The IT Law Wiki
Line 11: Line 11:
 
* [[Security functionality]] (i.e., the [[security]]-related features or functions employed within an [[information system]] or the [[infrastructure]] supporting the [[system]]); and
 
* [[Security functionality]] (i.e., the [[security]]-related features or functions employed within an [[information system]] or the [[infrastructure]] supporting the [[system]]); and
 
* [[Security assurance]] (i.e., the grounds for confidence that the [[security functionality]], when employed within an [[information system]] or its supporting [[infrastructure]], is effective in its application).
 
* [[Security assurance]] (i.e., the grounds for confidence that the [[security functionality]], when employed within an [[information system]] or its supporting [[infrastructure]], is effective in its application).
 
[[Spoof]]ed [[website]]s, stolen [[password]]s, and [[compromise]]d [[login]] accounts are all symptoms of an untrustworthy [[computing]] environment. One key step in reducing [[online fraud]] and [[identity theft]] is to increase the level of trust associated with identities in [[cyberspace]].
 
   
 
[[Critical system]]s and their [[operating environment]]s must be trustworthy despite a very wide range of adversities and adversaries. Historically, many [[system]] uses assumed the existence of a [[trustworthy computing]] base that would provide a suitable foundation for such [[computing]]. However, this assumption has not been justified.
 
[[Critical system]]s and their [[operating environment]]s must be trustworthy despite a very wide range of adversities and adversaries. Historically, many [[system]] uses assumed the existence of a [[trustworthy computing]] base that would provide a suitable foundation for such [[computing]]. However, this assumption has not been justified.
  +
  +
[[Scalable]] trustworthiness will be essential for many national- and world-scale [[system]]s, including those supporting [[critical infrastructure]]s. Current methodologies for creating [[high-assurance system]]s do not scale to the size of today’s — let alone tomorrow’s — [[critical system]]s.
  +
 
[[Spoof]]ed [[website]]s, stolen [[password]]s, and [[compromise]]d [[login]] accounts are all symptoms of an untrustworthy [[computing]] environment. One key step in reducing [[online fraud]] and [[identity theft]] is to increase the level of trust associated with identities in [[cyberspace]].
 
[[Category:Security]]
 
[[Category:Security]]
 
[[Category:Evidence]]
 
[[Category:Evidence]]

Revision as of 01:25, 11 August 2010

Evidence

Trustworthiness of documentary evidence or testimony is based primarily on subjective factors, but can include objective measurements such as established reliability.

Computing

Trustworthiness is a multidimensional measure of the extent to which a system is likely to satisfy each of multiple aspects of each stated requirement for some desired combination of system integrity, system availability and survivability, data confidentiality, guaranteed real-time performance, accountability, attribution, usability, and other critical needs.

Trustworthy information systems are systems that are worthy of being trusted to operate within defined levels of risk despite the environmental disruptions, human errors, and purposeful attacks that are expected to occur in the specified environments of operation. Two factors affecting the trustworthiness of an information system include:

Critical systems and their operating environments must be trustworthy despite a very wide range of adversities and adversaries. Historically, many system uses assumed the existence of a trustworthy computing base that would provide a suitable foundation for such computing. However, this assumption has not been justified.

Scalable trustworthiness will be essential for many national- and world-scale systems, including those supporting critical infrastructures. Current methodologies for creating high-assurance systems do not scale to the size of today’s — let alone tomorrow’s — critical systems.

Spoofed websites, stolen passwords, and compromised login accounts are all symptoms of an untrustworthy computing environment. One key step in reducing online fraud and identity theft is to increase the level of trust associated with identities in cyberspace.