This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Operations with Degraded Security
November/December 2011 (vol. 9 no. 6)
pp. 43-48
Simson L. Garfinkel, Naval Postgraduate School
George Dinolt, Naval Postgraduate School
Modern systems aren't designed to support some ongoing operations after their security has been compromised. Using Sterbenz's ResiliNets (resilient networks) model for describing the tasks of managing a system that might be attacked, the authors discuss five strategies for operating in a degraded security environment: ignorance is bliss (no recovery); response and recovery (no remediation, diagnosis, or refinement); isolate and treat (remediation, followed by recovery); in situ analysis (covert monitoring); and battleshort: hunker down and live with it.

1. E.F. Moore and C.E. Shannon, "Reliable Circuits Using Less Reliable Relays," J. Franklin Inst., vol. 262, no. 3, 1956, pp. 191–208.
2. J.P.G. Sterbenz et al., "Resilience and Survivability in Communication Networks: Strategies, Principles, and Survey of Disciplines," Computer Networks, vol. 54, no. 8, 2010, pp. 1245–1265.
3. J.F. Meyer, "On Evaluating the Performability of Degradable Computing Systems," IEEE Trans. Computers, vol. 29, no. 8, pp. 720–731.
4. Microsoft TechNet, "Erroneous VeriSign-Issued Digital Certificates Pose Spoofing Hazard,"22 Mar. 2001; www.microsoft.com/technet/security/bulletin MS01-017.mspx.
5. "My Computer Has Been Compromised, What Do I Do?" ClamWin Free Antivirus, 2001; www.clamwin.com/content/view/14627.
6. I. Kristic and S. Garfinkel, "The One Laptop per Child Security Model," Symp. Usable Security and Privacy, ACM Press, 2007; http://simson.net/clips/academic2007.SOUPS.Bitfrost.pdf .
1. M. Fry, M. Fischer, and P. Smith, "Challenge Identification for Network Resilience," 65th EURO-NF Conf. Next Generation Internet (NGI 10), IEEE Press, 2010, pp. 1–8.
2. H. Yang et al., "Toward Resilient Security in Wireless Sensor Networks," Proc. Int'l Symp. Mobile Ad Hoc Networking and Computing (MobiHoc 05), ACM Press, 2005, pp. 34–45.
3. A. Seshadri, M. Luk, and A. Perrig, "SAKE: Software Attestation for Key Establishment in Sensor Networks," Proc. Distributed Computing in Sensor Systems (DCOSS 08), LNCS 5067, Springer, 2008, pp. 372–385.
4. A.N. Bessani et al., "The Crutial Way of Critical Infrastructure Protection," IEEE Security & Privacy, vol. 6, no. 6, 2008, pp. 44–51.
5. Department of Defense Instruction 8500. 2,6 Feb. 2003; www.dtic.mil/whs/directives/corres/pdf850002p.pdf .
6. NIST Special Publication 800-53, Revision 3, "Recommended Security Controls for Federal Information Systems and Organizations," Computer Security Division, Information Technology Laboratory, Nat'l Inst. of Standards and Technology, May 2010; http://csrc.nist.gov/publications/nistpubs/ 800-53-Rev3sp800-53-rev3-final.pdf.

Index Terms:
Insecurity, degraded security, ResiliNets, battleshort, DoD Instruction 8500.2
Citation:
Simson L. Garfinkel, George Dinolt, "Operations with Degraded Security," IEEE Security & Privacy, vol. 9, no. 6, pp. 43-48, Nov.-Dec. 2011, doi:10.1109/MSP.2011.149
Usage of this product signifies your acceptance of the Terms of Use.