Abstract
Cyber security professionals are publicly acknowledging [1, 2], that the traditional approaches to securing information fail because the threat environment has become impossibly complex. This chapter on a fundamentally new approach to securing information that can radically simplify cyber security.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
D. Barrett, “U.S. Outgunned in Hacker War”, Wall Street Journal, March 28, 2012.
ThreatPost, Kapersky Labs: Experts Tell Senate: Government Networks Owned, Resistance Is Futile, March 21, 2012
Axel Buecker, Per Andreas and Scott Paisley, “Understanding IT Perimeter Security,” IBM Corporation, 2008.
Marcia Savage, “Perimeter Defenses Deemed Ineffective Against Modern Security Threats,” Information Security, June 30, 2010.
Simson Garfinkel, “The Deperimeter Problem,” CSO Online, November 1, 2005.
Anh Nguyen, “Infosec: Cloud Computing ‘Explodes’ the Security Perimeter,” CSO Online, April 25, 2011.
“Top Cause of Data Breaches? Negligent Insiders,” Help Net Security, Ponemon Institute, March 22, 2012.
L. Brillouin, Science and information theory: Dover, 2004.
Crowder, J. A., Carbone, J. N., “The Great Migration: Information to Knowledge using Cognition-Based Frameworks.” Springer Science, New York (2011).
T. Gruber, “Collective knowledge systems: Where the social web meets the semantic web,” Web Semantics: Science, Services and Agents on the World Wide Web, vol. 6, pp. 4–13, 2008.
Adam Cummings and Ron Bendes “Information Security in Application Development Projects,” cmu95752, Carnegie Mellon University, March 7, 2012
“Risk Across the Phases of Application Security,” Help Net Security, Ponemon Institute, March 21, 2012.
A. Metke, “Security technology for smart grid networks” IEEE Transactions on Smart Grid, 2010.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer Science+Business Media New York
About this paper
Cite this paper
Kruger, D., Carbone, J.N. (2014). Radically Simplifying Cyber Security. In: Suh, S., Tanik, U., Carbone, J., Eroglu, A. (eds) Applied Cyber-Physical Systems. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-7336-7_5
Download citation
DOI: https://doi.org/10.1007/978-1-4614-7336-7_5
Published:
Publisher Name: Springer, New York, NY
Print ISBN: 978-1-4614-7335-0
Online ISBN: 978-1-4614-7336-7
eBook Packages: Computer ScienceComputer Science (R0)