Title :
Surviving information warfare attacks
Author :
Jajodia, Sushil ; Ammann, Paul ; McCollum, Catherine D.
Author_Institution :
Dept. of Inf. & Software Eng., George Mason Univ., Fairfax, VA, USA
fDate :
4/1/1999 12:00:00 AM
Abstract :
The past few years have seen governmental, military, and commercial organizations widely adopt Web-based commercial technologies because of their convenience, ease of use, and ability to take advantage of rapid advances in the commercial market. With this increasing reliance on internetworked computer resources comes an increasing vulnerability to information warfare. In today´s heavily networked environment, safety demands protection from both obvious and subtle intrusions that can delete or corrupt vital data. Traditionally, information systems security focuses primarily on prevention: putting controls and mechanisms in place that protect confidentiality, integrity, and availability by stopping users from doing bad things. Moreover, most mechanisms are powerless against misbehavior by legitimate users who perform functions for which they are authorized. The paper discusses traditional approaches and their limitations
Keywords :
data integrity; data privacy; electronic commerce; security of data; Web-based commerce; commercial organizations; data confidentiality; data integrity; ease of use; government; information systems security; information warfare attacks; internetworked computer resources; military; safety; Availability; Control systems; Data security; Information security; Information systems; Internet; Military computing; Power system protection; Power system security; Safety;