DocumentCode :
2235506
Title :
Secure State Processing
Author :
Price, Sean M.
fYear :
2006
fDate :
21-23 June 2006
Firstpage :
380
Lastpage :
381
Abstract :
The information assurance (IA) model, an extension of the McCumber information security model, specifies security services for information when it is at rest, in transit, or being processed. According to the IA model, the processing information state is protected by technology, operations, and people security countermeasures. However, what has not been considered is the power wielded by an ordinary user over the processes in their environment. The authors consider people to be the principle countermeasure in the model. Unfortunately, this becomes problematic when users introduce unknown or unauthorized processes into a system which may affect information and the security services of the system. Indeed, such processes run with the rights and privileges of the user. The intentional or accidental execution of unauthorized applications epitomizes the insider threat. Therefore, system and data security is at the mercy of executing processes and the hands of the authorized user. Another way to represent this situation is to say that unknown and unauthorized processes, whether or not under the control of the user, change the secure state processing (SSP) of a system
Keywords :
authorisation; data security; information assurance model; people security countermeasures; secure state processing; security services; Authentication; Automatic control; Control systems; Data security; Information security; Libraries; Operating systems; Power system modeling; Power system security; Protection;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Information Assurance Workshop, 2006 IEEE
Conference_Location :
West Point, NY
Print_ISBN :
1-4244-0130-5
Type :
conf
DOI :
10.1109/IAW.2006.1652121
Filename :
1652121
Link To Document :
بازگشت