The Community for Technology Leaders
Green Image
Issue No. 06 - November/December (2011 vol. 9)
ISSN: 1540-7993
pp: 43-48
George Dinolt , Naval Postgraduate School
Simson L. Garfinkel , Naval Postgraduate School
Modern systems aren't designed to support some ongoing operations after their security has been compromised. Using Sterbenz's ResiliNets (resilient networks) model for describing the tasks of managing a system that might be attacked, the authors discuss five strategies for operating in a degraded security environment: ignorance is bliss (no recovery); response and recovery (no remediation, diagnosis, or refinement); isolate and treat (remediation, followed by recovery); in situ analysis (covert monitoring); and battleshort: hunker down and live with it.
Insecurity, degraded security, ResiliNets, battleshort, DoD Instruction 8500.2
George Dinolt, Simson L. Garfinkel, "Operations with Degraded Security", IEEE Security & Privacy, vol. 9, no. , pp. 43-48, November/December 2011, doi:10.1109/MSP.2011.149
93 ms
(Ver 3.1 (10032016))