{"title":"Adding the fourth \"R\" [CERT's model for computer security strategies]","authors":"B. Endicott-Popovsky, D. Frincke","doi":"10.1109/IAW.2004.1437854","DOIUrl":null,"url":null,"abstract":"In the emerging discipline of survivability, defined as the \"ability of a system to fulfil its mission, in a timely manner, in the presence of attacks, failures and accidents\", the CERT Coordination Center has implicitly institutionalized the concept of a never-ending, escalating computer security arms race. While previous point solutions - such as PKIs, VPNs and firewalls - focused on blocking attacks, survivability reflects the inevitability of experiencing attacks and the need to recover quickly. CERT's 3 R model - resistance, recognition, and recovery - describes survivability strategies. Increasing intruder accountability by increasing legal consequences will inhibit the escalation of the hacker arms race. This is reflected in CERT's model for computer security strategies by adding a 4th R, redress, to CERT's 3R model.","PeriodicalId":141403,"journal":{"name":"Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop, 2004.","volume":"11 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2004-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"8","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop, 2004.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IAW.2004.1437854","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 8
Abstract
In the emerging discipline of survivability, defined as the "ability of a system to fulfil its mission, in a timely manner, in the presence of attacks, failures and accidents", the CERT Coordination Center has implicitly institutionalized the concept of a never-ending, escalating computer security arms race. While previous point solutions - such as PKIs, VPNs and firewalls - focused on blocking attacks, survivability reflects the inevitability of experiencing attacks and the need to recover quickly. CERT's 3 R model - resistance, recognition, and recovery - describes survivability strategies. Increasing intruder accountability by increasing legal consequences will inhibit the escalation of the hacker arms race. This is reflected in CERT's model for computer security strategies by adding a 4th R, redress, to CERT's 3R model.