Securing the Flow - Data Flow Analysis with Operational Node Structures

Michael Meinig, Christoph Meinel

Abstract

After land, sea, air and space, cyberspace has become the fifth domain of warfare. Organizations recognize the need for protecting confidential, secret - classified – information. Competitors and adversaries turn to illegal methods to obtain classified information. They try to gain a competitive advantage or close a technological gap as well as reduce dependencies on others. Classified information involves facts, subject matters or knowledge needing to be kept secret, regardless of the way in which the information is depicted. In networks with different security classifications a direct physical connection is not allowed. Consequently the possibility of coupling different security domains in affected organizations must be checked comprehensively under security aspects. In this paper we present a new security approach that helps to identify threats at transitions and security zones on valid data flow paths. It can be used to display security challenges within organizations using classified information such as governmental or military organizations. The methodology also incorporates new attributes for data flows in connected systems or processes.

References

Download


Paper Citation


in Harvard Style

Meinig M. and Meinel C. (2018). Securing the Flow - Data Flow Analysis with Operational Node Structures.In Proceedings of the 4th International Conference on Information Systems Security and Privacy - Volume 1: ICISSP, ISBN 978-989-758-282-0, pages 241-250. DOI: 10.5220/0006570302410250


in Bibtex Style

@conference{icissp18,
author={Michael Meinig and Christoph Meinel},
title={Securing the Flow - Data Flow Analysis with Operational Node Structures},
booktitle={Proceedings of the 4th International Conference on Information Systems Security and Privacy - Volume 1: ICISSP,},
year={2018},
pages={241-250},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0006570302410250},
isbn={978-989-758-282-0},
}


in EndNote Style

TY - CONF

JO - Proceedings of the 4th International Conference on Information Systems Security and Privacy - Volume 1: ICISSP,
TI - Securing the Flow - Data Flow Analysis with Operational Node Structures
SN - 978-989-758-282-0
AU - Meinig M.
AU - Meinel C.
PY - 2018
SP - 241
EP - 250
DO - 10.5220/0006570302410250