Intelligent strategies and techniques for effective cyber security, infrastructure protection and privacy

E. Hooper
{"title":"Intelligent strategies and techniques for effective cyber security, infrastructure protection and privacy","authors":"E. Hooper","doi":"10.1109/ICITST.2009.5402581","DOIUrl":null,"url":null,"abstract":"There has been increasing challenges in the effective design of critical information infrastructures for effective security, privacy and data protection. The increase in transmission of highly sensitive data and challenges of data protection and of privacy, data loss prevention has major significant implications for systems engineering, systems integration, and systems analysis, design and validation. Furthermore, the design and development of complex integrated systems engineering and network systems lack effective transparency, auditability, validation and implementation of adequate security measures for transfers of highly sensitive metadata across global networks using third party and outsourced networks and the Internet and global privacy regulatory requirements for such data transfer across international borders. The major problem with current state of art approaches of controls for global critical infrastructures of Virtual Private Networks (VPN) depend on inadequate third-party systems. Thus current approaches lack transparency, auditability and validation of the implementation of adequate privacy and security controls for data transfers of highly sensitive metadata across global networks. The paper examines the effectivene strategies for effective critical information infrastructures protection, privacy and cyber security for complex large data transfers across multiple network zones.","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICITST.2009.5402581","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4

Abstract

There has been increasing challenges in the effective design of critical information infrastructures for effective security, privacy and data protection. The increase in transmission of highly sensitive data and challenges of data protection and of privacy, data loss prevention has major significant implications for systems engineering, systems integration, and systems analysis, design and validation. Furthermore, the design and development of complex integrated systems engineering and network systems lack effective transparency, auditability, validation and implementation of adequate security measures for transfers of highly sensitive metadata across global networks using third party and outsourced networks and the Internet and global privacy regulatory requirements for such data transfer across international borders. The major problem with current state of art approaches of controls for global critical infrastructures of Virtual Private Networks (VPN) depend on inadequate third-party systems. Thus current approaches lack transparency, auditability and validation of the implementation of adequate privacy and security controls for data transfers of highly sensitive metadata across global networks. The paper examines the effectivene strategies for effective critical information infrastructures protection, privacy and cyber security for complex large data transfers across multiple network zones.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
有效的网络安全、基础设施保护和隐私的智能策略和技术
在有效设计关键信息基础设施以实现有效的安全、隐私和数据保护方面,面临着越来越多的挑战。高敏感数据传输的增加以及数据保护和隐私的挑战,数据丢失预防对系统工程,系统集成和系统分析,设计和验证具有重大意义。此外,复杂的集成系统工程和网络系统的设计和开发缺乏有效的透明度、可审计性、验证和实施适当的安全措施,用于使用第三方和外包网络和互联网在全球网络上传输高度敏感的元数据,以及对此类数据跨境传输的全球隐私监管要求。当前虚拟专用网(VPN)全球关键基础设施控制方法的主要问题依赖于不充分的第三方系统。因此,目前的方法缺乏透明度、可审计性和有效性,无法对高度敏感的元数据在全球网络上的数据传输实施适当的隐私和安全控制。本文研究了跨多个网络区域的复杂大数据传输的有效关键信息基础设施保护、隐私和网络安全的有效策略。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Usability driven website design — An equine sports case study Grasping contextual awareness inside aworkspace at the entrance to support group interaction Towards security goals in summative e-assessment security Cloud Computing: The impact on digital forensic investigations Evaluation of question classification systems using differing features
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1