skip to main content
10.1145/1066677.1066679acmconferencesArticle/Chapter ViewAbstractPublication PagessacConference Proceedingsconference-collections
Article

The future of systematic information protection

Published:13 March 2005Publication History

ABSTRACT

Information plays a critical role in global economics as well as our security, safety, and quality of life. There is a growing disparity between the value of information and our capability to manage and protect it. Technical and policy research is needed to address this disparity. Fundamentally, we can not answer the following question, "how much security is enough?" We lack the capability to quantify the value of information, particularly information that has been processed and aggregated. We also face many difficulties when attempting to measure information security, characterize threats, understand vulnerabilities, or even formulate and sustain any specific security posture. As a result, we can not measure our risk and therefore can not manage it. Our efforts to address this problem can be divided into two categories, legal/policy and technical. Owners of physical assets, such as cash or gold, have the legal and technical means to augment fortification protections with armed guards and lethal force. From a legal perspective, protection of information is limited to fortification, in part because we lack sufficient attribution. From a technical perspective, we have built complex mountains of computer code on top of hardware architectures that will attempt to execute any arbitrary instructions. These systems cannot be effectively analyzed for vulnerabilities so as to ensure trustworthy and secure operation. Research is needed to address the systematic protection of information including information valuation, security metrics, strong attribution, trustworthy computing, sustainable security processes, and legal devices that will support comprehensive protection and risk management.

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Conferences
    SAC '05: Proceedings of the 2005 ACM symposium on Applied computing
    March 2005
    1814 pages
    ISBN:1581139640
    DOI:10.1145/1066677

    Copyright © 2005 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 13 March 2005

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • Article

    Acceptance Rates

    Overall Acceptance Rate1,650of6,669submissions,25%
  • Article Metrics

    • Downloads (Last 12 months)2
    • Downloads (Last 6 weeks)0

    Other Metrics

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader