Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
The risks of self-auditing systems
Mercuri R., Neumann P. Communications of the ACM59 (6):22-25,2016.Type:Article
Date Reviewed: Aug 22 2016

Impartial risk assessments of systems require independent external audits. Identifying risks posed by automatic self-auditing systems is not easy. How should internal self-auditing computing devices produce compliance data for validation by external auditors? Mercuri and Neumann offer timely viewpoints on the consequences and solutions to the threats of self-checking systems.

Undeniably, self-auditing systems are vulnerable to the lack of transparency that inhibits trust. The authors arguably discourage internal self-audits that encourage the misuse of system resources and make systems vulnerable to security attacks.

The paper discusses the inadvertent risks of errors and security due to the unrelenting innovative technological applications in medicine, the car manufacturing industry, electronic elections, and the management of complex organizations. The never-ending reliance on the use of digital devices to monitor the health conditions of patients, who have no knowledge of inaccurate meter displays, is a major problem design engineers and medical providers must resolve. Car manufacturing companies ought to be performing compliance testing for the standard verification of nitrogen oxide emissions by real road tests, instead of using automated factory test procedures. Certainly, reliable electronic systems should provide for external validation of all ballot entries. Unquestionably, the individual self-imposed monitoring systems of any complex organization, each with its implicit safety measures, can become catastrophic; for example, the paper insightfully reflects on the Deepwater Horizon project.

The authors concisely use practical examples of the potential security design flaws in automated teller machines, global positioning systems, and electronic voting systems to advocate the need for objective and reliable external auditing systems. I call on system designers concerned about system reliability to read this paper and weigh the roles security-related standards and compliance should continue to play in the formal and informal verification of future electronic and digital systems.

Reviewer:  Amos Olagunju Review #: CR144700 (1611-0824)
Bookmark and Share
  Reviewer Selected
Featured Reviewer
 
 
Security and Protection (D.4.6 )
 
Would you recommend this review?
yes
no
Other reviews under "Security and Protection": Date
Practical UNIX security
Garfinkel S., Spafford G., O’Reilly & Associates, Inc., Sebastopol, CA, 1991. Type: Book (9780937175729)
Jun 1 1992
Trusted products evaluation
Chokhani S. Communications of the ACM 35(7): 64-76, 1992. Type: Article
Oct 1 1993
An experience using two covert channel analysis techniques on a real system design
Haigh J., Kemmerer R., McHugh J., Young W. IEEE Transactions on Software Engineering SE-13(2): 157-168, 1987. Type: Article
Nov 1 1987
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy