The Community for Technology Leaders
Green Image
Issue No. 06 - November/December (2011 vol. 9)
ISSN: 1540-7993
pp: 43-48
George Dinolt , Naval Postgraduate School
Simson L. Garfinkel , Naval Postgraduate School
ABSTRACT
Modern systems aren't designed to support some ongoing operations after their security has been compromised. Using Sterbenz's ResiliNets (resilient networks) model for describing the tasks of managing a system that might be attacked, the authors discuss five strategies for operating in a degraded security environment: ignorance is bliss (no recovery); response and recovery (no remediation, diagnosis, or refinement); isolate and treat (remediation, followed by recovery); in situ analysis (covert monitoring); and battleshort: hunker down and live with it.
INDEX TERMS
Insecurity, degraded security, ResiliNets, battleshort, DoD Instruction 8500.2
CITATION
George Dinolt, Simson L. Garfinkel, "Operations with Degraded Security", IEEE Security & Privacy, vol. 9, no. , pp. 43-48, November/December 2011, doi:10.1109/MSP.2011.149
92 ms
(Ver 3.3 (11022016))