Intelligent strategies and techniques for effective cyber security, infrastructure protection and privacy

E. Hooper
{"title":"Intelligent strategies and techniques for effective cyber security, infrastructure protection and privacy","authors":"E. Hooper","doi":"10.1109/ICITST.2009.5402581","DOIUrl":null,"url":null,"abstract":"There has been increasing challenges in the effective design of critical information infrastructures for effective security, privacy and data protection. The increase in transmission of highly sensitive data and challenges of data protection and of privacy, data loss prevention has major significant implications for systems engineering, systems integration, and systems analysis, design and validation. Furthermore, the design and development of complex integrated systems engineering and network systems lack effective transparency, auditability, validation and implementation of adequate security measures for transfers of highly sensitive metadata across global networks using third party and outsourced networks and the Internet and global privacy regulatory requirements for such data transfer across international borders. The major problem with current state of art approaches of controls for global critical infrastructures of Virtual Private Networks (VPN) depend on inadequate third-party systems. Thus current approaches lack transparency, auditability and validation of the implementation of adequate privacy and security controls for data transfers of highly sensitive metadata across global networks. The paper examines the effectivene strategies for effective critical information infrastructures protection, privacy and cyber security for complex large data transfers across multiple network zones.","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICITST.2009.5402581","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4

Abstract

There has been increasing challenges in the effective design of critical information infrastructures for effective security, privacy and data protection. The increase in transmission of highly sensitive data and challenges of data protection and of privacy, data loss prevention has major significant implications for systems engineering, systems integration, and systems analysis, design and validation. Furthermore, the design and development of complex integrated systems engineering and network systems lack effective transparency, auditability, validation and implementation of adequate security measures for transfers of highly sensitive metadata across global networks using third party and outsourced networks and the Internet and global privacy regulatory requirements for such data transfer across international borders. The major problem with current state of art approaches of controls for global critical infrastructures of Virtual Private Networks (VPN) depend on inadequate third-party systems. Thus current approaches lack transparency, auditability and validation of the implementation of adequate privacy and security controls for data transfers of highly sensitive metadata across global networks. The paper examines the effectivene strategies for effective critical information infrastructures protection, privacy and cyber security for complex large data transfers across multiple network zones.
有效的网络安全、基础设施保护和隐私的智能策略和技术
在有效设计关键信息基础设施以实现有效的安全、隐私和数据保护方面,面临着越来越多的挑战。高敏感数据传输的增加以及数据保护和隐私的挑战,数据丢失预防对系统工程,系统集成和系统分析,设计和验证具有重大意义。此外,复杂的集成系统工程和网络系统的设计和开发缺乏有效的透明度、可审计性、验证和实施适当的安全措施,用于使用第三方和外包网络和互联网在全球网络上传输高度敏感的元数据,以及对此类数据跨境传输的全球隐私监管要求。当前虚拟专用网(VPN)全球关键基础设施控制方法的主要问题依赖于不充分的第三方系统。因此,目前的方法缺乏透明度、可审计性和有效性,无法对高度敏感的元数据在全球网络上的数据传输实施适当的隐私和安全控制。本文研究了跨多个网络区域的复杂大数据传输的有效关键信息基础设施保护、隐私和网络安全的有效策略。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信