Surviving information warfare attacks

Citation
S. Jajodia et al., Surviving information warfare attacks, COMPUTER, 32(4), 1999, pp. 57
Citations number
10
Categorie Soggetti
Computer Science & Engineering
Journal title
COMPUTER
ISSN journal
00189162 → ACNP
Volume
32
Issue
4
Year of publication
1999
Database
ISI
SICI code
0018-9162(199904)32:4<57:SIWA>2.0.ZU;2-B
Abstract
The past few years have seen governmental, military, and commercial organiz ations widely adopt Web-based commercial technologies because of their conv enience, ease of use, and ability to take advantage of rapid advances in th e commercial market. With this increasing reliance on internetworked comput er resources comes an increasing vulnerability to information warfare. In t oday's heavily networked environment, safety demands protection from both o bvious and subtle intrusions that can delete or corrupt vital data. Traditi onally, information systems security focuses primarily on prevention: putti ng controls and mechanisms in place that protect confidentiality, integrity , and availability by stepping users from doing bad things. Moreover, most mechanisms are powerless against misbehavior by legitimate users who perfor m functions for which they are authorized: the so-called "insider threat." Many network-based attacks, such as password sniffing and session hijacking , allow an attacker to masquerade as a legitimate user. Although, ultimately, preventing malicious attacks from succeeding is key, not all attacks can be averted at the outset. The goal therefore should be to develop an adaptable system that maintains maximum availability even whe n under attack: At any time, healthy components of the system remain availa ble while damaged components have either limited or no availability.