{"title":"Assessing the sovereignty and security of the Austrian internet","authors":"Florian Plainer, Klaus Kieseberg, Peter Kieseberg","doi":"10.1109/ICSSA51305.2020.00011","DOIUrl":null,"url":null,"abstract":"With many people depending on the internet in their daily work lives, the question on dependencies of these services arises. This is especially true when considering services provided by critical (IT) infrastructure or linked to governmental bodies. In this work, we provide a methodology and subsequent analysis results regarding the security and nature of dependencies of important Austrian sites on other nations and (potentially vulnerable) resources. Furthermore, we added a specific sub set to the analysis, focusing on governmental sites due to their increasing importance. The results of this analysis helps with the identification of critical resources outside the original services scope, especially considering the inclusion of services from outside the European Union and/or from unknown/unofficial sites. Furthermore, we also analyse the usage of security headers and the adoption of HTTPS, allowing an estimation of the state of security of vital services.","PeriodicalId":346706,"journal":{"name":"2020 International Conference on Software Security and Assurance (ICSSA)","volume":"134 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 International Conference on Software Security and Assurance (ICSSA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICSSA51305.2020.00011","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
With many people depending on the internet in their daily work lives, the question on dependencies of these services arises. This is especially true when considering services provided by critical (IT) infrastructure or linked to governmental bodies. In this work, we provide a methodology and subsequent analysis results regarding the security and nature of dependencies of important Austrian sites on other nations and (potentially vulnerable) resources. Furthermore, we added a specific sub set to the analysis, focusing on governmental sites due to their increasing importance. The results of this analysis helps with the identification of critical resources outside the original services scope, especially considering the inclusion of services from outside the European Union and/or from unknown/unofficial sites. Furthermore, we also analyse the usage of security headers and the adoption of HTTPS, allowing an estimation of the state of security of vital services.