{"title":"网络安全策略的设计与制定","authors":"Ning Zhang, Hong Bao","doi":"10.1109/ICFN.2010.91","DOIUrl":null,"url":null,"abstract":"In recent years, The information security has become a thriving and fast moving discipline in modern network society. people have realized that design and formulation of security strategy is very important and security failure is caused at least as often by bad incentives as by bad design. We find that incentives are becoming as important as technical design in achieving dependability. Systems are particularly prone to failure when the person guarding them is not the person who suffers when they fail. The growing use of security mechanisms to enable one system user to exert power over another user, rather than simply to exclude people who should not be users at all, introduces many strategic and policy issues.","PeriodicalId":185491,"journal":{"name":"2010 Second International Conference on Future Networks","volume":"6 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Design and Formulation of Security Strategy in Network\",\"authors\":\"Ning Zhang, Hong Bao\",\"doi\":\"10.1109/ICFN.2010.91\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In recent years, The information security has become a thriving and fast moving discipline in modern network society. people have realized that design and formulation of security strategy is very important and security failure is caused at least as often by bad incentives as by bad design. We find that incentives are becoming as important as technical design in achieving dependability. Systems are particularly prone to failure when the person guarding them is not the person who suffers when they fail. The growing use of security mechanisms to enable one system user to exert power over another user, rather than simply to exclude people who should not be users at all, introduces many strategic and policy issues.\",\"PeriodicalId\":185491,\"journal\":{\"name\":\"2010 Second International Conference on Future Networks\",\"volume\":\"6 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2010-01-22\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2010 Second International Conference on Future Networks\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICFN.2010.91\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 Second International Conference on Future Networks","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICFN.2010.91","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Design and Formulation of Security Strategy in Network
In recent years, The information security has become a thriving and fast moving discipline in modern network society. people have realized that design and formulation of security strategy is very important and security failure is caused at least as often by bad incentives as by bad design. We find that incentives are becoming as important as technical design in achieving dependability. Systems are particularly prone to failure when the person guarding them is not the person who suffers when they fail. The growing use of security mechanisms to enable one system user to exert power over another user, rather than simply to exclude people who should not be users at all, introduces many strategic and policy issues.