Skip to main content

Currently Skimming:

5 Category 2 - Enabling Accountability
Pages 113-123

The Chapter Skim interface presents what we've algorithmically identified as the most significant single chunk of text within every page in the chapter.
Select key terms on the right to highlight them within pages of the chapter.


From page 113...
... In this broad category are matters such as remote authentication, access control and policy management, auditing and traceability, maintenance of provenance, secure associations between system components, and so on. 5.1 ATTRIBUTION Computer operations are inherently anonymous, a fact that presents many problems in cybersecurity.
From page 114...
... But such attributes are by far the exception. Individuals may have the same name; the Media Access Control (MAC)
From page 115...
...  CATeGoRy  -- enABLInG ACCounTABILITy be attributed to a valid counterparty, but the tax implications might be attributed to a tax lawyer. For instance, one could research the possibility of having different attributions associated with the vari ous results of network service invocations.
From page 116...
...  TowARd A SAFeR And moRe SeCuRe CyBeRSPACe compromised or duped user. As the existence of botnets illustrates, a cyberattacker has many incentives to compromise others into doing his or her dirty work.
From page 117...
...  CATeGoRy  -- enABLInG ACCounTABILITy ficult to separate fact from fiction. For example, a picture with provenance indicating that there has been no modification beyond its initial imaging and also its association with the new york Times newsroom might well be more trustworthy than a picture that has been postprocessed and associated with a tabloid.
From page 118...
... , and improves the ability to audit systems performing certain critical functions (Provision VII)
From page 119...
...  CATeGoRy  -- enABLInG ACCounTABILITy trying to modify key operating system or configuration files) ; and • etwork-based mAd systems.
From page 120...
... Despite more than two decades of research in this area, significant problems remain concerning the interpretation of the audit and network packet data, in particular, involving the early recognition of patterns of multiple simultaneous attacks or outages, identifying the sources and identities of attackers, and discerning the intent of the attacks. 5 Privacy problems must also be addressed, because the audit and network packet data can contain sensitive information.6 Progress in MAD system research supports Provision I, Provision III, Provision Ix, and Provision x of the Cybersecurity Bill of Rights.
From page 121...
... trusted computing: how to build a computing environment in which the user is not trusted to control certain aspects of its configuration and operation but rather a programmer is trusted to do this. Recent hardware extensions, such as the Trusted Platform Module (TPM)
From page 122...
...  TowARd A SAFeR And moRe SeCuRe CyBeRSPACe they have lost control over their computers and the desire of content providers to enforce their content-usage contracts. Moreover, DRM schemes may enforce the rights of content owners at the expense of eroding the rights of content users.
From page 123...
...  CATeGoRy  -- enABLInG ACCounTABILITy Although the most common use today of DRM is the protection of copyrighted works that are sold for profit, the philosophy underlying DRM -- that content providers should have the ability to exercise finegrained control over how their content is used -- can be used to support individuals in protecting their own documents and other intellectual property in precisely the same ways. For example, A may wish to send a sensitive e-mail to B, but also to insist that B not print it or forward it to anyone else.


This material may be derived from roughly machine-read images, and so is provided only to facilitate research.
More information on Chapter Skim is available.