FACTOID # 18: Alaska spends more money per capita on elementary and secondary education than any other state.
 
 Home   Encyclopedia   Statistics   States A-Z   Flags   Maps   FAQ   About 
   
 
WHAT'S NEW
 

SEARCH ALL

FACTS & STATISTICS    Advanced view

Search encyclopedia, statistics and forums:

 

 

(* = Graphable)

 

 


Encyclopedia > Trusted systems

In security engineering, a trusted system is a system that you have no choice but to trust. The failure of a trusted system will compromise security. In general, the number of trusted components in a system should be minimized. Security engineering is the field of engineering dealing with the security and integrity of real-world systems. ...


See also: computer security, secure computing, trusted computing. Computer security is a field of computer science concerned with the control of risks related to computer use. ... Computer security is the effort to create a secure computing platform, designed so that agents (users or programs) cannot perform actions that they are not allowed to perform, but can perform the actions that they are allowed to. ... Trusted computing (TC) refers to a family of specifications from the TCPA, which extend the behavior of a personal computer or server to offer particular cryptographic security services. ...


Trusted Systems in Policy Analysis

Trusted systems in the context of national or homeland security, law enforcement, or social control policy are systems in which some conditional prediction about the behavior of people or objects within the system has been determined prior to authorizing access to system resources. [ 1 ] Security measures taken to protect the Houses of Parliament in London, England. ... Military personnel have started to guard transportation facilities such as New York Penn Station as part of homeland security efforts. ... Social control refers to social mechanisms that regulate individual and group behaviour, in terms of greater sanctions and rewards. ... A prediction is a statement or claim that a particular event will occur in the future. ...


For example, trusted systems include the use of "security envelopes" [1] in national security and counterterrorism applications, "trusted computing" initiatives in technical systems security, and the use of credit or identity scoring systems in financial and anti-fraud applications; in general, they include any system in which probabilistic threat or risk analysis is used to assess "trust" for decision-making before authorizing access or to allocate resources against likely threats (including their use in the design of systems constraints to control behavior within the system). Trusted computing (TC) refers to a family of specifications from the TCPA, which extend the behavior of a personal computer or server to offer particular cryptographic security services. ... A credit score is a numerical index which represents an estimate of an individuals financial creditworthiness. ... Risk analysis is a technique to identify and assess factors that may jeopardize the success of a project or achieving a goal. ... A constraint is a limitation of possibilities. ...


The widespread adoption of these authorization-based security strategies (where the default state is DEFAULT=DENY) for counterterrorism, anti-fraud, and other purposes is helping accelerate the ongoing transformation of modern societies from a notional Beccarian model of criminal justice based on accountability for deviant actions after they occur, see Cesare Beccaria, On Crimes and Punishment (1764), to a Foucauldian model based on authorization, preemption, and general social compliance through ubiquitous preventative surveillance and control through system constraints. See Michel Foucault, Discipline and Punish (1975, Alan Sheridan, tr., 1977, 1995). The study of criminal justice traditionally revolves around three main components of the criminal justice system: police, courts, corrections. ... Cesare, Marquis of Beccaria (or the Marchese de Beccaria-Bonesana) (March 11, 1738 - November 28, 1794) was an Italian philosopher and politician. ... Surveillance is close monitoring of behavior. ... A constraint is a limitation of possibilities. ... Michel Foucault Michel Foucault (October 15, 1926 – June 26, 1984) was a French philosopher and held a chair at the Collège de France, a chair to which he gave the title The History of Systems of Thought. His writings have had an enormous impact on other scholarly work: Foucault... Discipline and Punish (subtitled The Birth of the Prison) is a book written by the philosopher Michel Foucault. ...


In this emergent model, "security" is geared not towards policing but to risk management through surveillance, exchange of information, auditing, communication, and classification. These developments have led to general concerns about individual privacy and civil liberty and to a broader philosophical debate about the appropriate forms of social governance methodologies. Generally, Risk Management is the process of measuring, or assessing risk and then developing strategies to manage the risk. ... Surveillance is close monitoring of behavior. ... Basic definition Audit is the examination of records and reports of a company, in order to check that what is provided is relevant and accurate. ... Classification may refer to: Taxonomic classification See also class (philosophy) Statistical classification Security classification Hint: Language use may refer to a taxonomic classification that is used for statistical purposes also as a statistical classification (like International Statistical Classification of Diseases and Related Health Problems). ... Privacy is the ability of an individual or group to stop information about themselves from becoming known to people other than those they choose to give the information to. ... Civil liberties are protections from the power of governments. ... Philosophy (from the Greek words philos and sophia meaning love of wisdom) is understood in different ways historically and by different philosophers. ... Social control refers to social mechanisms that regulate individual and group behaviour, in terms of greater sanctions and rewards. ...


References

  1. The concept of trusted systems described here is discussed in K. A. Taipale, "The Trusted Systems Problem: Security Envelopes, Statistical Threat Analysis, and the Presumption of Innocence," Homeland Security - Trends and Controversies, IEEE Intelligent Systems, Vol. 20 No. 5, pp. 80-83 (Sept./Oct. 2005).

Links

See also, The Trusted Systems Project, a part of the Global Information Society Project (GISP), a joint research project of the World Policy Insitute (WPI) and the Center for Advanced Studies in Sci. & Tech. Policy (CAS).


  Results from FactBites:
 
Trusted Operating Systems (910 words)
Trusted operating systems provide the basic security mechanisms and services that allow a computer system to protect, distinguish, and separate classified data.
The portion of the trusted operating system that grants requesters access to data and records the action is frequently called the reference monitor because it refers to an authorization database to determine if access should be granted.
Trusted operating systems must be used to implement multi-level security systems and to build security guards that allow systems of different security levels to be connected to exchange data.
  More results at FactBites »

 
 

COMMENTARY     


Share your thoughts, questions and commentary here
Your name
Your comments

Want to know more?
Search encyclopedia, statistics and forums:

 


Press Releases |  Feeds | Contact
The Wikipedia article included on this page is licensed under the GFDL.
Images may be subject to relevant owners' copyright.
All other elements are (c) copyright NationMaster.com 2003-5. All Rights Reserved.
Usage implies agreement with terms, 1022, m