engineering ; Computer Communication Networks ; Digital systems ; Engineering ; Networks ; Requirements analysis ; Security ; Security management ; Signal,Image and Speech Processing ; Threat evaluation ; Threat models</subject><ispartof>Wireless personal communications, 2020-08, Vol.113 (3), p.1615-1639</ispartof><rights>The Author(s) 2020</rights><rights>The Author(s) 2020. This work is published under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c363t-8c276ac970d7bf0213ec77c189944c581ddbd80af386513778908fb5ff8f7a893</citedby><cites>FETCH-LOGICAL-c363t-8c276ac970d7bf0213ec77c189944c581ddbd80af386513778908fb5ff8f7a893</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s11277-020-07310-5$$EPDF$$P50$$Gspringer$$Hfree_for_read</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/s11277-020-07310-5$$EHTML$$P50$$Gspringer$$Hfree_for_read</linktohtml><link.rule.ids>314,776,780,27903,27904,41467,42536,51298</link.rule.ids></links><search><creatorcontrib>Køien, Geir M.</creatorcontrib><title>A Philosophy of Security Architecture Design</title><title>Wireless personal communications</title><addtitle>Wireless Pers Commun</addtitle><description>Digital systems are almost always vulnerable, yet we increasingly depend on these systems. There will be many threats towards these system. In a fully networked system, the vulnerabilities will literally be exposed to the whole world. The exposed vulnerabilities may be transformed into attacks. To counter this state of “vulnerability”, the standard remedy is to conduct security requirements analysis and security threat modeling. Threats are assessed, and various countermeasures are devised. The totality of these measures may be described as a security architecture. The goal of a security architecture will largely be to make the system robust and resilient in the face of an adversary. However, we shall argue that this is not enough. Security architecture designs should go one step further, and actually improve the defenses when faced with hostile actions. That is, the security architectures must become antifragile.</description><subject>Communications Engineering</subject><subject>Computer Communication Networks</subject><subject>Digital systems</subject><subject>Engineering</subject><subject>Networks</subject><subject>Requirements analysis</subject><subject>Security</subject><subject>Security management</subject><subject>Signal,Image and Speech Processing</subject><subject>Threat evaluation</subject><subject>Threat models</subject><issn>0929-6212</issn><issn>1572-834X</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2020</creationdate><recordtype>article</recordtype><sourceid>C6C</sourceid><recordid>eNp9kE9LxDAQR4MouK5-AU8Fr0ZnkraTHJf1LywoqOAtdNNkt8u6rUl72G9vtII3T3P5vTfwGDtHuEIAuo6IgoiDAA4kEXhxwCZYkOBK5u-HbAJaaF4KFMfsJMYNQMK0mLDLWfa8brZtbLv1Pmt99uLsEJp-n82CXTe9s_0QXHbjYrPanbIjX22jO_u9U_Z2d_s6f-CLp_vH-WzBrSxlz5UVVFZWE9S09CBQOktkUWmd57ZQWNfLWkHlpSoLlERKg_LLwnvlqVJaTtnF6O1C-zm42JtNO4RdemlELnJMRiHTSowrG9oYg_OmC81HFfYGwXxXMWMVk6qYnyqmSJAcoZjGu5ULf-p_qC-ix2MD</recordid><startdate>20200801</startdate><enddate>20200801</enddate><creator>Køien, Geir M.</creator><general>Springer US</general><general>Springer Nature B.V</general><scope>C6C</scope><scope>AAYXX</scope><scope>CITATION</scope></search><sort><creationdate>20200801</creationdate><title>A Philosophy of Security Architecture Design</title><author>Køien, Geir M.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c363t-8c276ac970d7bf0213ec77c189944c581ddbd80af386513778908fb5ff8f7a893</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2020</creationdate><topic>Communications Engineering</topic><topic>Computer Communication Networks</topic><topic>Digital systems</topic><topic>Engineering</topic><topic>Networks</topic><topic>Requirements analysis</topic><topic>Security</topic><topic>Security management</topic><topic>Signal,Image and Speech Processing</topic><topic>Threat evaluation</topic><topic>Threat models</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Køien, Geir M.</creatorcontrib><collection>Springer Nature OA Free Journals</collection><collection>CrossRef</collection><jtitle>Wireless personal communications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Køien, Geir M.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A Philosophy of Security Architecture Design</atitle><jtitle>Wireless personal communications</jtitle><stitle>Wireless Pers Commun</stitle><date>2020-08-01</date><risdate>2020</risdate><volume>113</volume><issue>3</issue><spage>1615</spage><epage>1639</epage><pages>1615-1639</pages><issn>0929-6212</issn><eissn>1572-834X</eissn><abstract>Digital systems are almost always vulnerable, yet we increasingly depend on these systems. There will be many threats towards these system. In a fully networked system, the vulnerabilities will literally be exposed to the whole world. The exposed vulnerabilities may be transformed into attacks. To counter this state of “vulnerability”, the standard remedy is to conduct security requirements analysis and security threat modeling. Threats are assessed, and various countermeasures are devised. The totality of these measures may be described as a security architecture. The goal of a security architecture will largely be to make the system robust and resilient in the face of an adversary. However, we shall argue that this is not enough. Security architecture designs should go one step further, and actually improve the defenses when faced with hostile actions. That is, the security architectures must become antifragile.</abstract><cop>New York</cop><pub>Springer US</pub><doi>10.1007/s11277-020-07310-5</doi><tpages>25</tpages><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 0929-6212
ispartof Wireless personal communications, 2020-08, Vol.113 (3), p.1615-1639
issn 0929-6212
1572-834X
language eng
recordid cdi_proquest_journals_2424121323
source Springer Nature - Complete Springer Journals
subjects Communications Engineering
Computer Communication Networks
Digital systems
Engineering
Networks
Requirements analysis
Security
Security management
Signal,Image and Speech Processing
Threat evaluation
Threat models
title A Philosophy of Security Architecture Design
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-22T00%3A12%3A30IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20Philosophy%20of%20Security%20Architecture%20Design&rft.jtitle=Wireless%20personal%20communications&rft.au=K%C3%B8ien,%20Geir%20M.&rft.date=2020-08-01&rft.volume=113&rft.issue=3&rft.spage=1615&rft.epage=1639&rft.pages=1615-1639&rft.issn=0929-6212&rft.eissn=1572-834X&rft_id=info:doi/10.1007/s11277-020-07310-5&rft_dat=%3Cproquest_cross%3E2424121323%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2424121323&rft_id=info:pmid/&rfr_iscdi=true