Capability of a product to sustain operations while under attack from a malicious actor. A malicious attack can include a denial of service attack, a ransomware attack, or other malicious actions.
The following approaches can be applied to improve resistance:
- to continuously protect itself from well-known attacks by removing potential flaws or weaknesses of the product with the use of integrated special security product to protect against DoS attacks, ransomware, and so on, which is a reasonable method;
- to minimize vulnerability of a product by secure software coding and/or to incorporate security enhancement functions or mechanisms;
- to maintain product updated during life time for security reason.
- The security goal that generates the requirement for actions of an entity to be traced uniquely to that entity. This supports non-repudiation, deterrence, fault isolation, intrusion detection and prevention, and after-action recovery and legal action.
- A property that ensures that the actions of an entity may be traced uniquely to that entity.
- The property of being able to trace activities on a system to individuals who may then be held responsible for their actions.