Paper: Results-Oriented Security
Citation
M. Bishop, R. Ford, and M. Ramilli, “Results-Oriented Security,” Proceedings of the 6th International Conference on Malicious and Unwanted Software pp. 42–49(Oct. 2011).
Paper
- Published version web page, paper paywalled at IEEE Explore: [DOI] [URL]
- Authors’ final version:
- Local: [PDF] [PS]
- UC Repository: [eScholarship]
Abstract
Current security practice is to examine incoming messages, commands, data, and executing processes for attacks that can then be countered. This position paper argues that this practice is counterproductive because the number and variety of attacks are far greater than we can cope with. We propose a results-oriented approach, in which one focuses on the step of the attack that realizes the compromise. Thus, the manner in which the compromise is effected becomes less important than the actual result, and prevention, detection, and recovery efforts are focused on that.
Bibliographic Information: [BibTeX]
[RIS]
DOI: 10.1109/MALWARE.2011.6112325