Degradation and subversion through subsystem attacks

D Bilar - IEEE Security & Privacy, 2010 - ieeexplore.ieee.org
IEEE Security & Privacy, 2010ieeexplore.ieee.org
Attacks targeting something or someone indirectly-nth order attacks against end systems--
have occurred on a large scale in real life. It goes to the heart of how conflicts between open
societies and their enemies are waged: trust subsystems. Trust helps lower tangible and
intangible transaction costs between individuals, corporations, and the state. Members of"
high-trust" societies like the United States leverage trust beyond family ties to form efficient
civic and economic organizations. Because trust permeates every facet of open societies, it's …
Attacks targeting something or someone indirectly-nth order attacks against end systems--have occurred on a large scale in real life. It goes to the heart of how conflicts between open societies and their enemies are waged: trust subsystems. Trust helps lower tangible and intangible transaction costs between individuals, corporations, and the state. Members of "high-trust" societies like the United States leverage trust beyond family ties to form efficient civic and economic organizations. Because trust permeates every facet of open societies, it's a very easy assumption for malicious actors to violate.
ieeexplore.ieee.org
以上显示的是最相近的搜索结果。 查看全部搜索结果