Economics Dictionary of Arguments

Home Screenshot Tabelle Begriffe

 
Internet security: Internet security refers to the practice of protecting computer networks, devices, programs, and data from unauthorized access, theft, damage, or any other threats. It encompasses antivirus software, firewalls, and encryption. See also Internet, Networks, Data, Software.
_____________
Annotation: The above characterizations of concepts are neither definitions nor exhausting presentations of problems related to them. Instead, they are intended to give a short introduction to the contributions below. – Lexicon of Arguments.

 
Author Concept Summary/Quotes Sources

Jonathan Zittrain on Internet Security - Dictionary of Arguments

I 155
Internet Security/network safety/Zittrain: In an effort to satisfy the desire for safety without full lockdown, PCs could be designed to pretend to be more than one machine, capable of cycling from one split personality to the next. In its simplest implementation, we could divide a PC into two virtual machines: “Red” and “Green.” (1) The Green PC would house reliable software and important data—a stable, mature OS platform and tax returns, term papers, and business documents. The Red PC would have everything else. In this setup, nothing that happens on one PC could easily affect the other, and the Red PC could have a simple reset button that sends it back to a predetermined safe state. Someone could confidently store important data on the Green PC and still use the Red PC for experimentation. Knowing which virtual PC to use would be akin to knowing when a sport utility vehicle should be placed into four-wheel drive mode instead of two-wheel drive, a decision that mainstream users could learn to make responsibly and knowledgeably. A technology that splits the difference between lockdown and openness means that intermediaries could afford to give their end users more flexibility—which is to say, more opportunity to run others’ code.
I 156
We want our e-mail programs to have access to any document on our hard drive, so that we can attach it to an e-mail (…)requires the ability to cross the boundaries from one application to another, or one virtual PC to another. For similar reasons, we may be hesitant to adopt complex access control and privilege lists to designate what software can and cannot do. (2)
>Spam
, >Internet, >Internet culture >Networks, >Social media, >Social networks.

1. For a sketch of such a machine, see Butler Lampson, Microsoft, Powerpoint on Accountability and Freedom 17—18 (Sept. 26, 2005), http://research.microsoft.com/lampson/slides/accountabilityAndFreedomAbstract.htm.
2. See, e.g., Granma’s Rules of POLA, http://www.skyhunter.com/marcs/granmaRulesPola.html (last visited June 1, 2007) (outlining six rules for desktop security based on the Principle of Least Authority); Sudhakar Govindavajhala & Andrew W Appel, Windows Access Control Demystified 2 (Jan. 31, 2006) (unpublished manuscript under submission), available at http://www.cs.princeton.edu/-sudhakar/papers/winval.pdf (detailing how the “fine-grained and expressive” character of Windows access control makes it difficult to evaluate the consequences of commercial access-control configurations, which leads to misconfigurations and “privilege-escalation vulnerabilities”); Introduction to Capability Based Security, http://www.skyhunter.com/marcs/capabilityIntro/index.html (last visited June 1, 2007).

_____________
Explanation of symbols: Roman numerals indicate the source, arabic numerals indicate the page number. The corresponding books are indicated on the right hand side. ((s)…): Comment by the sender of the contribution. Translations: Dictionary of Arguments
The note [Concept/Author], [Author1]Vs[Author2] or [Author]Vs[term] resp. "problem:"/"solution:", "old:"/"new:" and "thesis:" is an addition from the Dictionary of Arguments. If a German edition is specified, the page numbers refer to this edition.

Zittrain I
Jonathan Zittrain
The Future of the Internet--And How to Stop It New Haven 2009


Send Link
> Counter arguments against Zittrain
> Counter arguments in relation to Internet Security

Authors A   B   C   D   E   F   G   H   I   J   K   L   M   N   O   P   Q   R   S   T   U   V   W   Z  


Concepts A   B   C   D   E   F   G   H   I   J   K   L   M   N   O   P   Q   R   S   T   U   V   W   Z