The Community for Technology Leaders
Green Image
Issue No. 06 - November/December (2011 vol. 9)
ISSN: 1540-7993
pp: 43-48
Simson L. Garfinkel , Naval Postgraduate School
George Dinolt , Naval Postgraduate School
Modern systems aren't designed to support some ongoing operations after their security has been compromised. Using Sterbenz's ResiliNets (resilient networks) model for describing the tasks of managing a system that might be attacked, the authors discuss five strategies for operating in a degraded security environment: ignorance is bliss (no recovery); response and recovery (no remediation, diagnosis, or refinement); isolate and treat (remediation, followed by recovery); in situ analysis (covert monitoring); and battleshort: hunker down and live with it.
Insecurity, degraded security, ResiliNets, battleshort, DoD Instruction 8500.2

G. Dinolt and S. L. Garfinkel, "Operations with Degraded Security," in IEEE Security & Privacy, vol. 9, no. , pp. 43-48, 2011.
94 ms
(Ver 3.3 (11022016))