Collaborative Financial Infrastructure Protection Tools, Abstraction

The Critical Infrastructure Protection Survey recently released by Symantec found that 53% of interviewed IT security experts from international companies experienced at least ten cyber attacks in the last five years, and financial institutions were often

  • PDF / 7,083,479 Bytes
  • 239 Pages / 439.37 x 666.142 pts Page_size
  • 70 Downloads / 188 Views

DOWNLOAD

REPORT


Roberto Baldoni r Gregory Chockler Editors

Collaborative Financial Infrastructure Protection Tools, Abstractions, and Middleware

Editors Roberto Baldoni Dipartimento di Ingegneria Informatica, Automatica e Gestionale Antonio Ruberti Università degali Studi di Roma “La Sapienza” Roma Italy

Gregory Chockler IBM Research – Haifa Haifa University Campus, Mount Carmel Haifa Israel

ISBN 978-3-642-20419-7 e-ISBN 978-3-642-20420-3 DOI 10.1007/978-3-642-20420-3 Springer Heidelberg Dordrecht London New York Library of Congress Control Number: 2011946180 ACM Computing Classification (1998): C.2, J.1, K.6, H.4, D.4 © Springer-Verlag Berlin Heidelberg 2012 This work is subject to copyright. All rights are reserved, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilm or in any other way, and storage in data banks. Duplication of this publication or parts thereof is permitted only under the provisions of the German Copyright Law of September 9, 1965, in its current version, and permission for use must always be obtained from Springer. Violations are liable to prosecution under the German Copyright Law. The use of general descriptive names, registered names, trademarks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use. Printed on acid-free paper Springer is part of Springer Science+Business Media (www.springer.com)

Security is, I would say, our top priority, because for all the exciting things you will be able to do with computers—organizing your lives, staying in touch with people, being creative—if we don’t solve these security problems, then people will hold back. Bill Gates

To Dora, Edoardo, Camilla, and Luca To Hana, Naomi, Michael, and Daniel.

Foreword

Societies have grown such a dependence on informatics, that a large part of their assets relies on the availability and correct operation of interconnected computer services. Of the several critical information infrastructures (CIIs) supporting the above-mentioned societal services, the financial infrastructure is an extremely important example. At the date of publishing of this book, the world is experiencing intense turmoil caused by instability in the financial sectors. Furthermore, their interdependence is such that countries’ crises contaminate each other, and local problems quickly become global. Two things become obvious: (i) the financial infrastructure (FI) is a crucial asset whose balance is easily disturbed by “natural” causes; (ii) this organisational vulnerability is amplified by FI stakeholders traditionally operating in isolation, as well as by technical vulnerabilities in the supporting computer systems and networks. Given this scenario, the FI is a natural target for cyber attack, with ample margin for damage. This is confirmed by recent public statistics of actual intrus