See #secure


Capability of a product to sustain operations while under attack from a malicious actor. A malicious attack can include a denial of service attack, a ransomware attack, or other malicious actions.

The following approaches can be applied to improve resistance:

  • to continuously protect itself from well-known attacks by removing potential flaws or weaknesses of the product with the use of integrated special security product to protect against DoS attacks, ransomware, and so on, which is a reasonable method;
  • to minimize vulnerability of a product by secure software coding and/or to incorporate security enhancement functions or mechanisms;
  • to maintain product updated during life time for security reason.


  • The security goal that generates the requirement for actions of an entity to be traced uniquely to that entity. This supports non-repudiation, deterrence, fault isolation, intrusion detection and prevention, and after-action recovery and legal action.
  • A property that ensures that the actions of an entity may be traced uniquely to that entity.
  • The property of being able to trace activities on a system to individuals who may then be held responsible for their actions.

Computer Security Resource Center