IIC Journal of Innovation 9th Edition | Page 136

The Resilience Model Supporting IIoT System Trustworthiness adversity; the period during which the system does not satisfy the set of essential requirements because of adversity, and the time period during which the system is capable of restoring its functioning during and/or after adversity. These metrics are formalized and can further be evaluated. This method of evaluation require additional research. 2. Resilience approaches and techniques which can be used to increase the system’s resilience to attacks may be classified according to the factor which they consider and influence. This is quite helpful in identifying the applicable approaches for a particular case. 3. The risks connected to the use of the IT and IIoT services determine much of the strategies applied to increase the resilience of these services. The comparative examples demonstrate how the resilience strategies may vary significantly even for similar technologies. Currently, the process of identification is based on the expertise of the system architect. However, the method of semi- automated analysis may comprise a scope of further research.  Return to the beginning of this article  Return to the Table of Contents The views expressed in the IIC Journal of Innovation are the contributing authors’ views and do not necessarily represent the views of their respective employers nor those of the Industrial Internet Consortium. © 2018 The Industrial Internet Consortium logo is a registered trademark of Object Management Group®. Other logos, products and company names referenced in this publication are property of their respective companies. - 131 - IIC Journal of Innovation