Skip to main content
Top

2021 | OriginalPaper | Chapter

Convergent Evolution of IT Security Paradigm: From Access Control to Cyber-Defense

Author : Dmitry P. Zegzhda

Published in: The Economics of Digital Transformation

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The information technology revolution (Industry 4.0) has led to the creation of the concept of cyber-physical systems. Digitalization has brought all the urgency of information security problems, which depend on the efficiency of modern production on targeted and random destructive impact, which lead to hidden, remote, and difficult to detect effects that can cause catastrophic consequences. The information security problems of cyber-physical systems require the development of a new security methodology. In this paper, it is proposed to interpret the security of cyber-physical systems as the preservation of the sustainable functioning of the cyber-physical system in the context of a targeted destructive impact on its information components. Cybersecurity methodology extends the objects of protection from data or key information to control systems as telecommunications equipment and actuators in the energy and manufacturing. This paper describes the process of transition from access control to cyber-defense for securing cyber-physical systems.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
go back to reference Anderson, J. P. (1972). ‘Computer security technology planning study’. Electronic systems division, air force systems command. Bedford, MA: Hanscom Field. Anderson, J. P. (1972). ‘Computer security technology planning study’. Electronic systems division, air force systems command. Bedford, MA: Hanscom Field.
go back to reference Aström, K. J., & Murray, R.,. M. (2010). Feedback systems: An introduction for scientists and engineers. Princeton University Press. Aström, K. J., & Murray, R.,. M. (2010). Feedback systems: An introduction for scientists and engineers. Princeton University Press.
go back to reference Bellman, R. (2008). Stability theory of differential equations. Courier Corporation. Bellman, R. (2008). Stability theory of differential equations. Courier Corporation.
go back to reference Bishop, M. (2003). Computer security: Art and science. Boston: Addison Wesley. Bishop, M. (2003). Computer security: Art and science. Boston: Addison Wesley.
go back to reference Calder, A. (2009). Information security based on ISO 27001/ISO 27002: A management guide–best practice. Hertogenbosch: Van Haren Publishing. Calder, A. (2009). Information security based on ISO 27001/ISO 27002: A management guide–best practice. Hertogenbosch: Van Haren Publishing.
go back to reference Chen, S., & Billings, S. A. (1989). Representations of nonlinear system: The NARMAX model. International Journal of Control, 49(3), 1013–1032.CrossRef Chen, S., & Billings, S. A. (1989). Representations of nonlinear system: The NARMAX model. International Journal of Control, 49(3), 1013–1032.CrossRef
go back to reference Clayton, G. E. (2009). Data loss prevention and monitoring in the workplace: Best practice guide. Dallas, USA: Privacy Compliance Group, Inc. Clayton, G. E. (2009). Data loss prevention and monitoring in the workplace: Best practice guide. Dallas, USA: Privacy Compliance Group, Inc.
go back to reference Corin, R., Etalle, S., den Hartog, J., Lenzini, G., & Staicu, I. (2005). A logic for auditing accountability in decentralized systems. In T. Dimitrakos & F. Martinelli (Eds.), Formal aspects in security and trust. IFIP WCC TC1 2004. IFIP International Federation for Information Processing (Vol. 173). Boston, MA: Springer. Corin, R., Etalle, S., den Hartog, J., Lenzini, G., & Staicu, I. (2005). A logic for auditing accountability in decentralized systems. In T. Dimitrakos & F. Martinelli (Eds.), Formal aspects in security and trust. IFIP WCC TC1 2004. IFIP International Federation for Information Processing (Vol. 173). Boston, MA: Springer.
go back to reference Gupta, A., Kuppili, P., Akella, A., & Barford, P. (2009). An empirical study of malware evolution. 2009 First International Communication Systems and Networks and Workshops. Gupta, A., Kuppili, P., Akella, A., & Barford, P. (2009). An empirical study of malware evolution. 2009 First International Communication Systems and Networks and Workshops.
go back to reference Jasim, O. K., Abbas, S., & Salem, A. B. M. (2015). Evolution of an emerging symmetric quantum cryptographic algorithm. Journal of Information Security, 6, 82–91.CrossRef Jasim, O. K., Abbas, S., & Salem, A. B. M. (2015). Evolution of an emerging symmetric quantum cryptographic algorithm. Journal of Information Security, 6, 82–91.CrossRef
go back to reference Kilian, C. T. (2006). Modern control technology: Components and systems. Thompson Delmar Learning. Kilian, C. T. (2006). Modern control technology: Components and systems. Thompson Delmar Learning.
go back to reference Lacey, D. (2013). Advanced persistent threats: How to manage the risk to your business. ISACA. Lacey, D. (2013). Advanced persistent threats: How to manage the risk to your business. ISACA.
go back to reference Lavrova, D. S., Alekseev, I. V., & Shtyrkina, A. A. (2018). Security analysis based on controlling dependences of network traffic parameters by wavelet transformation. Automatic Control and Computer Sciences, 52(8), 931–935.CrossRef Lavrova, D. S., Alekseev, I. V., & Shtyrkina, A. A. (2018). Security analysis based on controlling dependences of network traffic parameters by wavelet transformation. Automatic Control and Computer Sciences, 52(8), 931–935.CrossRef
go back to reference Pavlenko, E. Y., Yarmak, A. V., & Moskvin, D. A. (2017). Hierarchical approach to analyzing security breaches in information systems. Automatic Control and Computer Sciences, 51(8), 829–834.CrossRef Pavlenko, E. Y., Yarmak, A. V., & Moskvin, D. A. (2017). Hierarchical approach to analyzing security breaches in information systems. Automatic Control and Computer Sciences, 51(8), 829–834.CrossRef
go back to reference Rattner, D. (2010). Risk Assessments. Security management. Boston: Northeastern University. Rattner, D. (2010). Risk Assessments. Security management. Boston: Northeastern University.
go back to reference Stepanova, T. (2012). Ensuring sustainability of multi-agent protection systems under the impact of distributed security threats. Ph. D. Thesis, SPbSTU. Stepanova, T. (2012). Ensuring sustainability of multi-agent protection systems under the impact of distributed security threats. Ph. D. Thesis, SPbSTU.
go back to reference Zadorozhnyi, V. N., & Yudin, E. B. (2012). Structural properties of the scale-free Barabasi-Albert graph. Automation and Remote Control, 73(4), 702–716.CrossRef Zadorozhnyi, V. N., & Yudin, E. B. (2012). Structural properties of the scale-free Barabasi-Albert graph. Automation and Remote Control, 73(4), 702–716.CrossRef
go back to reference Zegzhda, D. P. (2016). Sustainability as a criterion for information security in cyber-physical systems. Automatic Control and Computer Sciences, 50(8), 813–819.CrossRef Zegzhda, D. P. (2016). Sustainability as a criterion for information security in cyber-physical systems. Automatic Control and Computer Sciences, 50(8), 813–819.CrossRef
go back to reference Zegzhda, P. D., Lavrova, D. S., & Shtyrkina, A. A. (2018). Multifractal analysis of internet backbone traffic for detecting denial of service attacks. Automatic Control and Computer Sciences, 52(8), 936–944.CrossRef Zegzhda, P. D., Lavrova, D. S., & Shtyrkina, A. A. (2018). Multifractal analysis of internet backbone traffic for detecting denial of service attacks. Automatic Control and Computer Sciences, 52(8), 936–944.CrossRef
go back to reference Zegzhda, D. P., & Pavlenko, E. Y. (2017). Cyber-physical system homeostatic security management. Automatic Control and Computer Sciences, 51(8), 805–816.CrossRef Zegzhda, D. P., & Pavlenko, E. Y. (2017). Cyber-physical system homeostatic security management. Automatic Control and Computer Sciences, 51(8), 805–816.CrossRef
go back to reference Zegzhda, D. P., Poltavtseva, M. A., & Lavrova, D. S. (2017). Systematization and security assessment of cyber-physical systems. Automatic Control and Computer Sciences, 51(8), 835–843.CrossRef Zegzhda, D. P., Poltavtseva, M. A., & Lavrova, D. S. (2017). Systematization and security assessment of cyber-physical systems. Automatic Control and Computer Sciences, 51(8), 835–843.CrossRef
go back to reference Zegzhda, P. D., & Zegzhda, D. P. (2001). Secure systems design technology. In V. I. Gorodetski, V. A. Skormin, & L. J. Popyack (Eds.), Information Assurance in Computer Networks. MMM-ACNS 2001. Lecture notes in computer science (Vol. 2052). Berlin, Heidelberg: Springer. Zegzhda, P. D., & Zegzhda, D. P. (2001). Secure systems design technology. In V. I. Gorodetski, V. A. Skormin, & L. J. Popyack (Eds.), Information Assurance in Computer Networks. MMM-ACNS 2001. Lecture notes in computer science (Vol. 2052). Berlin, Heidelberg: Springer.
go back to reference Zhou, Y., & Jiang, X. (2012). Dissecting android malware: Characterization and evolution. 2012 IEEE symposium on security and privacy (pp. 95–109). Zhou, Y., & Jiang, X. (2012). Dissecting android malware: Characterization and evolution. 2012 IEEE symposium on security and privacy (pp. 95–109).
Metadata
Title
Convergent Evolution of IT Security Paradigm: From Access Control to Cyber-Defense
Author
Dmitry P. Zegzhda
Copyright Year
2021
Publisher
Springer International Publishing
DOI
https://doi.org/10.1007/978-3-030-59959-1_9