Abstract
Software doesn't do what users wish due to defects, including security vulnerabilities Especially focus on vulnerabilities Defect categories for our purposes: Unintentional defects Security-related defects Non-security-related defects Intentional defects from malicious individual or subversion appearing to be from individual Need to help organization counter underhanded code Malicious organization: Hard to deal with Organization's goal & might not be considered defects Mechanisms to support independent review can help
Index Terms
(auto-classified)Approaches to Cyber-Resilience through Language System Design
Recommendations
Cyber-Resilience: Seven Steps for Institutional Survival
No enterprise will ever be 100% secure. There are just too many threats. This article presents seven practical steps to achieving cyber-resilience. Cyber resilience is not a traditional defensive stance. It requires a change in the way organizations ...
Classifying resilience approaches for protecting smart grids against cyber threats
AbstractSmart grids (SG) draw the attention of cyber attackers due to their vulnerabilities, which are caused by the usage of heterogeneous communication technologies and their distributed nature. While preventing or detecting cyber attacks is a well-...






Comments