Corpus ID: 16030048

Defendable Architectures Achieving Cyber Security by Designing for Intelligence Driven Defense

@inproceedings{Fitch2015DefendableAA,
  title={Defendable Architectures Achieving Cyber Security by Designing for Intelligence Driven Defense},
  author={Scott C. Fitch},
  year={2015}
}
Conventional approaches to security architecture focus on hardening systems against attack. The implicit expectation is that, once deployed, it is the system’s responsibility to block all attacks against it. However, systems that rely strictly on hardening cannot learn from, or adapt themselves to, changes in attacker techniques, capabilities, and objectives over their lifecycle. Nor can they address the reality that attackers occasionally succeed. The ongoing efforts of sophisticated… Expand

References

SHOWING 1-7 OF 7 REFERENCES
A Threat-Driven Approach to Cyber Security Methodologies , Practices and Tools to Enable a Functionally Integrated Cyber Security Organization
  • 16
  • Highly Influential
  • PDF
Risk and responsibility in a hyperconnected world: implications for enterprises
  • 25
and A . Tseitlin , " Chaos Monkey Released Into The Wild , " 30 July 2012 . [ Online ]
  • Fitch , " A Threat - Driven Approach to Cyber Security
  • 2014
Resilient Military Systems and the Advanced Cyber Threat
  • Office of the Under Secretary of Defense for Acquisition, Technology, and Logistics, Washington, DC, 2013.
  • 2013
Chaos Monkey Released Into The Wild
  • 30 July 2012. [Online]. Available: http://techblog.netflix.com/2012/07/chaos-monkey-released-into-wild.html.
  • 2012