An Improved Testbed for Highly-Scalable Mission-Critical Information Systems

2007 ◽  
Author(s):  
Robbert Van Renesse
2016 ◽  
Vol E99.B (4) ◽  
pp. 803-811 ◽  
Author(s):  
Carlos PEREZ-LEGUIZAMO ◽  
P. Josue HERNANDEZ-TORRES ◽  
J.S. Guadalupe GODINEZ-BORJA ◽  
Victor TAPIA-TEC

Author(s):  
V. Sridhar ◽  
Piyush Jain

This case highlights the challenges faced by organizations in developing countries in getting reliable, high-speed Internet access to support their mission critical web enabled information systems. The case prescribes various measures to optimally use the constrained bandwidth available from service providers. The challenges in defining and monitoring appropriate service level agreements with the service providers are discussed.


2016 ◽  
Vol 6 (2) ◽  
pp. 32-40 ◽  
Author(s):  
Andrew N. Liaropoulos

The cyber security discourse is dominated by states and corporations that focus on the protection of critical information infrastructure and databases. The priority is the security of information systems and networks, rather than the protection of connected users. The dominance of war metaphors in the cyber security debates has produced a security dilemma, which is not sufficiently addressing the needs of people. This article underlines this shortcoming and views cyber security through a human-centric perspective. Freedom of expression and the right to privacy are under attack in the era of cyber surveillance. From a human-centric perspective such rights should be understood as a critical part of cyber security. Human rights protections need to be effectively addressed in the digital sphere and gain their place in the cyber security agendas.


AI Magazine ◽  
2019 ◽  
Vol 40 (1) ◽  
pp. 49-62 ◽  
Author(s):  
Sunny Fugate ◽  
Kimberly Ferguson-Walter

Traditional cyber security techniques have led to an asymmetric disadvantage for defenders. The defender must detect all possible threats at all times from all attackers and defend all systems against all possible exploitation. In contrast, an attacker needs only to find a single path to the defender’s critical information. In this article, we discuss how this asymmetry can be rebalanced using cyber deception to change the attacker’s perception of the network environment, and lead attackers to false beliefs about which systems contain critical information or are critical to a defender’s computing infrastructure. We introduce game theory concepts and models to represent and reason over the use of cyber deception by the defender and the effect it has on attacker perception. Finally, we discuss techniques for combining artificial intelligence algorithms with game theory models to estimate hidden states of the attacker using feedback through payoffs to learn how best to defend the system using cyber deception. It is our opinion that adaptive cyber deception is a necessary component of future information systems and networks. The techniques we present can simultaneously decrease the risks and impacts suffered by defenders and dramatically increase the costs and risks of detection for attackers. Such techniques are likely to play a pivotal role in defending national and international security concerns.


Sign in / Sign up

Export Citation Format

Share Document