Title :
A case for protocol dependency
Author :
Eronen, Juhani ; Laakso, Marko
Author_Institution :
Lab. of Comput. Eng., Oulu Univ., Finland
Abstract :
Vulnerabilities infest information technology. There is a lack of tools in risk assessment for understanding the impact that the disclosed vulnerabilities have on the critical information infrastructures. To address this need, this work derives a new dimension of dependency from practical vulnerability work, namely that of protocol dependency. Classic technology dependency views were reviewed, a chain of systematic vulnerability disclosures was followed as a case study and analysis revealed evidence of protocol dependency. Extrapolating from the experiences of a complex case, this new dependency dimension can be modelled. The model will benefit from going beyond a narrow technical view.
Keywords :
information technology; protocols; risk management; security of data; information technology; protocol dependency; risk assessment; systematic vulnerability disclosures; Computer aided software engineering; Context; Information security; Information systems; Information technology; Laboratories; Protection; Protocols; Risk management; Robustness; critical infrastructure protection; information systems; interdependency; protocol dependency; risk assessment; robustness; security assessment; vulnerability;
Conference_Titel :
Critical Infrastructure Protection, First IEEE International Workshop on
Print_ISBN :
0-7695-2426-5
DOI :
10.1109/IWCIP.2005.1