The Community for Technology Leaders
Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008) (2008)
Waikoloa, Big Island, Hawaii
Jan. 7, 2008 to Jan. 10, 2008
ISSN: 1530-1605
ISBN: 0-7695-3075-3
pp: 265
ABSTRACT
Architecting security solutions for today's diverse computer systems is a challenge. The modern business environment is comprised of many different applications, e-mail, databases, e-commerce, and more. Each of these has its own threat profile and associated business risk. The complexity of the computing environment extends to the design of security solutions. Current methodologies for designing security systems include piecemeal designs and patchwork systems comprised of multiple point solutions. As the complexity of the business driven systems increase, these methods are being strained to keep up with security requirements. Systems science provides information on how complex systems interact with their environment, and this guidance can be applied to designing security architectures. Analysis and design of security systems using systems theory provides a new path to reduce the complexity.
INDEX TERMS
CITATION

G. Dietrich and W. A. Conklin, "Systems Theory Model for Information Security," Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008)(HICSS), Waikoloa, Big Island, Hawaii, 2008, pp. 265.
doi:10.1109/HICSS.2008.421
80 ms
(Ver 3.3 (11022016))