DocumentCode :
274826
Title :
Security protection based on mission criticality
Author :
Johnson, Howard L.
fYear :
1988
fDate :
12-16 Dec 1988
Firstpage :
228
Lastpage :
232
Abstract :
Developments connected with security protection based on mission criticality at the US Department of Defense (DoD) are discussed. It is shown that assurance of service can be achieved as part of the design, thereby making availability in the presence of malicious threat an integrity problem. There are two approaches to simultaneously deal with both sensitivity and criticality policies: a restrictive combined data flow policy or a strategy that uses isolation techniques (e.g., encryption). Criticality attacks almost always allow a detection and recovery strategy, which can utilize encoding and is less expensive than a resistance strategy (like sensitivity protection). It is suggested that a DoD security objective and accompanying policy should be based on assuring accomplishment of nationally critical missions dealing with loss of integrity and denial of service threats
Keywords :
military computing; security of data; DoD; US Department of Defense; assurance of service; data flow policy; denial of service; encoding; integrity problem; isolation techniques; malicious threat; mission criticality; security protection; sensitivity; Availability; Computer crime; Control systems; Cryptography; Data security; Encoding; Information security; Mission critical systems; National security; Protection;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Aerospace Computer Security Applications Conference, 1988., Fourth
Conference_Location :
Orlando, FL
Print_ISBN :
0-8186-0895-1
Type :
conf
DOI :
10.1109/ACSAC.1988.113406
Filename :
113406
Link To Document :
بازگشت