A Philosophy of Security Architecture Design
Digital systems are almost always vulnerable, yet we increasingly depend on these systems. There will be many threats towards these system. In a fully networked system, the vulnerabilities will literally be exposed to the whole world. The exposed vulnerabilities may be transformed into attacks. To c...
Gespeichert in:
Veröffentlicht in: | Wireless personal communications 2020-08, Vol.113 (3), p.1615-1639 |
---|---|
1. Verfasser: | |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 1639 |
---|---|
container_issue | 3 |
container_start_page | 1615 |
container_title | Wireless personal communications |
container_volume | 113 |
creator | Køien, Geir M. |
description | Digital systems are almost always vulnerable, yet we increasingly depend on these systems. There will be many threats towards these system. In a fully networked system, the vulnerabilities will literally be exposed to the whole world. The exposed vulnerabilities may be transformed into attacks. To counter this state of “vulnerability”, the standard remedy is to conduct security requirements analysis and security threat modeling. Threats are assessed, and various countermeasures are devised. The totality of these measures may be described as a security architecture. The goal of a security architecture will largely be to make the system robust and resilient in the face of an adversary. However, we shall argue that this is not enough. Security architecture designs should go one step further, and actually improve the defenses when faced with hostile actions. That is, the security architectures must become antifragile. |
doi_str_mv | 10.1007/s11277-020-07310-5 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2424121323</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2424121323</sourcerecordid><originalsourceid>FETCH-LOGICAL-c363t-8c276ac970d7bf0213ec77c189944c581ddbd80af386513778908fb5ff8f7a893</originalsourceid><addsrcrecordid>eNp9kE9LxDAQR4MouK5-AU8Fr0ZnkraTHJf1LywoqOAtdNNkt8u6rUl72G9vtII3T3P5vTfwGDtHuEIAuo6IgoiDAA4kEXhxwCZYkOBK5u-HbAJaaF4KFMfsJMYNQMK0mLDLWfa8brZtbLv1Pmt99uLsEJp-n82CXTe9s_0QXHbjYrPanbIjX22jO_u9U_Z2d_s6f-CLp_vH-WzBrSxlz5UVVFZWE9S09CBQOktkUWmd57ZQWNfLWkHlpSoLlERKg_LLwnvlqVJaTtnF6O1C-zm42JtNO4RdemlELnJMRiHTSowrG9oYg_OmC81HFfYGwXxXMWMVk6qYnyqmSJAcoZjGu5ULf-p_qC-ix2MD</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2424121323</pqid></control><display><type>article</type><title>A Philosophy of Security Architecture Design</title><source>Springer Nature - Complete Springer Journals</source><creator>Køien, Geir M.</creator><creatorcontrib>Køien, Geir M.</creatorcontrib><description>Digital systems are almost always vulnerable, yet we increasingly depend on these systems. There will be many threats towards these system. In a fully networked system, the vulnerabilities will literally be exposed to the whole world. The exposed vulnerabilities may be transformed into attacks. To counter this state of “vulnerability”, the standard remedy is to conduct security requirements analysis and security threat modeling. Threats are assessed, and various countermeasures are devised. The totality of these measures may be described as a security architecture. The goal of a security architecture will largely be to make the system robust and resilient in the face of an adversary. However, we shall argue that this is not enough. Security architecture designs should go one step further, and actually improve the defenses when faced with hostile actions. That is, the security architectures must become antifragile.</description><identifier>ISSN: 0929-6212</identifier><identifier>EISSN: 1572-834X</identifier><identifier>DOI: 10.1007/s11277-020-07310-5</identifier><language>eng</language><publisher>New York: Springer US</publisher><subject>Communications Engineering ; Computer Communication Networks ; Digital systems ; Engineering ; Networks ; Requirements analysis ; Security ; Security management ; Signal,Image and Speech Processing ; Threat evaluation ; Threat models</subject><ispartof>Wireless personal communications, 2020-08, Vol.113 (3), p.1615-1639</ispartof><rights>The Author(s) 2020</rights><rights>The Author(s) 2020. This work is published under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c363t-8c276ac970d7bf0213ec77c189944c581ddbd80af386513778908fb5ff8f7a893</citedby><cites>FETCH-LOGICAL-c363t-8c276ac970d7bf0213ec77c189944c581ddbd80af386513778908fb5ff8f7a893</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s11277-020-07310-5$$EPDF$$P50$$Gspringer$$Hfree_for_read</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/s11277-020-07310-5$$EHTML$$P50$$Gspringer$$Hfree_for_read</linktohtml><link.rule.ids>314,776,780,27903,27904,41467,42536,51298</link.rule.ids></links><search><creatorcontrib>Køien, Geir M.</creatorcontrib><title>A Philosophy of Security Architecture Design</title><title>Wireless personal communications</title><addtitle>Wireless Pers Commun</addtitle><description>Digital systems are almost always vulnerable, yet we increasingly depend on these systems. There will be many threats towards these system. In a fully networked system, the vulnerabilities will literally be exposed to the whole world. The exposed vulnerabilities may be transformed into attacks. To counter this state of “vulnerability”, the standard remedy is to conduct security requirements analysis and security threat modeling. Threats are assessed, and various countermeasures are devised. The totality of these measures may be described as a security architecture. The goal of a security architecture will largely be to make the system robust and resilient in the face of an adversary. However, we shall argue that this is not enough. Security architecture designs should go one step further, and actually improve the defenses when faced with hostile actions. That is, the security architectures must become antifragile.</description><subject>Communications Engineering</subject><subject>Computer Communication Networks</subject><subject>Digital systems</subject><subject>Engineering</subject><subject>Networks</subject><subject>Requirements analysis</subject><subject>Security</subject><subject>Security management</subject><subject>Signal,Image and Speech Processing</subject><subject>Threat evaluation</subject><subject>Threat models</subject><issn>0929-6212</issn><issn>1572-834X</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2020</creationdate><recordtype>article</recordtype><sourceid>C6C</sourceid><recordid>eNp9kE9LxDAQR4MouK5-AU8Fr0ZnkraTHJf1LywoqOAtdNNkt8u6rUl72G9vtII3T3P5vTfwGDtHuEIAuo6IgoiDAA4kEXhxwCZYkOBK5u-HbAJaaF4KFMfsJMYNQMK0mLDLWfa8brZtbLv1Pmt99uLsEJp-n82CXTe9s_0QXHbjYrPanbIjX22jO_u9U_Z2d_s6f-CLp_vH-WzBrSxlz5UVVFZWE9S09CBQOktkUWmd57ZQWNfLWkHlpSoLlERKg_LLwnvlqVJaTtnF6O1C-zm42JtNO4RdemlELnJMRiHTSowrG9oYg_OmC81HFfYGwXxXMWMVk6qYnyqmSJAcoZjGu5ULf-p_qC-ix2MD</recordid><startdate>20200801</startdate><enddate>20200801</enddate><creator>Køien, Geir M.</creator><general>Springer US</general><general>Springer Nature B.V</general><scope>C6C</scope><scope>AAYXX</scope><scope>CITATION</scope></search><sort><creationdate>20200801</creationdate><title>A Philosophy of Security Architecture Design</title><author>Køien, Geir M.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c363t-8c276ac970d7bf0213ec77c189944c581ddbd80af386513778908fb5ff8f7a893</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2020</creationdate><topic>Communications Engineering</topic><topic>Computer Communication Networks</topic><topic>Digital systems</topic><topic>Engineering</topic><topic>Networks</topic><topic>Requirements analysis</topic><topic>Security</topic><topic>Security management</topic><topic>Signal,Image and Speech Processing</topic><topic>Threat evaluation</topic><topic>Threat models</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Køien, Geir M.</creatorcontrib><collection>Springer Nature OA Free Journals</collection><collection>CrossRef</collection><jtitle>Wireless personal communications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Køien, Geir M.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A Philosophy of Security Architecture Design</atitle><jtitle>Wireless personal communications</jtitle><stitle>Wireless Pers Commun</stitle><date>2020-08-01</date><risdate>2020</risdate><volume>113</volume><issue>3</issue><spage>1615</spage><epage>1639</epage><pages>1615-1639</pages><issn>0929-6212</issn><eissn>1572-834X</eissn><abstract>Digital systems are almost always vulnerable, yet we increasingly depend on these systems. There will be many threats towards these system. In a fully networked system, the vulnerabilities will literally be exposed to the whole world. The exposed vulnerabilities may be transformed into attacks. To counter this state of “vulnerability”, the standard remedy is to conduct security requirements analysis and security threat modeling. Threats are assessed, and various countermeasures are devised. The totality of these measures may be described as a security architecture. The goal of a security architecture will largely be to make the system robust and resilient in the face of an adversary. However, we shall argue that this is not enough. Security architecture designs should go one step further, and actually improve the defenses when faced with hostile actions. That is, the security architectures must become antifragile.</abstract><cop>New York</cop><pub>Springer US</pub><doi>10.1007/s11277-020-07310-5</doi><tpages>25</tpages><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0929-6212 |
ispartof | Wireless personal communications, 2020-08, Vol.113 (3), p.1615-1639 |
issn | 0929-6212 1572-834X |
language | eng |
recordid | cdi_proquest_journals_2424121323 |
source | Springer Nature - Complete Springer Journals |
subjects | Communications Engineering Computer Communication Networks Digital systems Engineering Networks Requirements analysis Security Security management Signal,Image and Speech Processing Threat evaluation Threat models |
title | A Philosophy of Security Architecture Design |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-22T00%3A12%3A30IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20Philosophy%20of%20Security%20Architecture%20Design&rft.jtitle=Wireless%20personal%20communications&rft.au=K%C3%B8ien,%20Geir%20M.&rft.date=2020-08-01&rft.volume=113&rft.issue=3&rft.spage=1615&rft.epage=1639&rft.pages=1615-1639&rft.issn=0929-6212&rft.eissn=1572-834X&rft_id=info:doi/10.1007/s11277-020-07310-5&rft_dat=%3Cproquest_cross%3E2424121323%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2424121323&rft_id=info:pmid/&rfr_iscdi=true |