Download now Free registration required
Protecting valuable enterprise assets, such as data, computer systems, and networks is becoming increasingly complex especially in autonomic computing systems due to their reduced reliance on human intervention and verification, and increased reliance on the ability of the system to make business or strategic decisions. This naturally makes the system extremely vulnerable to security breaches and malicious attacks. Successfully mitigating security threats in autonomic systems requires a two-pronged approach that ensures solid and continuous protection. First, it requires that defense mechanisms be made an integral and inseparable part of the system to be protected. Second, it requires that the defense mechanisms themselves be secure to ensure uninterrupted protection.
- Format: PDF
- Size: 259 KB