Skip to main content
Erschienen in: The Journal of Supercomputing 10/2016

01.10.2016

Leveraging information security and computational trust for cybersecurity

verfasst von: Robson de Oliveira Albuquerque, Luis Javier García Villalba, Ana Lucila Sandoval Orozco, Rafael Timóteo de Sousa Júnior, Tai-Hoon Kim

Erschienen in: The Journal of Supercomputing | Ausgabe 10/2016

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Cybersecurity has an enormous impact in modern society, since almost everything in our day-to-day activities depends on some information and communication technology that is prone to some form of threat. This paper argues that cybersecurity depends on the combined effect of information security measures together with explicit trust verification that these measures are operational and effective. In this sense, this paper provides a view of information treatments related to trust and information security and discusses how together they can counter advanced persistent threats and exploits that now plague the cyberspace.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literatur
2.
Zurück zum Zitat Bell DE, LaPadula LJ (1973) Secure computer systems: mathematical foundations. Technical report, DTIC document Bell DE, LaPadula LJ (1973) Secure computer systems: mathematical foundations. Technical report, DTIC document
3.
Zurück zum Zitat Ben-Asher N, Gonzalez C (2015) Effects of cyber security knowledge on attack detection. Comput Hum Behav 48:51–61CrossRef Ben-Asher N, Gonzalez C (2015) Effects of cyber security knowledge on attack detection. Comput Hum Behav 48:51–61CrossRef
4.
Zurück zum Zitat Biba KJ (1977) Integrity considerations for secure computer systems. Technical report, DTIC document Biba KJ (1977) Integrity considerations for secure computer systems. Technical report, DTIC document
7.
Zurück zum Zitat Burrows JH (1983) Guideline for computer security certification and accreditation. Technical report, Information Assurance Technology Analysis Center, Falls Church Va Burrows JH (1983) Guideline for computer security certification and accreditation. Technical report, Information Assurance Technology Analysis Center, Falls Church Va
8.
Zurück zum Zitat Byres E, Lowe J (2004) The myths and facts behind cyber security risks for industrial control systems. In: Proceedings of the VDE kongress, Berlin, Germany, vol 116, pp 213–218 Byres E, Lowe J (2004) The myths and facts behind cyber security risks for industrial control systems. In: Proceedings of the VDE kongress, Berlin, Germany, vol 116, pp 213–218
10.
Zurück zum Zitat Dasgupta P (2000) Trust as a commodity. Trust: Mak Break Coop Rel 4:49–72 Dasgupta P (2000) Trust as a commodity. Trust: Mak Break Coop Rel 4:49–72
11.
Zurück zum Zitat Dempsey K, et al. (2011) Information security continuous monitoring (ISCM) for federal systems and organisations. NIST Special Publication, pp 800–137 Dempsey K, et al. (2011) Information security continuous monitoring (ISCM) for federal systems and organisations. NIST Special Publication, pp 800–137
15.
Zurück zum Zitat Frei S (2013) The known unknowns: empirical analysis of publicly unknown vulnerabilities. NSS Labs Inc., Austin Frei S (2013) The known unknowns: empirical analysis of publicly unknown vulnerabilities. NSS Labs Inc., Austin
16.
Zurück zum Zitat Friedberg I, Skopik F, Settanni G, Fiedler R (2015) Combating advanced persistent threats: from network event correlation to incident detection. Comput Secur 48:35–57CrossRef Friedberg I, Skopik F, Settanni G, Fiedler R (2015) Combating advanced persistent threats: from network event correlation to incident detection. Comput Secur 48:35–57CrossRef
17.
Zurück zum Zitat Gambetta D (2000) Can we Trust Trust. Trust: Mak Break Coop Relat 2000:213–237 Gambetta D (2000) Can we Trust Trust. Trust: Mak Break Coop Relat 2000:213–237
18.
Zurück zum Zitat Gandotra E, Bansal D, Sofat S (2014) Computational techniques for predicting cyber threats. In: Proceedings of the international conference on intelligent computing, communication and devices (ICCD), pp 247–253 Gandotra E, Bansal D, Sofat S (2014) Computational techniques for predicting cyber threats. In: Proceedings of the international conference on intelligent computing, communication and devices (ICCD), pp 247–253
21.
Zurück zum Zitat Goncharov M (2014) Russian underground revisited. Technical report, Trend Micro Goncharov M (2014) Russian underground revisited. Technical report, Trend Micro
24.
Zurück zum Zitat Harrington SL (2010) Cyber security active defense: playing with fire or sound risk management? Richmond J Law Technol 20(4):1–41MathSciNet Harrington SL (2010) Cyber security active defense: playing with fire or sound risk management? Richmond J Law Technol 20(4):1–41MathSciNet
27.
Zurück zum Zitat Lamsal P (2001) Understanding trust and security. Technical report, Department of Computer Science, University of Helsinki, Finland Lamsal P (2001) Understanding trust and security. Technical report, Department of Computer Science, University of Helsinki, Finland
31.
Zurück zum Zitat de Oliveira Albuquerque R, García Villalba LJ, Kim TH (2014) GTrust: group extension for trust models in distributed systems. Int J Distrib Sensor Netw 2014:872842. doi:10.1155/2014/872842 de Oliveira Albuquerque R, García Villalba LJ, Kim TH (2014) GTrust: group extension for trust models in distributed systems. Int J Distrib Sensor Netw 2014:872842. doi:10.​1155/​2014/​872842
32.
Zurück zum Zitat de Oliveira Albuquerque R, García Villalba LJ, Sandoval Orozco AL, Mesquita Buiati F, Kim TH (2014) A layered trust information security architecture. Sensors 14(12):22,754–22,772CrossRef de Oliveira Albuquerque R, García Villalba LJ, Sandoval Orozco AL, Mesquita Buiati F, Kim TH (2014) A layered trust information security architecture. Sensors 14(12):22,754–22,772CrossRef
33.
Zurück zum Zitat de Oliveira Albuquerque R, Villalba LJG, Ribeiro Torres O, Gomes de Deus FE (2011) Virtualization with automated services catalog for providing integrated information technology infrastructure. In: Proceedings of the 8th international conference autonomic and trusted computing (ATC), Banff, Canada, pp 75–91 de Oliveira Albuquerque R, Villalba LJG, Ribeiro Torres O, Gomes de Deus FE (2011) Virtualization with automated services catalog for providing integrated information technology infrastructure. In: Proceedings of the 8th international conference autonomic and trusted computing (ATC), Banff, Canada, pp 75–91
34.
Zurück zum Zitat Peltier TR (2013) Information security fundamentals. CRC Press, Boca RatonCrossRef Peltier TR (2013) Information security fundamentals. CRC Press, Boca RatonCrossRef
35.
Zurück zum Zitat Schneider FB et al (1999) Trust in cyberspace. In: Committee on Information Systems Trustworthiness, Computer Science and Telecommunications Board, Commission on Physical Sciences, Mathematics, and Applications, National Research Council. National Academies Press Schneider FB et al (1999) Trust in cyberspace. In: Committee on Information Systems Trustworthiness, Computer Science and Telecommunications Board, Commission on Physical Sciences, Mathematics, and Applications, National Research Council. National Academies Press
37.
Zurück zum Zitat Shah S, Mehtre BM (2013) A modern approach to cyber security analysis using vulnerability assessment and penetration testing. Int J Electron Commun Comput Eng 4(6):47–52 Shah S, Mehtre BM (2013) A modern approach to cyber security analysis using vulnerability assessment and penetration testing. Int J Electron Commun Comput Eng 4(6):47–52
38.
Zurück zum Zitat Stephen M (1994) Formalising trust as a computational concept. Ph.D. thesis, University of Stirling, Scotland, UK Stephen M (1994) Formalising trust as a computational concept. Ph.D. thesis, University of Stirling, Scotland, UK
39.
Zurück zum Zitat Susanto H, Almunawar MN, Tuan YC (2011) Information security management system standards: a comparative study of the big five. Int J Electr Comput Sci IJECS-IJENS 11(5):23–29 Susanto H, Almunawar MN, Tuan YC (2011) Information security management system standards: a comparative study of the big five. Int J Electr Comput Sci IJECS-IJENS 11(5):23–29
40.
Zurück zum Zitat Symantec Labs (2014) 2014 internet security threat report. Technical report, Symantec Symantec Labs (2014) 2014 internet security threat report. Technical report, Symantec
41.
Zurück zum Zitat Szappanos G (2015) Exploit this: evaluating the exploit skills of malware groups. Technical report, SophosLabs Szappanos G (2015) Exploit this: evaluating the exploit skills of malware groups. Technical report, SophosLabs
42.
Zurück zum Zitat Teixeira A, Amin S, Sandberg H, Johansson KH, Sastry SS (2010) Cyber security analysis of state estimators in electric power systems. In: Proceedings of the 49th IEEE conference on decision and control (CDC), pp 5991–5998 Teixeira A, Amin S, Sandberg H, Johansson KH, Sastry SS (2010) Cyber security analysis of state estimators in electric power systems. In: Proceedings of the 49th IEEE conference on decision and control (CDC), pp 5991–5998
46.
Zurück zum Zitat Van Os R (2014) Comparing security architectures: defining and testing a model for evaluating and categorizing security architecture frameworks. Master’s thesis, Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Sweden Van Os R (2014) Comparing security architectures: defining and testing a model for evaluating and categorizing security architecture frameworks. Master’s thesis, Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Sweden
47.
Zurück zum Zitat Wadlow T (2014) Who must you trust? Queue 12(5):30–43 Wadlow T (2014) Who must you trust? Queue 12(5):30–43
48.
Zurück zum Zitat Wang D, Muller T, Irissappane AA, Zhang J, Liu Y (2015) Using information theory to improve the robustness of trust systems. In: Proceedings of the 2015 international conference on autonomous agents and multiagent systems. International Foundation for Autonomous Agents and Multiagent Systems, pp 791–799 Wang D, Muller T, Irissappane AA, Zhang J, Liu Y (2015) Using information theory to improve the robustness of trust systems. In: Proceedings of the 2015 international conference on autonomous agents and multiagent systems. International Foundation for Autonomous Agents and Multiagent Systems, pp 791–799
49.
Zurück zum Zitat Whitman M, Mattord H (2013) Management of information security, 4th edn. Cengage Learning, Boston Whitman M, Mattord H (2013) Management of information security, 4th edn. Cengage Learning, Boston
Metadaten
Titel
Leveraging information security and computational trust for cybersecurity
verfasst von
Robson de Oliveira Albuquerque
Luis Javier García Villalba
Ana Lucila Sandoval Orozco
Rafael Timóteo de Sousa Júnior
Tai-Hoon Kim
Publikationsdatum
01.10.2016
Verlag
Springer US
Erschienen in
The Journal of Supercomputing / Ausgabe 10/2016
Print ISSN: 0920-8542
Elektronische ISSN: 1573-0484
DOI
https://doi.org/10.1007/s11227-015-1543-4

Weitere Artikel der Ausgabe 10/2016

The Journal of Supercomputing 10/2016 Zur Ausgabe