IIC Journal of Innovation 9th Edition | Page 132

The Resilience Model Supporting IIoT System Trustworthiness C Dynamic Reconfiguration / AR Path Diversity / Di The set of Attribute-Based Usage Restriction Trust-Based Privilege Management / PR parameters / PR for the Dynamic Privileges / PR algorithms R Dynamic Resource Allocation / AR System resources used to perform the operations Asset Mobility / DP Purposing / Ra Offloading / Ra Protected Backup and Restore / Re Surplus Capacity / Re Replication / Re D X Obfuscation / De Synthetic Diversity / Di Input data in Functional Relocation of Cyber Fragmentation / DP the IT Resources / DP context Non-Persistent Information / NP D S IoT Disinformation / De Monitoring and Damage Assessment / AM Environment Misdirection / De Sensor Fusion and Analysis / AM represented Tainting / De in the IT Dynamic Mapping and Profiling / DR context Functional Relocation of Sensors / DP Z Adaptive Management / AR System Monitoring and requirements Assessment / AM Calibrated Defense-in-Depth / CD Damage Sensor Fusion and Analysis / AM Self-Challenge / CD Malware and Forensic Analysis / Dynamic Threat Modeling / DR AM Mission Dependency and Status Integrity Checks / SI Visualization / DR Provenance Tracking / SI Behavior Validation / SI - 127 - IIC Journal of Innovation