Myths and Misconceptions in Additive Manufacturing Security: Deficiencies of the CIA Triad

M. Yampolskiy, J. Gatlin, M. Yung
{"title":"Myths and Misconceptions in Additive Manufacturing Security: Deficiencies of the CIA Triad","authors":"M. Yampolskiy, J. Gatlin, M. Yung","doi":"10.1145/3462223.3485618","DOIUrl":null,"url":null,"abstract":"It is natural, as the demand for Additive Manufacturing (AM) Security grows, to adopt established approaches from other security research areas. However, such \"imports,'' if not done carefully, can be misleading, and sometimes even counterproductive, and thus may negatively affect actual security of AM. We argue that this is the case for the CIA triad (Confidentiality, Integrity, Availability), a fundamental model of data security. To this end, we present arguments showing that the CIA triad cannot substitute concrete threat categories already established in AM. AM is an area which is not \"pure data,\" but rather an area involving software, data files, and transforming data into physical artifacts, where established threats in this ecosystem include: Technical Data Theft, Sabotage, and Illegal Part Manufacturing.","PeriodicalId":113006,"journal":{"name":"Proceedings of the 2021 Workshop on Additive Manufacturing (3D Printing) Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 2021 Workshop on Additive Manufacturing (3D Printing) Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3462223.3485618","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5

Abstract

It is natural, as the demand for Additive Manufacturing (AM) Security grows, to adopt established approaches from other security research areas. However, such "imports,'' if not done carefully, can be misleading, and sometimes even counterproductive, and thus may negatively affect actual security of AM. We argue that this is the case for the CIA triad (Confidentiality, Integrity, Availability), a fundamental model of data security. To this end, we present arguments showing that the CIA triad cannot substitute concrete threat categories already established in AM. AM is an area which is not "pure data," but rather an area involving software, data files, and transforming data into physical artifacts, where established threats in this ecosystem include: Technical Data Theft, Sabotage, and Illegal Part Manufacturing.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
增材制造安全中的神话和误解:CIA三位一体的缺陷
随着对增材制造(AM)安全需求的增长,采用其他安全研究领域的既定方法是很自然的。然而,这种“导入”如果不小心进行,可能会产生误导,有时甚至会适得其反,从而可能对AM的实际安全性产生负面影响。我们认为这是CIA三位一体(保密性、完整性、可用性)的情况,这是数据安全的基本模型。为此,我们提出的论点表明,中央情报局的三位一体不能取代已经在AM中建立的具体威胁类别。增材制造不是一个“纯数据”的领域,而是一个涉及软件、数据文件和将数据转换为物理工件的领域,在这个生态系统中,已经建立的威胁包括:技术数据盗窃、破坏和非法零件制造。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Defining and Addressing the Cybersecurity Challenges of Additive Manufacturing Platforms Cybersecurity Requirements for AM Systems: New Enforcement in DoD Environments, and Resources for Implementation Information Embedding in Additive Manufacturing through Printing Speed Control Session details: Session 1: Research Community Perspective on AM Security Session details: Keynote Talk
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1