Intelligent strategies for secure complex systems integration and design, effective risk management and privacy

E. Hooper
{"title":"Intelligent strategies for secure complex systems integration and design, effective risk management and privacy","authors":"E. Hooper","doi":"10.1109/SYSTEMS.2009.4815808","DOIUrl":null,"url":null,"abstract":"There has been increasing challenges in the effective design of engineering complex integrated systems and Systems-of-systems in engineering and network systems. This is largely due to the integration of complex large data transfers across multiple zones of systems and network integration. The increase in transmission of highly sensitive data and challenges of data protection and of privacy, data loss prevention has major significant implications for systems engineering, systems integration, and systems analysis, design and validation. Furthermore, the design and development of complex integrated systems engineering and network systems lack effective transparency, auditability, validation and implementation of adequate security measures for transfers of highly sensitive metadata across global networks using third party and outsourced networks and the Internet and global privacy regulatory requirements for such data transfer across international borders. The major problem with current state of art approaches of controls for global critical infrastructures of Virtual Private Networks (VPN) depend on inadequate third-party systems. Thus current approaches lack transparency, auditability and validation of the implementation of adequate privacy and security controls for data transfers of highly sensitive metadata across global networks. The additional problem of obscurity has resulted in increasing concealing of unauthorized access, identity thefts, privacy and security breaches of highly sensitive data, interception through the man-in-the-middle and intermediary systems. The paper examines the effectiveness, resiliency, robustness, scalability and adaptability in the design, safety, security and usability of engineering complex integrated systems and network systems for complex large data transfers across multiple zones of systems and network integration and security.","PeriodicalId":131616,"journal":{"name":"2009 3rd Annual IEEE Systems Conference","volume":"139 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 3rd Annual IEEE Systems Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SYSTEMS.2009.4815808","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

Abstract

There has been increasing challenges in the effective design of engineering complex integrated systems and Systems-of-systems in engineering and network systems. This is largely due to the integration of complex large data transfers across multiple zones of systems and network integration. The increase in transmission of highly sensitive data and challenges of data protection and of privacy, data loss prevention has major significant implications for systems engineering, systems integration, and systems analysis, design and validation. Furthermore, the design and development of complex integrated systems engineering and network systems lack effective transparency, auditability, validation and implementation of adequate security measures for transfers of highly sensitive metadata across global networks using third party and outsourced networks and the Internet and global privacy regulatory requirements for such data transfer across international borders. The major problem with current state of art approaches of controls for global critical infrastructures of Virtual Private Networks (VPN) depend on inadequate third-party systems. Thus current approaches lack transparency, auditability and validation of the implementation of adequate privacy and security controls for data transfers of highly sensitive metadata across global networks. The additional problem of obscurity has resulted in increasing concealing of unauthorized access, identity thefts, privacy and security breaches of highly sensitive data, interception through the man-in-the-middle and intermediary systems. The paper examines the effectiveness, resiliency, robustness, scalability and adaptability in the design, safety, security and usability of engineering complex integrated systems and network systems for complex large data transfers across multiple zones of systems and network integration and security.
安全复杂系统集成和设计的智能策略,有效的风险管理和隐私
在工程和网络系统中,如何有效地设计复杂的工程集成系统和系统的系统已经成为越来越多的挑战。这主要是由于跨多个系统区域和网络集成的复杂大数据传输的集成。高敏感数据传输的增加以及数据保护和隐私的挑战,数据丢失预防对系统工程,系统集成和系统分析,设计和验证具有重大意义。此外,复杂的集成系统工程和网络系统的设计和开发缺乏有效的透明度、可审计性、验证和实施适当的安全措施,用于使用第三方和外包网络和互联网在全球网络上传输高度敏感的元数据,以及对此类数据跨境传输的全球隐私监管要求。当前虚拟专用网(VPN)全球关键基础设施控制方法的主要问题依赖于不充分的第三方系统。因此,目前的方法缺乏透明度、可审计性和有效性,无法对高度敏感的元数据在全球网络上的数据传输实施适当的隐私和安全控制。另一个问题是模糊,这导致了越来越多的未经授权访问的隐藏、身份盗窃、高度敏感数据的隐私和安全漏洞,以及通过中间人和中介系统进行拦截。本文研究了工程复杂集成系统和网络系统在设计、安全、保障和可用性方面的有效性、弹性、鲁棒性、可扩展性和适应性,用于跨多个系统和网络集成与安全区域的复杂大数据传输。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信