Invisible Security: Protecting Users with No Time to Spare

J. Dykstra
{"title":"Invisible Security: Protecting Users with No Time to Spare","authors":"J. Dykstra","doi":"10.1109/CIC50333.2020.00031","DOIUrl":null,"url":null,"abstract":"For over 50 years, the cybersecurity community has sought to protect vulnerable systems and users from victimization. Despite ongoing and valiant work at adoption and usability, some users cannot or will not avail themselves of necessary cybersecurity measures such as patching. Average, non-expert users-particularly those in small businesses-cannot afford to devote time to cybersecurity. Instead of accepting the risk of no security, alternatives are possible which achieve both security outcomes and conservation of time. We explore the paradigm of invisible security focused on creating cyber defenses that occur automatically without end user intervention. Invisible security is the next evolutionary step to aid users, now that automation is robust and effective in supporting it. Even though some example implementations, such as automatic updates, have existed for years, dedicated focus on this emerging paradigm is required to develop, measure, and deploy new capabilities. We present examples consistent with this approach in existence today, including automatic software updates and protective DNS. We draw insight and comparisons to other domains, including automobile safety. Then we describe how invisible defenses may aid potential beneficiaries in health care, the defense industrial base, and the general public. Finally, we present benefits and limitations of the approach and propose areas of future research and innovation.","PeriodicalId":265435,"journal":{"name":"2020 IEEE 6th International Conference on Collaboration and Internet Computing (CIC)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 IEEE 6th International Conference on Collaboration and Internet Computing (CIC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CIC50333.2020.00031","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

For over 50 years, the cybersecurity community has sought to protect vulnerable systems and users from victimization. Despite ongoing and valiant work at adoption and usability, some users cannot or will not avail themselves of necessary cybersecurity measures such as patching. Average, non-expert users-particularly those in small businesses-cannot afford to devote time to cybersecurity. Instead of accepting the risk of no security, alternatives are possible which achieve both security outcomes and conservation of time. We explore the paradigm of invisible security focused on creating cyber defenses that occur automatically without end user intervention. Invisible security is the next evolutionary step to aid users, now that automation is robust and effective in supporting it. Even though some example implementations, such as automatic updates, have existed for years, dedicated focus on this emerging paradigm is required to develop, measure, and deploy new capabilities. We present examples consistent with this approach in existence today, including automatic software updates and protective DNS. We draw insight and comparisons to other domains, including automobile safety. Then we describe how invisible defenses may aid potential beneficiaries in health care, the defense industrial base, and the general public. Finally, we present benefits and limitations of the approach and propose areas of future research and innovation.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
无形的安全:保护用户没有多余的时间
50多年来,网络安全社区一直在努力保护脆弱的系统和用户免受伤害。尽管在采用和可用性方面正在进行勇敢的工作,但一些用户不能或不愿利用必要的网络安全措施,如补丁。普通的非专业用户——尤其是小企业的用户——负担不起花时间在网络安全上。与其接受没有安全性的风险,还可以选择既安全又节省时间的替代方案。我们探索了无形安全的范例,重点是创建无需最终用户干预即可自动发生的网络防御。既然自动化在支持无形安全方面是健壮而有效的,那么无形安全将是帮助用户的下一个进化步骤。尽管一些示例实现(例如自动更新)已经存在多年,但是开发、度量和部署新功能仍然需要专门关注这种新兴范例。我们提供了与当前存在的这种方法一致的示例,包括自动软件更新和保护性DNS。我们对包括汽车安全在内的其他领域进行了洞察和比较。然后,我们描述了隐形防御如何帮助医疗保健、国防工业基础和公众的潜在受益者。最后,我们提出了该方法的优点和局限性,并提出了未来研究和创新的领域。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Discovering Localized Information for Heterogeneous Graph Node Representation Learning 2020 IEEE 6th International Conference on Collaboration and Internet Computing CIC 2020 Invisible Security: Protecting Users with No Time to Spare Hcpcs2Vec: Healthcare Procedure Embeddings for Medicare Fraud Prediction The 10 Research Topics in the Internet of Things
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1