{"title":"System Integrity – A Cautionary Tale","authors":"Hema Karnam Surendrababu","doi":"10.1109/PAINE56030.2022.10014826","DOIUrl":null,"url":null,"abstract":"One of the vital security requirements in information systems is integrity of information that is processed. Current security practices place more emphasis on protection of data with less focus on protection of the system processing that data, with inadequate security requirements specification throughout the system development life cycle. The consequence of this practice is a potential system dysfunction or degraded performance thus compromising system integrity. This paper explores the current practices for providing system integrity protection and the limitations thereof which can potentially undermine system integrity.","PeriodicalId":308953,"journal":{"name":"2022 IEEE Physical Assurance and Inspection of Electronics (PAINE)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 IEEE Physical Assurance and Inspection of Electronics (PAINE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/PAINE56030.2022.10014826","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
One of the vital security requirements in information systems is integrity of information that is processed. Current security practices place more emphasis on protection of data with less focus on protection of the system processing that data, with inadequate security requirements specification throughout the system development life cycle. The consequence of this practice is a potential system dysfunction or degraded performance thus compromising system integrity. This paper explores the current practices for providing system integrity protection and the limitations thereof which can potentially undermine system integrity.