• Keine Ergebnisse gefunden

Key ideas for technical security enforcement mechanisms

N/A
N/A
Protected

Academic year: 2022

Aktie "Key ideas for technical security enforcement mechanisms"

Copied!
1
0
0

Wird geladen.... (Jetzt Volltext ansehen)

Volltext

(1)

Sicherheit:

Fragen und Lösungsansätze

redundancy enables one

to infer needed information,

to detect failures and attacks and

to recover from such unfortunate events

isolation

prevents unwanted information flows or interference

indistinguishability

makes maliciously planned observations appear random or uniformly expected and thus useless

©2009 Springer-Verlag Berlin Heidelberg / ©2010 Joachim Biskup TU Dortmund / Jan Jürjens : Security in Computing Systems

Key Ideas and Combined Techniques 1

Key ideas for technical security

enforcement mechanisms

Referenzen

ÄHNLICHE DOKUMENTE

On the one hand, threat and event prioritization approaches are rather static with fixed calculation rules, whereas rule learning in alert verification focuses mostly on a

It also offers a path forward through recommendations for individual states and for the international community to keep the materials needed to build a nuclear bomb out of

The large quantities of separated nuclear material located in sites spread across the United States and activities related to stockpile stewardship presents

©2009 Springer-Verlag Berlin Heidelberg / ©2010 Joachim Biskup TU Dortmund / Jan Jürjens : Security in Computing Systems.. Interests, Requirements, Challenges, and Vulnerabilities

©2009 Springer-Verlag Berlin Heidelberg / ©2010 Joachim Biskup TU Dortmund / Jan Jürjens : Security in Computing Systems.. Fundamentals of Control and Monitoring

©2009 Springer-Verlag Berlin Heidelberg / ©2010 Joachim Biskup TU Dortmund / Jan Jürjens : Security in Computing

©2009 Springer-Verlag Berlin Heidelberg / ©2010 Joachim Biskup TU Dortmund / Jan Jürjens : Security in Computing

©2009 Springer-Verlag Berlin Heidelberg / ©2010 Joachim Biskup TU Dortmund / Jan Jürjens : Security in Computing Systems Interests, Requirements, Challenges, and Vulnerabilities