2020
DOI: 10.1007/s11277-020-07310-5
|View full text |Cite
|
Sign up to set email alerts
|

A Philosophy of Security Architecture Design

Abstract: Digital systems are almost always vulnerable, yet we increasingly depend on these systems. There will be many threats towards these system. In a fully networked system, the vulnerabilities will literally be exposed to the whole world. The exposed vulnerabilities may be transformed into attacks. To counter this state of "vulnerability", the standard remedy is to conduct security requirements analysis and security threat modeling. Threats are assessed, and various countermeasures are devised. The totality of the… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 14 publications
0
4
0
Order By: Relevance
“…In this paper, we consider how to avoid system downtime due to natural incidents caused by vulnerabilities. Two earlier papers [5,23] discuss how to prevent downtime due to attackers that intentionally exploit vulnerabilities.…”
Section: Vulnerabilities and Failuresmentioning
confidence: 99%
See 2 more Smart Citations
“…In this paper, we consider how to avoid system downtime due to natural incidents caused by vulnerabilities. Two earlier papers [5,23] discuss how to prevent downtime due to attackers that intentionally exploit vulnerabilities.…”
Section: Vulnerabilities and Failuresmentioning
confidence: 99%
“…Many published principles [2,5,7,11,51,52] provide foundations for various aspects of antifragility (see [5,7,11] for examples). Although this paper's author has only discussed principles for antifragility to downtime, the presented principles are valid for other types of antifragility, including antifragility to malware attacks [2].…”
Section: More Principles?mentioning
confidence: 99%
See 1 more Smart Citation
“…It involves a structured analysis of a system's components, data flows, and potential attack vectors to evaluate the likelihood and impact of different security risks. By understanding potential threats early in the development process, organizations can implement robust security measures to safeguard their assets and sensitive information [1].…”
Section: Introductionmentioning
confidence: 99%