{"title":"Intelligent strategies for secure complex systems integration and design, effective risk management and privacy","authors":"E. Hooper","doi":"10.1109/SYSTEMS.2009.4815808","DOIUrl":null,"url":null,"abstract":"There has been increasing challenges in the effective design of engineering complex integrated systems and Systems-of-systems in engineering and network systems. This is largely due to the integration of complex large data transfers across multiple zones of systems and network integration. The increase in transmission of highly sensitive data and challenges of data protection and of privacy, data loss prevention has major significant implications for systems engineering, systems integration, and systems analysis, design and validation. Furthermore, the design and development of complex integrated systems engineering and network systems lack effective transparency, auditability, validation and implementation of adequate security measures for transfers of highly sensitive metadata across global networks using third party and outsourced networks and the Internet and global privacy regulatory requirements for such data transfer across international borders. The major problem with current state of art approaches of controls for global critical infrastructures of Virtual Private Networks (VPN) depend on inadequate third-party systems. Thus current approaches lack transparency, auditability and validation of the implementation of adequate privacy and security controls for data transfers of highly sensitive metadata across global networks. The additional problem of obscurity has resulted in increasing concealing of unauthorized access, identity thefts, privacy and security breaches of highly sensitive data, interception through the man-in-the-middle and intermediary systems. The paper examines the effectiveness, resiliency, robustness, scalability and adaptability in the design, safety, security and usability of engineering complex integrated systems and network systems for complex large data transfers across multiple zones of systems and network integration and security.","PeriodicalId":131616,"journal":{"name":"2009 3rd Annual IEEE Systems Conference","volume":"139 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 3rd Annual IEEE Systems Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SYSTEMS.2009.4815808","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
There has been increasing challenges in the effective design of engineering complex integrated systems and Systems-of-systems in engineering and network systems. This is largely due to the integration of complex large data transfers across multiple zones of systems and network integration. The increase in transmission of highly sensitive data and challenges of data protection and of privacy, data loss prevention has major significant implications for systems engineering, systems integration, and systems analysis, design and validation. Furthermore, the design and development of complex integrated systems engineering and network systems lack effective transparency, auditability, validation and implementation of adequate security measures for transfers of highly sensitive metadata across global networks using third party and outsourced networks and the Internet and global privacy regulatory requirements for such data transfer across international borders. The major problem with current state of art approaches of controls for global critical infrastructures of Virtual Private Networks (VPN) depend on inadequate third-party systems. Thus current approaches lack transparency, auditability and validation of the implementation of adequate privacy and security controls for data transfers of highly sensitive metadata across global networks. The additional problem of obscurity has resulted in increasing concealing of unauthorized access, identity thefts, privacy and security breaches of highly sensitive data, interception through the man-in-the-middle and intermediary systems. The paper examines the effectiveness, resiliency, robustness, scalability and adaptability in the design, safety, security and usability of engineering complex integrated systems and network systems for complex large data transfers across multiple zones of systems and network integration and security.