Abstract:
This paper outlines the reasons why next-generation architecture is needed that can protect technology, systems, networks, and data in a dynamic risk environment. Althoug...Show MoreMetadata
Abstract:
This paper outlines the reasons why next-generation architecture is needed that can protect technology, systems, networks, and data in a dynamic risk environment. Although the Internet is integral to the flow of information across the globe and national boundaries, it was not built for the highly sensitive, critical data we see today. Architecture throughout protocol and software application stacks is not set up to face the cybersecurity issues. The forward-facing and strategic approach introduced here promotes an architecture inherently resilient to cybersecurity threats. This approach would also address the needs for 6G technologies, Web X.0, Metaverse, and any evolutionary technologies envisioned.
Date of Publication: 04 November 2022
Electronic ISBN:978-1-5044-9134-1
Persistent Link: https://ieeexplore.ieee.org/servlet/opac?punumber=9940222
Keywords assist with retrieval of results and provide a means to discovering other relevant content. Learn more.
- Index Terms
- Data Storage ,
- Autonomic System ,
- Internet Of Things ,
- Information Leakage ,
- General Data Protection Regulation ,
- National Science Foundation ,
- Heterogeneous Systems ,
- Quantum Computing ,
- Internet Of Things Devices ,
- Security Risks ,
- Security Environment ,
- Artificial Intelligence Systems ,
- Adversarial Attacks ,
- Threat Model ,
- Security Architecture ,
- Third-party Service ,
- Quantum Key Distribution ,
- Attack Surface ,
- Bad Actors ,
- Cybersecurity ,
- Areas Of Engineering ,
- Privacy ,
- Ransomware ,
- Quantum Information ,
- Security Issues ,
- Access Control ,
- Architectural Principles ,
- Artificial Intelligence Algorithms ,
- Personal Data
- Author Keywords
Keywords assist with retrieval of results and provide a means to discovering other relevant content. Learn more.
- Index Terms
- Data Storage ,
- Autonomic System ,
- Internet Of Things ,
- Information Leakage ,
- General Data Protection Regulation ,
- National Science Foundation ,
- Heterogeneous Systems ,
- Quantum Computing ,
- Internet Of Things Devices ,
- Security Risks ,
- Security Environment ,
- Artificial Intelligence Systems ,
- Adversarial Attacks ,
- Threat Model ,
- Security Architecture ,
- Third-party Service ,
- Quantum Key Distribution ,
- Attack Surface ,
- Bad Actors ,
- Cybersecurity ,
- Areas Of Engineering ,
- Privacy ,
- Ransomware ,
- Quantum Information ,
- Security Issues ,
- Access Control ,
- Architectural Principles ,
- Artificial Intelligence Algorithms ,
- Personal Data
- Author Keywords