
Blog Posts
System Resilience Part 7: 16 Guiding Principles for System Resilience
Adverse events and conditions can disrupt a system, causing it to fail to provide essential capabilities and services. As I outlined in previous posts in this series, resilience is an …
• By Donald Firesmith
In Cybersecurity Engineering
System Resilience Part 6: Verification and Validation
Adverse events and conditions can disrupt a system, causing it to fail to provide essential capabilities and services. As I outlined in previous posts in this series, resilience is an …
• By Donald Firesmith
In Cybersecurity Engineering
System Resilience Part 5: Commonly-Used System Resilience Techniques
If adverse events or conditions cause a system to fail to operate appropriately, they can cause all manner of harm to valuable assets. As I outlined in previous posts in …
• By Donald Firesmith
In Cybersecurity Engineering
System Resilience Part 4: Classifying System Resilience Techniques
A system resilience technique is any architectural, design, or implementation technique that increases a system's resilience....
• By Donald Firesmith
In Cybersecurity Engineering
System Resilience Part 3: Engineering System Resilience Requirements
At its most basic level, system resilience is the degree to which a system continues to perform its mission in the face of adversity....
• By Donald Firesmith
In Cybersecurity Engineering
System Resilience Part 2: How System Resilience Relates to Other Quality Attributes
To most people, a system is resilient if it continues to perform its mission in the face of adversity....
• By Donald Firesmith
In Cybersecurity Engineering
System Resilience: What Exactly is it?
Over the past decade, system resilience (a.k.a., system resiliency) has been widely discussed as a critical concern, especially in terms of data centers and cloud computing....
• By Donald Firesmith
In Cybersecurity Engineering
What is System Resilience?
Over the past decade, system resilience (a.k.a., system resiliency) has been widely discussed as a critical concern, especially in terms of data centers and cloud computing. It is also vitally …
• By Donald Firesmith
Mission Thread Analysis Using End-to-End Data Flows - Part 2
The first blog post in this series provided an overview of the E2E Mission Thread Data Flow Analysis (EMDA) method, an approach that analyzes the flow of data as they …
• By Donald Firesmith
In Cybersecurity Engineering
Why Software Architects Must Be Involved in the Earliest Systems Engineering Activities
Today's major defense systems rely heavily on software-enabled capabilities. However, many defense programs acquiring new systems first determine the physical items to develop....
• By Sarah Sheard, Suzanne Miller, Bill Nichols, Donald Firesmith, Mike Phillips
In Software Architecture
Get updates on our latest work.
Sign up to have the latest post sent to your inbox weekly.