11.07.2015 Views

syssec_red_book

syssec_red_book

syssec_red_book

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

25.1. ContextsInternet (e.g., smartphones), but many are not (e.g., wearable computing, orsmart insulin pumps).In some respects, cloud computing and pervasive systems are polar opposites:Cloud computing relies on massive centralization of data and processingpower, whereas pervasive systems rely on a diverse distribution of processingpower.As we are surrounded by ever more devices with embedded electronics,the digital and physical worlds are rapidly converging to form one cyberphysicalreality—in our homes and our workplaces, in semi-public places suchas care homes and hospitals, in public spaces such as the (public) transportsystems, and ultimately at a global level. Pervasive systems have importantimplications for privacy, security and trust and have a profound impact onour social lives. Also, some of the devices, for instance RFID tags, have onlyvery limited capabilities when it comes to information storage, processing andcommunication, so that traditional methods for providing security are notfeasible.Besides the location of computation and hardware capabilities, the natureof the software involves a myriad of variations that have serious implicationsfor security. Information exchange no longer has a p<strong>red</strong>ominantly client-servernature. Information is exchanged in a peer-to-peer fashion, more and moreinformation is sha<strong>red</strong> via social networks, and security sensitive operations(related to banking, healthcare, taxes, etc.) all occur via the Internet with avariety of technologies for such aspects as authentication and protection.25.1.2 Application DomainsICT technologies are used for many applications, ranging from generic use ofICT in the office or at home to more specific applications in industry, each withtheir own security requirements and threats. Below we highlight some—butby no means all—of these application domains in the NCSRA.• Domestic. ICT and ICT networks play an increasingly important rolein people’s private lives, as the way to communicate and socialize (e.g.,through social networks), as a source of information and entertainment(e.g., with gaming, and Internet taking over the role of television). Thisclearly has important security and privacy implications. Also, the hugeICT infrastructure collectively provided by Dutch citizens, with its excellentbroadband connections, in itself has proved to be an interestingtarget for botnets.• Commercial. Trust in ICT and Internet is vital for its ongoing andincreasing use, and for companies to reap the economic benefits that thisbrings. Online commerce is increasingly important, and lack of trust in147

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!