Title :
Operations with Degraded Security
Author :
Garfinkel, Simson L. ; Dinolt, George
Abstract :
Modern systems aren´t designed to support some ongoing operations after their security is compromised. Using the ResiliNets model, the authors discuss five strategies for operating in a degraded security environment.
Keywords :
security of data; ResiliNets model; degraded security environment; degraded security operation; Network security; Privacy; Resilience; DoD Instruction 8500.2; Insecurity; ResiliNets; battleshort; degraded security;
Journal_Title :
Security & Privacy, IEEE
DOI :
10.1109/MSP.2011.149