A CONDENSED APPROACH TO THE CYBER RESILIENT DESIGN SPACE
ABSTRACT In this paper, we describe cyber resiliency concepts, articulate models for where and how to design in resiliency, and provide examples of resiliency techniques. We describe the Continuous Trust Restoration concept and present “Start Secure. Stay Secure. Return Secure™” as three phases to c...
Gespeichert in:
Veröffentlicht in: | Insight (International Council on Systems Engineering) 2016-07, Vol.19 (2), p.43-46 |
---|---|
Hauptverfasser: | , , , , , |
Format: | Artikel |
Sprache: | eng |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | ABSTRACT
In this paper, we describe cyber resiliency concepts, articulate models for where and how to design in resiliency, and provide examples of resiliency techniques. We describe the Continuous Trust Restoration concept and present “Start Secure. Stay Secure. Return Secure™” as three phases to consider when requiring, implementing, and deploying cyber resiliency. We have touched on the importance of metrics for verification and validation, and we have provided a few examples of cyber resiliency solutions and techniques that are relevant to software and systems. It is important for systems engineers to consider how cyber resiliency can affect their systems, if they need it, and how to incorporate it early in the design process. |
---|---|
ISSN: | 2156-485X 2156-4868 |
DOI: | 10.1002/inst.12088 |