System Integrity – A Cautionary Tale

Hema Karnam Surendrababu
{"title":"System Integrity – A Cautionary Tale","authors":"Hema Karnam Surendrababu","doi":"10.1109/PAINE56030.2022.10014826","DOIUrl":null,"url":null,"abstract":"One of the vital security requirements in information systems is integrity of information that is processed. Current security practices place more emphasis on protection of data with less focus on protection of the system processing that data, with inadequate security requirements specification throughout the system development life cycle. The consequence of this practice is a potential system dysfunction or degraded performance thus compromising system integrity. This paper explores the current practices for providing system integrity protection and the limitations thereof which can potentially undermine system integrity.","PeriodicalId":308953,"journal":{"name":"2022 IEEE Physical Assurance and Inspection of Electronics (PAINE)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 IEEE Physical Assurance and Inspection of Electronics (PAINE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/PAINE56030.2022.10014826","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

One of the vital security requirements in information systems is integrity of information that is processed. Current security practices place more emphasis on protection of data with less focus on protection of the system processing that data, with inadequate security requirements specification throughout the system development life cycle. The consequence of this practice is a potential system dysfunction or degraded performance thus compromising system integrity. This paper explores the current practices for providing system integrity protection and the limitations thereof which can potentially undermine system integrity.
系统完整性——一个警世故事
信息系统中重要的安全需求之一是所处理信息的完整性。当前的安全实践更多地强调对数据的保护,而较少关注对处理该数据的系统的保护,在整个系统开发生命周期中缺乏足够的安全需求规范。这种做法的后果是潜在的系统功能障碍或性能下降,从而损害系统完整性。本文探讨了目前提供系统完整性保护的实践及其可能破坏系统完整性的局限性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信