Title :
Security protection based on mission criticality
Author :
Johnson, Howard L.
Abstract :
Developments connected with security protection based on mission criticality at the US Department of Defense (DoD) are discussed. It is shown that assurance of service can be achieved as part of the design, thereby making availability in the presence of malicious threat an integrity problem. There are two approaches to simultaneously deal with both sensitivity and criticality policies: a restrictive combined data flow policy or a strategy that uses isolation techniques (e.g., encryption). Criticality attacks almost always allow a detection and recovery strategy, which can utilize encoding and is less expensive than a resistance strategy (like sensitivity protection). It is suggested that a DoD security objective and accompanying policy should be based on assuring accomplishment of nationally critical missions dealing with loss of integrity and denial of service threats
Keywords :
military computing; security of data; DoD; US Department of Defense; assurance of service; data flow policy; denial of service; encoding; integrity problem; isolation techniques; malicious threat; mission criticality; security protection; sensitivity; Availability; Computer crime; Control systems; Cryptography; Data security; Encoding; Information security; Mission critical systems; National security; Protection;
Conference_Titel :
Aerospace Computer Security Applications Conference, 1988., Fourth
Conference_Location :
Orlando, FL
Print_ISBN :
0-8186-0895-1
DOI :
10.1109/ACSAC.1988.113406