Page 97 - index
P. 97







Also, given the nature of M2M—where patient adversaries have complete physical access to your
hardware—it may not be feasible to prevent all attacks against your devices. So prepare now for your
security systems to fail! Identify now how you will detect and respond to such failure in the long term.
Consider M2M across the full range of your existing security disaster and continuity of operations
(COOP) planning activities, including deploying a measured security posture before an attack; thorough
logging, auditing, and detection in the event an attack takes place; and timely forensics, analysis, and
remediation after an attack.


About The Author

Dr. John Linwood Griffin is a Research Fellow at
TeleCommunication Systems (TCS), Inc., where he leads
research and engineering programs on computer and
communications security. He earned Doctor of Philosophy
and Master of Science in Electrical and Computer
Engineering degrees from Carnegie Mellon University. He
earned a Bachelor of Science in Computer Engineering
degree from Auburn University, where he graduated
summa cum laude and as a University Honors Scholar. He
has written and taught academic and industrial courses on
computer storage, security, and networking and has co-
authored refereed conference, journal, and workshop
papers. Among the honors, grants, and awards he has received include an invitation to participate in the
U.S./Japan Experts’ Workshop on Critical Information Infrastructure Protection, an Intel Foundation Ph.D.
Fellowship, and a National Science Foundation Graduate Research Fellowship.

































97 Cyber Warnings E-Magazine – August 2013 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide
   92   93   94   95   96   97   98   99   100   101   102