Secure IT without vulnerabilities and back doors

Authors

DOI:

https://doi.org/10.14512/tatup.29.1.30

Keywords:

cybersecurity, sovereignty, open source, verification, supply chain risks

Abstract

Increasing dependence on information technology calls for strengthening the requirements on their safety and security. Vulnerabilities that result from flaws in hardware and software are a core problem which market mechanisms have failed to eliminate. A strategy for resolving this issue should consider the following options: (1) private- and public-sector funding for open and secure production, (2) strengthening the sovereign control over the production of critical IT components within an economic zone, and (3) improving and enforcing regulation. This paper analyses the strengths and weaknesses of these options and proposes a globally distributed, secure supply chain based on open and mathematically proved components. The approach supports the integration of legacy and new proprietary components.

Published

01.04.2020

How to Cite

1.
Weber A, Heiser G, Kuhlmann D, Schallbruch M, Chattopadhyay A, Guilley S, Kasper M, Krauß C, Krüger PS, Reith S, Seifert J-P. Secure IT without vulnerabilities and back doors. TATuP [Internet]. 2020 Apr. 1 [cited 2021 Aug. 2];29(1):30-6. Available from: https://www.tatup.de/index.php/tatup/article/view/6792

Most read articles by the same author(s)