Abstract
Today’s information assurance (IA) is no longer about keeping people out. It’s about letting people in — the right people, securely, to the right place. In modern military and commercial systems, partners, suppliers, and customers are all constantly accessing the infrastructure through the network. Once there, each needs to be taken directly to the appropriate data and resources. Secure and efficient access control in this context lays the foundation of next-generation business paradigm shift. Such new paradigms create new revenues and increase operation efficiency. Those who fail to make the transition are bound to face daunting challenges in competition. IA is a business enabler. It is vital piece that allows the paradigm shift to take place. This is the new but realistic way to look at security. This paper examines a broad range of critical issues in today’s closely knitted environment and discusses potential architectural and technological directions from the perspective of large and distributed infrastructures. To fully illustrate the significant issues, this paper also uses a major cyber crime case that went through the US Federal Court in 2001 for analysis purpose.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Huang, MY. (2005). Critical Information Assurance Challenges for Modern Large-Scale Infrastructures. In: Gorodetsky, V., Kotenko, I., Skormin, V. (eds) Computer Network Security. MMM-ACNS 2005. Lecture Notes in Computer Science, vol 3685. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11560326_2
Download citation
DOI: https://doi.org/10.1007/11560326_2
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-29113-8
Online ISBN: 978-3-540-31998-6
eBook Packages: Computer ScienceComputer Science (R0)