Call Us: US - +1 845 478 5244 | UK - +44 20 7193 7850 | AUS - +61 2 8005 4826


  1. Database Survivability
    Database systems need to operate and continue their functions even with reduced capabilities, despite disruptive events such as information warfare attacks. A DBMS make every effort to prevent an attack and detecting one in the event of occurrence should be able to do the following:
    a. Confinement – Take immediate action to eliminate the attackers access to the system and to isolate or contain the problem to prevent further spread.
    b. Damage assessment – Determine the extent of the problem including failed functions and corrupted data.
    c. Reconfiguration – Reconfigure to allow operation to continue in a degraded mode while recovery proceeds.
    d. Repair – Repair corrupted or lost data and repair or reinstall failed system functions to reestablish a normal level of operation.
    e. Fault treatment – To the extent possible, identify the weakness exploited in the attack and take steps to prevent a recurrence.

The goal of the information warfare attacker is to damage the organization operation and fulfillment of its mission through disruption of its information systems. The target of an attack may be the system itself or its data. While the attacks that bring system down outright are severe and dramatic, they must also be well timed to achieve the attackers goal since attacks will receive immediate and concentrated attention to bring the system back to operational condition, diagnose how the attack took place
and install preventive measures.