Security critical processes in the context of this paper are considered information technology processes that are implemented to achieve a high level of integrity, authenticity and confidentiality of data processing. It ís a matter of fact that high-level security may only be achieved through adequate physical protection. The classical approach is to close away such processes in computing centers protected by physical barriers with high drag factors ñ well known to cause substantial investment and operational costs. This paper describes a new, recently patented method to protect such a security critical process by different means not to keep the attacker out but to take the valuables out when the attacker comes in. Practical application of this strategy is detailed giving an example of protecting a Trust Center of a Public Key Infrastructure by such means.
CITATION STYLE
Dafelmair, F. J. (2002). Survivability strategy for a security critical process. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 2434, pp. 61–69). Springer Verlag. https://doi.org/10.1007/3-540-45732-1_8
Mendeley helps you to discover research relevant for your work.