• Corpus ID: 16030048

Defendable Architectures Achieving Cyber Security by Designing for Intelligence Driven Defense

@inproceedings{Fitch2015DefendableAA,
  title={Defendable Architectures Achieving Cyber Security by Designing for Intelligence Driven Defense},
  author={Scott C. Fitch},
  year={2015}
}
Conventional approaches to security architecture focus on hardening systems against attack. The implicit expectation is that, once deployed, it is the system’s responsibility to block all attacks against it. However, systems that rely strictly on hardening cannot learn from, or adapt themselves to, changes in attacker techniques, capabilities, and objectives over their lifecycle. Nor can they address the reality that attackers occasionally succeed. The ongoing efforts of sophisticated… 

References

SHOWING 1-10 OF 11 REFERENCES
Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains
TLDR
The evolution of advanced persistent threats necessitates an intelligence-based model because in this model the defenders mitigate not just vulnerability, but the threat component of risk, too.
A Threat-Driven Approach to Cyber Security Methodologies , Practices and Tools to Enable a Functionally Integrated Cyber Security Organization
TLDR
When this threat-driven approach is implemented along with tailored compliance processes, organizations can produce information systems that are both compliant and more secure, and produces an agile and resilient cyber security practice.
Risk and responsibility in a hyperconnected world: implications for enterprises
Introduction: Many leaders in business, civil society and government realize that for the world’s economy to fully derive the value inherent in technological innovation, a robust, coordinated system
CERT Resilience Management Model, Version 1.0 Improving Operational Resilience Processes
TLDR
CERT ® Resilience Management Model 1.x Part One: About the CERT ­Resilience management model 1.
and A . Tseitlin , " Chaos Monkey Released Into The Wild , " 30 July 2012 . [ Online ]
  • Fitch , " A Threat - Driven Approach to Cyber Security
  • 2014
Resilient Military Systems and the Advanced Cyber Threat
  • Office of the Under Secretary of Defense for Acquisition, Technology, and Logistics, Washington, DC, 2013.
  • 2013
Resilient Military Systems and the Advanced Cyber Threat Office of the Under Secretary of Defense for Acquisition
  • Technology, and Logistics
  • 2013
Chaos Monkey Released Into The Wild
  • 30 July 2012. [Online]. Available: http://techblog.netflix.com/2012/07/chaos-monkey-released-into-wild.html.
  • 2012
Chaos Monkey Released Into The Wild Available: http://techblog.netflix.com/2012/07/chaos-monkey-released-into-wild.html
  • Chaos Monkey Released Into The Wild Available: http://techblog.netflix.com/2012/07/chaos-monkey-released-into-wild.html
  • 2012
...
1
2
...